IJCT - Volume 3, Issue 5 / September - October 2016
S.No
|
Title/Author Name
|
Page No
|
1
|
A Review of Image Segmentation of Underwater Images Using Fuzzy C- Means Clustering - Vikram Dwivedi ,Dr. Paresh Rawat
Abstract
The underwater image segmentation is a challenging field of research due to poor illumination condition. Therefore this paper reviews the various issues and problems based on the existing researches in underwater segmentation field. Since underwater images have many uses in general purposes like in marine engineering, analysis and monitoring of underwater animals and plants and for monitoring of oil wells. Thus, underwater segmentation problem can be considered as fuzzy problem. Therefore this paper reviews the fuzzy clustering algorithm for image segmentation. Fuzzy C-Means clustering based underwater image segmentation methods separates the underwater objects using clustering and thresholding. It is found that fuzzy based approaches are not such efficient in underwater environment and thus not much explored. The efficiency of the fuzzy based methods various with different images and objects. Paper pointed out various challenges after reviewing the previous work. It is require improving the efficiency of the fuzzy based systems for segmenting the underwater images. Keyword: Image segmentation, clustering, Edge-based segmentation, Hybrid segmentation. × Vikram Dwivedi ,Dr. Paresh Rawat "A Review of Image Segmentation of Underwater Images Using Fuzzy C- Means Clustering" Vol. 3 - Issue 5 ( September - October 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
1-5 |
2
|
Recycling Organic Waste - Ms. Akila .S, Ms. Siva sankari A.
Abstract
Solid waste management is a big challenge in urban areas for most of the countries throughout the world. There are many technologies are used for waste collection as well as for well managed recycling. The concurrent effects of a fast national growth rate, of a large and dense residential area and a pressing demand for urban environmental protection create a challenging framework for waste management.In this project humans and vehicles were used to do that work and here we are using automatic technique to detect garbage level in Garbage Can. For that, ID number is given to each can. Also as soon as the Garbage Can is full / over flowing then a Message is sent to the server from where all the garbage collection vehicles are allotted.The main urban wastages are household food waste, agricultural waste, human and animal waste. The waste component of landfill is broken down by micro-organisms to form a liquid �leachate� which contains bacteria, rotting matter and maybe chemical contaminants from the landfill. Keyword: Solid waste management, environmental protection, micro-organisms. × Ms. Akila .S, Ms. Siva sankari A. "Recycling Organic Waste" Vol. 3 - Issue 5 ( September - October 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
6-12 |
3
|
Theft Alert System and Auto Arresting System for Museums or Jewellery Shop - Ms. Kalpanagayathri M.,Mrs. Sangeetha Lakshmi G.
Abstract
The main aim of the project is to design a system for alerting theft and to auto arrests the theft in museums and jewelry shops. The purpose of the system is to design a system for alerting theft and to auto arrest the theft in museums and jewelry shops. This system helps the museums and jewelry shop owners by giving them security. The thesis title �THEFT ALERT AND AUTO ARRESTING SYSTEM FOR MUSEUMS OR JEWELLRY SHOPS� itself indicates that whenever someone wants to theft the jewel which is present in the shopping mall then the theft will be automatically arrested with the help of some human detecting sensors and make the doors to close automatically. That means the thief is arrested. This thesis consists of two sections. The transmitter section consists of a PIR sensor, a motor a micro controller. One such thing is using PIR sensor which is used to detecting the human motion. Keyword: Design; Mobile App; visually impaired; blind; Usability; low vision mobile portal; accessibility; iOS; iphone. × Ms. Kalpanagayathri M.,Mrs. Sangeetha Lakshmi G."Theft Alert System and Auto Arresting System for Museums or Jewellery Shop" Vol. 3 - Issue 5 ( September - October 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
13-19 |
4
|
A Location- and Diversity-Aware News Feed System for Mobile Users - Ms. Sangeetha .R, Mrs. Sangeetha Lakshmi G.
Abstract
A location-aware news feed (LANF) system generates news feeds for a mobile user based on her spatial preference her current location and future locations) and non-spatial preference (i.e., her interest). Existing LANF systems simply send the most relevant geo-tagged messages to their users. Unfortunately, the major limitation of such an existing approach is that, a news feed may contain messages related to the same location (i.e., point-of-interest) or the same category of locations (e.g., food, entertainment or sport). We argue that diversity is a very important feature for location-aware news feeds because it helps users discover new places and activities. In this paper, we propose D-MobiFeed; a new LANF system enables a user to specify the minimum number of message categories (h) for the messages in a news feed. In D-MobiFeed, our objective is to efficiently schedule news feeds for a mobile user at her current and predicted locations, such that (i) each news feed contains messages belonging to at least h different categories, and (ii) their total relevance to the user is maximized. To achieve this objective, we formulate the problem into two parts, namely, a decision problem and an optimization problem. For the decision problem, we provide an exact solution by modeling it as a maximum flow problem and proving its correctness. The optimization problem is solved by our proposed three-stage heuristic algorithm. Keyword: A location-ware news feed(LANF), Points-of-interest, D-MobiFeed, database security. × Ms. Sangeetha .R, Mrs. Sangeetha Lakshmi G." A Location- and Diversity-Aware News Feed System for Mobile Users " Vol. 3 - Issue 5 ( September - October 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
20-28 |
5
|
Image Set Creation Using Different Image Enhancement Technique for Underwater Image Segmentation - Vikram Dwivedi , Dr. Paresh Rawat , Nashrah Fatima
Abstract
Underwater images suffer from less visibility problem due to principal of light refraction under water environment. Therefore, this paper address the problem of enhancing the contrast of the underwater images captured under different lightning conditions and depths. This paper presenting the comparison of the two distinct popular enhancement methods and it concluded that this different method generates two different image sets from original low contrast image. These sets can be further utilized for object segmentation using fuzzy based clustering methods efficiently. Paper presents enhancement using contrast limit adaptive histogram equalization (CLAHE) and, global contrast adjustment method.. The CLAHE method is used to the images so that contrast of output images is improved also gives better information. It is concluded that using the different contrast enhancement method different image data set can be created for same input image which can be utilized for higher level processing task and features extractions. Keyword: A Contrast enhancement, Contrast adjustment, Contrast limited Adaptive Histogram Equalization, Dual enhancement, Entropy. × Vikram Dwivedi , Dr. Paresh Rawat , Nashrah Fatima" Image Set Creation Using Different Image Enhancement Technique for Underwater Image Segmentation " Vol. 3 - Issue 5 ( September - October 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
29-32 |
6
|
Implementation of PSO & HB Image Enhancement Techniques For Tumor Detection - Nisha Kumari Dogra , Maninder Kaur
Abstract
Image enhancement is a mean as the improvement of an image appearance by increasing dominance of some features or by decreasing ambiguity between different regions of the image. Many images such as medical images, remote sensing images, electron microscopy images and even real life photographic pictures, suffer from poor contrast. Therefore there are many techniques of image enhancement in image processing such as Fast Ostu�s method, Histogram equalization (HE) method, Particle swarm optimization (PSO) , Honey Bee (HB) In this paper, a new approach to automatic image enhancement using HB is implemented by specifying intensity of the edges pixels and also earlier reported PSO results were used. Further comparatively analysis is performed between HB and PSO results. The obtained results indicate that the proposed HB yields better results in the terms of both the maximization of number of the pixels in the edges and peak signal to noise ratio (PSNR). Computational time is also relatively small in the HB as compared to the PSO. Keyword: Particle swarm optimization, honey bee and image enhancement. × Nisha Kumari Dogra , Maninder Kaur" Implementation of PSO & HB Image Enhancement Techniques For Tumor Detection" Vol. 3 - Issue 5 ( September - October 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
33-36 |
7
|
A Novel Approach to Resist Shoulder Surfing Attack - Smitesh salian, Shivani Deosthale , Kranti Ghag
Abstract
In today�s technology world one may have been witness password attacks on their applications or even websites. Currently there are many methods that help you provide security as well as prevent various kinds of attacks that your application or website may be vulnerable to. So it has become dire necessity to protect your Applications, Databases and various Projects from these kinds of attacks Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text is combined with colors to generate session passwords for authentication. A usability testing is carried out to measure the satisfactory level of users on the completeness of the system, which include factors such as, total response time to access the system, remembering of password using the system and resistant to shoulder surfing. The testing result shows that the modified colour pass authentication method is resistant to shoulder surfing Keyword: Shoulder Surfing Attack, User Interface, Feature tables, Challenge Values. × Smitesh salian, Shivani Deosthale , Kranti Ghag " A Novel Approach to Resist Shoulder Surfing Attack " Vol. 3 - Issue 5 ( September - October 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
33-36 |
8
|
Image Steganography using IWT along with AES Encryption - Samruddhi Yadav, Prof.Swati Deshpande , Prof.Smita Bansod
Abstract
Steganography is a process that involves hiding a secret message in an appropriate carrier like image, audio, video or text in such a way that secret message does not attract attention to itself and remains invisible. Cryptography is an art of protecting information by transforming it into an unreadable format called Cipher text only those possessing a secret key can decipher the message into plain text. A combined approach using Image Steganography and Privatekey Cryptography has been proposed, the cover image is transformed using Integer Wavelet Transform (IWT) and plain text (secret message) is encrypted using Advanced Encrypted Standards (AES). The Encrypted text is then embedded into cover image using proposed assignment algorithm. This system will offer higher security and robustness against image processing attacks and low-pass filtering attacks compared to older system with good embedding capacity, also the stego image and the secret message will have good visual quality. The system will have improved results in terms of PSNR and MSE values. Keyword: Encryption, Decryption, AES, 2DHaarIWT, Cryptography, Assignment algorithm. × Samruddhi Yadav, Prof.Swati Deshpande , Prof.Smita Bansod" Image Steganography using IWT along with AES Encryption" Vol. 3 - Issue 5 ( September - October 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
37-43 |
9
|
A Novel Method of Gradient-Based Illumination Invariant Face Recognition - Kong Rui , Cheng Lin ,Jie Yingda
Abstract
The effect of illumination variation is one of challenging problems in a face recognition system, which can dramatically reduce the performance of face recognition. In order to solve this problem, this paper proposed a novel method for face recognition. First of all, illumination insensitive representation of image is extracted, which is based on the ratio of gradient amplitude to the original image intensity in the domain. Then, combined with the analysis of NS-LDA algorithm for feature extraction, and finally classified with the nearest distance classifier. Compared with the existed representative approaches, such as LBP (Local Binary Pattern, LBP), WF(Weber-face, WF),GF (Gradientfaces,GF) ,this method has better recognition rate on CAS-PEAL, Yalefaces, Extended Yale B face database. Keyword: Face recognition, gradient domain, illumination insensitive representation, null space LDA. × Kong Rui , Cheng Lin ,Jie Yingda" A Novel Method of Gradient-Based Illumination Invariant Face Recognition " Vol. 3 - Issue 5 ( September - October 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
44-51 |
10
|
Analysis of Big Data Processing Using Data Mining - Shashank Dubey ,Vidya Chitre
Abstract
Cloud computing is a powerful technology that are highly used to perform large- scale and complex computing. It completely remove requirement to maintain expensive computing hardware, or software and large space. Massive growth has been observed in the generation of data or big data over the year through cloud computing. For processing and anlaysing result from that large data generally require lots of computational power and large infrastructure requirement. Hence there is a need to conjoined big data with cloud computing. Since this big data is important to analysis in order to extract insight knowledge from the data. Traditional association rule mining for frequent itemset which scan the dataset into main memory may become inconvenient when handling large dataset. Hence there is need of processing this dataset on multiple commodity machine using parallel technique of Map Reduce Framework. This paper gives overview of different big data mining algorithm used for processing dataset. Keyword: Big Data,Hadoop,MapReduce,Data Mining. × Shashank Dubey ,Vidya Chitre" Analysis of Big Data Processing Using Data Mining " Vol. 3 - Issue 5 ( September - October 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
52-56 |
11 |
Comprehensive Study On Efficient Diabetes Disease Prediction With Using Various Advance Decision Tree Models Algorithms - Amireddy Srinish Reddy, Sanjay Pachouri
Abstract
Data mining has from long been individuals companion and deliverer from numerous points of view and one of the techniques is through decision making. With expanding wellbeing concerns diabetes has a cutting edge scourge with millions around the globe influenced. Data mining is developing in significance to taking care of such true disease issues through its devices. The accompanying study proposes to utilize the UCI vault Diabetes dataset and create DECISION TREE models for classification using LAD tree, NB tree, and a Genetic J48 tree. The DECISION TREE based classifier models study incorporates various parameters like computational overheads consumed, highlights, productivity, and exactness and gives the outcomes. This hereditary J48 display precisely arranges the dataset when contrasted and the other two models as far as exactness and speed. Keyword: Diabetes, M-TREE, J48, C4.5, FB Tree, Classification. × Amireddy Srinish Reddy, Sanjay Pachouri"Comprehensive Study On Efficient Diabetes Disease Prediction With Using Various Advance Decision Tree Models Algorithms" Vol. 3 - Issue 5 ( September - October 2016), International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
57-65 |