2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), 2018
In the modern world, human (woman/man) adopted the system of cooking food and their daily needs f... more In the modern world, human (woman/man) adopted the system of cooking food and their daily needs from wooden fire to a LPG (Liquid Petroleum Gas) supply system. During the usage of the system, number of instances that will happen around us where there is a result of losing a life or the destruction of the mankind. A kind of self-killing scenario of human being because of their negligence or busy schedule. To prevent this to happen knowingly or unknowingly, this paper gives the details of existing methods to prevent the reason for causing damage due to leakage of LPG cylinders in closed areas like kitchen. Along with this we list the drawback of existing methods and propose a method that may resolve the identified drawbacks.
Examination is a core activity of any educational institution. As the university examinations arr... more Examination is a core activity of any educational institution. As the university examinations arrives, there exists a lot of work like consolidating the time table of each departments of the college and the seating arrangement to all the students in the college is a critical task. At present in existing system faculty allotment for exam duty as supervisor is done manually and also it does not keeps the track record about the supervisors who have been allocated for previous exam. Allocation of faculty will be done in the excel sheet. And also allocation of thousands of student to particular block is a hectic work and that will be done manually thus it may take lot of time and require man power. Thus, an automated system would solve the above stated problem in just few click work. An automated system can be used through cloud computing technology that facilitates the every college to provide their student and staff information and get the results of allotment. And by this way even Uni...
The work introduces to classify the encrypted data which are outsourced to the cloud. Nowadays cl... more The work introduces to classify the encrypted data which are outsourced to the cloud. Nowadays cloud computing is growing in popularity with most of the companies are moving towards it because of its interesting characteristics. It is a network which stores large data, manages and processes, and provides the security to it by storing in an encrypted form; so as to protect sensitive information of the users. But classifying the data which is in encrypted form is a complex procedure. So, we have proposed privacy preserving k-nearest neighbor algorithm to maintain the privacy of the data even after classifying it. This algorithm will give the accurate data mining results. Thus, the system tends to provide efficient functionalities and promises to have security guarantees to the data incorporated into cloud.
The proposed model is an extension of our previously proposed model for LAN security system which... more The proposed model is an extension of our previously proposed model for LAN security system which can be used in all the public security system; where a new technique/scenario is embedded in the existing biometric systems to prevent the spoof attack. The model follows with by authenticating user with his details by providing multiple inputs at different stages. In the first stage (said to be the basic authentication step), the user provides the biometric details as username and password which is tested for authentication, and once if the basic details are valid, then in the next stage user need to provide a four digit random number with an answer to a random question given from a number of questions (which has been stored with answers given at the registration by the user for a set of questions). If the answer given by the user to the question is valid, then the random number will be converted into a cipher text (by using some of the standard Cryptography algorithm). Finally, the sy...
The system is designed to help the admin of the department to monitor the students of their regul... more The system is designed to help the admin of the department to monitor the students of their regularity in the laboratory with their attendance report of the class. The system tracks the student with respect to the data given by the staff pertaining presence for their laboratory conducted, depending on which the system evaluates the performance of a student in conducting the experiment. It provides facilities to maintain the student reports obtained for every laboratory in the form of marks sheet. This project is going to help us to reduce the traditional paper-based data maintenance and verification/validation. This system will benefit for both the instructor and the staff. The system will help the staff to know the percentages of attendance and also track the records of previous years.
Nowadays, face recognition is very much effective way of counter security threats in various aspe... more Nowadays, face recognition is very much effective way of counter security threats in various aspects of human life. Though, other means of defending security attacks exists but they have their own drawbacks and overheads. Human face can be recognized from 2D face images or from 3D geometry of human faces. Although very popular, 2D face recognition algorithms are constrained by various factors like change in illumination, varying facial expressions, make-up on the face and orientation of the head. On the other hand face recognition based on 3D geometry of the faces has been shown to have more correctness than 2D face recognition. The only technological drawback however is that the 3D cameras are much less common than 2D based cameras. Therefore the work propose a novel facial expression recognition in real-time by tracking 2D face over a 3D plane. We use multiple 2D planes projected on each-other such that a 2D facial feature point is projected over all the planes, selecting the clos...
The system is generated to use their friends to communicate with them within a LAN system and can... more The system is generated to use their friends to communicate with them within a LAN system and can be hosted on server throughout to the friend circle. The system is designed to use to determine the distance between the two users on Google maps. This system helps us to connect with our close ones .The traditional way of sharing things can be replaced by our new system. The history of data can be stored and retrieved using this system. The system is worked as expected to the extent. This system deletes the cloud related files and can be deactivated using this facility. The system provides high accuracy and interaction between the users and provides user high security. The file assure deletion will provide whenever you don’t want to access or discontinue with your account using this file assure deletion from your database. This will give you a high reliable machine to your usage.
Emotion recognition is becoming commercially popular due to the major role of analytics in variou... more Emotion recognition is becoming commercially popular due to the major role of analytics in various aspects of marketing and strategy management. Several papers have been proposed in emotion recogni...
In the existing real-time automobile shop, it is difficult to trace an object and identify its pr... more In the existing real-time automobile shop, it is difficult to trace an object and identify its presence. The failure may happen due to its absence or improper match of shape as its identity. So to overcome this, we propose a method which can be used for the automatic identification of vehicular nuts based on the input image that contains a nut with square, hexa, rounded-head and pinned-bolt shapes. The application even works with the nut having clear view or any entity added like mud, noise, colour, etc. on the surface of nut. For the identification process the database has been designed to store different shapes for selected number of nut-shapes. By applying median filter during pre-processing stage, the Sobel-edge-detector and Canny-edge-detector; segmented and identified the captured images by identifying the edges to ascertain shape of the input. With the experimentations carried the method results with an accuracy of 86.1875%
Three-dimensional object construction has seen a great deal of activity in the past decade, as ha... more Three-dimensional object construction has seen a great deal of activity in the past decade, as has been pointed out in recent surveys, with the advancement of technology and easy availability of the depth sensors the 3D scanning technology has taken off. A wide range of commercial sensors such as Intel RealSense, Microsoft Kinect are being widely used for real time 3D capturing. Efficient 3D face scanning is one of the important areas of 3D scanning. 3D printer compatible texture supported scanning has a wide range of commercial applications. Such methods are also being used for 3D avatars and characterizations for games. Even though several commercial grade applications are available, most of the techniques suffer from background and light variations. Therefore an efficient face scanning technique is of extreme importance. In this paper we propose a 3D face scanning method based on Intel RealSense technology that combines 3D face detection, background segmentation and 3D mesh mapping to produce realistic 3D face model along with texture export. Further the models then can be manipulated using any 3D editing software along with texture and wireframe manipulation.
International Journal of Science and Research (IJSR)
The tool is used to generate the comments automatically for the code (without comments) when give... more The tool is used to generate the comments automatically for the code (without comments) when given for understanding during analysis. Code comments improve software maintainability. To address the comment scarcity issue, we propose a new automatic comment generation tool. The system adds the comments for all functional, operational and calculating statements. It is helpful for the C/C++/JAVA beginners/users. Comments in the program make the code more effective to analyse the ambiguities and difficulties. The system is designed in perspective of three languages concerned to their keywords, function names, reserve keywords, etc. the file types are recognized depending on their file extensions
International Journal of Science and Research (IJSR)
The System is planned to be designed & developed with a less storage space utilization, and perfo... more The System is planned to be designed & developed with a less storage space utilization, and perform the operations like issuing of books in the library, borrowing books from library, adding new books, updating existing book details, also managing the students' details and generate reports. The system (library management system) is planned to be register less which helps admin to perform all the activities related to library in an efficient manner within limited period of time. Students' need to register themselves to borrow books from library, students can search for available books so that they request to borrow that book from library. Every transaction between the student and the library will documented through the built-in database connections, and provides authenticated and authorized transactions.
International Journal of Engineering and Technology
Depth based 3D image modeling is a biggest challenge that persists in the digital image processin... more Depth based 3D image modeling is a biggest challenge that persists in the digital image processing depending on different depths. The method of recognizing in dynamic areas is an unanswered challenge facing the community of robotics. The answer can be framed by including the methods like segmentation, tracking, and classification components, etc. This paper reveals the survey of the works carried on the construction of 3D model with their own method and technologies applied in the process. The paper mainly goals the Reality systems to enhance the techniques used for the 3D image construction and also to segment the blurry areas in the image captured from different depths. Also the image is desirable to recognize 3D-objects of the system in the user's environment, in order to avoid manual based method. Many existing systems are surveyed which perform 3D-object model construction. Keyword-Depth, 3D image, modeling, Reconstruction, Acquisition I. INTRODUCTION Depth based 3D-object construction and its recognition is the most challenging area of research in the DIP (Digital Image Processing). The goal of 3D modeling is to correctly identify objects of different pose when given to a system for identification that are present in a 3D scene of a depth present with range image, and also to be used in the security systems and the military systems, and also intensity data systems, range data systems, and both range and intensity systems (sometimes including color). In cases like the intensity-image systems, points and straight line segments are the considered common features. Recently, the alignment method blindly matches the points or line segments thrice from the image with the similar of the model, using little or no contextual information. These all inventions lead to the assumptions that the points or line segments are the reliable features of the class of the identified object to be recognized or located and (b) the view of the object is determined can be unique using these features. They lead to the view of polyhedral objects or those modelled images with sharp and straight edges. Hence they are categorized under curved-surface objects. Three-dimensional reconstruction of objects has become an important technique in the context of inspection: Industry quality inspection-for observing the quality of a product from different views, Archaeology analysisreconstruction of an object from raw data obtained from muddy area, Medical science-for conduction sessions of teaching, and for reconstruction body check up from collected data like details obtained from body check up, Forensic analysis-reconstruction of a scene from raw data for identifying unseen actions. II. LITERATURE SURVEY (Jose L. Herrera Carlos R, et al., (2015)) proposes a method for constructing 3D using 2D by using a technique centroid clustering process by combining all the depth images in the cluster. (Zhongjun Wu, et al., (2015) proposes a Multi-Depth Generic Elastic Models (MDGEMs) for the construction of 3D face modeling by using varying multiple depth maps of an image. (Yan Zhou, Huiwen Guo, et al., (2015)) proposes an algorithm for reconstructing a 3D view using a wavelet transform and Support Vector Machine (SVM) models to get the image focus quality and Mean shift algorithm for the depth scene. The results prove to be improving the efficiency better compared to previous techniques. (Masaya Kaneko, et al., (2015)) proposes a method for detecting the edge by generating a decision tree, a solution 25 times better to a conventional method existing by training the decision tree using supervised learning method in the process (Xuyuan Xu, et al., (2014)) recovers the object boundaries of captured depth images with sharp that refine the use of adaptive block by reallocation of the same position and expand to increase the depth accuracy by avoiding false depth boundary refinement.
The purpose of developing attendance management system is to computerized the tradition way of ta... more The purpose of developing attendance management system is to computerized the tradition way of taking attendance. Another purpose for developing this software is to generate the report automatically at the end of the session or in the between of the session
Shape based object retrieval technique is an application used for the automatic retrieval of vehi... more Shape based object retrieval technique is an application used for the automatic retrieval of vehicular spare parts based on the input image, this application can be useful in the automobile industry/shop for the retrieval of specific object from the group of objects. For the retrieval process first the database has been designed to store different shapes of nuts that are hexagon and square. With the application of median filter and wiener filters in the preprocessing step, the canny edge-detector for identifying the edges and to ascertain shape of the input and database images the convex hull approach is applied. This system is successful in retrieving the shape of the images which already exist in the database and the method results with the accuracy of 82.1875%
2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), 2018
In the modern world, human (woman/man) adopted the system of cooking food and their daily needs f... more In the modern world, human (woman/man) adopted the system of cooking food and their daily needs from wooden fire to a LPG (Liquid Petroleum Gas) supply system. During the usage of the system, number of instances that will happen around us where there is a result of losing a life or the destruction of the mankind. A kind of self-killing scenario of human being because of their negligence or busy schedule. To prevent this to happen knowingly or unknowingly, this paper gives the details of existing methods to prevent the reason for causing damage due to leakage of LPG cylinders in closed areas like kitchen. Along with this we list the drawback of existing methods and propose a method that may resolve the identified drawbacks.
Examination is a core activity of any educational institution. As the university examinations arr... more Examination is a core activity of any educational institution. As the university examinations arrives, there exists a lot of work like consolidating the time table of each departments of the college and the seating arrangement to all the students in the college is a critical task. At present in existing system faculty allotment for exam duty as supervisor is done manually and also it does not keeps the track record about the supervisors who have been allocated for previous exam. Allocation of faculty will be done in the excel sheet. And also allocation of thousands of student to particular block is a hectic work and that will be done manually thus it may take lot of time and require man power. Thus, an automated system would solve the above stated problem in just few click work. An automated system can be used through cloud computing technology that facilitates the every college to provide their student and staff information and get the results of allotment. And by this way even Uni...
The work introduces to classify the encrypted data which are outsourced to the cloud. Nowadays cl... more The work introduces to classify the encrypted data which are outsourced to the cloud. Nowadays cloud computing is growing in popularity with most of the companies are moving towards it because of its interesting characteristics. It is a network which stores large data, manages and processes, and provides the security to it by storing in an encrypted form; so as to protect sensitive information of the users. But classifying the data which is in encrypted form is a complex procedure. So, we have proposed privacy preserving k-nearest neighbor algorithm to maintain the privacy of the data even after classifying it. This algorithm will give the accurate data mining results. Thus, the system tends to provide efficient functionalities and promises to have security guarantees to the data incorporated into cloud.
The proposed model is an extension of our previously proposed model for LAN security system which... more The proposed model is an extension of our previously proposed model for LAN security system which can be used in all the public security system; where a new technique/scenario is embedded in the existing biometric systems to prevent the spoof attack. The model follows with by authenticating user with his details by providing multiple inputs at different stages. In the first stage (said to be the basic authentication step), the user provides the biometric details as username and password which is tested for authentication, and once if the basic details are valid, then in the next stage user need to provide a four digit random number with an answer to a random question given from a number of questions (which has been stored with answers given at the registration by the user for a set of questions). If the answer given by the user to the question is valid, then the random number will be converted into a cipher text (by using some of the standard Cryptography algorithm). Finally, the sy...
The system is designed to help the admin of the department to monitor the students of their regul... more The system is designed to help the admin of the department to monitor the students of their regularity in the laboratory with their attendance report of the class. The system tracks the student with respect to the data given by the staff pertaining presence for their laboratory conducted, depending on which the system evaluates the performance of a student in conducting the experiment. It provides facilities to maintain the student reports obtained for every laboratory in the form of marks sheet. This project is going to help us to reduce the traditional paper-based data maintenance and verification/validation. This system will benefit for both the instructor and the staff. The system will help the staff to know the percentages of attendance and also track the records of previous years.
Nowadays, face recognition is very much effective way of counter security threats in various aspe... more Nowadays, face recognition is very much effective way of counter security threats in various aspects of human life. Though, other means of defending security attacks exists but they have their own drawbacks and overheads. Human face can be recognized from 2D face images or from 3D geometry of human faces. Although very popular, 2D face recognition algorithms are constrained by various factors like change in illumination, varying facial expressions, make-up on the face and orientation of the head. On the other hand face recognition based on 3D geometry of the faces has been shown to have more correctness than 2D face recognition. The only technological drawback however is that the 3D cameras are much less common than 2D based cameras. Therefore the work propose a novel facial expression recognition in real-time by tracking 2D face over a 3D plane. We use multiple 2D planes projected on each-other such that a 2D facial feature point is projected over all the planes, selecting the clos...
The system is generated to use their friends to communicate with them within a LAN system and can... more The system is generated to use their friends to communicate with them within a LAN system and can be hosted on server throughout to the friend circle. The system is designed to use to determine the distance between the two users on Google maps. This system helps us to connect with our close ones .The traditional way of sharing things can be replaced by our new system. The history of data can be stored and retrieved using this system. The system is worked as expected to the extent. This system deletes the cloud related files and can be deactivated using this facility. The system provides high accuracy and interaction between the users and provides user high security. The file assure deletion will provide whenever you don’t want to access or discontinue with your account using this file assure deletion from your database. This will give you a high reliable machine to your usage.
Emotion recognition is becoming commercially popular due to the major role of analytics in variou... more Emotion recognition is becoming commercially popular due to the major role of analytics in various aspects of marketing and strategy management. Several papers have been proposed in emotion recogni...
In the existing real-time automobile shop, it is difficult to trace an object and identify its pr... more In the existing real-time automobile shop, it is difficult to trace an object and identify its presence. The failure may happen due to its absence or improper match of shape as its identity. So to overcome this, we propose a method which can be used for the automatic identification of vehicular nuts based on the input image that contains a nut with square, hexa, rounded-head and pinned-bolt shapes. The application even works with the nut having clear view or any entity added like mud, noise, colour, etc. on the surface of nut. For the identification process the database has been designed to store different shapes for selected number of nut-shapes. By applying median filter during pre-processing stage, the Sobel-edge-detector and Canny-edge-detector; segmented and identified the captured images by identifying the edges to ascertain shape of the input. With the experimentations carried the method results with an accuracy of 86.1875%
Three-dimensional object construction has seen a great deal of activity in the past decade, as ha... more Three-dimensional object construction has seen a great deal of activity in the past decade, as has been pointed out in recent surveys, with the advancement of technology and easy availability of the depth sensors the 3D scanning technology has taken off. A wide range of commercial sensors such as Intel RealSense, Microsoft Kinect are being widely used for real time 3D capturing. Efficient 3D face scanning is one of the important areas of 3D scanning. 3D printer compatible texture supported scanning has a wide range of commercial applications. Such methods are also being used for 3D avatars and characterizations for games. Even though several commercial grade applications are available, most of the techniques suffer from background and light variations. Therefore an efficient face scanning technique is of extreme importance. In this paper we propose a 3D face scanning method based on Intel RealSense technology that combines 3D face detection, background segmentation and 3D mesh mapping to produce realistic 3D face model along with texture export. Further the models then can be manipulated using any 3D editing software along with texture and wireframe manipulation.
International Journal of Science and Research (IJSR)
The tool is used to generate the comments automatically for the code (without comments) when give... more The tool is used to generate the comments automatically for the code (without comments) when given for understanding during analysis. Code comments improve software maintainability. To address the comment scarcity issue, we propose a new automatic comment generation tool. The system adds the comments for all functional, operational and calculating statements. It is helpful for the C/C++/JAVA beginners/users. Comments in the program make the code more effective to analyse the ambiguities and difficulties. The system is designed in perspective of three languages concerned to their keywords, function names, reserve keywords, etc. the file types are recognized depending on their file extensions
International Journal of Science and Research (IJSR)
The System is planned to be designed & developed with a less storage space utilization, and perfo... more The System is planned to be designed & developed with a less storage space utilization, and perform the operations like issuing of books in the library, borrowing books from library, adding new books, updating existing book details, also managing the students' details and generate reports. The system (library management system) is planned to be register less which helps admin to perform all the activities related to library in an efficient manner within limited period of time. Students' need to register themselves to borrow books from library, students can search for available books so that they request to borrow that book from library. Every transaction between the student and the library will documented through the built-in database connections, and provides authenticated and authorized transactions.
International Journal of Engineering and Technology
Depth based 3D image modeling is a biggest challenge that persists in the digital image processin... more Depth based 3D image modeling is a biggest challenge that persists in the digital image processing depending on different depths. The method of recognizing in dynamic areas is an unanswered challenge facing the community of robotics. The answer can be framed by including the methods like segmentation, tracking, and classification components, etc. This paper reveals the survey of the works carried on the construction of 3D model with their own method and technologies applied in the process. The paper mainly goals the Reality systems to enhance the techniques used for the 3D image construction and also to segment the blurry areas in the image captured from different depths. Also the image is desirable to recognize 3D-objects of the system in the user's environment, in order to avoid manual based method. Many existing systems are surveyed which perform 3D-object model construction. Keyword-Depth, 3D image, modeling, Reconstruction, Acquisition I. INTRODUCTION Depth based 3D-object construction and its recognition is the most challenging area of research in the DIP (Digital Image Processing). The goal of 3D modeling is to correctly identify objects of different pose when given to a system for identification that are present in a 3D scene of a depth present with range image, and also to be used in the security systems and the military systems, and also intensity data systems, range data systems, and both range and intensity systems (sometimes including color). In cases like the intensity-image systems, points and straight line segments are the considered common features. Recently, the alignment method blindly matches the points or line segments thrice from the image with the similar of the model, using little or no contextual information. These all inventions lead to the assumptions that the points or line segments are the reliable features of the class of the identified object to be recognized or located and (b) the view of the object is determined can be unique using these features. They lead to the view of polyhedral objects or those modelled images with sharp and straight edges. Hence they are categorized under curved-surface objects. Three-dimensional reconstruction of objects has become an important technique in the context of inspection: Industry quality inspection-for observing the quality of a product from different views, Archaeology analysisreconstruction of an object from raw data obtained from muddy area, Medical science-for conduction sessions of teaching, and for reconstruction body check up from collected data like details obtained from body check up, Forensic analysis-reconstruction of a scene from raw data for identifying unseen actions. II. LITERATURE SURVEY (Jose L. Herrera Carlos R, et al., (2015)) proposes a method for constructing 3D using 2D by using a technique centroid clustering process by combining all the depth images in the cluster. (Zhongjun Wu, et al., (2015) proposes a Multi-Depth Generic Elastic Models (MDGEMs) for the construction of 3D face modeling by using varying multiple depth maps of an image. (Yan Zhou, Huiwen Guo, et al., (2015)) proposes an algorithm for reconstructing a 3D view using a wavelet transform and Support Vector Machine (SVM) models to get the image focus quality and Mean shift algorithm for the depth scene. The results prove to be improving the efficiency better compared to previous techniques. (Masaya Kaneko, et al., (2015)) proposes a method for detecting the edge by generating a decision tree, a solution 25 times better to a conventional method existing by training the decision tree using supervised learning method in the process (Xuyuan Xu, et al., (2014)) recovers the object boundaries of captured depth images with sharp that refine the use of adaptive block by reallocation of the same position and expand to increase the depth accuracy by avoiding false depth boundary refinement.
The purpose of developing attendance management system is to computerized the tradition way of ta... more The purpose of developing attendance management system is to computerized the tradition way of taking attendance. Another purpose for developing this software is to generate the report automatically at the end of the session or in the between of the session
Shape based object retrieval technique is an application used for the automatic retrieval of vehi... more Shape based object retrieval technique is an application used for the automatic retrieval of vehicular spare parts based on the input image, this application can be useful in the automobile industry/shop for the retrieval of specific object from the group of objects. For the retrieval process first the database has been designed to store different shapes of nuts that are hexagon and square. With the application of median filter and wiener filters in the preprocessing step, the canny edge-detector for identifying the edges and to ascertain shape of the input and database images the convex hull approach is applied. This system is successful in retrieving the shape of the images which already exist in the database and the method results with the accuracy of 82.1875%
Uploads
Papers by Ravi Hosur