Mr. Sonu Agrawal - Academia.edu (original) (raw)

Uploads

Papers by Mr. Sonu Agrawal

Research paper thumbnail of Support Vector Machine for age classification

Age of human can be inferred by distinct patterns emerging from the facial appearance. Humans can... more Age of human can be inferred by distinct patterns emerging from the facial appearance. Humans can easily distinguish which person is elder and which is older between two persons. When inferring a person’s age, the comparison is done with his/her face and with many people whose ages are known, resulting in a series of comparative series, and then judgment is done based on the comparisons. The computer based age classification has become particularly prevalent topics recently. In this paper age classification is done by using Support Vector Machine technique. In variety of applications SVM has achieved excellent generalization performance. Keywords— age classification, aging, face, Support

Research paper thumbnail of A Study on Human Ear Detection for Biometric Identification

3 ABSTRACT: This paper proposes an efficient and template based technique for automatic ear detec... more 3 ABSTRACT: This paper proposes an efficient and template based technique for automatic ear detection in a side face image. The technique first separates skin regions from non-skin regions and then searches for the ear within skin regions. Ear detection process involves three major steps. First, Skin Segmentation to eliminate all non-skin pixels from the image, second Ear Localization to perform ear detection using template matching approach, and third Ear Verification to validate the ear detection using the Zernike moments based shape descriptor. To handle the detection of ears of various shapes and sizes, an ear template is created considering the ears of various shapes and resized automatically to a size suitable for the detection.

Research paper thumbnail of A Survey on Enhanced Intrusion Detection System in Mobile Ad hoc Network

 Abstract— In the last few years, we have seen the fast development of wireless communication te... more  Abstract— In the last few years, we have seen the fast development of wireless communication technologies and a mobile ad hoc network play a major role for wireless communication. A MANET is a self-determining collection of mobile nodes that communicate over comparatively bandwidth constrained wireless mediums. Since the nodes are mobile, the network topology may change rapidly and impulsively over time. Many critical applications are using the mobile ad hoc network; therefore, security issue has become one of the major concerns in MANETs. Due to some unique features and characteristics of MANETs, prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can break the system. Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. An Intrusion Detection System is used to supervise networks for attacks o...

Research paper thumbnail of Image Comparision Based Traffic Queue Length Measurement for Real Time Signal Controlling

Due to the increase in the number of vehicle day by day traffic congestion is the main issue we f... more Due to the increase in the number of vehicle day by day traffic congestion is the main issue we face today. due to which road accident increasing day by day. to solve this issue we need an automated intelligent system that can handle this issue easily compare to our current scenario where we provide manual power to handle it which is not possible each and every time. This paper discusses about some of the standard traffic control system and their drawback, Image processing technique which helps in finding traffic queue length and some of the methods of it.

Research paper thumbnail of Location Detection in Wireless Sensor Network using Classical Optimization Methodology

Wireless Sensor Networks (WSN) is used for hunting down targets, environmental supervising, and d... more Wireless Sensor Networks (WSN) is used for hunting down targets, environmental supervising, and data collection for factors such as humidity, temperature, and pressure. While these networks are widely used in many applications, their success highly depends on the sensor node positions known as network deployment. Determining the position of sensor nodes is the main objective of deployment network which directly depends on the coverage of the concerned region. To locate sensors, Global Positioning System (GPS) is also used by which sensors know their position. But, this method is not feasible due to economic issues. So, only a small part of the network can affordably be equipped with GPS, and an automatic localization process is required for the rest of the nodes in the network. We estimate random solutions and then apply some technique to find the best feasible solution among all. Classical approach techniques are very efficient in cases where assumptions are fulfilled. In this pape...

Research paper thumbnail of Elastic Bunch Graph Matching : A Review

This paper presents a review of different techniques for face verification. The face recognition ... more This paper presents a review of different techniques for face verification. The face recognition and face verification technique is playing a very important role in research area under field of image processing and computer vision. There are many techniques or algorithm is discovered for the face recognition system but not all are applied on the surgically altered face image. This paper deal with the brief overview of the EBGM algorithm with the various method for the face verification. However the performance of all discovered algorithm are also depends on the various factors. The EBGM algorithm recognizes novel faces by first localizing a set of landmark features and then measuring similarity between these features. On the plastic surgery face images, the proposed algorithm give high verification accuracy as compared to other various algorithms and a commercial face verification system.

Research paper thumbnail of A Survey on Various Mobility Models for Protocols of Manet

Mobile Ad-hoc network has the attributes such as wireless connection, continuously changing topol... more Mobile Ad-hoc network has the attributes such as wireless connection, continuously changing topology, distributed operation, easy development and an autonomous, self-configuring network of mobile nodes. Different mobility models have been surveyed in mobile Ad-hoc network. It is difficult to select suitable mobility model for particular routing protocols. In this paper Various protocols of different groups has been discussed in third section and various mobility models of Bonn Motion software for different protocols of Ad-hoc wireless networks have discussed in fourth section. At last comparisons of various models depending on various features has been made.

Research paper thumbnail of A novel robust feature extraction with GSO-optimized extreme learning for age-invariant face recognition

The Imaging Science Journal, 2019

This paper presents a novel age function modelling technique on the basis of the fusion of local ... more This paper presents a novel age function modelling technique on the basis of the fusion of local features obtained by local texture descriptors. Initially, image normalization is performed and a feature extraction process is carried out. The age estimation performances of new texture descriptors Local Phase Quantization, Weber Local Descriptor and the familiar texture descriptor Local Binary Patterns, which are not examined thoroughly for age estimation modelling, are analysed in this paper. Then the feature fusion process is taken place for investigating the age estimation precisions of various concatenation of the local texture descriptors. By using PCA, dimensionality reduction is implemented for reducing the dimensions of the images. Extreme Learning Machine (ELM) classifier is applied to evaluate the output images for the corresponding input images. Because of the mild optimization restrictions, ELM can be simple for execution and normally attains the finer generalization performance. The outcomes display that, when compared with the earlier techniques, the age function modelling accuracy of the developed system is better.

Research paper thumbnail of Locality Detection in Wireless Sensor Network using Population based Algorithm

International Journal of Computer Applications, 2012

Artificial Bee Colony Algorithm is a population based optimization method depends on the behaviou... more Artificial Bee Colony Algorithm is a population based optimization method depends on the behaviour of natural honey bees. It works on the concept of natural bees for finding nectar food source. In this we show how ABC is applied for the application of location detection in wireless environment. Wireless Sensor Networks (WSN) is used for hunt down targets, environmental supervising etc. While these networks are widely used in many applications, their success highly depends on the sensor node positions known as network deployment. Determining the position of sensor nodes is the main objective of deployment network which directly depends on the coverage of the concerned region. To locate sensors, Global Positioning System (GPS) is also used by which sensors know their position. But, this method is not feasible due to economic issues. So, only a small part of the network can affordably be equipped with GPS, and an automatic localization process is required for the rest of the nodes in the network. We guess random solutions and then apply some method to find the best possible solution.

Research paper thumbnail of A Novel Idea for Age Invariant Face Recognition

International Journal of Innovative Research in Science, Engineering and Technology, 2014

Biometric identification is the technique of automatically identifying or verifying an individual... more Biometric identification is the technique of automatically identifying or verifying an individual by a physical characteristic or personal trait. The term "automatically" means the biometric identification system must identify or verify a human characteristic or trait quickly with little or no intervention from the user. A face recognition system is non-invasive means it allow user to be identified by simply walking past a camera. Human beings often recognize one another by unique facial characteristics. Automatic facial recognition also uses certain facial characteristics that are unique in nature. Facial recognition is the most successful form of human surveillance. The basic idea of this work focuses on the updation of corpus (database) by using a method based on feature extraction which is combined with minimization algorithm for searching process. This approach may be applied to other databases in which the data items varies with time such as human signature and other behavioural activities. The proposed idea first extracts features from the face images. These extracted features are stored in database during training period. Later on this database is used for identification. At the time of identification certain fitness function is calculated, if the value of fitness function decreases below a threshold value then the database is updated with features extracted from new image that is being identified. As in proposed idea the corpus is updated during recognition phase, it is expected to gives high acceptance rate as compared to static matching of face images. The application of this project range from static matching of controlled format photographs such as passports, credit cards, photo ID's, drivers licenses, and mug shots to real time matching of surveillance video images.

Research paper thumbnail of Study of Bluetooth Wireless Technology Using Java

Indian Journal of Computer Science and …

Bluetooth is a wireless communication protocol. Since it's a communication protocol, we can ... more Bluetooth is a wireless communication protocol. Since it's a communication protocol, we can use Bluetooth to communicate to other Bluetooth-enabled devices. In this sense, Bluetooth is like any other communication protocol that you use every day, such as HTTP, FTP, SMTP, ...

Research paper thumbnail of A Servey on Bluetooth Scatternet Formation

Communications in Computer and Information Science, 2011

... since Page 9. 268 P. Singh and S. Agrawal each node has all the information needed. Likewise ... more ... since Page 9. 268 P. Singh and S. Agrawal each node has all the information needed. Likewise ... area. Acknowledgments This work was partially supported by Mr. Dipesh Sharma who is Reader of Raipur institute of technology. My ...

Research paper thumbnail of Support Vector Machine for age classification

Age of human can be inferred by distinct patterns emerging from the facial appearance. Humans can... more Age of human can be inferred by distinct patterns emerging from the facial appearance. Humans can easily distinguish which person is elder and which is older between two persons. When inferring a person’s age, the comparison is done with his/her face and with many people whose ages are known, resulting in a series of comparative series, and then judgment is done based on the comparisons. The computer based age classification has become particularly prevalent topics recently. In this paper age classification is done by using Support Vector Machine technique. In variety of applications SVM has achieved excellent generalization performance. Keywords— age classification, aging, face, Support

Research paper thumbnail of A Study on Human Ear Detection for Biometric Identification

3 ABSTRACT: This paper proposes an efficient and template based technique for automatic ear detec... more 3 ABSTRACT: This paper proposes an efficient and template based technique for automatic ear detection in a side face image. The technique first separates skin regions from non-skin regions and then searches for the ear within skin regions. Ear detection process involves three major steps. First, Skin Segmentation to eliminate all non-skin pixels from the image, second Ear Localization to perform ear detection using template matching approach, and third Ear Verification to validate the ear detection using the Zernike moments based shape descriptor. To handle the detection of ears of various shapes and sizes, an ear template is created considering the ears of various shapes and resized automatically to a size suitable for the detection.

Research paper thumbnail of A Survey on Enhanced Intrusion Detection System in Mobile Ad hoc Network

 Abstract— In the last few years, we have seen the fast development of wireless communication te... more  Abstract— In the last few years, we have seen the fast development of wireless communication technologies and a mobile ad hoc network play a major role for wireless communication. A MANET is a self-determining collection of mobile nodes that communicate over comparatively bandwidth constrained wireless mediums. Since the nodes are mobile, the network topology may change rapidly and impulsively over time. Many critical applications are using the mobile ad hoc network; therefore, security issue has become one of the major concerns in MANETs. Due to some unique features and characteristics of MANETs, prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can break the system. Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. An Intrusion Detection System is used to supervise networks for attacks o...

Research paper thumbnail of Image Comparision Based Traffic Queue Length Measurement for Real Time Signal Controlling

Due to the increase in the number of vehicle day by day traffic congestion is the main issue we f... more Due to the increase in the number of vehicle day by day traffic congestion is the main issue we face today. due to which road accident increasing day by day. to solve this issue we need an automated intelligent system that can handle this issue easily compare to our current scenario where we provide manual power to handle it which is not possible each and every time. This paper discusses about some of the standard traffic control system and their drawback, Image processing technique which helps in finding traffic queue length and some of the methods of it.

Research paper thumbnail of Location Detection in Wireless Sensor Network using Classical Optimization Methodology

Wireless Sensor Networks (WSN) is used for hunting down targets, environmental supervising, and d... more Wireless Sensor Networks (WSN) is used for hunting down targets, environmental supervising, and data collection for factors such as humidity, temperature, and pressure. While these networks are widely used in many applications, their success highly depends on the sensor node positions known as network deployment. Determining the position of sensor nodes is the main objective of deployment network which directly depends on the coverage of the concerned region. To locate sensors, Global Positioning System (GPS) is also used by which sensors know their position. But, this method is not feasible due to economic issues. So, only a small part of the network can affordably be equipped with GPS, and an automatic localization process is required for the rest of the nodes in the network. We estimate random solutions and then apply some technique to find the best feasible solution among all. Classical approach techniques are very efficient in cases where assumptions are fulfilled. In this pape...

Research paper thumbnail of Elastic Bunch Graph Matching : A Review

This paper presents a review of different techniques for face verification. The face recognition ... more This paper presents a review of different techniques for face verification. The face recognition and face verification technique is playing a very important role in research area under field of image processing and computer vision. There are many techniques or algorithm is discovered for the face recognition system but not all are applied on the surgically altered face image. This paper deal with the brief overview of the EBGM algorithm with the various method for the face verification. However the performance of all discovered algorithm are also depends on the various factors. The EBGM algorithm recognizes novel faces by first localizing a set of landmark features and then measuring similarity between these features. On the plastic surgery face images, the proposed algorithm give high verification accuracy as compared to other various algorithms and a commercial face verification system.

Research paper thumbnail of A Survey on Various Mobility Models for Protocols of Manet

Mobile Ad-hoc network has the attributes such as wireless connection, continuously changing topol... more Mobile Ad-hoc network has the attributes such as wireless connection, continuously changing topology, distributed operation, easy development and an autonomous, self-configuring network of mobile nodes. Different mobility models have been surveyed in mobile Ad-hoc network. It is difficult to select suitable mobility model for particular routing protocols. In this paper Various protocols of different groups has been discussed in third section and various mobility models of Bonn Motion software for different protocols of Ad-hoc wireless networks have discussed in fourth section. At last comparisons of various models depending on various features has been made.

Research paper thumbnail of A novel robust feature extraction with GSO-optimized extreme learning for age-invariant face recognition

The Imaging Science Journal, 2019

This paper presents a novel age function modelling technique on the basis of the fusion of local ... more This paper presents a novel age function modelling technique on the basis of the fusion of local features obtained by local texture descriptors. Initially, image normalization is performed and a feature extraction process is carried out. The age estimation performances of new texture descriptors Local Phase Quantization, Weber Local Descriptor and the familiar texture descriptor Local Binary Patterns, which are not examined thoroughly for age estimation modelling, are analysed in this paper. Then the feature fusion process is taken place for investigating the age estimation precisions of various concatenation of the local texture descriptors. By using PCA, dimensionality reduction is implemented for reducing the dimensions of the images. Extreme Learning Machine (ELM) classifier is applied to evaluate the output images for the corresponding input images. Because of the mild optimization restrictions, ELM can be simple for execution and normally attains the finer generalization performance. The outcomes display that, when compared with the earlier techniques, the age function modelling accuracy of the developed system is better.

Research paper thumbnail of Locality Detection in Wireless Sensor Network using Population based Algorithm

International Journal of Computer Applications, 2012

Artificial Bee Colony Algorithm is a population based optimization method depends on the behaviou... more Artificial Bee Colony Algorithm is a population based optimization method depends on the behaviour of natural honey bees. It works on the concept of natural bees for finding nectar food source. In this we show how ABC is applied for the application of location detection in wireless environment. Wireless Sensor Networks (WSN) is used for hunt down targets, environmental supervising etc. While these networks are widely used in many applications, their success highly depends on the sensor node positions known as network deployment. Determining the position of sensor nodes is the main objective of deployment network which directly depends on the coverage of the concerned region. To locate sensors, Global Positioning System (GPS) is also used by which sensors know their position. But, this method is not feasible due to economic issues. So, only a small part of the network can affordably be equipped with GPS, and an automatic localization process is required for the rest of the nodes in the network. We guess random solutions and then apply some method to find the best possible solution.

Research paper thumbnail of A Novel Idea for Age Invariant Face Recognition

International Journal of Innovative Research in Science, Engineering and Technology, 2014

Biometric identification is the technique of automatically identifying or verifying an individual... more Biometric identification is the technique of automatically identifying or verifying an individual by a physical characteristic or personal trait. The term "automatically" means the biometric identification system must identify or verify a human characteristic or trait quickly with little or no intervention from the user. A face recognition system is non-invasive means it allow user to be identified by simply walking past a camera. Human beings often recognize one another by unique facial characteristics. Automatic facial recognition also uses certain facial characteristics that are unique in nature. Facial recognition is the most successful form of human surveillance. The basic idea of this work focuses on the updation of corpus (database) by using a method based on feature extraction which is combined with minimization algorithm for searching process. This approach may be applied to other databases in which the data items varies with time such as human signature and other behavioural activities. The proposed idea first extracts features from the face images. These extracted features are stored in database during training period. Later on this database is used for identification. At the time of identification certain fitness function is calculated, if the value of fitness function decreases below a threshold value then the database is updated with features extracted from new image that is being identified. As in proposed idea the corpus is updated during recognition phase, it is expected to gives high acceptance rate as compared to static matching of face images. The application of this project range from static matching of controlled format photographs such as passports, credit cards, photo ID's, drivers licenses, and mug shots to real time matching of surveillance video images.

Research paper thumbnail of Study of Bluetooth Wireless Technology Using Java

Indian Journal of Computer Science and …

Bluetooth is a wireless communication protocol. Since it's a communication protocol, we can ... more Bluetooth is a wireless communication protocol. Since it's a communication protocol, we can use Bluetooth to communicate to other Bluetooth-enabled devices. In this sense, Bluetooth is like any other communication protocol that you use every day, such as HTTP, FTP, SMTP, ...

Research paper thumbnail of A Servey on Bluetooth Scatternet Formation

Communications in Computer and Information Science, 2011

... since Page 9. 268 P. Singh and S. Agrawal each node has all the information needed. Likewise ... more ... since Page 9. 268 P. Singh and S. Agrawal each node has all the information needed. Likewise ... area. Acknowledgments This work was partially supported by Mr. Dipesh Sharma who is Reader of Raipur institute of technology. My ...