This paper describes a novel system for vectorizing 2D raster cartoon. The output videos are the resolution independent, smaller in file size. As a first step, input video is segment to scene thereafter all processes are done for each scene separately. Every scene contains foreground and background objects so in each and every scene foreground background classification is performed. Background details can occlude by foreground objects but when foreground objects move its previous position such occluded details exposed in one of the next frame so using that frame can fill the occluded area and can generate static background. Classified foreground objects are identified and the motion of the foreground objects tracked for this simple user assistance is required from those motion details of foreground object’s animation generated. Static background and foreground objects segmented using K-means clustering and each and every cluster’s vectorized using potrace. Using vectored background and foreground object animation path vector video regenerated.
Study of Image Inpainting Technique Based on TV Modelijsrd.com
This paper is related with an image inpainting method by which we can reconstruct a damaged or missing portion of an image. A fast image inpainting algorithm based on TV (Total variational) model is proposed on the basis of analysis of local characteristics, which shows the more information around damaged pixels appears, the faster the information diffuses. The algorithm first stratifies and filters the pixels around damaged region according to priority, and then iteratively inpaint the damaged pixels from outside to inside on the grounds of priority again. By using this algorithm inpainting speed of the algorithm is faster and greater impact.
WEB IMAGE RETRIEVAL USING CLUSTERING APPROACHEScscpconf
Image retrieval system is an active area to propose a new approach to retrieve images from the
large image database. In this concerned, we proposed an algorithm to represent images using
divisive based and partitioned based clustering approaches. The HSV color component and Haar wavelet transform is used to extract image features. These features are taken to segment an image to obtain objects. For segmenting an image, we used modified k-means clustering algorithm to group similar pixel together into K groups with cluster centers. To modify Kmeans, we proposed a divisive based clustering algorithm to determine the number of cluster and get back with number of cluster to k-means to obtain significant object groups. In addition, we also discussed the similarity distance measure using threshold value and object uniqueness to quantify the results.
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...CSCJournals
The traditional approach for solving the object recognition problem requires image representations to be first extracted and then fed to a learning model such as an SVM. These representations are handcrafted and heavily engineered by running the object image through a sequence of pipeline steps which requires a good prior knowledge of the problem domain in order to engineer these representations. Moreover, since the classification is done in a separate step, the resultant handcrafted representations are not tuned by the learning model which prevents it from learning complex representations that might would give it more discriminative power. However, in end-to-end deep learning models, image representations along with the classification decision boundary are all learnt directly from the raw data requiring no prior knowledge of the problem domain. These models deeply learn the object image representation hierarchically in multiple layers corresponding to multiple levels of abstraction resulting in representations that are more discriminative and give better results on challenging benchmarks. In contrast to the traditional handcrafted representations, the performance of deep representations improves with the introduction of more data, and more learning layers (more depth) and they perform well on large-scale machine learning problems. The purpose of this study is six fold: (1) review the literature of the pipeline processes used in the previous state-of-the-art codebook model approach for tackling the problem of generic object recognition, (2) Introduce several enhancements in the local feature extraction and normalization steps of the recognition pipeline, (3) compare the enhancements proposed to different encoding methods and contrast them to previous results, (4) experiment with current state-of-the-art deep model architectures used for object recognition, (5) compare between deep representations extracted from the deep learning model and shallow representations handcrafted through the recognition pipeline, and finally, (6) improve the results further by combining multiple different deep learning models into an ensemble and taking the maximum posterior probability.
A systematic image compression in the combination of linear vector quantisati...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Automatic dominant region segmentation for natural imagescsandit
Image Segmentation segments an image into different homogenous regions. An efficient
semantic based image retrieval system divides the image into different regions separated by
color or texture sometimes even both. Features are extracted from the segmented regions and
are annotated automatically. Relevant images are retrieved from the database based on the
keywords of the segmented region In this paper, automatic image segmentation is proposed to
obtained dominant region of the input natural images. Dominant region are segmented and
results are obtained . Results are also recorded in comparison to JSEG algorithm
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUEScscpconf
In the first study [1], a combination of K-means, watershed segmentation method, and Difference In Strength (DIS) map were used to perform image segmentation and edge detection
tasks. We obtained an initial segmentation based on K-means clustering technique. Starting from this, we used two techniques; the first is watershed technique with new merging
procedures based on mean intensity value to segment the image regions and to detect their boundaries. The second is edge strength technique to obtain accurate edge maps of our images without using watershed method. In this technique: We solved the problem of undesirable over segmentation results produced by the watershed algorithm, when used directly with raw data images. Also, the edge maps we obtained have no broken lines on entire image. In the 2nd study level set methods are used for the implementation of curve/interface evolution under various forces. In the third study the main idea is to detect regions (objects) boundaries, to isolate and extract individual components from a medical image. This is done using an active contours to detect regions in a given image, based on techniques of curve evolution, Mumford–Shah functional for segmentation and level sets. Once we classified our images into different intensity regions based on Markov Random Field. Then we detect regions whose boundaries are not necessarily defined by gradient by minimize an energy of Mumford–Shah functional forsegmentation, where in the level set formulation, the problem becomes a mean-curvature which will stop on the desired boundary. The stopping term does not depend on the gradient of the image as in the classical active contour. The initial curve of level set can be anywhere in the image, and interior contours are automatically detected. The final image segmentation is one
closed boundary per actual region in the image.
Study of Image Inpainting Technique Based on TV Modelijsrd.com
This paper is related with an image inpainting method by which we can reconstruct a damaged or missing portion of an image. A fast image inpainting algorithm based on TV (Total variational) model is proposed on the basis of analysis of local characteristics, which shows the more information around damaged pixels appears, the faster the information diffuses. The algorithm first stratifies and filters the pixels around damaged region according to priority, and then iteratively inpaint the damaged pixels from outside to inside on the grounds of priority again. By using this algorithm inpainting speed of the algorithm is faster and greater impact.
WEB IMAGE RETRIEVAL USING CLUSTERING APPROACHEScscpconf
Image retrieval system is an active area to propose a new approach to retrieve images from the
large image database. In this concerned, we proposed an algorithm to represent images using
divisive based and partitioned based clustering approaches. The HSV color component and Haar wavelet transform is used to extract image features. These features are taken to segment an image to obtain objects. For segmenting an image, we used modified k-means clustering algorithm to group similar pixel together into K groups with cluster centers. To modify Kmeans, we proposed a divisive based clustering algorithm to determine the number of cluster and get back with number of cluster to k-means to obtain significant object groups. In addition, we also discussed the similarity distance measure using threshold value and object uniqueness to quantify the results.
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...CSCJournals
The traditional approach for solving the object recognition problem requires image representations to be first extracted and then fed to a learning model such as an SVM. These representations are handcrafted and heavily engineered by running the object image through a sequence of pipeline steps which requires a good prior knowledge of the problem domain in order to engineer these representations. Moreover, since the classification is done in a separate step, the resultant handcrafted representations are not tuned by the learning model which prevents it from learning complex representations that might would give it more discriminative power. However, in end-to-end deep learning models, image representations along with the classification decision boundary are all learnt directly from the raw data requiring no prior knowledge of the problem domain. These models deeply learn the object image representation hierarchically in multiple layers corresponding to multiple levels of abstraction resulting in representations that are more discriminative and give better results on challenging benchmarks. In contrast to the traditional handcrafted representations, the performance of deep representations improves with the introduction of more data, and more learning layers (more depth) and they perform well on large-scale machine learning problems. The purpose of this study is six fold: (1) review the literature of the pipeline processes used in the previous state-of-the-art codebook model approach for tackling the problem of generic object recognition, (2) Introduce several enhancements in the local feature extraction and normalization steps of the recognition pipeline, (3) compare the enhancements proposed to different encoding methods and contrast them to previous results, (4) experiment with current state-of-the-art deep model architectures used for object recognition, (5) compare between deep representations extracted from the deep learning model and shallow representations handcrafted through the recognition pipeline, and finally, (6) improve the results further by combining multiple different deep learning models into an ensemble and taking the maximum posterior probability.
A systematic image compression in the combination of linear vector quantisati...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Automatic dominant region segmentation for natural imagescsandit
Image Segmentation segments an image into different homogenous regions. An efficient
semantic based image retrieval system divides the image into different regions separated by
color or texture sometimes even both. Features are extracted from the segmented regions and
are annotated automatically. Relevant images are retrieved from the database based on the
keywords of the segmented region In this paper, automatic image segmentation is proposed to
obtained dominant region of the input natural images. Dominant region are segmented and
results are obtained . Results are also recorded in comparison to JSEG algorithm
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUEScscpconf
In the first study [1], a combination of K-means, watershed segmentation method, and Difference In Strength (DIS) map were used to perform image segmentation and edge detection
tasks. We obtained an initial segmentation based on K-means clustering technique. Starting from this, we used two techniques; the first is watershed technique with new merging
procedures based on mean intensity value to segment the image regions and to detect their boundaries. The second is edge strength technique to obtain accurate edge maps of our images without using watershed method. In this technique: We solved the problem of undesirable over segmentation results produced by the watershed algorithm, when used directly with raw data images. Also, the edge maps we obtained have no broken lines on entire image. In the 2nd study level set methods are used for the implementation of curve/interface evolution under various forces. In the third study the main idea is to detect regions (objects) boundaries, to isolate and extract individual components from a medical image. This is done using an active contours to detect regions in a given image, based on techniques of curve evolution, Mumford–Shah functional for segmentation and level sets. Once we classified our images into different intensity regions based on Markov Random Field. Then we detect regions whose boundaries are not necessarily defined by gradient by minimize an energy of Mumford–Shah functional forsegmentation, where in the level set formulation, the problem becomes a mean-curvature which will stop on the desired boundary. The stopping term does not depend on the gradient of the image as in the classical active contour. The initial curve of level set can be anywhere in the image, and interior contours are automatically detected. The final image segmentation is one
closed boundary per actual region in the image.
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
Vector quantization is an elementary technique for image compression; however, searching for the nearest codeword in a codebook is time-consuming. In this work, we propose a hardware-based scheme by adopting bit-parallelism to prune unnecessary codewords. The new scheme uses a “Bit-mapped Look-up Table” to represent the positional information of the codewords. The lookup procedure can simply refer to the bitmaps to find the candidate codewords. Our simulation results further confirm the effectiveness of the proposed scheme.
This is about Image segmenting.We will be using fuzzy logic & wavelet transformation for segmenting it.Fuzzy logic shall be used because of the inconsistencies that may occur during segementing or
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Novel Method for Image Watermarking Using Luminance Based Block Selection a...IJERA Editor
A robust watermark scheme for copyright protection is proposed in the present paper. The present method selects the pixel locations to insert the watermark by checking luminance [1] values of blocks. The watermark is embedded in the selected pixel blocks by using local area pixel value difference method. The proposed approach overcomes the weak robustness problem of embedding the watermark in the spatial domain and also in pixel value difference method. Further the watermark extraction does not require the original image as in the case of many digital watermarking methods. The experimental results indicate the high image quality and robustness against various attacks when compared to several approaches.
Abstract Image Segmentation plays a vital role in image processing. The research in this area is still relevant due to its wide applications. Image segmentation is a process of assigning a label to every pixel in an image such that pixels with same label share certain visual characteristics. Sometimes it becomes necessary to calculate the total number of colors from the given RGB image to quantize the image, to detect cancer and brain tumour. The goal of this paper is to provide the best algorithm for image segmentation. Keywords: Image segmentation, RGB
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Improved block based segmentation for jpeg compressed document imageseSAT Journals
Abstract
Image Compression is to minimize the size in bytes of a graphics file without degrading the quality of the image to an unacceptable
level. The compound image compression normally based on three classification methods that is object based, layer based and block
based. This paper presents a block-based segmentation. for visually lossless compression of scanned documents that contain not only
photographic images but also text and graphic images. In low bit rate applications they suffer with undesirable compression artifacts,
especially for document images. Existing methods can reduce these artifacts by using post processing methods without changing the
encoding process. Some of these post processing methods requires classification of the encoded blocks into different categories.
Keywords- AC energy, Discrete Cosine Transform (DCT), JPEG, K-means clustering, Threshold value
A Hybrid Steganography Technique Based On LSBMR And OPAPIOSRJVSP
This paper presents a steganography technique based on two existing methods of data hiding i.e. LSBMR and OPAP. The proposed method uses the non-overlapping blocks, having three consecutive pixels. The center pixel of this block embeds k- bits of secret data using OPAP and the remaining pixels of the block embed data using LSBMR. The experimental results show that the proposed method provides better embedding capacity while maintaining the good image quality. The improved performance is shown in comparison to other data hiding methods that are investigated in this study.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
Vector quantization is an elementary technique for image compression; however, searching for the nearest codeword in a codebook is time-consuming. In this work, we propose a hardware-based scheme by adopting bit-parallelism to prune unnecessary codewords. The new scheme uses a “Bit-mapped Look-up Table” to represent the positional information of the codewords. The lookup procedure can simply refer to the bitmaps to find the candidate codewords. Our simulation results further confirm the effectiveness of the proposed scheme.
This is about Image segmenting.We will be using fuzzy logic & wavelet transformation for segmenting it.Fuzzy logic shall be used because of the inconsistencies that may occur during segementing or
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Novel Method for Image Watermarking Using Luminance Based Block Selection a...IJERA Editor
A robust watermark scheme for copyright protection is proposed in the present paper. The present method selects the pixel locations to insert the watermark by checking luminance [1] values of blocks. The watermark is embedded in the selected pixel blocks by using local area pixel value difference method. The proposed approach overcomes the weak robustness problem of embedding the watermark in the spatial domain and also in pixel value difference method. Further the watermark extraction does not require the original image as in the case of many digital watermarking methods. The experimental results indicate the high image quality and robustness against various attacks when compared to several approaches.
Abstract Image Segmentation plays a vital role in image processing. The research in this area is still relevant due to its wide applications. Image segmentation is a process of assigning a label to every pixel in an image such that pixels with same label share certain visual characteristics. Sometimes it becomes necessary to calculate the total number of colors from the given RGB image to quantize the image, to detect cancer and brain tumour. The goal of this paper is to provide the best algorithm for image segmentation. Keywords: Image segmentation, RGB
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Improved block based segmentation for jpeg compressed document imageseSAT Journals
Abstract
Image Compression is to minimize the size in bytes of a graphics file without degrading the quality of the image to an unacceptable
level. The compound image compression normally based on three classification methods that is object based, layer based and block
based. This paper presents a block-based segmentation. for visually lossless compression of scanned documents that contain not only
photographic images but also text and graphic images. In low bit rate applications they suffer with undesirable compression artifacts,
especially for document images. Existing methods can reduce these artifacts by using post processing methods without changing the
encoding process. Some of these post processing methods requires classification of the encoded blocks into different categories.
Keywords- AC energy, Discrete Cosine Transform (DCT), JPEG, K-means clustering, Threshold value
A Hybrid Steganography Technique Based On LSBMR And OPAPIOSRJVSP
This paper presents a steganography technique based on two existing methods of data hiding i.e. LSBMR and OPAP. The proposed method uses the non-overlapping blocks, having three consecutive pixels. The center pixel of this block embeds k- bits of secret data using OPAP and the remaining pixels of the block embed data using LSBMR. The experimental results show that the proposed method provides better embedding capacity while maintaining the good image quality. The improved performance is shown in comparison to other data hiding methods that are investigated in this study.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Improved EPRCA Congestion Control Scheme for ATM NetworksEswar Publications
Traffic management and congestion control are major issues in Asynchronous Transfer Mode(ATM) networks. Congestion arises when traffic in the network is more than offered load. The primary function of congestion control is to ensure good throughput and low delay performance while maintaining a fair allocation of network resources to users. In this paper, Enhanced Proportional Rate based Congestion Avoidance (EPRCA) scheme proposed by ATM forum has been considered. But this scheme has limitation of higher cell drop problem for the bursty traffic. Improvements to EPRCA scheme have been proposed to reduce cell drop problem and results of
improved EPRCA schemes were analyzed with basic EPRCA scheme.
Skillsoft perspectives 2014 marketing learning and development workshopMarie Sanguinetti
Presented at the MGM, Las Vegas SkillSoft Perspectives Annual Conference.
This initiative allowed JCS to move from a handful of instructor lead workshops to a blended environment where we employees can access thousands of online learning, as well as, ILT courses. JCS University received many accolades and was recognized throughout the company and featured in Jarden's 2012 Annual Report.
Un Hito en la Historia Educativa del ParaguayFabiola Oviedo
La Ley N° 4088/10 es considerada un hito en la historia educativa de nuestro país por el Informe Integrante de la Iniciativa Global por los Niños Fuera de la Escuela, Perfiles de la exclusión educativa en la República del Paraguay, de OOSCI, Unicef-UIS y Unesco, entre otros factores, porque se creció en inclusión, no solamente en términos verificables en dígitos, sino también en la internalización de estos derechos sobre todo por parte de los sectores más vulnerables.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...INFOGAIN PUBLICATION
Locally linear embedding (LLE) is an unsupervised learning algorithm which computes the low dimensional, neighborhood preserving embeddings of high dimensional data. LLE attempts to discover non-linear structure in high dimensional data by exploiting the local symmetries of linear reconstructions. In this paper, video feature extraction is done using modified LLE alongwith adaptive nearest neighbor approach to find the nearest neighbor and the connected components. The proposed feature extraction method is applied to a video. The video feature description gives a new tool for analysis of video.
Internet data almost double every year. The need of multimedia communication
is less storage space and fast transmission. So, the large volume of video data has become
the reason for video compression. The aim of this paper is to achieve temporal compression
for three-dimensional (3D) videos using motion estimation-compensation and wavelets.
Instead of performing a two-dimensional (2D) motion search, as is common in conventional
video codec’s, the use of a 3D motion search has been proposed, that is able to better exploit
the temporal correlations of 3D content. This leads to more accurate motion prediction and
a smaller residual. The discrete wavelet transform (DWT) compression scheme has been
added for better compression ratio. The DWT has a high-energy compaction property thus
greatly impacted the field of compression. The quality parameters peak signal to noise ratio
(PSNR) and mean square error (MSE) have been calculated. The simulation results shows
that the proposed work improves the PSNR from existing work.
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionIJAEMSJORNAL
In recent years, the modeling of human behaviors and patterns of activity for recognition or detection of special events has attracted considerable research interest. Various methods abounding to build intelligent vision systems aimed at understanding the scene and making correct semantic inferences from the observed dynamics of moving targets. Many systems include detection, storage of video information, and human-computer interfaces. Here we present not only an update that expands previous similar surveys but also a emphasis on contextual abnormal detection of human activity , especially in video surveillance applications. The main purpose of this survey is to identify existing methods extensively, and to characterize the literature in a manner that brings to attention key challenges.
There have been several researches done in the field of image saliency but
not as much as in video saliency. In order to increase precision and accuracy
during compression, reduce coding complexity and time consumption along
with memory allocation problems with our proposed solution. It is a
modified high-definition video compression (HEVC) pixel based consistent
spatiotemporal diffusion with temporal uniformity. It involves taking apart
the video into groups of frames, computing colour saliency, integrate
temporal fusion, pixel saliency fusion is conducted and then colour
information guides the diffusion process for the spatiotemporal mapping
with the help of permutation matrix. The proposed solution is tested on a
publicly available extensive dataset with five global saliency valuation
metrics and is compared with several other state-of-the-art saliency detection
methods. The results display and overall best performance amongst all other
candidates.
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Leading Change strategies and insights for effective change management pdf 1.pdf
Resolution Independent 2D Cartoon Video Conversion
1. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 05 Pages: 2849-2854 (2016) ISSN: 0975-0290
2849
Resolution Independent 2D Cartoon Video
Conversion
MSF. Fayaza
Faculty of Information Technology, University of Moratuwa, Sri Lanka
Email: msf.fayaza89@gmail.com
MAM. Aazeer, MFHM. Adheeb, KF.Muhiminah, S.C.Premarathna
Faculty of Information Technology, University of Moratuwa, Sri Lanka
Email: mamreezaa@gmail.com, adheeb91@gmail.com, fathima.mkhalid@gmail.com, samindap@uom.lk
----------------------------------------------------------------------ABSTRACT------------------------------------------------------------
This paper describes a novel system for vectorizing 2D raster cartoon. The output videos are the resolution
independent, smaller in file size. As a first step, input video is segment to scene thereafter all processes are done
for each scene separately. Every scene contains foreground and background objects so in each and every scene
foreground background classification is performed. Background details can occlude by foreground objects but
when foreground objects move its previous position such occluded details exposed in one of the next frame so
using that frame can fill the occluded area and can generate static background. Classified foreground objects are
identified and the motion of the foreground objects tracked for this simple user assistance is required from those
motion details of foreground object’s animation generated. Static background and foreground objects segmented
using K-means clustering and each and every cluster’s vectorized using potrace. Using vectored background and
foreground object animation path vector video regenerated.
Keywords - Vectorizing, Foreground extraction and identification, Background extraction, Background filling,
Motion tracking, Scene Segmentation, Clustering
-------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: March 14, 2016 Date of Acceptance: April 20, 2016
-------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Cartoons are result of artistic works which have long
history starting from paper drawings. Today it is preserved
as digital videos as result of technology enhancement. But
such videos are mostly in raster format. The raster format
videos are resolution dependents and comparatively need
high storage and to download high resolution raster video
need high bandwidth. Normally raster videos can see
clearly in specific resolution and when tries to increase
resolution it’s get blurred and pixelated. But the vector
videos are resolution independent and can see clearly any
resolution. So this paper presents a novel approach for
vectorizing 2D cartoon videos. As result of this approach
following advantages can gain:
Resolution independent videos so can clearly see
any resolution also can display in different
display capable derives.
Comparatively need small storage because
vectors usually represent by points, line, curves
and polygons.
Can edit easily because background, foreground
and animation are separated.
Output video can be transmitted using
comparatively small band width.
Today there is increasing demand for vector based
contents on internet. So there are several researches on
different approaches for vectorizing raster images and
there several commercial tools for vectorizing raster
images ex: Standford VectorMagic. But there is number of
various approaches for vectorizing videos and quality
enhancement of video in literature. The approaches were
taken in different point of view.
In this paper we provide a system to convert 2D raster to
vector cartoon. System needs simple user assistance to
track the multiple object motion to crate the animation.
Also system provides new way of vectorizing using the
potrace. Potrace mainly provide the black and white output
but this paper address this problem and it’s provide novel
approach to get color vector images.
The rest of the paper is organized as follows. Section II
involves the detailed description about the related research
work. Section III presents the Proposed Approach. Section
IV presents Design and Implementation details of our
system. Section V presents evaluation of results. The final
section contains conclusion of the study.
II. RELATED RESEARCH WORK
There have been various proposed solutions to resolution
quality enhancement of video in literature. Though they
are not much closer to our topic. The approaches were
taken in different point of view. Under those approaches
only some of them were presented related to our topic.
The approach discussed in is the most closely related work
to ours [1]. Here they developed a methodology to
2. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 05 Pages: 2849-2854 (2016) ISSN: 0975-0290
2850
vectorize a small cartoon video sequence. The approach
described in [20] and [21] discusses techniques to
vectorize raster images. The approach in [6] describes the
use of SIFT features to track objects in a video sequence.
[2, 4, 5, 12, 17] discusses various techniques of shot
boundary detection and background extraction.
Vectorizing Cartoon Animations [1] mainly focuses on
vectorizing of single video sequence rather than the whole
cartoon sequence. They mainly concern about cartoon
with static background and decorative lines. And they
used ‘trapped-ball’ method [1] to segment frame into
regions. Also in their approach simple user assistance was
required to extract the background. Unlike the approach in
[1], our approach does not aim to produce fully vectorized
video but rather at reproducing the animation with
vectorized images to output frames with vector images.
Therefore we need to track the motion and transformation
of the objects of the foreground in order to be able to
reproduce the animation
Video segmentation is the basic step in any video
processing or analyzing applications. Shot boundary
detection facilitates to segment the video in to
subdivisions (shots). There are many shot boundary
detection algorithms proposed in literature. One of the
basic and straightforward ways is pixel difference/ pixel
comparison [4, 5, and 18] to determine the shot. Second
approach is Block based approach [5] but it is slow
because of complexity of statistical formula. Third
approach is Histogram comparison [4, 5, and 12]. The
logic behind this approach is, if the background and
objects (moving and static) are unchanged in successive
frame their will have small difference in histogram [4].
To fill the occluded area of background there are several
approaches proposed in [1] they construct an initial
background based on median pixel values in appropriate
frames and at the same time, they estimate the background
probability of each pixel. In [4] they fill the occluded area
by visually plausible background that mimics the
appearance of the source region or neighboring pixels.
Background pixels that are occluded by the moving
foreground if they are exposed in at least one other frame.
In [2], using motion vectors of each moving object they
calculate how fast the corresponding region can recover
and using that frame they extracted the occluded details
[2].
To track object there are several approaches the object
tracking method used in [6] can track objects invariant of
homographic transformation, lighting, viewpoint change
and also a certain degree of change in illumination. There
are many methods proposed to describe regions that are
invariant under homographs. Approaches in [8, 9, 10] have
discussed feature descriptors that are invariant to
transformation. Transformation invariant features in [6]
are based on interest points which are selected according
to criteria.
To victories the objects in the background and foreground
regions in [1] they have used the approach in [21] using
gradient meshes. Unlike in conventional vector graphics
which is described in lines, curves and polygons that are
then colored within the boundaries, in [21] they have
provided a tool called “optimized gradient mesh” which
enables to represent objects as a single multicolored object
which can be easily manipulated to scale the image.
Another approach to vectorize full color raster images is
discussed in [20]. They decompose the image to triangles
and piecewise smooth Loop subdivision surfaces to
achieve number of vector image editing operations. This
approach has produced high quality vectorized results with
low color discontinuities compared to approaches in [22].
Such high level of detail is not needed to vectorize cartoon
images, as it has lower color variations compared to real
world images.
III. PROPOSED APPROACH
Fig.1.Top level architecture of the system
In this approach if user provides the 2D raster cartoon
video to system it’s provide output as vector video. Fig.1
shows the top level architecture of the system. Normally
input video of the system is resolution dependent 2D
cartoon videos with low quality to provide the vector
video input video goes through following sequence of
steps
Videos usually consist with multiple scenes.
Scene is a segment of video with the same
background throughout that segment. As first step
video segment into scenes and rest of the process
are continue for each scene.
To extract foreground and background of a scene
background, foreground classification is
performed.
Some background details are occluded by
foreground objects so as next step occluded
3. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 05 Pages: 2849-2854 (2016) ISSN: 0975-0290
2851
details of background is extracted form one of
next frame and using that details background
filled and static background generated.
Foreground objects are identified
Using simple user assistance motion of
foreground objects tracked
Background and foreground are segmented using
K-means clustering
Each cluster is vectorized using potrace.
Using vector background, foreground and
motion details vectorized animation is output.
IV. DESIGN AND IMPLEMENTATION
This section describes the detail description of system
design and how it implemented. There are several
approaches for each step. The procedures and techniques
are explained below.
A. Scene segmentation
In a video basically scene changes happen in two ways
those are abrupt and gradual. Gradual transition is
occurring throughout many frames. Abrupt transition is
occurring in a single frame, a scene is stopping at
particular frame and in the next frame starting a new
scene. The system supports for abrupt transitions. To
segment the scenes 32 bins rgb color histograms
comparison is used. Histograms are compared using the
Chi-Square matrices; if the difference between the
following frames exceeds the threshold shot is detected.
Fig.2. Histogram of two consecutive frames where scene
detected
B. Background Extraction
Normally in a video there are two types of backgrounds
available those are static background and moving
background. In the static background it will not containing
any moving objects. In moving background the
background objects can have movements. In our system
we are supporting static backgrounds; it will not contain
moving objects. If a particular object contains movement it
is defined as foreground object. To extract the background
as first approach using MOG2 algorithm foreground mask
crated. After that in-order to simplify the process
foreground mask encapsulated into rectangle box. From
the rectangle box occluded area is inedited.
The background pixels are static. Second approach is for a
particular scene, pixel based foreground – background
classification performs. For this purpose shot detected
frame considered as base-frame and N (N=10 in our
implementation) consecutive frames used to compare with
base-frame and foreground-background pixels classified.
After that to simplify the process foreground pixels are
encapsulated into rectangle. From that rectangle occlude
area of background identified. Background, foreground
classification algorithm is given below
start
for x=baseFrameNo and x<=baseFrameNo+N{
for i = 0 and i < rows {
for j = 0 and j = columns {
read baseFrame pixel value of base, consecutive frame
if(baseFrame pixel value- consecutiveFrame pixel
value)< = thresholdValue;
pixelValue =0;
else
pixelValue = 255;
}
}
}
end
Fig.3. Base-frame, foreground mask, background,
foreground classification
C. Background Filling
If foreground object move from its previous position one
of next frame the occlude area is exposed. Motion vector
of moving object is used to identify the frame where the
occluded area is exposed. For this following equation is
used.
(xcurrent-xprevious)2
+(ycurrent - yprevious)2
> Rectangle diameter
(1)
D. Foreground Extraction
Since static background of a scene already available to
extract the foreground absdiff() was used. The absdiff()
function will output the computed difference of each and
every pixel of the video frame being considered and the
background image. The result of absdiff() return the pixel
4. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 05 Pages: 2849-2854 (2016) ISSN: 0975-0290
2852
belongs to foreground that result is threshold and stored.
Thereafter threshold value is read using the rgb values and
foreground object is identified.
E. Foreground Identification (Object Identification)
Since the same foreground objects will appear in a
sequence of frames and in a cartoon, writing the same
foreground that appears in all of the frames to an image
file is not needed. To avoid redundancy of the same
object, we use object identification in order to identify
already available image files of a particular foreground
appearing in a sequence of frames.
We use the SURF () method to compare two images. In
this case we compare the extracted foreground against all
the available foreground image files available so far. This
algorithm utilizes a Hessian based detector and intensity
distribution based description feature vector and leverages
several approximations, which allow for fast computation
without major sacrifices in accuracy and repeatability.
Fig.4. Background subtraction and thresholding using 5,
10,20 respectively
F. Color Extraction for Tracking
To extract the motion of foreground object simple user
assistance is needed. The extracted foreground will
available to user if user select the foreground object the
color value of object is extracted. The extracted color
needs to be in the HSV color space. So start by first
converting the foreground image to the HSV color space.
Thereafter we present the user with these converted
images in sequence. When the user click on the image, the
HSV color value corresponding to the area clicked by the
user is written to a file along with the references to the
foreground object
G. Motion Tracking
Using that color of object the motion of object is tracked.
Once each user selection take place the color of object is
taken into the system. By using inrange () function of
opencv. Thereafter Threshold the HSV image for the range
of colors. And after that to remove noise Erode and dilate
the image in order to clearly make visible the object. Find
contours of object and track the filtered object using
moment() function.After the removal of noise track the x,
y coordinates of object in each frame. Form that animation
points generated.
H. Background, Foreground Segmentation and
Vectorization
We have used k-means clustering along with potrace in
order to vectorize the image. Potrace is an open source
tool that can be used to convert binary raster image files to
vector files. A binary image file can be given as an input,
and potrace will generate the vectorized image in the
required vector representation. Potrace also provides a tool
to prepare input images to an acceptable input format or to
preprocess the image in order to achieve the best
vectorized output. However this cannot convert color
images accurately. We have come up with a novel
approach to using potrace in order to vectorize color
images with high accuracy.
First, the image is clustered by using k-means clustering.
We write each cluster of the image to a separate image file
in the bmp format. Then we use the ‘mkbitmap’, another
tool provided along with potrace to threshold the image.
Thereafter we use potrace to convert the threshold image
to the SVG file format.
Since potrace only supports binary images, the output
vector images are always black. Therefor we need to
modify the colors of all output vector image files. Since
we vectorize all clusters of the images separately, we can
modify each output SVG file with the color of that
particular cluster. We have used php script which will be
called in our program to modify the output vector
files.Once all image clusters are vectorized, we merge all
the SVG file in to one SVG file, which will be used in our
program.
Fig.5. Clustered images – 5 clusters and 10 clusters
5. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 05 Pages: 2849-2854 (2016) ISSN: 0975-0290
2853
Fig.6. Clustered images – 20 clusters and 35 clusters
I. Video Reproducing
Using the details available details of background,
foreground and motion vector animation is generated.
Using the background details master background is
generated thereafter on top that foreground object is
animated.
Fig.7. Background Generating Module
V. RESULT AND DISCUSSION
There are many open source and commercial tools
available to convert raster images to vector images but
there are no many tools to convert raster video to vector
video. As a first step of raster video to vector video
conversion we started with 2D cartoon videos and we find
a novel approach to vectorizing raster videos. Throughout
our study we also find a novel approach to vectorizing
raster images using Potrace.
To vector color images we cluster the images based on
colors using K-means clustering. We tested 100 images
starting form 5 clusters to 35 clusters. We find that number
of cluster for good quality output varies depends on the
images. But most of images get aspect output in 22
clusters. And also for an image vectorizing it takes less
than one minute.
Fig.8. SVG of image clusters and merged SVG fil
Fig.9. Raster, vector frame
VI. CONCLUSION
We have been successful in vectorizing raster images by
being able to find a novel approach to vectorizing color
images using k-means clustering and potrace. This
approach is efficient and can produce good quality images
based on the number of clusters.
We have introduced a novel approach to vectorizing 2D
cartoon videos by vectorizing the foreground and
background separately and by using these vectorized
components to re produce the video. So far, though we
have not been entirely successful for all cartoon video, we
have been able to demonstrate our approach on a set of
videos.
REFERENCES
[1]. Song-Hai Zhang, Tao Chen, Yi-Fei Zhang, Shi-Min
Hu, Member, IEEE, and Ralph R. Martin, Vectorizing
Cartoon Animations
[2]. Srenivas Varadarajan*, Lina J. Karam*, and Dinei
Florencio, Background recovery from video sequences
using motion parameters
[3] A. Criminisi, P. Perez, and K. Toyama, “Object
removal by exemplar-based inpainting,” Proc. IEEE
Computer Society Conference on Computer Vision and
Pattern Recognition, vol. 2
[4] Irena Koprinska, Sergio Carrato, Temporal video
segmentation: A survey
[5] Comparison of video shot boundary detection
techniques John S. Boreczky, Lawrence A. Rowe
6. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 05 Pages: 2849-2854 (2016) ISSN: 0975-0290
2854
[6] D.G. Lowe, “Object Recognition from Local Scale-
Invariant
Features,” Proc. Int’l Conf. Computer Vision, pp. 1150-
1157, 1999
[7] J. Xiao and M. Shah, “Motion Layer Extraction in the
Presence of Occlusion Using Graph Cuts,” IEEE Trans.
Pattern Analysis and Machine Intelligence, vol. 27
[8] A. Baumberg. Reliable Feature Matching Across
Widely Separated Views. In Proceedings of the
Interational Conference on Computer Vision and Pattern
Recognition
[9] D. Lowe. Object Recognition from Local Scale-
Invariant Features. In Proceedings of the International
Conference on Computer Vision, pages 1150–1157, Corfu,
Greece, September 1999
[10] C. Schmid and R. Mohr. Local Grayvalue Invariants
for Image Retrieval. IEEE Transactions on Pattern
Analysis and Machine Intelligence, 19(5)
[11] Aseem Agarwala, Aaron Hertzmann, David H.
Salesin, Steven M. Seitz, Keyframe-Based Tracking for
Rotoscoping and Animation
[12] L. Congcong, Y. T. Wu, Y. Shiaw-Shian, and T.
Chen, “Motion-focusing key frame extraction and video
summarization for lane surveillance system,” ICIP 2009.
[13] L. J. Lai, Y. Yi, Key frame extraction based on visual
attention model, Journal of Visual Communication and
Image Representation 23(1)
[14] N. Ejaz, T. Bin Tariq, and S. W. Baik, “Adaptive key
frame extraction for video summarization using an
aggregation mechanism,” Journal of Visual
Communication and Image Representation, vol. 23
[15] Ravi Kansagara, DarshakThakore, Mahasweta Joshi,
“A Study on Video Summarization Techniques,”
International Journal of Emerging Technology and
Advanced Engineering, (ISSN 2250-2459, ISO 9001:2008
Certified Journal, Volume 4(9))
[16] S. Ariffa Begum, Dr. A. Askarunisa, “Performance
Analysis of Various Key Frame Extraction Methods for
Surveillance Applications,” International Journal of
Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO
9001:2008 Certified Journal, vol. 4)
[17] S. K. Kuanar, R. Panda, and A. S. Chowdhur, “Video
key frame extraction through dynamic Delaunay clustering
with a structural constraint,” Journal of Visual
Communication and Image Representation, vol. 24
[18] Sujatha, C.; Mudenagudi, U., "A Study on Keyframe
Extraction Methods for Video Summary," Computational
Intelligence and Communication Networks (CICN), 2011
International Conference on, vol., no., pp.73, 77, 7-9
[19] Soma Datta, Debotosh Bhattacherjee, Pramit Ghosh,
“Path Detection of a Moving Object”, International
Journal of Recent Trends in Engineering, Vol 2, No. 3
[20] Zicheng Liao, Hugues Hoppe, David Forsyth, and
Yizhou Yu, A Subdivision-Based Representation for
Vector Image Editing
[21] Jian Sun Lin Liang Fang Wen Heung-Yeung Shum,
Image Vectorization using Optimized Gradient Meshes
[22] T. Xia, B. Liao and Y. Yu,”Patch-Based Image
Vectorization with Automatic Curvilinear Feature
Alignment,” ACM Trans. Graph. vol. 28