This document discusses image segmentation techniques for plasma detection in visible images of tokamaks. It compares Gray Level Local Variance (GLLV), Gray Level Local Entropy (GLLE), and Gray Level Spatial Correlation (GLSC) based 2D histogram segmentation methods using Tsallis entropy thresholding. These methods construct 2D histograms using pixel gray levels combined with local variance, entropy, or spatial correlation features. The document implements these methods on visible tokamak images and evaluates the results using an unsupervised uniformity value metric. It finds that the GLSC method provides better segmentation in terms of uniformity value compared to the other techniques.
An unsupervised method for real time video shot segmentationcsandit
Segmentation of a video into its constituent shots is a fundamental task for indexing and
analysis in content based video retrieval systems. In this paper, a novel approach is presented
for accurately detecting the shot boundaries in real time video streams, without any a priori
knowledge about the content or type of the video. The edges of objects in a video frame are
detected using a spatio-temporal fuzzy hostility index. These edges are treated as features of the
frame. The correlation between the features is computed for successive incoming frames of the
video. The mean and standard deviation of the correlation values obtained are updated as new
video frames are streamed in. This is done to dynamically set the threshold value using the
three-sigma rule for detecting the shot boundary (abrupt transition). A look back mechanism
forms an important part of the proposed algorithm to detect any missed hard cuts, especially
during the start of the video. The proposed method is shown to be applicable for online video
analysis and summarization systems. In an experimental evaluation on a heterogeneous test set,
consisting of videos from sports, movie songs and music albums, the proposed method achieves
99.24% recall and 99.35% precision on the average.
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region IJECEIAES
This paper presents data an Ant colony optimization (ACO) based data hiding technique. ACO is used to detect complex region of cover image and afterward, least significant bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. ACO is an algorithm developed inspired by the inborn manners of ant species. The ant leaves pheromone on the ground for searching food and provisions. The proposed ACO-based data hiding in complex region establishes an array of pheromone, also called pheromone matrix, which represents the complex region in sequence at each pixel position of the cover image. The pheromone matrix is developed according to the movements of ants, determined by local differences of the image element’s intensity. The least significant bits of complex region pixels are substituted with message bits, to hide secret information. The experimental results, provided, show the significance of the performance of the proposed method.
This document compares the performance of various thresholding algorithms for segmenting biomedical images. It begins by introducing thresholding as a common segmentation technique and describes several thresholding methods: global thresholding, variable thresholding, thresholding with background, Otsu's method, and Sauvola thresholding. It then applies these algorithms to segment a chest radiograph and analyzes the results. The algorithms either over-segment or under-segment the image when using a single global threshold. Variable thresholding and Sauvola thresholding perform better by adapting locally. Subdividing the image and thresholding segments independently gives the best segmentation.
Brain tumor segmentation using asymmetry based histogram thresholding and k m...eSAT Publishing House
This document presents a method for segmenting brain tumors from MRI images using asymmetry-based histogram thresholding and k-means clustering. The method involves 8 steps: 1) preprocessing the MRI image using sharpening and median filters, 2) computing histograms of the left and right halves of the image, 3) calculating a threshold value using the difference between left and right histograms, 4) applying thresholding and morphological operations to extract the tumor region, 5) applying k-means clustering and using the cluster centroids to refine the segmentation. The method is tested on 30 MRI images and results show the tumor region is accurately segmented. The segmented tumors can then be used for quantification, classification, and computer-assisted diagnosis of brain tumors.
Robust foreground modelling to segment and detect multiple moving objects in ...IJECEIAES
This document summarizes a research paper that proposes a robust foreground modeling method to segment and detect multiple moving objects in videos. The proposed method uses a running average technique to model the background and subtract it from video frames to detect foreground objects. Morphological operations like dilation and erosion are applied to reduce noise and merge connected regions. Convex hull processing is also used to define object boundaries more clearly. The method was tested on standard video datasets and achieved better performance than other techniques in segmenting objects under various challenging conditions like illumination changes and occlusion. Experimental results demonstrated high precision, recall and specificity based on comparisons with ground truth data.
This document reviews different techniques for thinning images, including the Zhang and Suen algorithm and neural networks. It provides an overview of existing thinning approaches, such as iterative algorithms, and proposes a new approach using neural networks. The proposed approach aims to perform thinning invariant to rotations while being less sensitive to noise than existing methods. It evaluates techniques based on execution time, thinning rate, and other performance measures. The document concludes that neural networks may provide better results than existing techniques in terms of metrics like PSNR and MSE, while also reducing execution time for skeletonization.
Visual Cryptography using Image ThresholdingIRJET Journal
This document proposes a novel visual cryptography algorithm using image thresholding that generates shares of an image without requiring a key. The technique thresholds the secret image to create two shares such that individual shares do not reveal information about the secret image. The original image can be reconstructed by performing an OR operation on the pixel values of the shares using the threshold value, without any loss of quality or information. The algorithm was tested on color images in MATLAB and successfully recovered the original image from the shares.
This document provides a survey of single scalar point multiplication algorithms for elliptic curves over prime fields. It discusses the background of elliptic curve cryptography and point multiplication. Point multiplication is the dominant operation in ECC and can be computed using on-the-fly techniques or precomputation if the point is fixed. The efficiency of point multiplication depends on the recoding method used to represent the scalar and the composite elliptic curve operations employed. Various recoding methods and point multiplication algorithms are analyzed, including binary, signed binary using NAF representation, and window methods.
An unsupervised method for real time video shot segmentationcsandit
Segmentation of a video into its constituent shots is a fundamental task for indexing and
analysis in content based video retrieval systems. In this paper, a novel approach is presented
for accurately detecting the shot boundaries in real time video streams, without any a priori
knowledge about the content or type of the video. The edges of objects in a video frame are
detected using a spatio-temporal fuzzy hostility index. These edges are treated as features of the
frame. The correlation between the features is computed for successive incoming frames of the
video. The mean and standard deviation of the correlation values obtained are updated as new
video frames are streamed in. This is done to dynamically set the threshold value using the
three-sigma rule for detecting the shot boundary (abrupt transition). A look back mechanism
forms an important part of the proposed algorithm to detect any missed hard cuts, especially
during the start of the video. The proposed method is shown to be applicable for online video
analysis and summarization systems. In an experimental evaluation on a heterogeneous test set,
consisting of videos from sports, movie songs and music albums, the proposed method achieves
99.24% recall and 99.35% precision on the average.
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region IJECEIAES
This paper presents data an Ant colony optimization (ACO) based data hiding technique. ACO is used to detect complex region of cover image and afterward, least significant bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. ACO is an algorithm developed inspired by the inborn manners of ant species. The ant leaves pheromone on the ground for searching food and provisions. The proposed ACO-based data hiding in complex region establishes an array of pheromone, also called pheromone matrix, which represents the complex region in sequence at each pixel position of the cover image. The pheromone matrix is developed according to the movements of ants, determined by local differences of the image element’s intensity. The least significant bits of complex region pixels are substituted with message bits, to hide secret information. The experimental results, provided, show the significance of the performance of the proposed method.
This document compares the performance of various thresholding algorithms for segmenting biomedical images. It begins by introducing thresholding as a common segmentation technique and describes several thresholding methods: global thresholding, variable thresholding, thresholding with background, Otsu's method, and Sauvola thresholding. It then applies these algorithms to segment a chest radiograph and analyzes the results. The algorithms either over-segment or under-segment the image when using a single global threshold. Variable thresholding and Sauvola thresholding perform better by adapting locally. Subdividing the image and thresholding segments independently gives the best segmentation.
Brain tumor segmentation using asymmetry based histogram thresholding and k m...eSAT Publishing House
This document presents a method for segmenting brain tumors from MRI images using asymmetry-based histogram thresholding and k-means clustering. The method involves 8 steps: 1) preprocessing the MRI image using sharpening and median filters, 2) computing histograms of the left and right halves of the image, 3) calculating a threshold value using the difference between left and right histograms, 4) applying thresholding and morphological operations to extract the tumor region, 5) applying k-means clustering and using the cluster centroids to refine the segmentation. The method is tested on 30 MRI images and results show the tumor region is accurately segmented. The segmented tumors can then be used for quantification, classification, and computer-assisted diagnosis of brain tumors.
Robust foreground modelling to segment and detect multiple moving objects in ...IJECEIAES
This document summarizes a research paper that proposes a robust foreground modeling method to segment and detect multiple moving objects in videos. The proposed method uses a running average technique to model the background and subtract it from video frames to detect foreground objects. Morphological operations like dilation and erosion are applied to reduce noise and merge connected regions. Convex hull processing is also used to define object boundaries more clearly. The method was tested on standard video datasets and achieved better performance than other techniques in segmenting objects under various challenging conditions like illumination changes and occlusion. Experimental results demonstrated high precision, recall and specificity based on comparisons with ground truth data.
This document reviews different techniques for thinning images, including the Zhang and Suen algorithm and neural networks. It provides an overview of existing thinning approaches, such as iterative algorithms, and proposes a new approach using neural networks. The proposed approach aims to perform thinning invariant to rotations while being less sensitive to noise than existing methods. It evaluates techniques based on execution time, thinning rate, and other performance measures. The document concludes that neural networks may provide better results than existing techniques in terms of metrics like PSNR and MSE, while also reducing execution time for skeletonization.
Visual Cryptography using Image ThresholdingIRJET Journal
This document proposes a novel visual cryptography algorithm using image thresholding that generates shares of an image without requiring a key. The technique thresholds the secret image to create two shares such that individual shares do not reveal information about the secret image. The original image can be reconstructed by performing an OR operation on the pixel values of the shares using the threshold value, without any loss of quality or information. The algorithm was tested on color images in MATLAB and successfully recovered the original image from the shares.
This document provides a survey of single scalar point multiplication algorithms for elliptic curves over prime fields. It discusses the background of elliptic curve cryptography and point multiplication. Point multiplication is the dominant operation in ECC and can be computed using on-the-fly techniques or precomputation if the point is fixed. The efficiency of point multiplication depends on the recoding method used to represent the scalar and the composite elliptic curve operations employed. Various recoding methods and point multiplication algorithms are analyzed, including binary, signed binary using NAF representation, and window methods.
An effective and robust technique for the binarization of degraded document i...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGEScscpconf
Segmentation of Synthetic Aperture Radar (SAR) images have a great use in observing the global environment, and in analysing the target detection and recognition .But , segmentation of (SAR) images is known as a very complex task, due to the existence of speckle noise. Therefore, in this paper we present a fast SAR images segmentation based on between class variance. Our choice for used (BCV) method, because it is one of the most effective thresholding techniques for most real world images with regard to uniformity and shape measures. Our experiments will be as a test to determine which technique is effective in thresholding (extraction) the oil spill for numerous SAR images, and in the future these thresholding
techniques can be very useful in detection objects in other SAR images
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGEScsitconf
Segmentation of Synthetic Aperture Radar (SAR) images have a great use in observing the
global environment, and in analysing the target detection and recognition .But , segmentation
of (SAR) images is known as a very complex task, due to the existence of speckle noise.
Therefore, in this paper we present a fast SAR images segmentation based on between class
variance. Our choice for used (BCV) method, because it is one of the most effective thresholding
techniques for most real world images with regard to uniformity and shape measures. Our
experiments will be as a test to determine which technique is effective in thresholding
(extraction) the oil spill for numerous SAR images, and in the future these thresholding
techniques can be very useful in detection objects in other SAR images
Tracking and counting human in visual surveillance systemiaemedu
This document summarizes a proposed system for tracking and counting humans in a visual surveillance system. The system first performs background subtraction on input video frames to detect foreground objects. It applies this process to both grayscale and binary image formats, and selects the better-performing format. Features are then extracted from detected blobs, including size, centroid, and color. Tracking rectangles are drawn around whole detected objects to group separated body parts. Counting is done by detecting when pixel values change from background to foreground. Experimental results on videos with various challenges like shadows, illumination changes, and occlusions showed the system could accurately track and count humans, with near-perfect accuracy even for occluded or broken objects, though it introduced some minor errors.
Efficient fingerprint image enhancement algorithm based on gabor filtereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes a research paper that proposes a novel background removal algorithm using fuzzy c-means clustering. It begins by introducing background subtraction and some of the challenges. It then describes the proposed algorithm which uses edge detection to locate regions of interest before applying fuzzy c-means clustering to segment the foreground object. The algorithm achieves significant computation time reduction compared to other methods. Experimental results show the proposed method has higher true positive rates and accuracy compared to other algorithms, though precision and similarity are slightly lower.
Data Steganography for Optical Color Image CryptosystemsCSCJournals
In this paper, an optical color image cryptosystem with a data hiding scheme is proposed. In the proposed optical cryptosystem, a confidential color image is embedded into the host image of the same size. Then the stego-image is encrypted by using the double random phase encoding algorithm. The seeds to generate random phase data are hidden in the encrypted stego-image by a content-dependent and low distortion data embedding technique. The confidential image and secret data delivery is accomplished by hiding the image into the host image and embedding the data into the encrypted stego-image. Experimental results show that the proposed data steganographic cryptosystem provides large data hiding capacity and high reconstructed image quality.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
This document summarizes an article that proposes a new image steganography technique using discrete wavelet transform. The technique applies an adaptive pixel pair matching method from the spatial domain to the frequency domain. Data is embedded in the middle frequencies of the discrete wavelet transformed image because they are more robust to attacks than high frequencies. The coefficients in the low frequency sub-band are preserved unchanged to improve image quality. The experimental results showed better performance with discrete wavelet transform compared to the spatial domain.
improving differently illuminant images with fuzzy membership based saturatio...INFOGAIN PUBLICATION
Illumination estimation is basic to white balancing digital color images and to color constancy. The key to automatic white balancing of digital images is to estimate precisely the color of the overall scene illumination. Many methods for estimating the illumination’s color has proposed. Though not the most exact, one of the simplest and quite extensively used methods are the gray world algorithm, white patch, max-RGB, Gray edge using first order derivative and gray edge using second order derivative, saturation weighting. The first-three methods have neglected the multiple light sources illuminate. In this work, we investigate how illuminate estimation techniques can be improved using fuzzy membership. The main aim of this paper is to evaluate performance of Fuzzy Enhancement based saturation weighting technique for different light sources (single, multiple, indoor scene and outdoor scene) under different conditions. The experiment has clearly shown the effectiveness of the proposed technique over the available methods.
Modified weighted embedding method for image steganographyIAEME Publication
This document proposes a modified weighted embedding method for image steganography. It begins by discussing traditional LSB substitution methods and their weaknesses. It then describes the proposed method, which embeds data by complementing LSBs in image pixels based on the decimal value of the data, rather than direct bit replacement. This is intended to provide better security while maintaining high image quality. The embedding algorithm works by converting the data to decimal, dividing the cover image into blocks, and complementing LSBs in the block pixels based on the decimal digits and an embedding table. Extraction works similarly but in reverse. Experiments on grayscale images are said to support the method.
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...IJMER
In this paper a two stage reversible data hiding technique is proposed. At the first stage, an
interpolation technique is used to generate a cover image from the input image. The difference values
from input image and cover image is used as the carrier to embed data. At the second stage, a histogram
modification is applied on a difference image to embed data. The extraction process also works in two
stages. The proposed algorithm is expected to increase the embedding capacity as two techniques are
combined. The interpolation technique helps to keep the distortion low. Experimental results show that
the new method has higher embedding capacity than other existing methods.
Gabor filter is a powerful way to enhance biometric images like fingerprint images in order to extract correct features from these images, Gabor filter used in extracting features directly asin iris images, and sometimes Gabor filter has been used for texture analysis. In fingerprint images The even symmetric Gabor filter is contextual filter or multi-resolution filter will be used to enhance fingerprint imageby filling small gaps (low-pass effect) in the direction of the ridge (black regions) and to increase the discrimination between ridge and valley (black and white regions) in the direction, orthogonal to the ridge, the proposed method in applying Gabor filter on fingerprint images depending on translated fingerprint image into binary image after applying some simple enhancing methods to partially overcome time consuming problem of the Gabor filter.
This document summarizes a research paper on techniques for binarizing degraded document images. It discusses how degraded documents often have mixed foreground and background pixels that need to be separated. The proposed method uses contrast adjustment, grey scale edge detection, thresholding and post-processing to binarize degraded images. It first inverts the image contrast, then uses grey scale detection to find text stroke edges. Pixels are classified and thresholding is used to create a binary image. Post-processing removes background pixels to output a clean image with only text strokes. The method is tested on degraded novel and book images and produces separated, readable text from the backgrounds.
A CONCERT EVALUATION OF EXEMPLAR BASED IMAGE INPAINTING ALGORITHMS FOR NATURA...cscpconf
Image inpainting derives from restoration of art works, and has been applied to repair ancient
art works. Inpainting is a technique of restoring a partially damaged or occluded image in an
undetectable way. It fills the damaged part of an image by employing information of the
undamaged part according to some rules to make it look “reasonable” to human eyes. Digital
image inpainting is relatively new area of research, but numerous and different approaches to
tackle the inpainting problem have been proposed since the concept was first introduced. This
paper analyzes and compares the recent exemplar based inpainting algorithms by Minqin Wang
and Hao Guo et al. A number of examples on real images are demonstrated to evaluate the
results of algorithms using Peak Signal to Noise Ratio (PSNR)
This document discusses data hiding techniques for images. It begins by introducing steganography and some common image steganography methods like LSB substitution, blocking, and palette modification. It then reviews related work on minimizing distortion in steganography, modifying matrix encoding for minimal distortion, and designing adaptive steganographic schemes. The document proposes using a universal distortion measure to evaluate embedding changes independently of the domain. It presents a system for reversible data hiding in encrypted images that partitions the image, encrypts it, hides data in the encrypted image, and allows extraction from the decrypted or encrypted image. Least significant bit substitution is discussed as an approach for hiding data in the encrypted image.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that proposes a new technique for binarizing images captured of black/green boards using a mobile camera. It begins with an abstract that overviews binarizing degraded images from mobile-captured black/green board images to extract text with 92.589% accuracy. It then reviews existing binarization techniques in the literature and describes common global and local thresholding methods. The proposed technique enhances the input image, segments it into 3x3 parts, computes local thresholds using OTSU for each part, binarizes the parts, and joins them. Experimental results on a database of 50 mobile-captured board images show the technique achieves better accuracy than other algorithms according to evaluation metrics.
This document summarizes JPEG image compression techniques. It discusses how images are divided into blocks and transformed from the spatial domain to the frequency domain using the Discrete Cosine Transform (DCT). It then describes how the DCT coefficients are quantized and arranged in zigzag order before entropy encoding with Huffman coding. The goal of JPEG compression is to store image data using as little space as possible while maintaining enough visual detail. The techniques discussed aim to remove irrelevant and redundant image data through DCT, quantization, and entropy encoding.
An unsupervised method for real time video shot segmentationcsandit
Segmentation of a video into its constituent shots
is a fundamental task for indexing and
analysis in content based video retrieval systems.
In this paper, a novel approach is presented
for accurately detecting the shot boundaries in rea
l time video streams, without any a priori
knowledge about the content or type of the video. T
he edges of objects in a video frame are
detected using a spatio-temporal fuzzy hostility in
dex. These edges are treated as features of the
frame. The correlation between the features is comp
uted for successive incoming frames of the
video. The mean and standard deviation of the corre
lation values obtained are updated as new
video frames are streamed in. This is done to dynam
ically set the threshold value using the
three-sigma rule for detecting the shot boundary (a
brupt transition). A look back mechanism
forms an important part of the proposed algorithm t
o detect any missed hard cuts, especially
during the start of the video. The proposed method
is shown to be applicable for online video
analysis and summarization systems. In an experimen
tal evaluation on a heterogeneous test set,
consisting of videos from sports, movie songs and m
usic albums, the proposed method achieves
99.24% recall and 99.35% precision on the average
Comparative study on image fusion methods in spatial domainIAEME Publication
This document provides a comparative study of various image fusion methods in the spatial domain. It begins by introducing image fusion and its applications. Section 2 then describes several common fusion algorithms in the spatial domain, including average, select maximum/minimum, Brovey transform, intensity hue saturation (IHS), and principal component analysis (PCA). Section 3 defines image fusion quality measures like entropy, mean squared error, and normalized cross correlation. Section 4 provides a comparative analysis of the spatial domain fusion techniques based on parameters like simplicity, type of resources, and disadvantages. It finds that spatial domain methods provide high spatial resolution but have issues like image blurring and producing less informative outputs. The document concludes that while the best algorithm depends on the problem, spatial
An effective and robust technique for the binarization of degraded document i...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGEScscpconf
Segmentation of Synthetic Aperture Radar (SAR) images have a great use in observing the global environment, and in analysing the target detection and recognition .But , segmentation of (SAR) images is known as a very complex task, due to the existence of speckle noise. Therefore, in this paper we present a fast SAR images segmentation based on between class variance. Our choice for used (BCV) method, because it is one of the most effective thresholding techniques for most real world images with regard to uniformity and shape measures. Our experiments will be as a test to determine which technique is effective in thresholding (extraction) the oil spill for numerous SAR images, and in the future these thresholding
techniques can be very useful in detection objects in other SAR images
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGEScsitconf
Segmentation of Synthetic Aperture Radar (SAR) images have a great use in observing the
global environment, and in analysing the target detection and recognition .But , segmentation
of (SAR) images is known as a very complex task, due to the existence of speckle noise.
Therefore, in this paper we present a fast SAR images segmentation based on between class
variance. Our choice for used (BCV) method, because it is one of the most effective thresholding
techniques for most real world images with regard to uniformity and shape measures. Our
experiments will be as a test to determine which technique is effective in thresholding
(extraction) the oil spill for numerous SAR images, and in the future these thresholding
techniques can be very useful in detection objects in other SAR images
Tracking and counting human in visual surveillance systemiaemedu
This document summarizes a proposed system for tracking and counting humans in a visual surveillance system. The system first performs background subtraction on input video frames to detect foreground objects. It applies this process to both grayscale and binary image formats, and selects the better-performing format. Features are then extracted from detected blobs, including size, centroid, and color. Tracking rectangles are drawn around whole detected objects to group separated body parts. Counting is done by detecting when pixel values change from background to foreground. Experimental results on videos with various challenges like shadows, illumination changes, and occlusions showed the system could accurately track and count humans, with near-perfect accuracy even for occluded or broken objects, though it introduced some minor errors.
Efficient fingerprint image enhancement algorithm based on gabor filtereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes a research paper that proposes a novel background removal algorithm using fuzzy c-means clustering. It begins by introducing background subtraction and some of the challenges. It then describes the proposed algorithm which uses edge detection to locate regions of interest before applying fuzzy c-means clustering to segment the foreground object. The algorithm achieves significant computation time reduction compared to other methods. Experimental results show the proposed method has higher true positive rates and accuracy compared to other algorithms, though precision and similarity are slightly lower.
Data Steganography for Optical Color Image CryptosystemsCSCJournals
In this paper, an optical color image cryptosystem with a data hiding scheme is proposed. In the proposed optical cryptosystem, a confidential color image is embedded into the host image of the same size. Then the stego-image is encrypted by using the double random phase encoding algorithm. The seeds to generate random phase data are hidden in the encrypted stego-image by a content-dependent and low distortion data embedding technique. The confidential image and secret data delivery is accomplished by hiding the image into the host image and embedding the data into the encrypted stego-image. Experimental results show that the proposed data steganographic cryptosystem provides large data hiding capacity and high reconstructed image quality.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
This document summarizes an article that proposes a new image steganography technique using discrete wavelet transform. The technique applies an adaptive pixel pair matching method from the spatial domain to the frequency domain. Data is embedded in the middle frequencies of the discrete wavelet transformed image because they are more robust to attacks than high frequencies. The coefficients in the low frequency sub-band are preserved unchanged to improve image quality. The experimental results showed better performance with discrete wavelet transform compared to the spatial domain.
improving differently illuminant images with fuzzy membership based saturatio...INFOGAIN PUBLICATION
Illumination estimation is basic to white balancing digital color images and to color constancy. The key to automatic white balancing of digital images is to estimate precisely the color of the overall scene illumination. Many methods for estimating the illumination’s color has proposed. Though not the most exact, one of the simplest and quite extensively used methods are the gray world algorithm, white patch, max-RGB, Gray edge using first order derivative and gray edge using second order derivative, saturation weighting. The first-three methods have neglected the multiple light sources illuminate. In this work, we investigate how illuminate estimation techniques can be improved using fuzzy membership. The main aim of this paper is to evaluate performance of Fuzzy Enhancement based saturation weighting technique for different light sources (single, multiple, indoor scene and outdoor scene) under different conditions. The experiment has clearly shown the effectiveness of the proposed technique over the available methods.
Modified weighted embedding method for image steganographyIAEME Publication
This document proposes a modified weighted embedding method for image steganography. It begins by discussing traditional LSB substitution methods and their weaknesses. It then describes the proposed method, which embeds data by complementing LSBs in image pixels based on the decimal value of the data, rather than direct bit replacement. This is intended to provide better security while maintaining high image quality. The embedding algorithm works by converting the data to decimal, dividing the cover image into blocks, and complementing LSBs in the block pixels based on the decimal digits and an embedding table. Extraction works similarly but in reverse. Experiments on grayscale images are said to support the method.
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...IJMER
In this paper a two stage reversible data hiding technique is proposed. At the first stage, an
interpolation technique is used to generate a cover image from the input image. The difference values
from input image and cover image is used as the carrier to embed data. At the second stage, a histogram
modification is applied on a difference image to embed data. The extraction process also works in two
stages. The proposed algorithm is expected to increase the embedding capacity as two techniques are
combined. The interpolation technique helps to keep the distortion low. Experimental results show that
the new method has higher embedding capacity than other existing methods.
Gabor filter is a powerful way to enhance biometric images like fingerprint images in order to extract correct features from these images, Gabor filter used in extracting features directly asin iris images, and sometimes Gabor filter has been used for texture analysis. In fingerprint images The even symmetric Gabor filter is contextual filter or multi-resolution filter will be used to enhance fingerprint imageby filling small gaps (low-pass effect) in the direction of the ridge (black regions) and to increase the discrimination between ridge and valley (black and white regions) in the direction, orthogonal to the ridge, the proposed method in applying Gabor filter on fingerprint images depending on translated fingerprint image into binary image after applying some simple enhancing methods to partially overcome time consuming problem of the Gabor filter.
This document summarizes a research paper on techniques for binarizing degraded document images. It discusses how degraded documents often have mixed foreground and background pixels that need to be separated. The proposed method uses contrast adjustment, grey scale edge detection, thresholding and post-processing to binarize degraded images. It first inverts the image contrast, then uses grey scale detection to find text stroke edges. Pixels are classified and thresholding is used to create a binary image. Post-processing removes background pixels to output a clean image with only text strokes. The method is tested on degraded novel and book images and produces separated, readable text from the backgrounds.
A CONCERT EVALUATION OF EXEMPLAR BASED IMAGE INPAINTING ALGORITHMS FOR NATURA...cscpconf
Image inpainting derives from restoration of art works, and has been applied to repair ancient
art works. Inpainting is a technique of restoring a partially damaged or occluded image in an
undetectable way. It fills the damaged part of an image by employing information of the
undamaged part according to some rules to make it look “reasonable” to human eyes. Digital
image inpainting is relatively new area of research, but numerous and different approaches to
tackle the inpainting problem have been proposed since the concept was first introduced. This
paper analyzes and compares the recent exemplar based inpainting algorithms by Minqin Wang
and Hao Guo et al. A number of examples on real images are demonstrated to evaluate the
results of algorithms using Peak Signal to Noise Ratio (PSNR)
This document discusses data hiding techniques for images. It begins by introducing steganography and some common image steganography methods like LSB substitution, blocking, and palette modification. It then reviews related work on minimizing distortion in steganography, modifying matrix encoding for minimal distortion, and designing adaptive steganographic schemes. The document proposes using a universal distortion measure to evaluate embedding changes independently of the domain. It presents a system for reversible data hiding in encrypted images that partitions the image, encrypts it, hides data in the encrypted image, and allows extraction from the decrypted or encrypted image. Least significant bit substitution is discussed as an approach for hiding data in the encrypted image.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that proposes a new technique for binarizing images captured of black/green boards using a mobile camera. It begins with an abstract that overviews binarizing degraded images from mobile-captured black/green board images to extract text with 92.589% accuracy. It then reviews existing binarization techniques in the literature and describes common global and local thresholding methods. The proposed technique enhances the input image, segments it into 3x3 parts, computes local thresholds using OTSU for each part, binarizes the parts, and joins them. Experimental results on a database of 50 mobile-captured board images show the technique achieves better accuracy than other algorithms according to evaluation metrics.
This document summarizes JPEG image compression techniques. It discusses how images are divided into blocks and transformed from the spatial domain to the frequency domain using the Discrete Cosine Transform (DCT). It then describes how the DCT coefficients are quantized and arranged in zigzag order before entropy encoding with Huffman coding. The goal of JPEG compression is to store image data using as little space as possible while maintaining enough visual detail. The techniques discussed aim to remove irrelevant and redundant image data through DCT, quantization, and entropy encoding.
An unsupervised method for real time video shot segmentationcsandit
Segmentation of a video into its constituent shots
is a fundamental task for indexing and
analysis in content based video retrieval systems.
In this paper, a novel approach is presented
for accurately detecting the shot boundaries in rea
l time video streams, without any a priori
knowledge about the content or type of the video. T
he edges of objects in a video frame are
detected using a spatio-temporal fuzzy hostility in
dex. These edges are treated as features of the
frame. The correlation between the features is comp
uted for successive incoming frames of the
video. The mean and standard deviation of the corre
lation values obtained are updated as new
video frames are streamed in. This is done to dynam
ically set the threshold value using the
three-sigma rule for detecting the shot boundary (a
brupt transition). A look back mechanism
forms an important part of the proposed algorithm t
o detect any missed hard cuts, especially
during the start of the video. The proposed method
is shown to be applicable for online video
analysis and summarization systems. In an experimen
tal evaluation on a heterogeneous test set,
consisting of videos from sports, movie songs and m
usic albums, the proposed method achieves
99.24% recall and 99.35% precision on the average
Comparative study on image fusion methods in spatial domainIAEME Publication
This document provides a comparative study of various image fusion methods in the spatial domain. It begins by introducing image fusion and its applications. Section 2 then describes several common fusion algorithms in the spatial domain, including average, select maximum/minimum, Brovey transform, intensity hue saturation (IHS), and principal component analysis (PCA). Section 3 defines image fusion quality measures like entropy, mean squared error, and normalized cross correlation. Section 4 provides a comparative analysis of the spatial domain fusion techniques based on parameters like simplicity, type of resources, and disadvantages. It finds that spatial domain methods provide high spatial resolution but have issues like image blurring and producing less informative outputs. The document concludes that while the best algorithm depends on the problem, spatial
Binarization of Degraded Text documents and Palm Leaf ManuscriptsIRJET Journal
This document proposes a technique for binarizing degraded text documents and palm leaf manuscripts. It involves taking the average pixel value of the image as a threshold to distinguish foreground from background. The algorithm first computes the average value of the original image and uses it to set pixels above the threshold to black, removing background. It then computes the average of the remaining image, excluding black pixels, and uses that value as a new threshold to set remaining pixels above it to white, extracting the foreground. The technique is tested on old documents and manuscripts, showing improvement over existing methods based on metrics like peak signal-to-noise ratio. While effective for documents, it needs improvement for palm leaf manuscripts with non-uniform degradation.
A Review On Single Image Depth Prediction with Wavelet DecompositionIRJET Journal
This document summarizes research on single image depth prediction using wavelet decomposition. It begins with an abstract describing how wavelet-based methods can accurately predict depth from RGB images with reduced computational complexity compared to other methods. The document then reviews related work applying wavelets to tasks like image classification, disparity estimation, and demoireing. It describes how wavelet decomposition can cut the number of operations in the decoder in half with less than 2% accuracy drop for monocular depth estimation. Finally, it concludes that wavelet methods allow depth prediction from single images by combining wavelet representation with deep learning to progressively upsample and refine depth maps.
IRJET- Image Segmentation Techniques: A SurveyIRJET Journal
1) The document discusses various techniques for image segmentation including histogram-based techniques, K-means clustering, fuzzy C-means clustering, and watershed segmentation.
2) Histogram-based techniques use the histogram of pixel intensities or colors to separate an image into regions but do not capture much detail. K-means and fuzzy C-means are clustering techniques that group similar pixels but do not consider spatial relationships.
3) The document surveys recent research on applying these techniques and combinations such as initializing fuzzy C-means with histograms to improve convergence speed and incorporating spatial data.
IRJET- Geological Boundary Detection for Satellite Images using AI TechniqueIRJET Journal
This document summarizes a research paper that proposes a method for detecting geological boundaries in satellite images using artificial intelligence techniques. The method involves pre-processing images, generating histograms to analyze pixel values, performing 2D convolution on image planes, applying a particle swarm optimization algorithm to identify boundaries, and testing the approach on pre-flood and post-flood satellite images of Kerala, India. The results show differences in detected geological boundaries between the two images, allowing changes from flooding to be identified. The method provides a way to automatically analyze satellite imagery and extract geological boundary information.
Retinal blood vessel extraction and optical disc removaleSAT Journals
Abstract Retinal image processing is an important process by which we can detect the blood vessels and this helps us in detecting the DIABETIC RETINOPATHY at a early stage and this is very helpful because the symptoms are not known by anyone unless we have blur eye sight or we get blind. And this mainly occurs in people suffering from high diabetes. So by extracting the blood vessels using the algorithm we can see which blood vessels are actually damaged. So by using the algorithm we can continuously survey the situation and can protect our eye-sight. Keywords: field of view, retinopathy, thresholding, morphology, Otsu's algorithm, MATLAB.
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET Journal
This document proposes a method to detect digital image forgeries using local binary patterns (LBP) and histogram of oriented gradients (HOG). It extracts LBP features from the input image, then applies HOG to the LBP features. These combined features are classified using a support vector machine (SVM) as authentic or tampered. Testing on CASIA datasets achieved detection rates of 92.3% for CASIA-1 and 96.1% for CASIA-2, outperforming other existing methods. The method is effective at forgery detection while having reduced time complexity.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Segmentation and Classification of MRI Brain TumorIRJET Journal
This document presents a study comparing two techniques for detecting brain tumors in MRI images: level set segmentation and K-means segmentation. Features are extracted from the segmented tumors using discrete wavelet transform and gray level co-occurrence matrix. The features are then classified as benign or malignant using a support vector machine. The level set method and K-means method are evaluated based on accuracy, sensitivity, and specificity on a dataset of 41 MRI brain images. The level set method achieved slightly higher accuracy of 94.12% compared to the K-means method.
Design and implementation of video tracking system based on camera field of viewsipij
The basic idea of this paper is to design and implement of video tracking system based on Camera Field of
View (CFOV), Otsu’s method was used to detect targets such as vehicles and people. Whereas most
algorithms were spent a lot of time to execute the process, an algorithm was developed to achieve it in a
little time. The histogram projection was used in both directional to detect target from search region,
which is robust to various light conditions in Charge Couple Device (CCD) camera images and saves
computation time.
Our algorithm based on background subtraction, and normalize cross correlation operation from a series
of sequential sub images can estimate the motion vector. Camera field of view (CFOV) was determined and
calibrated to find the relation between real distance and image distance. The system was tested by
measuring the real position of object in the laboratory and compares it with the result of computed one. So
these results are promising to develop the system in future.
Mislaid character analysis using 2-dimensional discrete wavelet transform for...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Image fusion using nsct denoising and target extraction for visual surveillanceeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Minimum image disortion of reversible data hidingIRJET Journal
1) The document presents a method for minimum image distortion in reversible data hiding. It aims to hide data in image files while maintaining high image quality after extraction.
2) The method assigns different weights to pixels for feature extraction in steganalysis based on their probability of being altered. It focuses on regions likely changed to reduce the effect of unchanged smooth areas.
3) Experimental results on four common mobile steganography techniques demonstrate the effectiveness of the proposed scheme, particularly at low embedding rates, in identifying areas containing hidden data while maintaining perceptual image quality.
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement ijsc
Soft computing is likely to play aprogressively important role in many applications including image enhancement. The paradigm for soft computing is the human mind. The soft computing critique has been particularly strong with fuzzy logic. The fuzzy logic is facts representationas a rule for management of uncertainty. Inthis paperthe Multi-Dimensional optimized problem is addressed by discussing the optimal thresholding usingfuzzyentropyfor Image enhancement. This technique is compared with bi-level and multi-level thresholding and obtained optimal thresholding values for different levels of speckle noisy and low contrasted images. The fuzzy entropy method has produced better results compared to bi-level and multi-level thresholding techniques.
Similar to IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmentation for Plasma Detection from Visible Images of TOKAMAK (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.