Computer Science And Technology - Research Publications

Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82

Browse

Search Results

Now showing 1 - 10 of 14
  • Item
    A new binarization method for degraded document images
    (Springer Science and Business Media B.V., 2019-09-17T00:00:00) Rani, Usha; Kaur, Amandeep; Josan, Gurpreet
    The binarization of image is an important stage in any document analysis system such as OCR. It converts the colored or grayscale images into monochromatic form to reduce the computational complexity in the next stages. In old document images in the presence of degradations (ink bleed, stains, smear, non-uniform illumination, low contrast, etc.) the separation of foreground and background becomes a challenging task. Most of the existing binarization techniques can handle only a subset of these degradations. We present a simple binarization method for old document images. The experimental results confirm that the proposed technique gives good binarization results in the presence of various degradations. It computes the Laplacian of an image to separate the foreground. The subtracted Laplacian image is binarized using a global threshold. Finally, the postprocessing using morphological functions is applied. The results are compared in terms of F-measure, PSNR, time complexity, and OCR based evaluations which shows that our method outperforms existing techniques like Niblack, Sauvola, Gatos, Zhou, NICK, Singh, and Bataineh. � 2019, Bharati Vidyapeeth's Institute of Computer Applications and Management.
  • Thumbnail Image
    Item
    Handover between Wi-Fi and WiMAX technologies using GRE tunnel
    (Springer, 2019) Aimen, Aroof; Hamid,, S; Ahmad, S; Chisti, M.A; Khurana, Surinder Singh; Kaur, Amandeep
    The next era of wireless grid inclines to be heterogeneous in the composition, i.e., wireless technologies like Wi-Fi and WiMAX networks desire co-breathe, so there is a demand for the best utilization of the accessible mixed chains. This paper considers the issue of handover between Wi-Fi and WiMAX grids with seamless connectivity. For this, first, a mobile terminal that abuts both IEEE 802.11 and IEEE 802.16 technologies was designed in the simulator. The developed mobile node was then introduced in the simulation scenario to study the various metrics. Second, we present the incorporation of GRE tunnel between the home agent and base stations for doing away with latency and packet drop and thereby improving the MOS value of the interest of consumers, giving impetus to efficiency day instant and day forth. © 2019, Springer Nature Singapore Pte Ltd.
  • Thumbnail Image
    Item
    Face detection techniques: a review
    (Springer, 2019) Kumar, A; Kaur, Amandeep; Kumar, M.
    With the marvelous increase in video and image database there is an incredible need of automatic understanding and examination of information by the intelligent systems as manually it is getting to be plainly distant. Face plays a major role in social intercourse for conveying identity and feelings of a person. Human beings have not tremendous ability to identify different faces than machines. So, automatic face detection system plays an important role in face recognition, facial expression recognition, head-pose estimation, human–computer interaction etc. Face detection is a computer technology that determines the location and size of a human face in a digital image. Face detection has been a standout amongst topics in the computer vision literature. This paper presents a comprehensive survey of various techniques explored for face detection in digital images. Different challenges and applications of face detection are also presented in this paper. At the end, different standard databases for face detection are also given with their features. Furthermore, we organize special discussions on the practical aspects towards the development of a robust face detection system and conclude this paper with several promising directions for future research. © 2018, Springer Nature B.V.
  • Thumbnail Image
    Item
    A Comprehensive Review on Performance of AODV and DSDV Protocol Using Manhattan Grid Mobility Model
    (IJRET, 2014) Kaur, Amandeep; Mittal, Meenakshi
    Wireless networks have become an epitome of revolution in the communication industry as these have enabled the devices to communicate and access information independent of their location. These networks can be classified into two categories: Infrastructure based and Infrastructure less. Mobile ad hoc networks (MANET) fall under infrastructureless category in which nodes are able to move thereby making the topology of the network highly dynamic. Due to the dynamically changing topology, efficient routing mechanisms needed to be developed, which led to the foundations of various mobile ad hoc routing protocols. There are a number of mobile ad hoc routing protocols proposed to serve different purposes like security and transmission efficiency. These protocols are divided into two categories: Table based and Demand based. Through this work, table based traditional routing protocol DSDV and demand based routing protocol AODV have been assessed through simulation using Manhattan Grid mobility model. Comprehensive analysis was carried out to analyze which protocol performs better in the assumed scenarios. The performance metrics evaluated for the two protocols are Throughput, Average End to End delay, Routing Overhead and Packet Delivery Ratio
  • Item
    Detection of defective printed circuit boards using image processing
    (Inderscience Publishers, 2018) Kaur, Beant; Kaur, Gurmeet; Kaur, Amandeep
    Manufacturing of printed circuit boards involves three stages (printing, component fabrication over surface of printed circuit boards, soldering of components), where inspection at every stage is very important to improve the quality of production. Image subtraction method is widely used for finding the difference between any two images. Using this method, defects have been detected by finding the difference between reference (defect free) and test image (to be inspected). The major limitation of image subtraction is that both the images should have same size and same orientation. The proposed method removes the above explained limitation of image subtraction method and also calculates total number of defects on printed circuit boards. The proposed method is tested on six test images. The experimental results show that proposed method is simple, economical and easy to implement in small and medium scale industries where most of the inspection is still done by humans.
  • Thumbnail Image
    Item
    Resolving the celestial classification using fine k-NN classifier
    (Institute of Electrical and Electronics Engineers Inc., 2016) Yadav, Sangeeta; Kaur, Amandeep; Bhauryal, Neeraj Singh
    With the rapid growth in space technology, space exploration is on the high demand. With each such type of mission, data is accumulating in heaps. Be it manned or unmanned mission, its credibility is defined by the quality of research which can be conducted on the data collected in such missions through remote or on the capsule experiments. Thus there is huge demand of soft techniques, which can make the space or celestial data as useful as possible. One of the major issues is dearth of automated technique for image classification of celestial bodies. Though many image classification techniques exist, but none of them is totally attributed to celestial bodies. An artificial neural network based classifier is proposed to classify celestial object from its image. Texture features are extracted from 90 images of size of 225-225 of different planets. Different classifiers were applied on this training data. Accuracy of different classifiers is compared to find out the best classifier for space data classification. Different validation schemes are applied and the results are compared to figure out the best validation scheme. ? 2016 IEEE.
  • Thumbnail Image
    Item
    Mobility model based performance analysis of DSDV mobile ad hoc routing protocol
    (Institute of Electrical and Electronics Engineers Inc., 2014) Kaur, Amandeep
    Wireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access a wide pool of resources and information irrespective of the physical location of the devices used by them across the globe. Mobile ad hoc networks are a kind of infrastructure less wireless networks in which all the nodes act as peers and share information as well as resources. Mobile ad hoc networks are an open area of research since these have not been deployed widely yet. Every research in the field of networking focuses on the efficient, accurate, reliable, secure and immediate delivery of data. Therefore, the routing of data across the mobile ad hoc network is a major concern of researchers all over the world. Several routing protocols have been proposed and implemented to send data efficiently across mobile ad hoc networks. The performance evaluation of these protocols has been going on since a long time. In most of the studies, the focus has been on the variations in pause times and network size to measure the performance of various mobile ad hoc network routing protocols. A very few work has been done on the performance analysis of protocols by varying the underlying mobility models. Through this paper, investigations have been made into the behavior of DSDV mobile ad hoc routing protocol by varying the underlying mobility models. The metrics used to analyze the performance are Throughput, Average End to End delay, Routing overhead and Packet Delivery Ratio. ? 2014 IEEE.
  • Thumbnail Image
    Item
    Influence of link sensing mechanism of IMEP on the performance of TORA under different mobility models
    (Institute of Electrical and Electronics Engineers Inc., 2015) Kaur, Amandeep; Mittal, Meenakshi
    The performance evaluation of Mobile Ad Hoc Network (MANET) routing protocols is an important as well as open area of research worldwide. Temporally Ordered Routing Algorithm (TORA) is an adaptable and distributed MANET routing protocol which is dependent on the services of Internet MANET Encapsulation Protocol (IMEP) for its various necessary functions like link status detection. The incorrect link failure detection by IMEP leads to creation of congested network and initiation of avoidable route maintenance in TORA. Thus changes need to be introduced in the link sensing mechanism provided by IMEP to improve the detection of links in TORA. According to previously available research, if the maximum number of OBM retransmissions is increased, significant improvement in the performance of TORA is noticed. This modification has been implemented in this paper and performance of Enhanced TORA is evaluated under Random-Waypoint model, Manhattan-Grid mobility model and Random-Direction model using FTP traffic with 10 connections. The results are then compared with those of original TORA using various performance metrics like Packet Delivery Ratio, Average End to End Delay and Routing Overhead. ? 2014 IEEE.
  • Item
    A New Approach to Punjabi Text Steganography using Naveen Toli
    (Department of Computer Science & engineering, NITTTR,, 2017) Kumar, Arun; Kaur, Amandeep
  • Item
    Degraded Document Binarization
    (International Conference on Advancements in Engineering and Technology (ICAET), 2017) Rani, Usha; Kaur, Amandeep; Joshan, Gurpreet Singh
    Document image binarization is first and very important step of Optical Character Recognition system. Binarization converts the document image into bi-level form.There exists many Document binarization techniques in which we have mainly one or two parameters. Output completely depends upon the values of these user defined parameters. One such parameter is window size in case of sliding window binarization techniques like Niblack;s, Bernsen's, Nick, Sauvola etc. In this proposed work we have tried to modify Sauvola's method is state of art