{"title":"Improved Context Dependent logo matching framework using FREAK method","authors":"D. R. Sonawane, S. Apte","doi":"10.1109/ICAECCT.2016.7942614","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942614","url":null,"abstract":"Now days to prevent malicious use of original companies logos or identity, the automated image processing based frameworks are presented. The process of logo detection and recognition hence becoming the vital task for various applications. In this project we are presenting automated framework for logo detection using the real world logos images and its test image. Basically the working is that input query image is taken and big database of logos with goal of recognizing the logo in query image if any. Previously efficient method presented which outperform the existing method in terms of FRR and FPR. During this paper we are contributing by using RANSAC in which Fast Retina Keypoint (FREAK) descriptor is extracted for further matching and recognition process rather than using existing SIFT technique. The recent method for logo recognition and detection process is based on methodology of CDS (Context Dependent Similarity) which directly local features spatial context. Basically this CDS method using the SIFT method for initial keypoints extraction and then further matching process along with detection is done. The goal of our proposed CDS with RANSAC is to improve the recognition accuracy and to minimize the error rate performance. The RANSAC method is using FREAK technique for keypoints extraction which is superior as compared to SIFT.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"43 1","pages":"362-366"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80861479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient method for detecting and tracking moving objects in video","authors":"Nilesh J. Uke, P. Futane","doi":"10.1109/ICAECCT.2016.7942610","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942610","url":null,"abstract":"Detection and tracking of moving object in the video has turned into a fascinating zone of exploration in the field of computer vision and has wide applications in fields like video surveillance, service robots, public security and target recognition. Although researches have proposed many approaches for object detection, robustness remains a huge challenge. In this paper, we proposed hybrid method of object detection using motion estimation and tracking by parallel kalman filter. Detection of the moving object is performed by analyzing the moving parts by corner and the shape feature extraction. The parallel kalman filter is used to tracks the object that is detected by calculating the motion estimation in video. The object tracking using the shape and the corner feature helps in providing the extract tracking of the object.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"52 1","pages":"343-348"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85879729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image management and data access control for Multi-authority cloud storage with use of certificate less encryption","authors":"V. Gutte, Amol N. Jadhav, Pramod Mundhe","doi":"10.1109/ICAECCT.2016.7942557","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942557","url":null,"abstract":"Cloud computing technologies getting importance with a high level in security concern. In a domain of private, public or government organization. It shows new aspect for transparency. The main issue that Cloud computing provides transparency, but sharing of resources at different level in distributed scheme has severe implications. When at sensitive or privacy-relevant data is concerned for most secure challenging task. In cloud computing ensure the data security in data access control is an effective way. The problem with unsecured cloud servers or the untrusted cloud servers, data access control to various vendors becomes a challenging and most unsecured issue in cloud storage systems in these days. However after user's data or attribute revocation if we have to show the more security through re-encryption process. In the proposed method we uses certificate less encryption-based schemes by relying on a public cloud server. We have applied it as underlying techniques to design the data users and data access control scheme in process. We came to know that our certificate less encryption method can efficiently provide not only forward security but also backward security with more efficient way.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"136 1","pages":"64-67"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86310007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WHT and Double WHT: An effective PAPR reduction approach in OFDM","authors":"S. Shete, G. Bhide, M. Jadhav","doi":"10.1109/ICAECCT.2016.7942577","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942577","url":null,"abstract":"With rapid growth in communication orthogonal frequency division multiplexing (OFDM) is multi-carrier communication technique becomes more popular which is used in both wired and wireless communication. OFDM consist of multiple carriers over single channel for signal transmission. OFDM is the time domain signal which is made up of several sinusoids and due to this sinusoids Peak to Average Power Ratio (PAPR)of OFDM signal increases. Due to this high PAPR transmission efficiency reduces so PAPR is major drawback of OFDM. There are several PAPR reduction techniques but, pre-coding techniques shows better result. In this paper, we propose Walsh Hadamard Transform (WHT) and Double Walsh Hadamard Transform (Double WHT). The proposed scheme shows the better results.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"16 1","pages":"172-175"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87048612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recognition of salient object","authors":"Ms. Nikhila, Sayali Rawat","doi":"10.1109/ICAECCT.2016.7942599","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942599","url":null,"abstract":"Salient region detection is essential theme in computer vision. This paper demonstrates the application of salient region detection for object recognition and classification. The different visual cues are used for salient object detection. The local contrast and compactness visual cues are complementally to each other. The salient regions are not correctly suppressed by compactness cues but local contrast can effectively recover. The bottom-up technique is used for recognition of salient object. The saliency map is getting from compactness and local contrast map. After detection of salient region or objects we will extend our approach towards recognition or of some special objects or shapes. For that we will work on some geometrical features.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"101 1","pages":"283-286"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80619900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective denoising and enhancement technique for removal of random impulse noise in images","authors":"R. Rajesh, P. Malathi","doi":"10.1109/ICAECCT.2016.7942594","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942594","url":null,"abstract":"Digital images are likely to suffer from impulse noise during the process of acquisition and subsequent transmission. In this brief a decision tree based method (DTBM) is presented which effectively removes random valued impulse noise from gray scale images. The pixels corrupted by noise are detected by an impulse detector and are reconstructed using an edge preserving image filter. The reconstructed pixels are written back in an adaptive manner so that they will be available for the next computation. The desirable feature of DTBM is that the design requires simple mathematical computations which results in a cost effective implementation of the system. The quantifiable evaluation and visual quality results of the presented system prove that the system's performance is good in both respects. Image enhancement is done on the denoised image using discrete cosine transform (DCT) which improves the visual quality of the image.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"3 1","pages":"256-261"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82564743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligence transportation service using Vehicular Cloud Network","authors":"Ashwini B. Abhale, S. Khandelwal","doi":"10.1109/ICAECCT.2016.7942598","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942598","url":null,"abstract":"Today transportation play important role and have major economic sector of world. In contrast, increase in number of vehicles can increase number of road accidents and human fatalities. In addition, we are facing traffic problem also. Under this condition, it is necessary to provide promising solution to prevent an accident and traffic on road. Vehicular cloud network is help to maintain the communication between vehicles and road side units. Vehicular cloud network is a hybrid solution for maintaining traffic information and providing road safety. In this paper, we focus on vehicular cloud network and provide simulation result explore the working of propose methodology.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"154 1","pages":"277-282"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83828098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA","authors":"A. Desai, D. Gaikwad","doi":"10.1109/ICAECCT.2016.7942601","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942601","url":null,"abstract":"In Internet-based communication, different types of networks are used to provide services to users. Due to exploration of different types of vulnerabilities, day by day threat of attacks in network is increasing. There is possibility of getting system infected by internal or external intruders. Single computer system is shared by multiple users. Users use multiuser system by creating their own account, which is protected by unique id and password. Sometimes, authorized users attack system for some malicious purposes. Internal attacks include deleting some important files or data, altering some important data. For any intrusion detection system, it is very difficult to identify authorized internal intruders. SQL injection is one such attack, which can be launched by internal attacker. The purpose of external intruder is to perform malicious activities in remote system. To avoid these two types of attacks, the robust intrusion detection system is needed. In this paper, we have implemented hybrid intrusion detection system, which includes identification of both internal and external attacks. Signature matching algorithm is implemented to identify internal attacks. Fuzzy genetic algorithm is applied for implementation of external attacks detection. The system is hybrid and compatible in offline as well as online environment. Experimental results show that the accuracy of system is better than some of existing systems.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"11 1","pages":"291-294"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85796821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voxel selection framework with signal decomposition for fMRI based brain activity classification","authors":"S. V. Raut, D. M. Yadav","doi":"10.1109/ICAECCT.2016.7942627","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942627","url":null,"abstract":"This paper presents an fMRI signal analysis methodology using Empirical mean curve decomposition (EMCD) and mutual information (MI) based voxel selection framework. Previously, the fMRI signal analysis has been carried out either using empirical mean curve decomposition (EMCD) model or voxel selection on raw fMRI signal. The first methodology does signal decomposition that makes voxel selection process easy while the latter methodology does selection of relevant voxels (or features). Both these advantages are added by our methodology in which the frequency component is considered by decomposing the raw fMRI signal using Empirical mean and the voxels are selected from EMCD signal. The proposed methodologies are adopted for predicting the neural response. Experimentations are carried out in the openly available fMRI data of six subjects and comparisons are made with existing decomposition model and voxel selection framework. The comparative results demonstrate the superiority of the proposed methodology.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"64 1","pages":"433-437"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91192509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Vamsikrishna, Sonti Dinesh Kumar, Dinesh Bommisetty, Akshat Tyagi
{"title":"Raspberry Pi voting system, a reliable technology for transparency in democracy","authors":"P. Vamsikrishna, Sonti Dinesh Kumar, Dinesh Bommisetty, Akshat Tyagi","doi":"10.1109/ICAECCT.2016.7942629","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942629","url":null,"abstract":"Voting process takes the significant part of democratic systems. In most of the developing countries, paper ballot method is still being used. Information technology also has offered significant advantages and facilities to improve the quality of voting process. Digital recording electronic systems are developed replacing paper ballots. Although this is a great advancement, this process is prone to tampering threats and electoral frauds. This paper presents a new voting process which makes use of Raspberry Pi which has improved reliability and transparency over currently used systems. This system employs biometric identifiers in pursuit of authenticity. Pre collected details of all the voters in the country will be maintained as a central database by the government. This data is rechecked at the time of voting to ensure the identity of voters. Usage of Raspberry Pi for web casting the complete voting process and time to time display of polling percentage etc., details will tremendously affect the reliability of the process. Transparency and minimum usage of personnel is achieved at a cheaper cost and simpler process with this Raspberry Pi and its peripherals.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"36 1","pages":"443-449"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91426944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}