363 research outputs found

    A User Oriented Image Retrieval System using Halftoning BBTC

    Get PDF
    The objective of this paper is to develop a system for content based image retrieval (CBIR) by accomplishing the benefits of low complexity Ordered Dither Block Truncation Coding based on half toning technique for the generation of image content descriptor. In the encoding step ODBTC compresses an image block into corresponding quantizes and bitmap image. Two image features are proposed to index an image namely co-occurrence features and bitmap patterns which are generated using ODBTC encoded data streams without performing the decoding process. The CCF and BPF of an image are simply derived from the two quantizes and bitmap respectively by including visual codebooks. The proposed system based on block truncation coding image retrieval method is not only convenient for an image compression but it also satisfy the demands of users by offering effective descriptor to index images in CBIR system

    Review Paper - High Utility Item sets Mining on Incremental Transactions using UP-Growth and UP-Growth+ Algorithm

    Get PDF
    One of the important research area in data mining is high utility pattern mining. Discovering itemsets with high utility like profit from database is known as high utility itemset mining. There are number of existing algorithms have been work on this issue. Some of them incurs problem of generating large number of candidate itemsets. This leads to degrade the performance of mining in case of execution time and space. In this paper we have focus on UP-Growth and UP-Growth+ algorithm which overcomes this limitation. This technique uses tree based data structure, UP-Tree for generating candidate itemsets with two scan of database. In this paper we extend the functionality of these algorithms on incremental database.

    Sociology of Sport

    Get PDF
    Exam paper for first semeste

    A Novel Approach for Shadow Detection and Removal from Image

    Get PDF
    Image processing has been one region of studies that draws the interest of extensive form of researchers. Surveillance structures are in big demand specially, for their packages in public areas, consisting of airports, stations, subways, front to buildings and mass events. Shadow occurs while objects consist of light from light source. Shadows offer wealthy information about the item shapes as well as light orientations. Shadow in picture reduces the reliability of many computer imaginative and prescient algorithms. Shadow regularly degrades the visual exceptional of an image. Shadow removal in an image is pre-processing step for computer imaginative and prescient algorithm and image enhancement. Shadow detection and removal in numerous actual lifestyles situations consisting of surveillance device and laptop vision machine remained a hard project. Shadow in visitors surveillance system might also misclassify the actual item, lowering the gadget overall performance

    Separation of copper(II) from manganese-(II), cobalt(II), nickel(II) and zinc(II) using Acetylacetone

    Get PDF
    823-824The separation of copper(II) from binary mixtures of divalent metal ions, Cu-Mn, Cu-Co, Cu-Ni and Cu-Zn has been studied using acetylacetone(Hacac) in chloro-form as the extractant. The pH of the aqueous phase has been kept at 4.34 using Britton-Robinson buffer (CH3COOH-NaOH). From the plot of log Kd versus log[Hacac], the nature of the extracted species is found to be Cu(CH3COO) (acac)

    A Review of Authentication Protocols

    Get PDF
    Authentication is a process that ensures and confirms a users identity. Authorization is the process of giving someone permissions to do or have something. There are different types of authentication methods such as local password authentication, server-based-password authentication, certificate-based authentication, two-factor authentication etc. Authentication protocol developed for Password Authentication Protocol (PAP), Challenge-Handshake Authentication Protocol (CHAP), and Extensible Authentication Protocol (EAP). There are different types of application for authentications are as follows: 1.protocols developed for PPP Point-to-Point Protocol 2. Authentication, Authorization and Accounting 3.Kerberos

    Car Black Box System

    Get PDF
    This paper presents the concept of car black box vehicle safety system which would not only record the data, but also gives indication like engine overheating, alcohol consumption etc. In the case of an accident the message is sent through the GSM to prescribed mobile numbers. For the security purpose, the password is given to the black box to secure or prevent the recorded data. User enters the password for authentication of black box for accessing recorded data. Recorded data is used to find out the proper & actual reason behind an accident

    A Safety Device for Women?s Security Using GSM/GPS

    Get PDF
    This project describes about a one touch alarm system for women?s safety using GSM. In the light of recent outrage in Delhi which shook the nation and woke us to the safety issues for women, people are finding up in different ways to defend. Here we introduce a device which ensures the protection of women. This helps to identify protect and call on resources to help the one out of dangerous situations. Anytime you senses danger, all you had to do, is hold on the button of the device. The device consists of a AT89S52 microcontroller, GSM module, GPS modules. The system resembles a normal device which when activated, tracks the place of the women using GPS (Global Positioning System) and Force sensor and sends emergency messages using GSM (Global System for Mobile communication), to wireless SOS key contacts and the police control room. The main advantage of this system is that the user does not require a Smartphone unlike other applications that have been developed earlier. The use of sophisticated components ensures accuracy and makes it reliable. The system provides with all the features which will leave no stone unturned to help the dupe in any kind of emergency situations

    Caffeine, Its Basicity, Acidity, Hydrolysis & Spectrophotometric Assay

    Get PDF
    141-14

    A Review on Image mosaicing for secure Transmission of University Exam Question Paper

    Get PDF
    The rapid spread of the digital world nowadays which is powered by ever faster system demands greater speed and security. Real time to secure an image is a challenging task due to the processing time and computational requirement for RGB image. So, to cope with these concerns, many innovative techniques of image processing for data hiding are required. In this paper new data hiding scheme is proposed which is known as image mosaicing. Image mosaicing is the process of merging split images to produce a single and complete image of the document. For this technique two input images are required one is secret image and second is target image, by merging these two a new image is made called as a mosaic image. So, the creation of mosaic image and lossless recovery of secret input image for question paper security is presented in this paper
    corecore