Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Pooja,
- Text Region Extraction from Punjabi News Videos using Feature Analysis
Abstract Views :182 |
PDF Views:0
Authors
Affiliations
1 Dr. B. R. Ambedker National Institute of Technology, Jalandhar, IN
1 Dr. B. R. Ambedker National Institute of Technology, Jalandhar, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 18, No 1 (2016), Pagination: 23-39Abstract
This paper presents a text region extraction approach based on feature analysis. This scheme consists of 5 main phases that are Frame Extraction, Edge Detection and Binarization, Fusion, Normalization and Feature Extraction. For Frame extraction MATLAB simulator is used where video reader is used to extract frames from the video according to the length of video. Edge detection and Binarization is processed on that extracted frames then both the detected edges and binarized image will be fused using PCA based fusion method. Fused image is then normalize and feature extraction is perform by using SIFT and SURF based algorithm. The results will show that extracted text region from the frames of the news videos.Keywords
Text Region Extraction, Sobel, Otsu Threshold, PCA, SIFT, SURF.- Ant Colony Optimization Based Mixed Clahe for Underwater Haze Removal
Abstract Views :164 |
PDF Views:1
Authors
Dilraj Kaur
1,
Pooja
1
Affiliations
1 Punjab Technical University, Dept. Computer Science Engineering, CT-Institute of Engineering Management and Technology, Jalandhar, IN
1 Punjab Technical University, Dept. Computer Science Engineering, CT-Institute of Engineering Management and Technology, Jalandhar, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 16, No 1 (2015), Pagination: 24-31Abstract
Visibility restoration refers to various ways that aim to reduce and remove the degradation that have occurred while the digital image has been obtained. The degradation may be due to various factors like relative object-camera motion, blur due to camera misfocus, relative atmospheric turbulence and others. Underwater image enhancement based algorithms become more useful for many vision applications. It is found that most of the existing researchers have neglected many issues i.e. no technique is accurate for different kind of circumstances. The existing methods have neglected the use of ant colony optimization to reduce the noise and uneven illuminate problem. The main objective of this paper is to evaluate the performance of Ant colony optimization over the available MIX-CLAHE technique.Keywords
Underwater Haze Removal, ACO, Mix-CLAHE, Dark Channels.- Improving Saturation Weighting Color Constancy with Fuzzy Membership and Edge Preservation
Abstract Views :155 |
PDF Views:0
Authors
Gurpreet Kaur
1,
Pooja
1
Affiliations
1 Punjab Technical University, Dept. of CSE, CT Institute of Engineering, Management and Technology, Jalandhar, IN
1 Punjab Technical University, Dept. of CSE, CT Institute of Engineering, Management and Technology, Jalandhar, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 16, No 1 (2015), Pagination: 32-40Abstract
Generally, color constancy is a method of which calculates the particular impact involving discrete light sources using a digital image. The exacting figure documents with a camera determined by several components such - the actual physical information with the picture, the particular illumination occurrence within the scene, and the features with the digital camera. Our paper has explained the key purpose to modify saturation weighting dependent color constancy applying fuzzy membership based color improvement in addition to edge preserving filtering. As fuzzy membership based saturation weighting may be slow up the impact of the light due to it decreases the sharpness on the image and results in an amount of noise. Therefore a conflict has been arisen and we have needed to remove by using an integrated effort of the edge based color constancy with the histogram stretching, and edge preserving filtering. Experimental results have been shown the efficiency of our approach which carried out certain performance matrices such - MSE, RMSE and PSNR. Our proposed method has given better performance on the basis of performance matrices as compared to the previous methods.Keywords
Color Constancy, Saturation Weighting, Edge Based Color Constancy, Fuzzy Membership.- Decorative Text Words Recognition Using Neural Network
Abstract Views :178 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, CT Group of Institutions, Jalandhar, Punjab, IN
1 Department of CSE, CT Group of Institutions, Jalandhar, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 21 (2016), Pagination: 39-47Abstract
Use of the decorated text is highly preferable in the area where the attention of viewers is required. The basic optical recognition systems do not give good results for the decorated inputs because the formation of decorated text is complex and different from the other regular fonts. Very less work has been done in the field of decorated text and specially decorated words. In this paper algorithm has been designed which work for the recognition of decorated words. The proposed system uses the neural network for the recognition and consists of the following portion. First is Otsu's algorithm, then applying preprocessing, neural network and finally the matched decision is displayed.Keywords
Text Recognition, Neural Network, Otsu’s Algorithm.- Analysing Saliency with SIFT for Intruder Detection
Abstract Views :165 |
PDF Views:2
Authors
Affiliations
1 Department of CSE, CT Group of Institutions, Jalandhar, Punjab, IN
1 Department of CSE, CT Group of Institutions, Jalandhar, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 21 (2016), Pagination: 96-105Abstract
In this paper we are proposing a system for the colored saliency detection for securing the systems from indruders. The proposed system is based on saliency detection. The detection Saliency can be a good technique for the detection of Intruders in the security system areas. Saliency detection has become a very prominent subject for research in time. The different types of techniques has been defined for the saliency detection. The experimental results are shown in the below.Keywords
Saliency Detection, SIFT.- Fake Profile Detection in Instagram Online Social Network
Abstract Views :155 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, University Institute of Engineering & Technology (U.I.E.T), IN
1 Department of Computer Science, University Institute of Engineering & Technology (U.I.E.T), IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 27, No 1 (2018), Pagination: 91-98Abstract
Social network provides number of applications such as Myspace, Facbook, Twitter and many more through which users can connect with their friends and share their images and videos with them. Instagram is application of social network which is used to share images and videos with friends also tag a friend on an image and video. It is difficult to recognize which user is normal user or which user is malicious user. In this paper different techniques to recognize fake profile user has been surveyed and provide a mechanism to detect fake profiles in social network. This paper proposed a mechanism to detect normal posts using Random Forest classifier. The proposed mechanism has been analyzed using weka.Keywords
Social Networks, Fake Profile, Cloning ,Instagram and Facebook.References
- Pran Dev, Jyoti, Dr. Kulvinder Singh and Dr. Sanjeev Dhawan, “A Naive Algorithmic Approach for Detection of Users’ with Unusual Behavior in online Social Networks” International Journal of Software and Web Sciences (IJSWS), ISSN: 2279-0071pp: 37-41,2015.
- Ekta and Sanjeev Dhawan, “Classification of Data Mining and Analysis for Predicting Diabetes Subtypes using WEKA”, Vivechana: National Conference on Advances in Computer Science and Engineering (ACSE-2016), pp. 1-5.
- Ekta, Sanjeev Dhawan and Kulvinder Singh, “Feature Extraction and Content Investigation of Facebook User’s using Netvizz and Gephi”, Advances in Computer Science and Information Technology (ACSIT), ACSIT 2016, pp. 262-265.
- Sanjeev Dhawan and Ekta, “Implications of Various Fake Profile Detection Techniques in Social Networks”, IOSR Journal of Computer Engineering (IOSR-JCE), AETM'16, 2016, pp. 49-55.
- M. Li, N. Cao, S. Yu, and W. Lou, “FindU: Privacy-preserving personal profile matching in mobile social networks,” in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 2435–2443.
- W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure friend discovery in mobile social networks,” in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 1647–1655.
- R. Agrawal and R. Srikant, “Privacy-preserving data mining,” in ACM Sigmod Rec., vol. 29, no. 2, pp. 439–450, 2000.
- A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh, “Location privacy via private proximity testing,” in Proc. NDSS, San Diego, CA, USA, 2011.
- Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, and Michalis Faloutsos, “Detecting Malicious Facebook Applications”, IEEE/ACM TRANSACTIONS ON NETWORKING, IEEE 2015, pp. 1-15
- G. Stringhini, C. Kruegel, and G. Vigna, “Detecting spammers on social networks,” in ACSAC ’10: Proceedings of the 26th Annual Computer Security Applications Conference. ACM Request Permissions, 2012, pp. 1–9.
- Anwar M, Fong PW, “A visualization tool for evaluating access control policies in Facebook-style social network systems”, In: Proceedings of the 27th annual ACM symposium on applied computing, ACM 2012, pp. 1443–1450.
- S. Abu-Nimeh, T. M. Chen, and O. Alzubi, “Malicious and Spam Posts in Online Social Networks,” Computer, vol. 44, no. 9, IEEE 2011, pp. 23–28.
- Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon, “What is Twitter, a Social Network or a News Media?”, International World Wide Web Conference Committee (IW3C2),ACM 2010, pp. 1-10.
- Rahman MS, Huang TK, Madhyastha HV, Faloutsos M, “Frappe: detecting malicious Facebook applications”, in: Proceedings of the 8th international conference on emerging networking experiments and technologies, ACM 2012, pp. 313–324.