Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kaur, Navdeep
- Performance Analysis of Genetic Algorithm in Different Cloud Computing Environments
Abstract Views :169 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Sri Guru Granth Sahib World University, Fatehgarh Sahib, Punjab, IN
1 Department of Computer Science and Engineering, Sri Guru Granth Sahib World University, Fatehgarh Sahib, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 16, No 1 (2015), Pagination: 6-11Abstract
Cloud Computing is the inevitable emerging technology which thrives on managing the services to users in an effective manner. Providing those services requires an optimal solution for scheduling tasks to the resources within time bound. Genetic Algorithm (GA) is one of the scheduling algorithm which is based on evolutionary concept has been extensively studied in literature. In this paper, the performance of the Efficient Genetic Algorithm (EGA) is evaluated in different cloud computing environments. A comparison analysis revealed that EGA is more effective in heterogeneous environment as compared to homogeneous environment.Keywords
Genetic Algorithm, Scheduling, Cloud Environment.- Secure Node Localization in Wireless Sensor Network: A Review
Abstract Views :144 |
PDF Views:2
Authors
Affiliations
1 Deptt of CSE, Sri Guru Granth Sahib World University, Fatehgarh Sahib, Punjab, IN
2 Deptt of ECE, Sri Guru Granth Sahib World University, Fatehgarh Sahib, Punjab, IN
1 Deptt of CSE, Sri Guru Granth Sahib World University, Fatehgarh Sahib, Punjab, IN
2 Deptt of ECE, Sri Guru Granth Sahib World University, Fatehgarh Sahib, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 16, No 1 (2015), Pagination: 90-93Abstract
Wireless Sensor Network (WSN) has achieved researcher's interest worldwide in the last decade. For some applications like environmental monitoring, health monitoring, tracking applications etc., position of node plays a vital role. As wireless sensor networks are deployed in hostile and unattended environment, nodes are prone to various types of attacks like Sybil attack, black hole attack, wormhole attack etc. So security is a main concern in wireless sensor network. Therefore secure localization of nodes is an active area of research. This paper surveys different schemes that have been proposed to find the location of a node securely.Keywords
Wireless Sensor Network, Security, Localization.- A Novel Technique for Data Embedding Using Visual Saliency Map
Abstract Views :159 |
PDF Views:2
Authors
Affiliations
1 Punjab Technical University, Kapurthala, IN
2 Department of Computer Science Engineering., SGGSWU, Fatehgarh Sahib, IN
3 Department of Information Technology, Chandigarh Engineering College, Landran, Mohali, IN
1 Punjab Technical University, Kapurthala, IN
2 Department of Computer Science Engineering., SGGSWU, Fatehgarh Sahib, IN
3 Department of Information Technology, Chandigarh Engineering College, Landran, Mohali, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 6 (2012), Pagination: 200-223Abstract
Steganography is a technique in which secret message is hidden in some media like image file, audio file or video file. The objective of the steganography is to prevent the unauthorized user to estimate that certain secret communication is going on by concealing the very existence of secret message. As it is clear this thing involves deceiving the human visual system (HVS) to get an impression that some secret message is hidden in image or some other media file. Saliency model is one of the methods that generate a map corresponding to the attention region of Human Visual System. So Human Visual System (HVS) is a point of interconnection between two concepts - Steganography and Saliency Map. In this work we represent a method for data hiding in images based on saliency map.Keywords
Saliency Map, Wavelet Domain, Model Based Steganography, Imperceptibility.- Human Eye Deceiving Model for Secret Communication
Abstract Views :103 |
PDF Views:4
Authors
Affiliations
1 Punjab Technical University, Kapurthala, IN
2 Department of Computer Science Engineering, Chandigarh Engineering College, Landran, Mohali, IN
3 Department of Information Technology, Chandigarh Engineering College, Landran, Mohali, IN
1 Punjab Technical University, Kapurthala, IN
2 Department of Computer Science Engineering, Chandigarh Engineering College, Landran, Mohali, IN
3 Department of Information Technology, Chandigarh Engineering College, Landran, Mohali, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 5 (2011), Pagination: 270-295Abstract
Visual system of human beings does not process the complete area of image rather focus upon limited area of visual image. But in which area does the visual attention focused is a topic of hot research nowadays. Research on psychological phenomenon indicates that attention is attracted to features that differ from its surroundings or the one that are unusual or unfamiliar to the human visual system. Detection of visually salient image regions is useful for applications like object segmentation, adaptive compression, and object recognition. Object or region based image processing can be performed more efficiently with information pertaining locations that are visually salient to human perception with the aid of a saliency map. Recently many authors have used wavelet domain for detection of salient regions. This domain has shown promising results but almost all the authors have ignored the detail components of wavelet domain which may have some useful information. So in this paper we have tried to use the wavelet domain method to detect salient regions using approximation and all detail components. Further this saliency map will be used for steganography.Keywords
Saliency Map, Wavelet Transform, Approximation Coefficients, Detail Coefficients, Salient Region.- Image Segmentation Techniques
Abstract Views :131 |
PDF Views:5
Authors
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 591-595Abstract
Segmentation partitions an image into distinct regions containing each pixel with similar attributes. The level to which this partition is carried out depends on the problem being solved, i.e., the segmentation should stop when the objects of interest in an application have been isolated. The applications of computer vision require an image segmentation to extract the meaningful regions of the image. Image segmentation is very useful tool in medical applications. In medical area it is used to extract or region of interest from the background. Image Segmentation simplifies and/or changes the representation of an image into meaningful form and which is easier to analyse.- Identification and Detection of Plant Diseases Using Image Segmentation Techniques:A Review
Abstract Views :168 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Engineering, Punjabi University, Patiala, IN
1 Department of Computer Engineering, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 24, No 1 (2017), Pagination: 12-18Abstract
This review paper discusses various image segmentation methods for parting plant images to identify infected part of leaf. Segmentation is an image processing system that is used to divide image into parts in light of pixel and auxiliary data. Segmentation is utilized to separate area of interest based on the application. This paper explains about area based and edge based segmentation methods under which thresholding, K-mean, Fuzzy C mean systems are examined.References
- N. M. Zaitoun and M. J. A. , "Survey on Image Segmentation Techniques," 2015.
- U. M. S, M. C and S. M, "An Experiment Study and Analysis of Different Segmentation Techniques," 2013.
- Dilpreet and Y. K. , "Various Image Segmentation Techniques:A review," vol. 3, no. 5, 2014.
- G. Manoj and A. Rajamurugan, "A Review about Digital Image Segmentation Techniques," vol. 3, no. 9, 2015.
- R.Yogamangalam and B.Karthikeyan, "Segmentation Techniques Comparison in Image Processing," vol. 5, no. 1, 2013.
- S. Nilima, PatelDhanesh and JivaniAnjali, "Review on Image Segmentation, Clustering and Boundary Encoding," vol. 2, no. 11, 2013.
- P.Revathi and M.Hemalatha, "Classification of Cotton Leaf Spot Diseases Using Image Processing Edge Detection Technique," 2012.
- S. M. Sheela Se, "Study and Theortical Analysis of Various Segmentation Technique For Ultrasound Images," 2016.
- H. Narkhede, " Review Of Image Segmentation Techniques," no. 8, july 2013.
- A. Khan and R. S, "Image Segmentation Methods:A Comparitive Study," vol. 3, no. 4, 2013.
- Y. Chan and O.T.Chan, "Image Segmentation Method using Thtreshold Automatically Determined from Picture Content".
- A.Comargo and J. Smith, "Image Pattern Classification for the Identification of Disease Causing Agents In Plants," no. 66, 2009.
- A. B. Ishak, "A two Dimensional Multilevel Thresholding Method For Image Segmentation," no. 52.
- S. Sankaran, A. Mishra, R. Ehsani and C. Davis, no. 72, 2016.
- T. Liang, M. Zhang and W. N.Brown, "Image Feature Selection Using Genric Programming for Figure Ground Segmentation," no. 62, 2017.
- D. A. Bashish, M. Braik and S. Bani-Ahmed, "Detection and Classification of Leaf Diseases using K-means Based Segmentation and Nural Network Based Classification".
- A. N.Rathod, B. Tanawal and V. shah, "Image Processing Technique for Detection of leaf Disease," vol. 3, no. 11, 2013.