{"title":"An improved image denoising using wavelet transform","authors":"B. N. Aravind, K. Suresh","doi":"10.1109/ITACT.2015.7492679","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492679","url":null,"abstract":"Image is one of the most important part of multi-media that is used in several areas from simple photography to medical and satellite imaging. In each field its usage and requirements are very different. So, an image required to be clean and free from artifacts to convey better information. But, acquisition is always associated with some sort of degradation that may be due to atmospheric conditions, camera sensors and/or lighting conditions. In this paper we are considering the degradation only due to noise and in specific additive Gaussian noise. Here, we are proposing to use a dual step approach for denoising. In the first step it uses stationary wavelet based denoising and in continuation to second step, a spatial domain method, Non-local means, is used to remove the artifacts. The simulation is done on both real and synthetic images and it shows an improvement over existing methods. Image is one of the most important part of multi- media that is used in several areas from simple photography to medical and satellite imaging. In each field its usage and requirements are very different. So, an image required to be clean and free from artifacts to convey better information. But, acquisition is always associated with some sort of degradation that may be due to atmospheric conditions, camera sensors and/or lighting conditions. In this paper we are considering the degradation only due to noise and in specific additive Gaussian noise. Here, we are proposing to use a dual step approach for denoising. In the first step it uses stationary wavelet based denoising and in continuation to second step, a spatial domain method, Non-local means, is used to remove the artifacts. The simulation is done on both real and synthetic images and it shows an improvement over existing methods.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130181665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Srikanth, L. Krishnamurthy, L. Prathyusha, V. Naidu
{"title":"Synthetic aerial image generation for miniature aerial system","authors":"A. Srikanth, L. Krishnamurthy, L. Prathyusha, V. Naidu","doi":"10.1109/ITACT.2015.7492685","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492685","url":null,"abstract":"This paper presents a computer vision based method which generates a synthetic image of the earth as would be viewed by an aerial camera. The method takes geo-referenced, ortho-rectified aerial image database as the source and using a pinhole perspective camera model generates the synthetic image. The method requires the position and attitude of the camera, which act as the extrinsic parameters for the camera model. The intrinsic parameters are chosen to emulate a real camera. Finally, the results of synthetic aerial image generation implemented on MATLAB are presented.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128990592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arindam Mal, J. Laha, Tanisha Bhatia, Subhalakshmi K, Shwetha Kanawalli
{"title":"Vision based terrain relative navigation sensor","authors":"Arindam Mal, J. Laha, Tanisha Bhatia, Subhalakshmi K, Shwetha Kanawalli","doi":"10.1109/ITACT.2015.7492669","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492669","url":null,"abstract":"Space field has witnessed vigorous change due to evolution of image processing. For precise spacecraft navigation and landing, high end image processing algorithm has to be executed in real time. In this paper, vision based in plane relative positioning and velocity sensor is discussed for precise landing. Image acquisition of the planet from the camera at the altitude of 6km–200m at successive time interval is planned. These images are used for the estimation of velocity and relative position using phase correlation based method. Image FFT are performed to compute correlation using radiation hardened FPGA. Sub pixel-shift of 1/20th pixel between two images is calculated from correlation peak using interpolation technique. Terrain relative horizontal velocity is estimated from the images pixel-shift per unit time with the help of altimeter data. This measurement technique is robust against image illumination variation, rotation tolerance of 0.3 degree between two successive images and Jitter of the space craft. The computation time is assessed from the simulation and optimized to get a faster update rate. A proto model of the sensor is tested successfully in laboratory environment using a scene simulation of lunar terrain in front of the sensor.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122448480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of mesh and torus for network on chip based system","authors":"S. V., N. Chiplunkar","doi":"10.1109/ITACT.2015.7492661","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492661","url":null,"abstract":"Today in VLSI design, most systems are built using bus architecture for communication. Bus topology will be soon replaced by network on chip which is becoming a backbone for all systems. Mesh and torus are one of the most widely used topologies in this area. Here we present a paper which describes the design and implementation of two dimensional mesh and torus.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132251401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Eye Center Localization using cascaded corner detection and geometrical measurements algorithm","authors":"Ravi Kumar Y B, C. Kumar","doi":"10.1109/ITACT.2015.7492678","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492678","url":null,"abstract":"The eye center localization can be achieved using the corner detection algorithm, which is an algorithm intends to find the corner points of a face and use of corner detection algorithm is to mark a point, where the line should be drawn on parts of a face. The corner detection algorithm used in this research work performs the task of finding the corners of a face such as eyes, nose, and mouth, but the paper mainly focuses on the corners of an eye using an eye detection algorithm, as the paper intends to find the center of an eye. The eye detection algorithm is required to consider only the points of our interest. The corner points obtained using corner detection algorithm is given to eye detection algorithm, which considers only the corner points that are found near eyes, and these points are used as a reference to draw a rectangle using geometrical measurement algorithm. The geometrical measurement is another method employed in this research work to draw a rectangle around the corner points of two eyes. The output of geometrical measurement algorithm is an exact center of two eyes. All three algorithms have been linked to one another. The output of corner detection algorithm is given to eye detection algorithm, which in turn gives its output to geometrical measurements algorithm. Since there is a cascading of output from one algorithm to another, the method is collectively called as Eye Center Localization with cascaded corner detection, and geometrical measurements algorithm. The accuracy achieved during the process of localizing the center of an eye is 99.64%, which is better than other approaches to the best of our knowledge.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"544 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133487990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An authentication mechanism to prevent SQL injection by syntactic analysis","authors":"Ashwin Ramesh, Anirban Bhowmick, A. Lal","doi":"10.1109/ITACT.2015.7492650","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492650","url":null,"abstract":"With the growth in web based applications that employ database services, SQL Injection is becoming one of the repeatedly used exploits. It permits an intruder to gain control over the database of an application, thereby able to read and modify confidential data. This paper illustrates few different forms of SQL injection and based on observation, it is seen that SQL Injection is interpreted differently on different databases. Also, an effective solution is proposed for the prevention of these categories of injection attacks. The authors suggest an approach in which the value entered for every field is checked for an SQL injection attack by parsing it through a grammar that detects SQL injection. If successfully parsed then probably, an SQL injection attack was intended. If not, the entry was legitimate and the database can be coordinated.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anuja Thakur, Rohit Chaware, Nikhil S., S. H. Islam
{"title":"A Reading Oriented Overlapping Text based CAPTCHA","authors":"Anuja Thakur, Rohit Chaware, Nikhil S., S. H. Islam","doi":"10.1109/ITACT.2015.7492651","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492651","url":null,"abstract":"CAPTCHA is a security technique used widely over the Internet to verify whether the end user is a human. Text-based CAPTCHAs are the most commonly used. The security of text-based CAPTCHA depends on the ability to resist the segmentation and recognition attacks. The Reading Oriented Overlapping Text (ROOT) based CAPTCHA, introduced in this article, consists of overlapping alphanumeric letters both hand written and computer generated along with a reading pattern scheme that helps to use the same CAPTCHA multiple number of times. The proposed ROOT based CAPTCHA generation algorithm is discussed along with its resistivity to known attacks.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116876708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combined segmentation technique for suspicious mass detection in Mammography","authors":"A. Makandar, Bhagirathi Halalli","doi":"10.1109/ITACT.2015.7492680","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492680","url":null,"abstract":"Breast cancer is one of the prevalent causes of death among women worldwide. Early detection may save life of women and helps for timely recovery. There are several screening tests are available to detect the cancer such as Ultrasound, Mammography and MRI. Among these, Mammography is the most effective screening test for breast cancer. The purpose of screening was to detect abnormalities at an early stage, which may require monitoring and treatment. Mass and microcalcifications are basic signs of abnormalities found using screening test. However it is very difficult to find the mass and its spread in the mammogram. Therefore Computer Aided Diagnosis (CAD) helps radiologist to analysis the abnormality in the mammography without much difficulty. The proposed method aims to segment the suspicious mass from the mammography using combined technique of using watershed, morphological operations and active contour based segmentation techniques. Here we show that, proposed segmentation technique helps to minimize the over segmentation of conventional watershed segmentation technique. The efficiency of the algorithm is measured with Mini-MIAS database. The results reported satisfactory segmentation using proposed contour based segmentation technique. The accuracy of the algorithm is reported to be 95.86% in identification of mass in mammography.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117135342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Ahmed, Balachandra Hegde, Pavan R. Manvi, A. S., P. Manohar
{"title":"Modeling and simulation of 800 kV multi-terminal UHVDC system in India","authors":"W. Ahmed, Balachandra Hegde, Pavan R. Manvi, A. S., P. Manohar","doi":"10.1109/ITACT.2015.7492692","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492692","url":null,"abstract":"The World's third Multi-terminal and first UHVDC system in India is planned to be commissioned in the year 2016. This system is designed for ± 800 kV, 6000 MW and transmits power over a total distance of 1728 km. A detailed modeling and analysis of the multi-terminal HVDC system is needed to ensure proper satisfactory operation of the system. The present paper deals with the detailed modeling of the upcoming MTDC system. The complete system is developed, modeled in PSCAD/EMTDC environment and transient simulation studies are carried out. The present study is aimed to gain an insight into the system operation and develop expertise needed to design the system parameters for reliable and stable operation.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127092409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Carbon nanopowder based fragrance sensor","authors":"S. Panda, M. Suresh","doi":"10.1109/ITACT.2015.7492662","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492662","url":null,"abstract":"The fragrance industry is a huge profit making industry and consulting agencies forecast further increase in the coming years. But every year it loses its profit because of counterfeit products. Detection of fake products and quality control of deodorants is of high importance for the fragrance industry [1, 2]. In this paper we propose a method to identify two different deodorants by adsorption on carbon nano ink sensors by measuring the variation of film resistance. The same sensor can also be used for food borne pathogen detection to prevent problem related to health and safety. The sensing element comprises of a planar interdigitated electrode over which carbon nano ink thick film is spin coated. When the active layer of sensor is exposed to aromatic molecules, the electrical resistance of carbon nano ink film dramatically changes. The advantages of this sensor include short response time, high sensitivity and reusability.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126292929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}