A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Taneja, Amit
- Segmentation of Touching Characters in Handwritten Gurumukhi Script
Authors
1 Department of Computer Science and Engineering, GZS-PTU Campus, Bathinda, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 13 (2014), Pagination: 90-94Abstract
Segmentation of a word into characters is one of the important challenges. This is even more challenging when we segment characters in an offline handwritten document. Touching characters make this problem more complex. In this paper, we have applied straight segmentation method for identification and segmentation of touching characters in handwritten Gurumukhi words. We could achieve 90.9% accuracy for character segmentation with this method. If the characters are neither broken nor overlapping, then this technique will produce better results.Keywords
Character Segmentation, Projection analysis, Zone Segmentation.- Comparative Study of Routing Protocols for WMN
Authors
1 Department of Computer Science and Engineering, GZS PTU Campus, Bathinda, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 13 (2014), Pagination: 106-110Abstract
Today, Wireless Mesh Networks has been recognized as a new attractive communication paradigm due to their ease of deployment and ability of fault tolerance. WMN is a multi-hop wireless network which builds high performance infrastructure and provides efficient communication using various Routing Protocols. Traditional routing protocols like AODV, DSR and DSDV etc. support Ad-hoc networking in which devices doesn't have capability to provide fault tolerance. To overcome this, several types of Opportunistic based routing protocols have been proposed i.e. EXOR and SOAR etc. which support combination of both Ad-hoc and Mesh networking. All these protocols like EXOR and SOAR exploit the broadcast nature and provide the capability of fault tolerance using multiple alternate paths and redundant copies of data packets. Further, we have shown the comparative performance analysis of EXOR and SOAR using various network parameters i.e. network throughput, robustness (against node/link failure), hop count, bandwidth consumption and traffic congestion for multiple different nodes network.Keywords
WMN, Fault Tolerance, EXOR, SOAR, ROMER.- A Novel Approach for Pattern Recognization Using Neural Network of Hand Biometrics
Authors
1 Computer Engineering Section, Yadavindra College of Engineering, Punjabi University, Guru Kashi Campus, Talwandi Sabo, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 4 (2011), Pagination: 87-101Abstract
Hand geometry is considered to achieve medium security with lesser cost along with several other advantages as compared to other available techniques. The physical dimensions of a human hand known as hand or palm geometry, contains information that is capable of authenticating the identity of an individual. The hand geometry based identity verification system is being widely used in various applications like access control, time and attendance, point-of-scale, anti-pass back and interactive kiosks etc. The goal of a biometric verification system consists in deciding whether two characteristics belong to the same person or not. The present work presents a biometric user recognition system based on hand geometry. It explores the features of a human hand, extracted from a color photograph which is taken when the user is asked to place his/her hand on a platform especially designed for this task.
Different pattern reorganization techniques have been used for classification and verification. It consists of a database where all the information about the authenticated users is stored. The system extracts the features from a test image and compares it with the stored information on the database. The experimental results show that the proposed system has an encouraging performance. The false acceptance rate are reduced down to 0.02, respectively. Experimental result, up to 95 percent rate of success in classification, will show the possibility of using the system in medium/high security environment with less cost.