|Research Topic||Paper ID|
|Skew Detection Techniques for Scanned Documents
Navneet Kaur, Dr. Himani
Abstract: Document image processing plays an important role in the mechanization of document works. Detection of skew in scanned document images is the main stage of preprocessing recognition which in turn helps in improving the quality of scanned image so that document can be easily extracted. Whenever we scan a document, skew is automatically introduced in the image even if we consider all precautions well. It occurs due to various factors responsible like alignment of text lines, language, and page layout etc. So if skew is inexact it may cause incorrect analysis of layout, segmentation and inaccurate recognition i.e. the performance of the complete system will be degraded. Generally all algorithms are sensitive to deformation of document images. Therefore skew can cause great problem if not handled well and becomes a necessity to properly detect and correct document image so that disturbance must be avoided in further preprocessing.
|Control Strategies of Grid Connected PWM Voltage
Mohamayee Mohapatra, B Chitti Babu , A.K.Panda
Abstract: This paper presents a comparative study between delta and delta-sigma modulator for mains connected inverter. Since the paper discusses the implementation of these controllers for grid-connected system, their evaluation is made in two operating conditions. First, in steady-state conditions, the contributions of controllers to the total harmonic distortion (THD) of the grid current, active and reactive power control and unity power factor operation is pursued. Further on, the transient behavior of controllers especially during sudden change in reactive loads and how they are able to provide reactive power demand in order to improve the voltage profile at PCC, control the active and reactive power independently and provides fast voltage regulation etc are studied. Their performances are also evaluated by various values of reference current and hysteresis bandwidth. The
|Proposed paper on “SVD Based Image Watermarking”
Abstract: Digital watermarking addresses the growing concerns of theft and tampering of digital media through the use of advanced signal processing strategies to embed copyright and authentication information within media content., since it makes possible to identify the author, owner, distributor or authorized consumer of a document. In case of any dispute, one can prove their identity by decoding the watermark. This thesis aims to develop and implement Robust and secure watermarking technique for digital images. Two most important prerequisites for an efficient watermarking scheme are robustness and invisibility. After embedding the watermark, perceptual quality of the digital content should not be degraded and watermark must be recoverable from the watermarked image even if it is altered or processed by one or more image processing attacks such as compression, filtering, geometric distortions, resizing etc.In my research work, I have proposed a blind watermarking scheme based on the discrete wavelet transformation (DWT) and theory of linear algebra called “singular value decomposition (SVD)” to digital image wat ermarking..SVD method can transform A into product of USV, which allow us to refactoring a digital image in three matrixes. The using of singular values of such refactoring allows us to represent the image in the small set of values, which can preserve useful features of the original image, but use less storage space in the memory and achieve a image watermarking process. In this scheme, Singular Values (SV’s) were embedded in the HH band of the watermark for perceptual transparency and robustness. Although the scheme proves to be robust however it is insecure. An authentication mechanism is proposed at the decoder for security enhancement. It is implemented by using a signature based authentication mechanism. Finally the resulting water- marking scheme is secure and robust.
|Ontology self-learning and service recommendation in smart environment
Abstract: In order to be able to provide users with personalized service, the paper analyses the characteristics and attributes of the user, and set up the user personalized ontology model via context in smart environment. Meanwhile, a Bayesian probability algorithm is designed that can automatically adjust according to user’s preferences change. Combining with user activity, the user ontology model provides the user with a real-time active service model in the purpose of meeting user’s demands, and presents the implementation pseudo code, which shows the usability of user model and algorithm.
|Application of Selective Algorithm for Effective Resource Provisioning In Cloud Computing Environment
Mayanka Katyal, Atul Mishra
Abstract: Modern day continued demand for resource hungry services and applications in IT sector has led to development of Cloud computing. Cloud computing environment involves high cost infrastructure on one hand and need high scale computational resources on the other hand. These resources need to be provisioned (allocation and scheduling) to the end users in most efficient manner so that the tremendous capabilities of cloud are utilized effectively and efficiently. In this paper we discuss a selective algorithm for allocation of cloud resources to end-users on-demand basis. This algorithm is based on min-min and max-min algorithms. These are two conventional task scheduling algorithm. The selective algorithm uses certain heuristics to select between the two algorithms so that overall makespan of tasks on the machines is minimized. The tasks are scheduled on machines in either space shared or time shared manner. We evaluate our provisioning heuristics using a cloud simulator, called CloudSim. We also compared our approach to the statistics obtained when provisioning of resources was done in First-Cum-First-Serve(FCFS) manner. The experimental results show that overall makespan of tasks on given set of VMs minimizes significantly in different scenarios.
|LITERATURE SURVEY: Steganography Using Redundant Bit Replacement By Neural Network
Jasmeet Kaur, Nitika Kapoor, Harish Kundra
Abstract: The paper describes the progress in the field of Steganography. The idea behind this technique is to hide the information in the media.The challenge is to make the hidden information untraceable. The concept orignate from Spatial domain to more enhanced technique. The proposed technique in this paper is Neural Network. By using this technique we make hide the information in better way than simpler techniques in spatial domian.
|Emotion Detection with multimodal fusion using Speech – A Review
R. V. Darekar, A.P. Dhande
Abstract: Speech is the most natural form of
|Survey of Network-on-Chip Proposals and Contributions
Jaya R. Surywanshi, Dr. Dinesh V. Padole
Abstract: System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a “system” on a single integrated circuit. The scaling of microchip technologies has enable large scale systems-on-chip. Network-on-chip (NoC) research addresses global communication in SoC, involving the implementation of scalable communication structures. The platforms should also have to incorporate highly scalable, predictable, reusable, cost- and energy-efficient architectures. This survey presents a perspective on existing NoC research. In this paper, we have summarized different research papers and contributions in NOC area.
|Principal Component Analysis for Detecting Foreign Fiber Contaminant in Cotton with Comparative Analysis.
Damandeep kaur, Sunil Khullar
Abstract: Presence of foreign fibers & cotton contaminants in cotton degrades the quality of cotton The digital image processing teqniques based on computer vesion provides a good way to eliminate such contaminants from cotton. There are various techniques used to detect the cotton contaminants and foreign fibers. The major contaminants found in cotton are plastic film, nylon straps, jute, dry cotton, bird feather, glass, paper, rust, oil grease, metal wires and various foreign fibers like silk, nylon polypropylene of different colors and some of white color may or may not be of cotton itself. After analyzing cotton contaminants characteristics adequately, The paper presents various techniques for detection of white foreign fibers and contaminants from cotton.Many techniques were implemented like HSI, YDbDR, YCbCR .RGB images are converted into these components then by calculating the threshold values these images are fused in the end which detects the contaminants .In this research the fusion technique is applied that is PCA in the end which will fuse the image which is being analysis acording to its threshold value .and will provide good results which are based on parameters like mean ,standard deviation and variance.
|Hybrid Model Designing for Image Fusion and Comparative Analysis with Previous Techniques
Amarjot kaur, Sunil Khullar
Abstract: Image fusion basically defines merging of two images in such a way that the resultant image can retain the most desirable characteristics of both source images. It is a process of combining the relevant information from different source images into a single image, with which the output fused image will be more informative than any of the input source images.It extracts information from the several domains. The main goal of image fusion techniques is to enhance the applications of the source images, improve reliability and also improve capability of the images.Many fusion techniques like PCA,HIS and wavelet techniques are producing good results in past years but there are also some research papers describing the problems of these techniques. This implementation paper is presenting the implementation of these three fusion techniques and hybrid of three fusion techniques HIS, PCA and wavelet for better results. The comparison of each technique with hybrid fusion technique is based on two parameters RGB content and Correlation parameter. Our Hybrid fusion technique is producing better results as shown in comparison of this implementation paper.
|Skew Detection Techniques for Binary Documents
Manpreet kaur, Dr. Himani
Abstract: Skew refers to the text which is neither parallel nor at right angles to a specified or implied line. Even a smallest skew occurring in a document image results in the failure of segmentation of characters from words or text lines. It is therefore essential to detect and correct the skew at the preprocessing stage so that the perturbation of skew can be avoided for further processing. In this paper, a brief overview of document skew, types of skew and skew detection is presented. It also highlights the key problems associated with skew detection. Several approaches concerned with skew detection that have already been developed are discussed in this paper.
|A Novel Scheme for Decision Making of Handover in Mobile Wimax
Satinder Singh, Jaspal Singh
Abstract: Mobile terminals allow users to access service while on the move. This unique feature has driven the rapid growth in the mobile network industry, changing it from a new technology into a massive industry in less than two decades. In this thesis, an in-depth study of the handover effects of mobile WiMAX networks is carried out. The mobile WiMAX technology is first presented as literature study and then the technologies of handovers for previous generations are introduced in detail. Further, the hard handover of the mobile WiMAX is simulated. In addition, the “ping-pang” effect of handover was investigated and the call blocking and dropping probabilities are implemented using MATLAB. The goal is to find out which parameters have the significant impact on the handover performance.The results showed that the threshold and hysteresis margin of the handover should be selected by considering the tradeoff between the “ping-pang” effect and the extra interference causing to neighboring cells due to the poor quality link. After that some work has been done on the concept of smart handover manager.the main goal of this thesis is to reduce the handover latency . The handover latency of mobile WiMAX is below 50 ms with the traveling speed of mobile station
| Intrusion Detection for Mobile Ad-Hoc Network
Deepika Dua, Atul Mishra
Abstract: Mobile ad-hoc networks(MANET) are the networks which uses the wireless medium for communication ,every node is free to either join or leave the network and the nodes in such a network have no fixed topology, the topology changes with time as the nodes move from one place to another. So in such a network, security can be easily compromised as the attacker can introduce its malicious node in the network and can degrade the network performance. As a result there is a need of an intrusion detection system. This paper describes a scheme that will detect the intrusion in the network and will help improve the network performance in the presence of malicious node.
|Software Fault Forecasting Based on Statistical Attributes
Rita Rani, Vikas Gupta
Abstract: The growing demand for higher operational effectiveness and reliability in industrial processes has resulted in a huge attention in fault detection techniques. Researchers and practitioners are remains concerned with correct prediction when developing systems. On the other hand the most popular research area is software fault or fault prediction. Software fault prediction has security, reliability and financial benefits in technical systems by preventing future failures and further improves process upholding schedules. Software fault prediction facilitates to software engineers to attention development activities on defect less code which enhance the software quality, reliability and minimize the cost and time to develop software system in today’s era of dynamic scenario of globalization. There are many prediction models which are used to filter the software defects. The present study empirically explorers the viability of reducing the software defect prediction based on statistical factors. Further, the study attempts to offer the future prospective in other dimensions like programming languages and for mapping the relation of attributes and fault tolerance.
|A Fuzzy Model for Evaluating the Maintainability of Object Oriented System Using MOOD Metrics
Gurpreet Kaur, Mehak Aggarwal
Abstract: The research on object-oriented metrics has a great contribution in improving the quality of object-oriented systems. Many software metrics have been proposed by different researchers such as Chidamber and Kemerer (CK), Lorenz & Kidd, Rosenberg, Abreu etc. These metrics measure the OO design mechanisms such as polymorphism, inheritance, Encapsulation, Information hiding, Cohesion, Coupling etc which greatly influence the various quality characteristics of the software’s such as reusability, reliability, maintainability and so on. Fernando Brito e Abreu has proposed a set of six object-oriented metrics namely MOOD Metrics and presented the correlation between these metrics and the Normalized Rework (maintainability). But the results given by Abreu are not quantitative and vague in nature. In this research work, a decision making system based on fuzzy inference is proposed that quantifies the maintainability of object-oriented system using the MOOD Metrics. This system is finally validated using the empirical results given by Abreu.
|An Overview: Enhanced Steganography Using Rule Base Neural Network
Seema Rani, Nitika Kapoor, Harish Kundra
Abstract: Hiding messages in image data, called steganography, is used for both legal and illicit purposes. The detection of hidden messages in image data stored on websites and computers, called steganalysis, is of prime importance to cyber forensics personnel. This paper describes research On Steganography And artificial neural network (ANN) system.ANN is combined with Rule based System to provide high-performance and immune against conventional attack and performs good perceptibility compared to other steganographic approaches. Neural Networks can be used for steganalysis.
|Malware Identification Embedded into Malicious Websites Using Client Honeypot Based on Hybrid Detection
Supinder Kaur, Harpreet Kaur
Abstract: Attackers are using the malicious websites to launch the cyber attacks against the client’s user applications which is one of the growing threat to the internet community. The growing threat to spread the internet attacks through malicious websites led to new technologies to defend against these kind of attacks and client honeypots is one of the these technologies. Client honeypots crawl the internet websites to find and to identify the malicious web servers. The technology called Active Honeypots (Honeyclients) is designed to act as security devices in search of malicious servers that attack client side applications. The main objective of Active Honeypot is to actively browse the cyber space to identify and enlist the malicious websites. This Paper presents the usefulness of client honey pots in terms of collection of malwares which are embedded into malicious websites , the comparative analysis of state based detection of malwares with signature based detection mechanisms , then the design and implementation of the system by incorporating the hybrid model of detection known as signature & state based malware infection detection. Both the detection mechanism is running in parallel mode and most of software tools used in this implementation is open source.
|Cuckoo based Energy Effective Routing in Wireless Sensor Network
Gurpreet Kaur Bhatti, Jatinder Pal Singh Raina
Abstract: Energy efficiency is the most required quality in a sensor network where each node consumes some energy with each transmission over the network. Energy efficiency is required to improve the network life. In this work we will move in the direction to improve the network life. The presented work is about to perform the energy effective routing so that the network life and network throughput will be improved. In this work the opportunistic routing will be defined to optimize the networks on the basis of Cuckoo Search. Also, modification is made in the PEGASIS(Power Efficient Gathering in Sensor Information System) protocol using fuzzy system. This work is done to improve the network throughput as well as the network lifetime. The presented work is about to define an energy effective routing over the sensor network so that effective communication will be performed without increasing the congestion over the network. We have defined opportunistic routing to identify the effective path based on the energy analysis, load analysis and the delay analysis.
|Solution of Boundary Value Problem using Shooting Method
Most of the problems in the world use mathematical tools for its solutions. Some problems have analytical solutions. However analytical solutions of all the problems do not exist. Almost all the problems in the world can be solved using numerical methods. Boundary Value Problem (BVP) is defined as a mathematical problem in which the partial differential equation is satisfied with in a certain, and in addition certain conditions are to be satisfied on the boundary of the region. Shooting Method is an iterative method used for solving BVP. In this method, BVP is first onverted into Initial Value Problem by assuming the required number of conditions at the initial points. Shooting method is more time efficient than other numerical methods available like Range-Kutta Method, Newton Raphson Method, Secant Method and fastly converges toward the solution.