Search
Now showing items 1-10 of 39
INSPECTION OF DEFECTIVE PRINTED CIRCUIT BOARDS USING IMAGE PROCESSING
(Indian Journal of Computer Science and Engineering (IJCSE), 2017)
The goal of this paper is to present the inspection of defective Printed Circuit boards with the help of image processing. As Image processing is an important and useful toolbox in these days. Printed circuit boards ...
Survey on Image Registration
(Vidya Publications, 2016)
This paper aims to present a survey of image registration technique. It is a
procedure of mapping points from one image to corresponding points in another image. The image registration geometrically align the two images ...
GRAY HOLE ATTACK ON HYBRID 5G NETWORK
(International Journal of Advanced Research in Computer Science, 2017)
5G device to device communication is such a product of progressive thinking, a network that uses both LTE communication scenario in conjugation with Wi-Fi low band communication. The main idea for conjunction of two different ...
Deployment of Coordinated Multiple Sensors to Detect Stealth Man-in-the-Middle Attack in WLAN
(Modern Education and Computer Science Press, 2016)
The use of wireless devices is increasing tremendously in our day-to-day life because of their portability and ease of deployment. The augmented practices of using these technologies have put the user security at risk. The ...
TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection
(Modern Education and Computer Science Press, 2016)
Fast-flux service networks (FFSN) helps the cyber-criminals to hide the servers used for malicious activities behind a wall of proxies (bots). It provides the reliability and detection evasion to a malicious server. FFSN ...
Degraded Document Binarization
(International Conference on Advancements in Engineering and Technology (ICAET), 2017)
Document image binarization is first and very important step of Optical Character Recognition system. Binarization converts the document image into bi-level form.There exists many Document binarization techniques in which ...
Contrast enhancement for cephalometric images using wavelet-based modified adaptive histogram equalization
(Elsevier Ltd, 2017)
Cephalometric images usually have low contrast. The existing techniques for automatic cephalometric analysis usually use histogram equalization for image enhancement. This technique has the advantage of being fully automatic ...
A New Approach to Punjabi Text Steganography using Naveen Toli
(Department of Computer Science & engineering, NITTTR,, 2017)
Recovery Based Architecture To Protect Hids Log Files Using Time Stamps
(ACADEMY PUBLISHER, 2010)
After the great revolution in the field of Information Technology, many applications made necessity to run computer systems (either servers or client machines) all the time. Along with improvements and new inventions
in ...
Application of Image Processing using Computer in Detection of Defective Printed Circuit Boards
(International Journal of Advanced Research in Computer Science, 2017)
In these days, image processing has been used in many applications. It is the process for performing the different operations on the images using various functions. In this paper, image processing is used for finding the ...