The document proposes an efficient image encryption method using pixel scrambling and genetic algorithms. The method involves segmenting the input image into blocks, randomly shuffling the pixels within each block, slicing the scrambled image into bitplanes, and applying genetic algorithm operations of crossover and mutation to further encrypt the data. Experiments on standard images show the method achieves a uniform histogram and low correlation between pixels, indicating high encryption strength. It also has faster encryption speeds compared to other algorithms. The document concludes the hybrid genetic algorithm approach provides an efficient and secure way to encrypt images.
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET Journal
This document proposes an image encryption system using logistic sine map and permutation models. The system works as follows:
1. A plain image is converted to grayscale and decomposed into 8 bit planes.
2. Each bit plane is randomly scrambled.
3. A logistic sine map is used to generate a key to partially encrypt each bit plane.
4. The bits planes are then permuted to obtain the final encrypted image. Logistic sine maps are well-suited for this approach due to their sensitivity to initial parameter values and ability to generate seemingly random outputs. The system aims to increase security by efficiently scrambling and permuting the bit plane values of the input image.
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...idescitation
In this paper, an architecture designed for Non-
Maximal Suppression used in Canny edge detection algorithm
is presented in order to reduce memory requirements
significantly. The architecture also achieves decreased latency
and increased throughput with no loss in edge detection. The
new algorithm used has a low-complexity 8-bin non-uniform
gradient magnitude histogram to compute block-based
hysteresis thresholds that are used by the Canny edge detector.
Furthermore, the hardware architecture of the proposed
algorithm is presented in this paper and the architecture is
synthesized on the Xilinx Virtex 5 FPGA. The design
development is done in VHDL and simulated results are
obtained using modelsim 6.3 with Xilinx 12.2.
IRJET- An Approach to FPGA based Implementation of Image Mosaicing using Neur...IRJET Journal
This document proposes using an FPGA to implement image mosaicing using neural networks. Image mosaicing stitches together overlapping images to create a panoramic image. It involves feature extraction, matching, calculating homography matrices, warping images, and blending. Neural networks can improve feature extraction accuracy. FPGAs can parallelize operations to greatly improve processing speed for tasks like this that involve pixel-level operations on images. The proposed system would extract features from input images using a neural network, match features to calculate homographies, warp images, stitch, and output a panoramic image. Implementing on an FPGA could increase speed by parallelizing operations compared to a conventional computer.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This document proposes a novel color image encryption scheme based on multiple chaotic systems. The scheme utilizes the ergodic properties of chaotic systems to perform pixel permutation and applies a substitution operation to achieve diffusion. In the permutation stage, two generalized Arnold maps are used to generate hybrid chaotic sequences to permute pixel positions. In the diffusion stage, four pseudo-random gray value sequences generated by another generalized Arnold map are used to diffuse the permuted image via bitwise XOR operations. Security analysis shows the scheme has a large key space and is highly secure against statistical attacks, differential attacks, and chosen/known plaintext attacks.
A Novel Low Complexity Histogram Algorithm for High Performance Image Process...IRJET Journal
This document proposes four new low complexity histogram generation algorithms to reduce the implementation complexity of histogram generators used in image processing applications. The existing histogram generator architectures require a large number of registers and counters due to 256 possible pixel intensity levels. The proposed algorithms reduce this complexity by approximating pixel values that differ by 1-4 levels to a single value. This is done by truncating 1-4 least significant bits of pixel values. Simulation results show the proposed algorithms generate identical histograms while significantly reducing the number of required registers and counters, lowering implementation complexity, power consumption, and delay compared to conventional designs.
IRJET- Crowd Density Estimation using Novel Feature DescriptorIRJET Journal
This document proposes a new texture feature-based approach for crowd density estimation using Completed Local Binary Pattern (CLBP). The approach divides images into blocks and further divides blocks into cells to compute CLBP features for each cell. A multi-class Support Vector Machine (SVM) classifier is trained to classify each block into one of four crowd density categories (Very Low, Low, Medium, High). Experiments on the PETS 2009 dataset show the proposed CLBP descriptor achieves 95% accuracy and outperforms other texture descriptors for crowd density estimation.
This document summarizes the author's work on a traffic sign recognition project using deep learning. The author explores preprocessing techniques like grayscale conversion, histogram equalization, and data augmentation. Two neural network architectures are developed - K-Net and K-Net-vgg, based on LeNet and VGG respectively. K-Net-vgg achieves 99.14% accuracy on the validation set and 97.07% on the test set. The model is also tested on 10 unlabeled internet images, producing top-5 predictions for each.
A fast fpga based architecture for measuring the distance betweenIAEME Publication
This paper presents an FPGA-based architecture for measuring the Manhattan distance between two RGB color images. The architecture takes RGB pixel values from each image as input and calculates the absolute difference between corresponding pixel values. It sums all the absolute differences and divides by the total number of pixels to obtain the normalized Manhattan distance. The architecture was implemented on a Xilinx Spartan 3 FPGA and can operate at 171.585 MHz, faster than software solutions. Experimental results demonstrating distance calculations on sample image pairs are presented. The FPGA implementation allows real-time Manhattan distance measurement for applications like image retrieval.
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET Journal
This document proposes an image encryption system using logistic sine map and permutation models. The system works as follows:
1. A plain image is converted to grayscale and decomposed into 8 bit planes.
2. Each bit plane is randomly scrambled.
3. A logistic sine map is used to generate a key to partially encrypt each bit plane.
4. The bits planes are then permuted to obtain the final encrypted image. Logistic sine maps are well-suited for this approach due to their sensitivity to initial parameter values and ability to generate seemingly random outputs. The system aims to increase security by efficiently scrambling and permuting the bit plane values of the input image.
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...idescitation
In this paper, an architecture designed for Non-
Maximal Suppression used in Canny edge detection algorithm
is presented in order to reduce memory requirements
significantly. The architecture also achieves decreased latency
and increased throughput with no loss in edge detection. The
new algorithm used has a low-complexity 8-bin non-uniform
gradient magnitude histogram to compute block-based
hysteresis thresholds that are used by the Canny edge detector.
Furthermore, the hardware architecture of the proposed
algorithm is presented in this paper and the architecture is
synthesized on the Xilinx Virtex 5 FPGA. The design
development is done in VHDL and simulated results are
obtained using modelsim 6.3 with Xilinx 12.2.
IRJET- An Approach to FPGA based Implementation of Image Mosaicing using Neur...IRJET Journal
This document proposes using an FPGA to implement image mosaicing using neural networks. Image mosaicing stitches together overlapping images to create a panoramic image. It involves feature extraction, matching, calculating homography matrices, warping images, and blending. Neural networks can improve feature extraction accuracy. FPGAs can parallelize operations to greatly improve processing speed for tasks like this that involve pixel-level operations on images. The proposed system would extract features from input images using a neural network, match features to calculate homographies, warp images, stitch, and output a panoramic image. Implementing on an FPGA could increase speed by parallelizing operations compared to a conventional computer.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This document proposes a novel color image encryption scheme based on multiple chaotic systems. The scheme utilizes the ergodic properties of chaotic systems to perform pixel permutation and applies a substitution operation to achieve diffusion. In the permutation stage, two generalized Arnold maps are used to generate hybrid chaotic sequences to permute pixel positions. In the diffusion stage, four pseudo-random gray value sequences generated by another generalized Arnold map are used to diffuse the permuted image via bitwise XOR operations. Security analysis shows the scheme has a large key space and is highly secure against statistical attacks, differential attacks, and chosen/known plaintext attacks.
A Novel Low Complexity Histogram Algorithm for High Performance Image Process...IRJET Journal
This document proposes four new low complexity histogram generation algorithms to reduce the implementation complexity of histogram generators used in image processing applications. The existing histogram generator architectures require a large number of registers and counters due to 256 possible pixel intensity levels. The proposed algorithms reduce this complexity by approximating pixel values that differ by 1-4 levels to a single value. This is done by truncating 1-4 least significant bits of pixel values. Simulation results show the proposed algorithms generate identical histograms while significantly reducing the number of required registers and counters, lowering implementation complexity, power consumption, and delay compared to conventional designs.
IRJET- Crowd Density Estimation using Novel Feature DescriptorIRJET Journal
This document proposes a new texture feature-based approach for crowd density estimation using Completed Local Binary Pattern (CLBP). The approach divides images into blocks and further divides blocks into cells to compute CLBP features for each cell. A multi-class Support Vector Machine (SVM) classifier is trained to classify each block into one of four crowd density categories (Very Low, Low, Medium, High). Experiments on the PETS 2009 dataset show the proposed CLBP descriptor achieves 95% accuracy and outperforms other texture descriptors for crowd density estimation.
This document summarizes the author's work on a traffic sign recognition project using deep learning. The author explores preprocessing techniques like grayscale conversion, histogram equalization, and data augmentation. Two neural network architectures are developed - K-Net and K-Net-vgg, based on LeNet and VGG respectively. K-Net-vgg achieves 99.14% accuracy on the validation set and 97.07% on the test set. The model is also tested on 10 unlabeled internet images, producing top-5 predictions for each.
A fast fpga based architecture for measuring the distance betweenIAEME Publication
This paper presents an FPGA-based architecture for measuring the Manhattan distance between two RGB color images. The architecture takes RGB pixel values from each image as input and calculates the absolute difference between corresponding pixel values. It sums all the absolute differences and divides by the total number of pixels to obtain the normalized Manhattan distance. The architecture was implemented on a Xilinx Spartan 3 FPGA and can operate at 171.585 MHz, faster than software solutions. Experimental results demonstrating distance calculations on sample image pairs are presented. The FPGA implementation allows real-time Manhattan distance measurement for applications like image retrieval.
An enhanced difference pair mapping steganography method to improve embedding...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- Implementation of FIR Filter using Self Tested 2n-2k-1 Modulo AdderIRJET Journal
This document presents a novel algorithm and VLSI implementation for a modulo 2n-2k-1 adder. The proposed modulo adder structure has four modules: pre-processing, carry generation, carry modification, and sum calculation. It aims to reduce area and delay compared to traditional modulo adders. The proposed adder is used to generate random numbers with a long period suitable for cryptography. It is also used to implement a finite impulse response (FIR) filter to demonstrate better performance than a normal FIR filter. Simulation results show the proposed FIR filter using the modulo adder has a delay of 11.21ns, less than the 26.69ns delay of a conventional FIR filter.
An improved image compression algorithm based on daubechies wavelets with ar...Alexander Decker
This document summarizes an academic article that proposes a new image compression algorithm using Daubechies wavelets and arithmetic coding. It first discusses existing image compression techniques and their limitations. It then describes the proposed algorithm, which applies Daubechies wavelet transform followed by 2D Walsh wavelet transform on image blocks and arithmetic coding. Results show the proposed method achieves higher compression ratios and PSNR values than existing algorithms like EZW and SPIHT. Future work aims to improve results by exploring different wavelets and compression techniques.
IRJET- An Improved 2LSB Steganography Technique for Data TransmissionIRJET Journal
This document proposes an improved 2LSB steganography technique for hiding data in digital images. The technique embeds message bits randomly into the least significant bit planes of pixels in an RGB image. It uses the two least significant bits of the red channel to indicate whether even or odd parity bits of the message will be embedded in the green and blue channels. The random embedding of bits and parity checks makes the hidden message difficult to detect. Experimental results show the technique can hide message bits in 65-74% of pixels while maintaining good image quality with PSNR values over 30dB. The technique aims to provide higher data hiding capacity and security compared to standard 2LSB steganography.
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformIOSR Journals
This document proposes a content-based image retrieval system using 2D discrete wavelet transform and texture features. The system decomposes images using 2D DWT, extracts texture features from low frequency coefficients using GLCM, and retrieves similar images by calculating Euclidean distances between feature vectors. Experimental results on Wang's database show the proposed approach achieves 89.8% average retrieval accuracy.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET- Finding Dominant Color in the Artistic Painting using Data Mining ...IRJET Journal
This document discusses finding the dominant color in an artistic painting using data mining techniques. It proposes using k-means clustering via the OpenCV library in Python to cluster pixels in the image by color and determine the dominant color cluster. The document provides background on k-means clustering and other clustering algorithms. It then describes applying a faster k-means algorithm to the image pixels to efficiently identify the dominant color in 2-3 times fewer iterations than standard k-means. The proposed system architecture involves preprocessing the image, extracting pixel vectors, clustering the pixels into color groups using fast k-means, and identifying the dominant color cluster.
Transmission of critical data over the link, in the
presence of an attacker has augmented the demand for secure
communication. Particularly in the military field, exchange of
classified images has to be executed with extreme caution.
Advanced digital technologies require encryption, authentication
and key distribution techniques to facilitate reliable and
secure communication. In this paper, Discrete Wavelet Transform
(DWT) Sub-band Exchange based color image fusion scheme for
enhanced security is proposed. In this method, the horizontal
and vertical sub-bands of two colored images are replaced by
chrominance information of each other. This permits generation
of uniquely fused gray-scale textured images. This method
facilitates fused images which are extremely difficult to intercept
by the attacker, since the probability of getting hold on all
the information pertaining to one single image is negligible.
Also, this method offers reduced bandwidth utilization and less
transmission time as it converts colored images to compressed
textured gray-scale images. In addition to proposing a novel
image fusion technique and compression scheme, this paper
illustrates detailed analysis of the algorithm.
Survey on clustering based color image segmentation and novel approaches to f...eSAT Journals
Abstract Segmentation is an important image processing technique that helps to analyze an image automatically. Applications involving detection or recognition of objects in images often include segmentation process. This paper describes two unsupervised clustering based color image segmentation techniques namely K-means clustering and Fuzzy C-means (FCM) clustering. The advantages and disadvantages of both K-means and Fuzzy C-means algorithm are also presented in this paper. K-means algorithm takes less computation time as compared to Fuzzy C-means algorithm which produces result close to that of K-means. On the other hand in FCM algorithm each pixel of an image can have membership to more than one cluster which is not in case of K-means algorithm, an advantage to FCM method. Color images contain wide variety of information and are more complicated than gray scale images. In image processing, though color image segmentation is a challenging task but provides a path for image analysis in practical application fields. Secondly some novel approaches to FCM algorithm for better image segmentation are also discussed such as SFCM (Spatial FCM) and THFCM (Thresholding FCM). Basic FCM algorithm does not take into consideration the spatial information of the image. SFCM specially focus on spatial details and contribute towards image segmentation results for image analysis. It introduces spatial function into FCM algorithm membership function and then operates with available spatial information. THFCM is another approach that focus on thresholding technique for image segmentation. It main task is to find a discerner cluster that will act as automatic threshold. These two approaches shows how better segmentation results can be obtained.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...IJNSA Journal
Methods like edge directed interpolation and projection onto convex sets (POCS) that are widely used for image error concealment to produce better image quality are complex in nature and also time consuming. Moreover, those methods are not suitable for real time error concealment where the decoder may not have sufficient computation power or done in online. In this paper, we propose a data-hiding scheme for error concealment of digital image. Edge direction information of a block is extracted in the encoder and is embedded imperceptibly into the host media using quantization index modulation (QIM), thus reduces work load of the decoder. The system performance in term of fidelity and computational load is improved using M-ary data modulation based on near-orthogonal QIM. The decoder extracts the embedded
features (edge information) and those features are then used for recovery of lost data. Experimental results duly support the effectiveness of the proposed scheme.
A secured data transmission system by reversible data hiding with scalable co...IAEME Publication
The document describes a method for secure image transmission that combines reversible data hiding, encryption, compression, and steganography. It involves three main steps:
1. Reversible data hiding is used to embed the original image data by reserving room before encryption. Some pixel least significant bit values are embedded in other pixels.
2. Scalable compression is then applied to further secure the image.
3. The compressed, encrypted image then has additional data hidden within it using steganography techniques for transmission.
The receiving end performs the inverse processes of extracting the data, decompressing the image, and recovering the original embedded image in a lossless and secure manner. The method aims to achieve high quality encrypted
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...Alexander Decker
This document summarizes a research paper on 3D discrete cosine transform (DCT) for image compression. It discusses how 3D-DCT video compression works by dividing video streams into groups of 8 frames treated as 3D images with 2 spatial and 1 temporal component. Each frame is divided into 8x8 blocks and each 8x8x8 cube is independently encoded using 3D-DCT, quantization, and entropy encoding. It achieves better compression ratios than 2D JPEG by exploiting correlations across multiple frames. The document provides details on the 3D-DCT compression and decompression process. It reports that testing on a set of 8 images achieved a compression ratio of around 27 with this technique.
Color image encryption decryption using smtZiadAlqady
This document summarizes a research paper that proposes a new method for color image encryption and decryption using segment map tables (SMT) and a private key (PK). The method segments the image into blocks, reorders the blocks using the SMT, and encrypts the reordered image by XORing it with the PK. It was tested on various images and results showed it to be simple, secure, efficient with fast encryption and decryption speeds, and to better preserve image quality compared to other methods. Experimental results validated that the proposed method satisfies requirements for mean square error and peak signal-to-noise ratio during the encryption and decryption processes.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET- Matlab based Multi Feature Extraction in Image and Video Analysis ...IRJET Journal
This document discusses using MATLAB for multi-feature extraction in image and video analysis. It focuses on four techniques: 1) Improving image and video quality using histogram equalization, 2) Changing image and video formats, 3) Resizing images and videos, and 4) Compressing images and videos using wavelet compression techniques. It proposes combining these four techniques into one MATLAB-based software program to simplify image and video processing for users. The document reviews existing related work on individual techniques and argues the proposed approach integrates multiple techniques into a single tool.
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET Journal
This document presents a proposed method for detecting fake Indian currency notes using image processing techniques. The proposed system takes an image of a currency note as input and performs pre-processing including resizing, restoration, and enhancement. It then applies "X-ray vision" using dark channel prior to extract inner and outer edges of patterns in the image. The extracted patterns are labeled and classified using a fuzzy classifier. The system is able to classify images as real or fake currency with 90-95% accuracy. The document reviews related work on currency detection and provides details on the proposed methodology, which includes image acquisition, pre-processing, enhancement, dark channel prior, labeling, and fuzzy classification. Results are presented showing the output of each step.
IRJET- Interactive Image Segmentation with Seed PropagationIRJET Journal
The document proposes a method called Adaptive Constraint Propagation Cut (ACPCut) for interactive image segmentation that uses seed propagation to learn a global discriminative structure from limited user inputs. ACPCut adaptively propagates characteristics of user markers across the image to avoid bias while preserving data coherence. Experimental results show that ACPCut achieves state-of-the-art performance in interactive image segmentation in terms of effectiveness and efficiency compared to other methods.
A new partial image encryption method for document images using variance base...IJECEIAES
The proposed method partially and completely encrypts the gray scale Document images. The complete image encryption is also performed to compare the performance with the existing encryption methods. The partial encryption is carried out by segmenting the image using the Quad-tree decomposition method based on the variance of the image block. The image blocks with uniform pixel levels are considered insignificant blocks and others the significant blocks. The pixels in the significant blocks are permuted by using 1D Skew tent chaotic map. The partially encrypted image blocks are further permuted using 2D Henon map to increase the security level and fed as input to complete encryption. The complete encryption is carried out by diffusing the partially encrypted image. Two levels of diffusion are performed. The first level simply modifies the pixels in the partially encrypted image with the Bernoulli’s chaotic map. The second level establishes the interdependency between rows and columns of the first level diffused image. The experiment is conducted for both partial and complete image encryption on the Document images. The proposed scheme yields better results for both partial and complete encryption on Speed, statistical and dynamical attacks. The results ensure better security when compared to existing encryption schemes.
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
This document proposes a new method for securely transmitting images over a medium using mosaic image creation in video. The method has two main phases:
1) Mosaic video creation: A video is selected and its frames are used to create a mosaic image that resembles a target secret image. Color transformations are applied to fit tiles of the secret image into blocks of frames. Relevant information for recovery is embedded into the mosaic video.
2) Secret image recovery: At the receiving end, the frames are extracted from the video. The embedded information is extracted to recover tiles of the secret image from the mosaic frames through inverse transformations. The secret image is thus reconstructed without any loss.
COMPOSITE IMAGELET IDENTIFIER FOR ML PROCESSORSIRJET Journal
The document proposes a composite imagelet identifier technique for machine learning processors that uses seam carving to manipulate edges and pixilation in images for processing. It discusses using existing algorithms like SSIM and Dijkstra's algorithm to calculate image energy and identify optimal seam locations for manipulation. The technique is evaluated using test images in MATLAB and is presented as having potential applications in areas like forestry, animal husbandry and safety monitoring.
An enhanced difference pair mapping steganography method to improve embedding...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- Implementation of FIR Filter using Self Tested 2n-2k-1 Modulo AdderIRJET Journal
This document presents a novel algorithm and VLSI implementation for a modulo 2n-2k-1 adder. The proposed modulo adder structure has four modules: pre-processing, carry generation, carry modification, and sum calculation. It aims to reduce area and delay compared to traditional modulo adders. The proposed adder is used to generate random numbers with a long period suitable for cryptography. It is also used to implement a finite impulse response (FIR) filter to demonstrate better performance than a normal FIR filter. Simulation results show the proposed FIR filter using the modulo adder has a delay of 11.21ns, less than the 26.69ns delay of a conventional FIR filter.
An improved image compression algorithm based on daubechies wavelets with ar...Alexander Decker
This document summarizes an academic article that proposes a new image compression algorithm using Daubechies wavelets and arithmetic coding. It first discusses existing image compression techniques and their limitations. It then describes the proposed algorithm, which applies Daubechies wavelet transform followed by 2D Walsh wavelet transform on image blocks and arithmetic coding. Results show the proposed method achieves higher compression ratios and PSNR values than existing algorithms like EZW and SPIHT. Future work aims to improve results by exploring different wavelets and compression techniques.
IRJET- An Improved 2LSB Steganography Technique for Data TransmissionIRJET Journal
This document proposes an improved 2LSB steganography technique for hiding data in digital images. The technique embeds message bits randomly into the least significant bit planes of pixels in an RGB image. It uses the two least significant bits of the red channel to indicate whether even or odd parity bits of the message will be embedded in the green and blue channels. The random embedding of bits and parity checks makes the hidden message difficult to detect. Experimental results show the technique can hide message bits in 65-74% of pixels while maintaining good image quality with PSNR values over 30dB. The technique aims to provide higher data hiding capacity and security compared to standard 2LSB steganography.
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformIOSR Journals
This document proposes a content-based image retrieval system using 2D discrete wavelet transform and texture features. The system decomposes images using 2D DWT, extracts texture features from low frequency coefficients using GLCM, and retrieves similar images by calculating Euclidean distances between feature vectors. Experimental results on Wang's database show the proposed approach achieves 89.8% average retrieval accuracy.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET- Finding Dominant Color in the Artistic Painting using Data Mining ...IRJET Journal
This document discusses finding the dominant color in an artistic painting using data mining techniques. It proposes using k-means clustering via the OpenCV library in Python to cluster pixels in the image by color and determine the dominant color cluster. The document provides background on k-means clustering and other clustering algorithms. It then describes applying a faster k-means algorithm to the image pixels to efficiently identify the dominant color in 2-3 times fewer iterations than standard k-means. The proposed system architecture involves preprocessing the image, extracting pixel vectors, clustering the pixels into color groups using fast k-means, and identifying the dominant color cluster.
Transmission of critical data over the link, in the
presence of an attacker has augmented the demand for secure
communication. Particularly in the military field, exchange of
classified images has to be executed with extreme caution.
Advanced digital technologies require encryption, authentication
and key distribution techniques to facilitate reliable and
secure communication. In this paper, Discrete Wavelet Transform
(DWT) Sub-band Exchange based color image fusion scheme for
enhanced security is proposed. In this method, the horizontal
and vertical sub-bands of two colored images are replaced by
chrominance information of each other. This permits generation
of uniquely fused gray-scale textured images. This method
facilitates fused images which are extremely difficult to intercept
by the attacker, since the probability of getting hold on all
the information pertaining to one single image is negligible.
Also, this method offers reduced bandwidth utilization and less
transmission time as it converts colored images to compressed
textured gray-scale images. In addition to proposing a novel
image fusion technique and compression scheme, this paper
illustrates detailed analysis of the algorithm.
Survey on clustering based color image segmentation and novel approaches to f...eSAT Journals
Abstract Segmentation is an important image processing technique that helps to analyze an image automatically. Applications involving detection or recognition of objects in images often include segmentation process. This paper describes two unsupervised clustering based color image segmentation techniques namely K-means clustering and Fuzzy C-means (FCM) clustering. The advantages and disadvantages of both K-means and Fuzzy C-means algorithm are also presented in this paper. K-means algorithm takes less computation time as compared to Fuzzy C-means algorithm which produces result close to that of K-means. On the other hand in FCM algorithm each pixel of an image can have membership to more than one cluster which is not in case of K-means algorithm, an advantage to FCM method. Color images contain wide variety of information and are more complicated than gray scale images. In image processing, though color image segmentation is a challenging task but provides a path for image analysis in practical application fields. Secondly some novel approaches to FCM algorithm for better image segmentation are also discussed such as SFCM (Spatial FCM) and THFCM (Thresholding FCM). Basic FCM algorithm does not take into consideration the spatial information of the image. SFCM specially focus on spatial details and contribute towards image segmentation results for image analysis. It introduces spatial function into FCM algorithm membership function and then operates with available spatial information. THFCM is another approach that focus on thresholding technique for image segmentation. It main task is to find a discerner cluster that will act as automatic threshold. These two approaches shows how better segmentation results can be obtained.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...IJNSA Journal
Methods like edge directed interpolation and projection onto convex sets (POCS) that are widely used for image error concealment to produce better image quality are complex in nature and also time consuming. Moreover, those methods are not suitable for real time error concealment where the decoder may not have sufficient computation power or done in online. In this paper, we propose a data-hiding scheme for error concealment of digital image. Edge direction information of a block is extracted in the encoder and is embedded imperceptibly into the host media using quantization index modulation (QIM), thus reduces work load of the decoder. The system performance in term of fidelity and computational load is improved using M-ary data modulation based on near-orthogonal QIM. The decoder extracts the embedded
features (edge information) and those features are then used for recovery of lost data. Experimental results duly support the effectiveness of the proposed scheme.
A secured data transmission system by reversible data hiding with scalable co...IAEME Publication
The document describes a method for secure image transmission that combines reversible data hiding, encryption, compression, and steganography. It involves three main steps:
1. Reversible data hiding is used to embed the original image data by reserving room before encryption. Some pixel least significant bit values are embedded in other pixels.
2. Scalable compression is then applied to further secure the image.
3. The compressed, encrypted image then has additional data hidden within it using steganography techniques for transmission.
The receiving end performs the inverse processes of extracting the data, decompressing the image, and recovering the original embedded image in a lossless and secure manner. The method aims to achieve high quality encrypted
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...Alexander Decker
This document summarizes a research paper on 3D discrete cosine transform (DCT) for image compression. It discusses how 3D-DCT video compression works by dividing video streams into groups of 8 frames treated as 3D images with 2 spatial and 1 temporal component. Each frame is divided into 8x8 blocks and each 8x8x8 cube is independently encoded using 3D-DCT, quantization, and entropy encoding. It achieves better compression ratios than 2D JPEG by exploiting correlations across multiple frames. The document provides details on the 3D-DCT compression and decompression process. It reports that testing on a set of 8 images achieved a compression ratio of around 27 with this technique.
Color image encryption decryption using smtZiadAlqady
This document summarizes a research paper that proposes a new method for color image encryption and decryption using segment map tables (SMT) and a private key (PK). The method segments the image into blocks, reorders the blocks using the SMT, and encrypts the reordered image by XORing it with the PK. It was tested on various images and results showed it to be simple, secure, efficient with fast encryption and decryption speeds, and to better preserve image quality compared to other methods. Experimental results validated that the proposed method satisfies requirements for mean square error and peak signal-to-noise ratio during the encryption and decryption processes.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET- Matlab based Multi Feature Extraction in Image and Video Analysis ...IRJET Journal
This document discusses using MATLAB for multi-feature extraction in image and video analysis. It focuses on four techniques: 1) Improving image and video quality using histogram equalization, 2) Changing image and video formats, 3) Resizing images and videos, and 4) Compressing images and videos using wavelet compression techniques. It proposes combining these four techniques into one MATLAB-based software program to simplify image and video processing for users. The document reviews existing related work on individual techniques and argues the proposed approach integrates multiple techniques into a single tool.
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET Journal
This document presents a proposed method for detecting fake Indian currency notes using image processing techniques. The proposed system takes an image of a currency note as input and performs pre-processing including resizing, restoration, and enhancement. It then applies "X-ray vision" using dark channel prior to extract inner and outer edges of patterns in the image. The extracted patterns are labeled and classified using a fuzzy classifier. The system is able to classify images as real or fake currency with 90-95% accuracy. The document reviews related work on currency detection and provides details on the proposed methodology, which includes image acquisition, pre-processing, enhancement, dark channel prior, labeling, and fuzzy classification. Results are presented showing the output of each step.
IRJET- Interactive Image Segmentation with Seed PropagationIRJET Journal
The document proposes a method called Adaptive Constraint Propagation Cut (ACPCut) for interactive image segmentation that uses seed propagation to learn a global discriminative structure from limited user inputs. ACPCut adaptively propagates characteristics of user markers across the image to avoid bias while preserving data coherence. Experimental results show that ACPCut achieves state-of-the-art performance in interactive image segmentation in terms of effectiveness and efficiency compared to other methods.
A new partial image encryption method for document images using variance base...IJECEIAES
The proposed method partially and completely encrypts the gray scale Document images. The complete image encryption is also performed to compare the performance with the existing encryption methods. The partial encryption is carried out by segmenting the image using the Quad-tree decomposition method based on the variance of the image block. The image blocks with uniform pixel levels are considered insignificant blocks and others the significant blocks. The pixels in the significant blocks are permuted by using 1D Skew tent chaotic map. The partially encrypted image blocks are further permuted using 2D Henon map to increase the security level and fed as input to complete encryption. The complete encryption is carried out by diffusing the partially encrypted image. Two levels of diffusion are performed. The first level simply modifies the pixels in the partially encrypted image with the Bernoulli’s chaotic map. The second level establishes the interdependency between rows and columns of the first level diffused image. The experiment is conducted for both partial and complete image encryption on the Document images. The proposed scheme yields better results for both partial and complete encryption on Speed, statistical and dynamical attacks. The results ensure better security when compared to existing encryption schemes.
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
This document proposes a new method for securely transmitting images over a medium using mosaic image creation in video. The method has two main phases:
1) Mosaic video creation: A video is selected and its frames are used to create a mosaic image that resembles a target secret image. Color transformations are applied to fit tiles of the secret image into blocks of frames. Relevant information for recovery is embedded into the mosaic video.
2) Secret image recovery: At the receiving end, the frames are extracted from the video. The embedded information is extracted to recover tiles of the secret image from the mosaic frames through inverse transformations. The secret image is thus reconstructed without any loss.
COMPOSITE IMAGELET IDENTIFIER FOR ML PROCESSORSIRJET Journal
The document proposes a composite imagelet identifier technique for machine learning processors that uses seam carving to manipulate edges and pixilation in images for processing. It discusses using existing algorithms like SSIM and Dijkstra's algorithm to calculate image energy and identify optimal seam locations for manipulation. The technique is evaluated using test images in MATLAB and is presented as having potential applications in areas like forestry, animal husbandry and safety monitoring.
Number Plate Recognition of Still Images in Vehicular Parking SystemIRJET Journal
This document discusses a proposed method for number plate recognition in vehicle parking systems using image processing techniques. It begins with an abstract that outlines the increasing need for automated vehicle management systems due to rising vehicle and traffic volumes. It then provides an overview of the key steps in number plate recognition systems - plate detection, character segmentation, and character recognition. The proposed method uses profile projection for segmentation and neural networks for recognition. The document reviews several existing plate detection methods and their limitations. It proposes a new method that uses edge detection and morphological operations to isolate the license plate from an image while removing noise. Finally, it discusses factors to consider for license plate detection and different image segmentation techniques used in existing automatic number plate recognition systems.
This document presents a traffic sign recognition system using a convolutional neural network (CNN) model. The authors train the CNN model on a German traffic sign dataset containing over 50,000 images across 43 classes. The proposed CNN architecture contains 4 VGGNet blocks with convolutional, max pooling, dropout and batch normalization layers. The model is trained for 45 epochs and achieves 96.9% accuracy and 11.4% test loss on the test set, outperforming other baseline models. The trained CNN model can accurately classify traffic sign images to assist with applications like self-driving cars.
Minimum image disortion of reversible data hidingIRJET Journal
1) The document presents a method for minimum image distortion in reversible data hiding. It aims to hide data in image files while maintaining high image quality after extraction.
2) The method assigns different weights to pixels for feature extraction in steganalysis based on their probability of being altered. It focuses on regions likely changed to reduce the effect of unchanged smooth areas.
3) Experimental results on four common mobile steganography techniques demonstrate the effectiveness of the proposed scheme, particularly at low embedding rates, in identifying areas containing hidden data while maintaining perceptual image quality.
1) The document describes a novel design for an inexpensive high-quality panoramic camera. It uses a motor-controlled camera mounted on a 2-axis stand to capture overlapping images with recorded parameters for image stitching.
2) Simple image stitching algorithms along with recorded image parameters can be used to generate high-quality panoramic images in real-time, without requiring complicated computationally-intensive algorithms.
3) The proposed system was tested and able to produce high-quality stitched panoramic images using basic algorithms by controlling camera settings and overlap between images. This approach paves the way for low-cost portable panoramic camera systems.
IRJET - Underwater Image Enhancement using PCNN and NSCT FusionIRJET Journal
This document discusses techniques for enhancing underwater images that have been degraded due to scattering and absorption in the water medium. It proposes a new method for color image fusion using Non-Subsampled Contourlet Transform (NSCT) and Pulse Coupled Neural Network (PCNN). NSCT is used to decompose the image into sub-bands, while PCNN is used to fuse the high frequency sub-band coefficients. The proposed method is shown to outperform other fusion methods in objective quality assessment metrics. Various other underwater image enhancement techniques are also discussed, including wavelength compensation, multi-band fusion, image mode filtering, and approaches using neural networks like convolutional neural networks.
IRJET- Different Approaches for Implementation of Fractal Image Compressi...IRJET Journal
This document discusses different approaches for implementing fractal image compression on medical images using parallel processing on GPUs. It analyzes fractal image compression algorithms in MATLAB to compress medical images with very low loss in image quality. The key aspects covered are:
1. Fractal image compression uses self-similarity within images to achieve high compression ratios while preserving image quality.
2. Implementing fractal compression in parallel on GPUs can significantly reduce computational time compared to CPU implementations, as the redundant processing can be distributed across multiple processors.
3. The document implements and evaluates different fractal compression algorithms on MATLAB to compress medical images with low signal-to-noise ratio, high compression ratio, and reduced encoding time.
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsIRJET Journal
The document discusses two lossless image encryption algorithms: the bit plane crypt algorithm and the edge map crypt algorithm. Both algorithms use a key image of the same size as the original image to encrypt the image. The bit plane algorithm extracts a bit plane from another image to generate the key image. It then performs an XOR operation between the key image and each bit plane of the original image. The edge map algorithm generates the key image by detecting edges in another image and encrypts each bit plane of the original image using an XOR with the edge map. Both algorithms invert the bit plane order and combine them to produce the encrypted image. Simulation results show the original image can be recovered losslessly from the encrypted image using the decryption process for
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
This document summarizes a research paper that proposes a new method for securely transmitting images using image segmentation, permutation, and multi-encryption techniques. It begins with an abstract that outlines encrypting images to protect confidential data from unauthorized access. It then provides background on encryption and discusses how traditional text encryption is not suitable for large image files. The proposed method segments an image, permutes the pixels using random numbers, and repeats the encryption multiple times for security. It claims this approach provides strong encryption with minimal data loss or computational costs compared to other methods.
IRJET- Mango Classification using Convolutional Neural NetworksIRJET Journal
This document presents research on classifying different types of mangoes using convolutional neural networks (CNNs). The researchers collected a dataset of over 5000 mango images across 5 classes. They used transfer learning with the Inception v3 CNN model pre-trained on ImageNet, removing the final classification layer and retraining a new one for the mango classes. The CNN achieved over 99% accuracy on the test set at classifying mango types, demonstrating that CNNs can effectively perform fine-grained image classification of mangoes and distinguish between similar types.
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
This document proposes a new chaos-based image encryption and decryption scheme using Arnold's cat map for pixel permutation and the Lorenz system for diffusion. A hash function, specifically MurmurHash3, is used to generate the permutation and diffusion keys. This helps accelerate the diffusion process and reduces the number of cipher cycles needed compared to previous schemes. The encryption process involves first permuting the pixel positions using the cat map, with control parameters determined by the hash value of the original image. Then diffusion is performed using the Lorenz system to generate the keystream. Decryption follows the reverse process using the same keys. Security analysis demonstrates the scheme has a large key space and the encrypted images pass various statistical tests, indicating the
An efficient image compression algorithm using dct biorthogonal wavelet trans...eSAT Journals
Abstract
Recently the digital imaging applications is increasing significantly and it leads the requirement of effective image compression techniques. Image compression removes the redundant information from an image. By using it we can able to store only the necessary information which helps to reduce the transmission bandwidth, transmission time and storage size of image. This paper proposed a new image compression technique using DCT-Biorthogonal Wavelet Transform with arithmetic coding for improvement the visual quality of an image. It is a simple technique for getting better compression results. In this new algorithm firstly Biorthogonal wavelet transform is applied and then 2D DCT-Biorthogonal wavelet transform is applied on each block of the low frequency sub band. Finally, split all values from each transformed block and arithmetic coding is applied for image compression.
Keywords: Arithmetic coding, Biorthogonal wavelet Transform, DCT, Image Compression.
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
This document proposes a new secure image transmission method using byte rotation algorithm that improves encryption speed and security. The key steps are:
1. The input image is divided into four blocks which are shuffled using byte rotation.
2. A cover image is used to embed the shuffled secret image blocks for transmission.
3. At the receiver, byte rotation is applied again to extract the original secret image blocks from the embedded image.
Experimental results show the proposed method recovers images with high PSNR quality scores while increasing encryption speed over other algorithms like AES. This provides a more secure and fast way to transmit encrypted images over networks.
The document describes a system that uses AI technologies like optical character recognition, text summarization, and speech synthesis to automatically recognize text from images, summarize it, and generate an audio podcast of the summary. The system segments text from images using a neural network with differentiable binarization. It recognizes words using a temporal recognition network with connectionist temporal classification. It summarizes the text using either an abstractive transformer model or extractive PageRank algorithm. Finally, it generates a mel-spectrogram from the summary and synthesizes speech from the spectrogram using generative adversarial networks. The system aims to quickly digest lengthy publications for users.
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...IRJET Journal
This document presents a proposed system for symmetric image registration based on intensity and spatial information using a technique called the Coloured Simple Algebraic Algorithm (CSAA). The system first preprocesses color images, extracts features, then classifies images as symmetric or asymmetric using a neural network. It is shown to provide accurate and robust registration of medical and biomedical images. The system is implemented and evaluated on sample images, demonstrating it can successfully identify symmetric versus asymmetric images. The proposed approach aims to improve on existing techniques for intensity-based image registration tasks.
Similar to IRJET- Efficient Image Encryption with Pixel Scrambling and Genetic Algorithm (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.