Mrunal Pathak - Academia.edu (original) (raw)
Papers by Mrunal Pathak
International Journal of Advanced Research in Science, Communication and Technology
Today in the medical field lot of complications have arrived in this fields. The reason is that t... more Today in the medical field lot of complications have arrived in this fields. The reason is that the human body has innumerable parts. As the people are become advanced day by day and they move towards automation for their comfort. The machines have become smarter due to high computation power. The machines have become accurate as the data is available in large quantity. Therefore machines are essential for human work. Decisions taken by machines are more reliable than man. So, here we try to build machine learning model to detect pneumonia. The pneumonia is detected using examine of chest X-Ray radiograph by highly-trained specialists. The result can be different according to different radiologists. Examining chest X-Ray requires high precision. Covid-19 can cause Pneumonia. Pneumonia is a disease that affects the lungs. We aim at designing a highly efficient system to predict a user suffers from Pneumonia by analyzing the patient’s chest X-ray images and increasing the accuracy of ...
International Journal of Advanced Research in Science, Communication and Technology
The medical field is most sensitive domain of all the fields. Cause is deals with the human body ... more The medical field is most sensitive domain of all the fields. Cause is deals with the human body human body parts. As the people are become advanced day by day and they move towards automation for their comfort. The machine is also being smarter and accurate due to the availability of a large amount of data and fast computing power. So as a result machine learning becomes an important pillar in life. People now become more reliable to machine than man decision. So, here we try to build machine learning model to detect pneumonia. Pneumonia is the leading death of cause among young children and one of the top major causes worldwide. The pneumonia is detected using examine of chest X-Ray radiograph by highly-trained specialists. This process is tedious and often leads to a disagreement between radiologists. Analyzing chest x-rays is a difficult task and requires precision. Pneumonia, a symptom of Covid-19, is a life-threatening condition that affects the lungs. We aim at designing a hi...
International Journal of Recent Technology and Engineering, 2019
Today’s most of the iris recognition systems are strongly dependent on user’s cooperation during ... more Today’s most of the iris recognition systems are strongly dependent on user’s cooperation during image acquisition such as stop-stair condition, head position and camera distance. Images are taken in NIR spectrum to reduce the noise such as effect of illumination. Challenges faced by existing iris recognition systems are such as they are time consuming due to need of extra hardware setup and unable to achieve better performance for images acquired on-the-move, at-a-distance, etc.. To overcome these challenges, in this paper we proposed novel segmentation algorithm based on content based image retrieval approach. In proposed segmentation method, color, texture and brightness contour features were extracted. Entropy value for these extracted contour features was measured to reduce the dimensionality of features. These set of calculated entropy value was given as input to convolutional neural network to cluster noisy eye image into iris, sclera and pupil region. The proposed segmentati...
International Journal of Scientific Research in Science and Technology, 2021
Anomaly Detection is system which identifies inappropriate human behavior. One of the major probl... more Anomaly Detection is system which identifies inappropriate human behavior. One of the major problems in computer vision is identifying inappropriate human behavior. It is crucial as activity detection can help many numbers of applications. It can benefit applications like image monitoring, sign language recognization, object pursue and many more. Many alternatives are there such as low-cost depth sensors, but they do have some drawbacks such as limited indoor use also with lower resolution and clamorous depth information from deep images, it becomes nearly impossible to assess human poses. In order to resolve the above issues, the proposed system plans to utilize neural networks. One of the major research area is to recognize suspicious human behavior in video monitoring, in the field of computer vision. Several surveillance cameras are situated at places like airports, banks, bus station, malls, railway station, colleges, schools, etc to detect suspicious activities such as murder,...
International Journal of Scientific Research in Science and Technology, 2021
Increasingly digital technology in the present helped many people lives. Unlike the electoral sys... more Increasingly digital technology in the present helped many people lives. Unlike the electoral system, there are many conventional uses of paper in its implementation. The aspect of security and transparency is a threat from still widespread election with the conventional system (offline). General elections still use a centralized system, there is one organization that manages it. Some of the problems that can occur in traditional electoral systems is with an organization that has full control over the database and system, it is possible to tamper with the database of considerable opportunities. Blockchain technology is one of solutions, because it embraces a decentralized system and the entire database are owned by many users. Blockchain itself has been used in the Bitcoin system known as the decentralized Bank system. By adopting blockchain in the distribution of databases on e-voting systems can reduce one of the cheating sources of database manipulation. This research discusses t...
Journal of Advanced Research in Dynamical and Control Systems, 2019
Advances in Computing Applications, 2016
User authentication is essential to provide security that restricts access to system and data res... more User authentication is essential to provide security that restricts access to system and data resources. Automated recognition of individuals based on their biological and behavioral characteristics is referred as biometric system. Recognition of legitimate user depends upon a feature vector(s) extracted from either their distinguishing behavioral or both distinguishing behavioral and physiological traits such as face, finger, speech, iris and gait. Research on biometrics has distinctly increased for solving identification and authentication issues in forensics, physical and computer security, custom and immigration. However, unimodal biometric system is not able to fulfill reliability constraints, speed and acceptability of authentication in real applications due to noise in sensed data, spoof attacks, data quality, lack of distinctiveness, restricted degree of freedom, non-universality and other factors. Therefore, multimodal biometric systems are used to increase security as well as better performance. To establish the identity of individuals, multimodal biometric systems unite the information presented by multiple biometric sensor, samples, algorithms, units and traits. Multimodal biometric systems are not only used for enhancing matching performance, but these systems also provide improved people coverage, discourage deceiving, make possible continuous monitoring and impart fault tolerance to biometric applications. This paper presents an overview of different multimodal biometric (multibiometric) systems and their fusion techniques with respect to their performance.
Software-Defined Networks (SDN) has been deployed on production networks such as datacenter netwo... more Software-Defined Networks (SDN) has been deployed on production networks such as datacenter networks. Current SDN is based on OpenFlow technology that is a set of network flow control API for switch devices. In past few years, the shift from fully distributed control planes to logically centralized network control has many challenges. As centralizing management functions simplifies network management, logically centralized control planes tend to face limitations in scalability. We are using Locator/ID separation Protocol (LISP) to implement a network virtualization solution that also provides decoupling of the control plane from the data plane. LISP architecture has Mapping System as main component, where policies can be defined programmatically. We propose a new architecture based on Software Defined Networking (SDN) concept, in the context of Network virtualization, a Mapping Service can be queried by LISP-enabled network devices (virtual/physical) to provide the mapping service o...
2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp), 2017
Most recently popular biometrie systems are based on recognition and classification of unique scl... more Most recently popular biometrie systems are based on recognition and classification of unique sclera and iris patterns. Unique pattern of blood veins explore the interest in sclera recognition for person identification. However sclera segmentation of relaxed eye images in condition such as different stare direction, at-a-distance image and on-the-move image widely enquired. The drawback of iris is off angle imaging where position of iris and center for off angle imagining affect the performance of sclera segmentation in terms of accuracy. Another challenge in sclera segmentation and iris recognition is high resolution and dark images which causes draining process for mobile application. So we proposed a new method which is the fusion of both iris and sclera. In proposed system sclera and iris descriptor value are fuse together for reliable and accurate iris recognition system. The proposed method will test the execution of iris recognition system for different fusion model using iri...
Biometrics is seen as a viable solution to ageing password based authentication on smartphones. F... more Biometrics is seen as a viable solution to ageing password based authentication on smartphones. Fingerprint biometric is leading the biometric technology for smartphones, however, owing to its high cost, major players in mobile industry are introducing fingerprint sensors only on their flagship devices, leaving most of their other devices without a fingerprint sensor. Cameras on the other hand have been seeing a constant upgrade in sensor and supporting hardware, courtesy of ‘selfies’ on all smartphones. Face, iris and visible vasculature are three biometric traits that can be captured in visible spectrum using existing cameras on smartphone. Current biometric recognition systems on smartphones rely on a single biometric trait for faster authentication thereby increasing the probability of failure to enroll, affecting the usability of the biometric system for practical purposes. While multibiometric system mitigates this problem, computational models for multimodal biometrics recogn...
User authentication is essential to provide security that restricts access to system and data res... more User authentication is essential to provide security that restricts access to system and data resources. Biometric system refers to an recognition of legitimate user based on a feature vector(s) derived from their distinguishing behavioral and/or physiological traits like face, finger, speech iris, gait, etc., Research on biometrics has distinctly increased for solving identification and authentication issues in forensics, physical and computer security , custom and immigration, However, unimodal biometric system is not able to satisfy acceptability, speed, and reliability constraints of authentication in real applications due to noise in sensed data, spoof attacks, data quality, lack of distinctiveness, restricted degree of freedom, non-universality and other factors. Therefore multimodal biometric systems are used to increase security as well as better performance. This paper presents overview of different multimodal biometric (multibiometric) systems and their fusion techniques w...
International Journal of Scientific Research in Science and Technology, 2021
Anomaly Detection is identification of suspicious human behavior using real-time CCTV video. Huma... more Anomaly Detection is identification of suspicious human behavior using real-time CCTV video. Human Anomaly Behavior has been studied as one of the main problems of computer vision for more than 15 years. It is important because of the sheer number of applications that can benefit from activity detection. For applications such as image monitoring, object tracking and formed to oversee, sign language identification, advanced human contact, and less motion capture markers, for example, human pose estimates are used. Low-cost depth sensors have disadvantages, such as restricted indoor use, and with low resolution and noisy depth information, it is difficult to estimate human poses from deep images. The proposed system therefore plans to use neural networks to solve these problems. Suspicious identification of human activity through video surveillance is an active research area in the field of image recognition and computer vision. Human activities can be monitored by video surveillance ...
International Journal of Scientific Research in Science and Technology, 2021
Increasingly digital technology in the present helped many people lives. Unlike the electoral sys... more Increasingly digital technology in the present helped many people lives. Unlike the electoral system, there are many conventional uses of paper in its implementation. The aspect of security and transparency is a threat from still widespread election with the conventional system (offline). General elections still use a centralized system, there is one organization that manages it. Some of the problems that can occur in traditional electoral systems is with an organization that has full control over the database and system, it is possible to tamper with the database of considerable opportunities. Blockchain technology is one of solutions, because it embraces a decentralized system and the entire database are owned by many users. Blockchain itself has been used in the Bitcoin system known as the decentralized Bank system. By adopting blockchain in the distribution of databases on e-voting systems can reduce one of the cheating sources of database manipulation. This research discusses t...
International Journal of Scientific Research in Science and Technology, 2021
Anomaly Detection is system which identifies inappropriate human behavior. One of the major probl... more Anomaly Detection is system which identifies inappropriate human behavior. One of the major problems in computer vision is identifying inappropriate human behavior. It is crucial as activity detection can help many numbers of applications. It can benefit applications like image monitoring, sign language recognization, object pursue and many more. Many alternatives are there such as low-cost depth sensors, but they do have some drawbacks such as limited indoor use also with lower resolution and clamorous depth information from deep images, it becomes nearly impossible to assess human poses. In order to resolve the above issues, the proposed system plans to utilize neural networks. One of the major research area is to recognize suspicious human behavior in video monitoring, in the field of computer vision. Several surveillance cameras are situated at places like airports, banks, bus station, malls, railway station, colleges, schools, etc to detect suspicious activities such as murder,...
Existing iris recognition system provides accurate and reliable results based on Near Infrared Im... more Existing iris recognition system provides accurate and reliable results based on Near Infrared Images when images are captured under constrained environment with user cooperation from fixed distance. But the performance of iris recognition system degrades for color eye images acquired under visible wavelength without user cooperation due to noise occurrence such as blur eye images, eyelash, occlusion and reflection. This paper present the multimodal eye biometric system based on support value based fusion for iris, sclera and pupil features depending on their match score value. Support value for iris, sclera and pupil is calculated using the log Gabor features, Y-shaped features and color histogram features. The robustness of proposed eye biometric system is tested on UBIRIS.V2 database for noisy eye images taken under unconstrained environment in visible wavelength. The propose algorithm significantly improve the accuracy of person authentication by reducing the time for segmentati...
MANET (Mobile ad hoc network) is a collection of mobile nodes which communicate with each other d... more MANET (Mobile ad hoc network) is a collection of mobile nodes which communicate with each other directly or via other nodes which works as router. Nodes in MANET can move independently in any direction so the topology changes rapidly and unpredictably over time. Routing protocols of MANETs are designed considering that all participating nodes collaborate and communicate in harmony. However, participating nodes need energy and other resources to perform network functions, which can lead to misbehavior of node. Misbehaving nodes degrades network performance. Several acknowledgement based schemes have been proposed to detect misbehaving nodes in MANET. This paper aims at providing the survey and comparison of various acknowledgement schemes which have been proposed to detect misbehavior in MANET. Keywords—MANET, Misbehaving Nodes, Ad Hoc Networks, ACK.
International Journal of Innovative Technology and Exploring Engineering
Recent advancement in biometric system prefer multimodal biometric system instead of single biome... more Recent advancement in biometric system prefer multimodal biometric system instead of single biometric system to overcome challenges faced by unimodal biometric system such as intra class variation, noise sensitivity, non universality, spoofing attack, etc. Most of the existing iris biometric systems are dependent on ideal condition which needs user cooperation during image acquisition with help of NIR camera to avoid noise. Such system performance significantly degrades when images are taken under visible light without user cooperation called unconstrained environment. Proposed multi modal eye biometric system provides improvement in segmentation accuracy using entropy based convolution neural network (E-CNN) based on contour feature. It also reduces the time required for segmentation up to 0.9second. Multi algorithmic feature extraction for color, texture features of iris and pupil and Y-shaped features of sclera exploit the improvement in feature extraction performance. Proposed f...
TELKOMNIKA (Telecommunication Computing Electronics and Control)
In today's sensitive environment, for personal authentication, iris recognition is the mo... more In today's sensitive environment, for personal authentication, iris recognition is the most attentive technique among the various biometric technologies. One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil and sclera of a captured eye-image. In our proposed method, initially input image is preprocessed by using bilateral filtering. After the preprocessing of images contour based features such as, brightness, color and texture features are extracted. Then entropy is measured based on the extracted contour based features to effectively distinguishing the data in the images. Finally, the convolution neural network (CNN) is used for the effective sclera, iris and pupil parts segmentations based on the entropy measure. The proposed results are analyzed to demonstrate the better performance of the proposed segmentation method than the existing methods.
IOSR Journal of Electronics and Communication Engineering, 2013
International Journal of Advanced Research in Science, Communication and Technology
Today in the medical field lot of complications have arrived in this fields. The reason is that t... more Today in the medical field lot of complications have arrived in this fields. The reason is that the human body has innumerable parts. As the people are become advanced day by day and they move towards automation for their comfort. The machines have become smarter due to high computation power. The machines have become accurate as the data is available in large quantity. Therefore machines are essential for human work. Decisions taken by machines are more reliable than man. So, here we try to build machine learning model to detect pneumonia. The pneumonia is detected using examine of chest X-Ray radiograph by highly-trained specialists. The result can be different according to different radiologists. Examining chest X-Ray requires high precision. Covid-19 can cause Pneumonia. Pneumonia is a disease that affects the lungs. We aim at designing a highly efficient system to predict a user suffers from Pneumonia by analyzing the patient’s chest X-ray images and increasing the accuracy of ...
International Journal of Advanced Research in Science, Communication and Technology
The medical field is most sensitive domain of all the fields. Cause is deals with the human body ... more The medical field is most sensitive domain of all the fields. Cause is deals with the human body human body parts. As the people are become advanced day by day and they move towards automation for their comfort. The machine is also being smarter and accurate due to the availability of a large amount of data and fast computing power. So as a result machine learning becomes an important pillar in life. People now become more reliable to machine than man decision. So, here we try to build machine learning model to detect pneumonia. Pneumonia is the leading death of cause among young children and one of the top major causes worldwide. The pneumonia is detected using examine of chest X-Ray radiograph by highly-trained specialists. This process is tedious and often leads to a disagreement between radiologists. Analyzing chest x-rays is a difficult task and requires precision. Pneumonia, a symptom of Covid-19, is a life-threatening condition that affects the lungs. We aim at designing a hi...
International Journal of Recent Technology and Engineering, 2019
Today’s most of the iris recognition systems are strongly dependent on user’s cooperation during ... more Today’s most of the iris recognition systems are strongly dependent on user’s cooperation during image acquisition such as stop-stair condition, head position and camera distance. Images are taken in NIR spectrum to reduce the noise such as effect of illumination. Challenges faced by existing iris recognition systems are such as they are time consuming due to need of extra hardware setup and unable to achieve better performance for images acquired on-the-move, at-a-distance, etc.. To overcome these challenges, in this paper we proposed novel segmentation algorithm based on content based image retrieval approach. In proposed segmentation method, color, texture and brightness contour features were extracted. Entropy value for these extracted contour features was measured to reduce the dimensionality of features. These set of calculated entropy value was given as input to convolutional neural network to cluster noisy eye image into iris, sclera and pupil region. The proposed segmentati...
International Journal of Scientific Research in Science and Technology, 2021
Anomaly Detection is system which identifies inappropriate human behavior. One of the major probl... more Anomaly Detection is system which identifies inappropriate human behavior. One of the major problems in computer vision is identifying inappropriate human behavior. It is crucial as activity detection can help many numbers of applications. It can benefit applications like image monitoring, sign language recognization, object pursue and many more. Many alternatives are there such as low-cost depth sensors, but they do have some drawbacks such as limited indoor use also with lower resolution and clamorous depth information from deep images, it becomes nearly impossible to assess human poses. In order to resolve the above issues, the proposed system plans to utilize neural networks. One of the major research area is to recognize suspicious human behavior in video monitoring, in the field of computer vision. Several surveillance cameras are situated at places like airports, banks, bus station, malls, railway station, colleges, schools, etc to detect suspicious activities such as murder,...
International Journal of Scientific Research in Science and Technology, 2021
Increasingly digital technology in the present helped many people lives. Unlike the electoral sys... more Increasingly digital technology in the present helped many people lives. Unlike the electoral system, there are many conventional uses of paper in its implementation. The aspect of security and transparency is a threat from still widespread election with the conventional system (offline). General elections still use a centralized system, there is one organization that manages it. Some of the problems that can occur in traditional electoral systems is with an organization that has full control over the database and system, it is possible to tamper with the database of considerable opportunities. Blockchain technology is one of solutions, because it embraces a decentralized system and the entire database are owned by many users. Blockchain itself has been used in the Bitcoin system known as the decentralized Bank system. By adopting blockchain in the distribution of databases on e-voting systems can reduce one of the cheating sources of database manipulation. This research discusses t...
Journal of Advanced Research in Dynamical and Control Systems, 2019
Advances in Computing Applications, 2016
User authentication is essential to provide security that restricts access to system and data res... more User authentication is essential to provide security that restricts access to system and data resources. Automated recognition of individuals based on their biological and behavioral characteristics is referred as biometric system. Recognition of legitimate user depends upon a feature vector(s) extracted from either their distinguishing behavioral or both distinguishing behavioral and physiological traits such as face, finger, speech, iris and gait. Research on biometrics has distinctly increased for solving identification and authentication issues in forensics, physical and computer security, custom and immigration. However, unimodal biometric system is not able to fulfill reliability constraints, speed and acceptability of authentication in real applications due to noise in sensed data, spoof attacks, data quality, lack of distinctiveness, restricted degree of freedom, non-universality and other factors. Therefore, multimodal biometric systems are used to increase security as well as better performance. To establish the identity of individuals, multimodal biometric systems unite the information presented by multiple biometric sensor, samples, algorithms, units and traits. Multimodal biometric systems are not only used for enhancing matching performance, but these systems also provide improved people coverage, discourage deceiving, make possible continuous monitoring and impart fault tolerance to biometric applications. This paper presents an overview of different multimodal biometric (multibiometric) systems and their fusion techniques with respect to their performance.
Software-Defined Networks (SDN) has been deployed on production networks such as datacenter netwo... more Software-Defined Networks (SDN) has been deployed on production networks such as datacenter networks. Current SDN is based on OpenFlow technology that is a set of network flow control API for switch devices. In past few years, the shift from fully distributed control planes to logically centralized network control has many challenges. As centralizing management functions simplifies network management, logically centralized control planes tend to face limitations in scalability. We are using Locator/ID separation Protocol (LISP) to implement a network virtualization solution that also provides decoupling of the control plane from the data plane. LISP architecture has Mapping System as main component, where policies can be defined programmatically. We propose a new architecture based on Software Defined Networking (SDN) concept, in the context of Network virtualization, a Mapping Service can be queried by LISP-enabled network devices (virtual/physical) to provide the mapping service o...
2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp), 2017
Most recently popular biometrie systems are based on recognition and classification of unique scl... more Most recently popular biometrie systems are based on recognition and classification of unique sclera and iris patterns. Unique pattern of blood veins explore the interest in sclera recognition for person identification. However sclera segmentation of relaxed eye images in condition such as different stare direction, at-a-distance image and on-the-move image widely enquired. The drawback of iris is off angle imaging where position of iris and center for off angle imagining affect the performance of sclera segmentation in terms of accuracy. Another challenge in sclera segmentation and iris recognition is high resolution and dark images which causes draining process for mobile application. So we proposed a new method which is the fusion of both iris and sclera. In proposed system sclera and iris descriptor value are fuse together for reliable and accurate iris recognition system. The proposed method will test the execution of iris recognition system for different fusion model using iri...
Biometrics is seen as a viable solution to ageing password based authentication on smartphones. F... more Biometrics is seen as a viable solution to ageing password based authentication on smartphones. Fingerprint biometric is leading the biometric technology for smartphones, however, owing to its high cost, major players in mobile industry are introducing fingerprint sensors only on their flagship devices, leaving most of their other devices without a fingerprint sensor. Cameras on the other hand have been seeing a constant upgrade in sensor and supporting hardware, courtesy of ‘selfies’ on all smartphones. Face, iris and visible vasculature are three biometric traits that can be captured in visible spectrum using existing cameras on smartphone. Current biometric recognition systems on smartphones rely on a single biometric trait for faster authentication thereby increasing the probability of failure to enroll, affecting the usability of the biometric system for practical purposes. While multibiometric system mitigates this problem, computational models for multimodal biometrics recogn...
User authentication is essential to provide security that restricts access to system and data res... more User authentication is essential to provide security that restricts access to system and data resources. Biometric system refers to an recognition of legitimate user based on a feature vector(s) derived from their distinguishing behavioral and/or physiological traits like face, finger, speech iris, gait, etc., Research on biometrics has distinctly increased for solving identification and authentication issues in forensics, physical and computer security , custom and immigration, However, unimodal biometric system is not able to satisfy acceptability, speed, and reliability constraints of authentication in real applications due to noise in sensed data, spoof attacks, data quality, lack of distinctiveness, restricted degree of freedom, non-universality and other factors. Therefore multimodal biometric systems are used to increase security as well as better performance. This paper presents overview of different multimodal biometric (multibiometric) systems and their fusion techniques w...
International Journal of Scientific Research in Science and Technology, 2021
Anomaly Detection is identification of suspicious human behavior using real-time CCTV video. Huma... more Anomaly Detection is identification of suspicious human behavior using real-time CCTV video. Human Anomaly Behavior has been studied as one of the main problems of computer vision for more than 15 years. It is important because of the sheer number of applications that can benefit from activity detection. For applications such as image monitoring, object tracking and formed to oversee, sign language identification, advanced human contact, and less motion capture markers, for example, human pose estimates are used. Low-cost depth sensors have disadvantages, such as restricted indoor use, and with low resolution and noisy depth information, it is difficult to estimate human poses from deep images. The proposed system therefore plans to use neural networks to solve these problems. Suspicious identification of human activity through video surveillance is an active research area in the field of image recognition and computer vision. Human activities can be monitored by video surveillance ...
International Journal of Scientific Research in Science and Technology, 2021
Increasingly digital technology in the present helped many people lives. Unlike the electoral sys... more Increasingly digital technology in the present helped many people lives. Unlike the electoral system, there are many conventional uses of paper in its implementation. The aspect of security and transparency is a threat from still widespread election with the conventional system (offline). General elections still use a centralized system, there is one organization that manages it. Some of the problems that can occur in traditional electoral systems is with an organization that has full control over the database and system, it is possible to tamper with the database of considerable opportunities. Blockchain technology is one of solutions, because it embraces a decentralized system and the entire database are owned by many users. Blockchain itself has been used in the Bitcoin system known as the decentralized Bank system. By adopting blockchain in the distribution of databases on e-voting systems can reduce one of the cheating sources of database manipulation. This research discusses t...
International Journal of Scientific Research in Science and Technology, 2021
Anomaly Detection is system which identifies inappropriate human behavior. One of the major probl... more Anomaly Detection is system which identifies inappropriate human behavior. One of the major problems in computer vision is identifying inappropriate human behavior. It is crucial as activity detection can help many numbers of applications. It can benefit applications like image monitoring, sign language recognization, object pursue and many more. Many alternatives are there such as low-cost depth sensors, but they do have some drawbacks such as limited indoor use also with lower resolution and clamorous depth information from deep images, it becomes nearly impossible to assess human poses. In order to resolve the above issues, the proposed system plans to utilize neural networks. One of the major research area is to recognize suspicious human behavior in video monitoring, in the field of computer vision. Several surveillance cameras are situated at places like airports, banks, bus station, malls, railway station, colleges, schools, etc to detect suspicious activities such as murder,...
Existing iris recognition system provides accurate and reliable results based on Near Infrared Im... more Existing iris recognition system provides accurate and reliable results based on Near Infrared Images when images are captured under constrained environment with user cooperation from fixed distance. But the performance of iris recognition system degrades for color eye images acquired under visible wavelength without user cooperation due to noise occurrence such as blur eye images, eyelash, occlusion and reflection. This paper present the multimodal eye biometric system based on support value based fusion for iris, sclera and pupil features depending on their match score value. Support value for iris, sclera and pupil is calculated using the log Gabor features, Y-shaped features and color histogram features. The robustness of proposed eye biometric system is tested on UBIRIS.V2 database for noisy eye images taken under unconstrained environment in visible wavelength. The propose algorithm significantly improve the accuracy of person authentication by reducing the time for segmentati...
MANET (Mobile ad hoc network) is a collection of mobile nodes which communicate with each other d... more MANET (Mobile ad hoc network) is a collection of mobile nodes which communicate with each other directly or via other nodes which works as router. Nodes in MANET can move independently in any direction so the topology changes rapidly and unpredictably over time. Routing protocols of MANETs are designed considering that all participating nodes collaborate and communicate in harmony. However, participating nodes need energy and other resources to perform network functions, which can lead to misbehavior of node. Misbehaving nodes degrades network performance. Several acknowledgement based schemes have been proposed to detect misbehaving nodes in MANET. This paper aims at providing the survey and comparison of various acknowledgement schemes which have been proposed to detect misbehavior in MANET. Keywords—MANET, Misbehaving Nodes, Ad Hoc Networks, ACK.
International Journal of Innovative Technology and Exploring Engineering
Recent advancement in biometric system prefer multimodal biometric system instead of single biome... more Recent advancement in biometric system prefer multimodal biometric system instead of single biometric system to overcome challenges faced by unimodal biometric system such as intra class variation, noise sensitivity, non universality, spoofing attack, etc. Most of the existing iris biometric systems are dependent on ideal condition which needs user cooperation during image acquisition with help of NIR camera to avoid noise. Such system performance significantly degrades when images are taken under visible light without user cooperation called unconstrained environment. Proposed multi modal eye biometric system provides improvement in segmentation accuracy using entropy based convolution neural network (E-CNN) based on contour feature. It also reduces the time required for segmentation up to 0.9second. Multi algorithmic feature extraction for color, texture features of iris and pupil and Y-shaped features of sclera exploit the improvement in feature extraction performance. Proposed f...
TELKOMNIKA (Telecommunication Computing Electronics and Control)
In today's sensitive environment, for personal authentication, iris recognition is the mo... more In today's sensitive environment, for personal authentication, iris recognition is the most attentive technique among the various biometric technologies. One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil and sclera of a captured eye-image. In our proposed method, initially input image is preprocessed by using bilateral filtering. After the preprocessing of images contour based features such as, brightness, color and texture features are extracted. Then entropy is measured based on the extracted contour based features to effectively distinguishing the data in the images. Finally, the convolution neural network (CNN) is used for the effective sclera, iris and pupil parts segmentations based on the entropy measure. The proposed results are analyzed to demonstrate the better performance of the proposed segmentation method than the existing methods.
IOSR Journal of Electronics and Communication Engineering, 2013