A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kumar, Lalit
- Facial Recognition Using Theory of Biometrics
Authors
1 Department of Computer Science and Engineering, GZS PTU CAMPUS, Bathinda, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 13 (2014), Pagination: 41-45Abstract
While people have had the inborn ability to identify and compare different faces for millions of years, computers are just now captivating this. In this paper, the techniques of how computers are shaping your face into computer code are compared to millions of other faces are illustrated. How facial recognition software is being used in criminal investigations, elections and to protect your personal computer.
A facial recognition system is a computer application for automatically recognizing or verifying a human from a digital image or a video frame from videos. This can be done by distinguishing selected facial features from the image and a facial database. It is widely used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems.
3-D facial recognition system and biometric facial recognition system is focussed. This paper also illustrates future scope of enhancement of facial recognition system in India.
Keywords
3D Facial Recognition, Biometrics Facial Recognition, Alignment, Identification.- Smartphone’s Hardware and Software Development Issues and Factors
Authors
1 Chandigarh University, Gharuan, (Mohali), IN
2 GZS-PTU Campus, Bathinda (Punjab), IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 13 (2014), Pagination: 69-73Abstract
Smartphone's provides us the capability of a typical computer with absolute mobility and small form factor. But the hardware, software architecture of smartphone is significantly different from the conventional hardware and software architectures. The feature and architecture of the processors is totally different the traditional processors as these processors are developed to cope-up with less energy availability with Smartphone's or any other ultra portable devices.Keywords
Smartphone Development Issues, Hardware, Software Development Issues of Smartphones.- A Novel Technique for Image Enhancement and Denoising with Wavelets
Authors
1 Computer Science Engineering Department, GZS-PTU Campus, Bathinda, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 12 (2014), Pagination: 13-17Abstract
Images are used in a variety of fields for image analysis and image understanding. Digital images are usually degraded by various types of noise due to sensor problems, weather problems and so on. In this paper, we represent a new technique for removing noise from images. Image enhancement is based on the multi scale singularity detection with an adaptive threshold whose value is calculated with different ways. Wavelet transforms are used because of their inherent property that they are redundant and shift invariant. In different scales of an image intensity changes occurs, so there is need of optimal detection that requires the use of operators of different sizes. Therefore, a vision filter must be a differential operator, and it must be capable of being tuned to act at any desired scale and the wavelets are ideal for this. Principle objective of Image enhancement and denoising is to process an image so that result is more suitable than the original image for specific application. This paper will provide an overview of underlying concepts commonly used for image enhancement.Keywords
Spatial Domain, Frequency Domain, Discrete Wavelet Transforms (DWT), Daubechies Wavelets, Neuro-Fuzzy Logic, Peak Signal to Noise Ratio(PSNR) and Mean Square Error(MSE).- Analysis of Authentication Protocols in Mobile IP
Authors
1 Department of Computer Science and Engineering, GZS-PTU Campus, Bathinda (Punjab), IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 11 (2014), Pagination: 1-6Abstract
Mobile Internet Protocol (IP) is a new recommended Internet protocol designed to support the mobility of a user (host). Host mobility is becoming important because of the recent blossoming of laptop computers and the high desire to have continuous network connectivity anywhere the host happens to be. The development of Mobile IP makes this possible. This paper describes and summarizes the characteristics of the current Internet draft for Mobile IP. In addition to the current internet draft, this paper also discusses authentication mechanism in Mobile IP proposals so that the reader may understand the different design issues associated with the different authentication protocols.Keywords
Internet Protocol, Mobile IP, Internet, Authentication Protocols.- Network Security: Present and Future Trends
Authors
1 Department of Computer Science and Engineering, GZS-PTU Campus, Bathinda(Pb), IN