Sudha Yadav - Academia.edu (original) (raw)
Papers by Sudha Yadav
International Journal of Computer Applications, 2016
Degradation of images is one of the major problems in image processing. Blur in images is an unwa... more Degradation of images is one of the major problems in image processing. Blur in images is an unwanted reduction in bandwidth which degrades the image quality and it is difficult to avoid. Blur occur due to atmospheric turbulence as well as improper setting of camera. Along with blur effects, noise also corrupts the captured image. Restoration of image is a technique to get rid of the blur from the degraded image and recover the original image. Blur can be of various types like Gaussian blur, motion blur etc. Now a day's there are various different techniques and methods have been proposed to deblur a degraded image. For specific types of blur there are specific methods to remove it. Image restoration has applications in various different-different fields like medical imaging, forensic science, and astronomy. In this paper, we will discuss various image deblurring techniques and their analysis of performance.
International Journal of Computer Applications, 2015
In computer science, mutual exclusion (MUTEX) refers to a way of making sure that if one process ... more In computer science, mutual exclusion (MUTEX) refers to a way of making sure that if one process is using shared modifiable data or resources then the other processes will be excluded from doing the same thing at the same time. A number of mutual exclusion algorithms are available in the literature, with different performance metrics and with different techniques. The Selection for a "good" mutual exclusion algorithm is a key point. These mutual exclusion algorithms can be broadly classified into token and non-token based algorithm. This paper surveys the algorithms which have been reported in the literature for Mutual exclusion in distributed systems and their comparison.
Degradation of images is one of the major problems in image processing. Blur in images is an unwa... more Degradation of images is one of the major problems in image processing. Blur in images is an unwanted reduction in bandwidth which degrades the image quality and it is difficult to avoid. Blur occur due to atmospheric turbulence as well as improper setting of camera. Along with blur effects, noise also corrupts the captured image. Restoration of image is a technique to get rid of the blur from the degraded image and recover the original image. Blur can be of various types like Gaussian blur, motion blur etc. Now a day's there are various different techniques and methods have been proposed to deblur a degraded image. For specific types of blur there are specific methods to remove it. Image restoration has applications in various different-different fields like medical imaging, forensic science, and astronomy. In this paper, we will discuss various image deblurring techniques and their analysis of performance.
In computer science, mutual exclusion (MUTEX) refers to a way of making sure that if one process ... more In computer science, mutual exclusion (MUTEX) refers to a way of making sure that if one process is using shared modifiable data or resources then the other processes will be excluded from doing the same thing at the same time. A number of mutual exclusion algorithms are available in the literature, with different performance metrics and with different techniques. The Selection for a " good " mutual exclusion algorithm is a key point. These mutual exclusion algorithms can be broadly classified into token and non-token based algorithm. This paper surveys the algorithms which have been reported in the literature for Mutual exclusion in distributed systems and their comparison.
A distributed system is a collection of independent entities that cooperate to solve a problem th... more A distributed system is a collection of independent entities that cooperate to solve a problem that cannot be
individually solved. Checkpoint is defined as a fault tolerant technique. It is a save state of a process during the
failure-free execution, enabling it to restart from this checkpointed state upon a failure to reduce the amount of
lost work instead of repeating the computation from beginning. The process of restoring form previous
checkpointed state is known as rollback recovery. A checkpoint can be saved on either the stable storage or the
volatile storage depending on the failure scenarios to be tolerated. Checkpointing is major challenge in mobile ad
hoc network. The mobile ad hoc network architecture is one consisting of a set of self configure mobile hosts(MH)
capable of communicating with each other without the assistance of base stations, some of processes running on
mobile host. The main issues of this environment are insufficient power and limited storage capacity. This paper
surveys the algorithms which have been reported in the literature for checkpointing in distributed systems as well
as Mobile Distributed systems.
Keywords – Checkpointing, Distributed systems, Fault tolerance, Mobile computing system, Rollback recovery.
Delete by Sudha Yadav
International Journal of Computer Applications, 2016
Degradation of images is one of the major problems in image processing. Blur in images is an unwa... more Degradation of images is one of the major problems in image processing. Blur in images is an unwanted reduction in bandwidth which degrades the image quality and it is difficult to avoid. Blur occur due to atmospheric turbulence as well as improper setting of camera. Along with blur effects, noise also corrupts the captured image. Restoration of image is a technique to get rid of the blur from the degraded image and recover the original image. Blur can be of various types like Gaussian blur, motion blur etc. Now a day's there are various different techniques and methods have been proposed to deblur a degraded image. For specific types of blur there are specific methods to remove it. Image restoration has applications in various different-different fields like medical imaging, forensic science, and astronomy. In this paper, we will discuss various image deblurring techniques and their analysis of performance.
International Journal of Computer Applications, 2015
In computer science, mutual exclusion (MUTEX) refers to a way of making sure that if one process ... more In computer science, mutual exclusion (MUTEX) refers to a way of making sure that if one process is using shared modifiable data or resources then the other processes will be excluded from doing the same thing at the same time. A number of mutual exclusion algorithms are available in the literature, with different performance metrics and with different techniques. The Selection for a "good" mutual exclusion algorithm is a key point. These mutual exclusion algorithms can be broadly classified into token and non-token based algorithm. This paper surveys the algorithms which have been reported in the literature for Mutual exclusion in distributed systems and their comparison.
Degradation of images is one of the major problems in image processing. Blur in images is an unwa... more Degradation of images is one of the major problems in image processing. Blur in images is an unwanted reduction in bandwidth which degrades the image quality and it is difficult to avoid. Blur occur due to atmospheric turbulence as well as improper setting of camera. Along with blur effects, noise also corrupts the captured image. Restoration of image is a technique to get rid of the blur from the degraded image and recover the original image. Blur can be of various types like Gaussian blur, motion blur etc. Now a day's there are various different techniques and methods have been proposed to deblur a degraded image. For specific types of blur there are specific methods to remove it. Image restoration has applications in various different-different fields like medical imaging, forensic science, and astronomy. In this paper, we will discuss various image deblurring techniques and their analysis of performance.
In computer science, mutual exclusion (MUTEX) refers to a way of making sure that if one process ... more In computer science, mutual exclusion (MUTEX) refers to a way of making sure that if one process is using shared modifiable data or resources then the other processes will be excluded from doing the same thing at the same time. A number of mutual exclusion algorithms are available in the literature, with different performance metrics and with different techniques. The Selection for a " good " mutual exclusion algorithm is a key point. These mutual exclusion algorithms can be broadly classified into token and non-token based algorithm. This paper surveys the algorithms which have been reported in the literature for Mutual exclusion in distributed systems and their comparison.
A distributed system is a collection of independent entities that cooperate to solve a problem th... more A distributed system is a collection of independent entities that cooperate to solve a problem that cannot be
individually solved. Checkpoint is defined as a fault tolerant technique. It is a save state of a process during the
failure-free execution, enabling it to restart from this checkpointed state upon a failure to reduce the amount of
lost work instead of repeating the computation from beginning. The process of restoring form previous
checkpointed state is known as rollback recovery. A checkpoint can be saved on either the stable storage or the
volatile storage depending on the failure scenarios to be tolerated. Checkpointing is major challenge in mobile ad
hoc network. The mobile ad hoc network architecture is one consisting of a set of self configure mobile hosts(MH)
capable of communicating with each other without the assistance of base stations, some of processes running on
mobile host. The main issues of this environment are insufficient power and limited storage capacity. This paper
surveys the algorithms which have been reported in the literature for checkpointing in distributed systems as well
as Mobile Distributed systems.
Keywords – Checkpointing, Distributed systems, Fault tolerance, Mobile computing system, Rollback recovery.