varsha dange - Academia.edu (original) (raw)
Papers by varsha dange
Object Detection is one of the important entities in the field of Computer Vision with a large nu... more Object Detection is one of the important entities in the field of Computer Vision with a large number of applications. This project demonstrates Object detection using You Only Look Once (YOLO) Algorithm, version 3. YOLOv3 method is prominently used in object detection methods which are based on Deep Learning. It uses k-means cluster method for creating bounding boxes of specific height and width, which are used for predicting output. The model training is based on the Common Object in Context (COCO) Dataset. The dataset has around 164K images based on 80 categories, also called as classes. Thus, this object detection model takes an image from the user and then with the help of YOLO algorithm, predicts the types of objects present in that image and marks them accurately., the lower complex CNN model achieves an accuracy of 0.93.
IJETT, Jul 8, 2017
MANET is determined as a network that has many free autonomous nodes that can move locations and ... more MANET is determined as a network that has many free autonomous nodes that can move locations and configure itself to various networks and operate without any centralized administration. Some MANETs are restricted to a local area of wireless devices (such as a group of laptop computers), while others may be connected to the Internet. For example, A VANET (Vehicular Ad Hoc Network), is a type of MANET that allows vehicles to communicate with roadside equipment. Because of the dynamic nature of MANETs, they are typically not very secure, so it is important to be cautious what data is sent over a MANET. There are various applications of MANET, In Commercial Sector: e.g. in fire, flood, or earthquake. Local Level: e.g. conference or classroom. In MANET, congestion can take place between two intermediate nodes, occurs when bandwidth is insufficient and network data traffic exceeds capacity. This paper mainly studies and compares the performance of MANET routing protocols namely PSR, DSR, DSDV and AODV under various traffic loads with various maximum TCP congestion window size to improve congestion control in the routing. The metrics used to compare routing protocol performance are packet delivery ratio, average routing load, the average end-to-end time required with delay and average network throughput and mainly to overcome congestion situation and avoid packet loss in wireless networks. Index Terms-Congestion control, Mobile Ad Hoc Networks (MANET), On-demand (reactive) routing protocol, Packet Delivery Ratio, Table-driven (proactive) routing protocol.
International Journal of Innovative Research in Computer and Communication Engineering, Oct 30, 2016
2022 International Conference on Emerging Smart Computing and Informatics (ESCI)
Object Detection is one of the important entities in the field of Computer Vision with a large nu... more Object Detection is one of the important entities in the field of Computer Vision with a large number of applications. This project demonstrates Object detection using You Only Look Once (YOLO) Algorithm, version 3. YOLOv3 method is prominently used in object detection methods which are based on Deep Learning. It uses k-means cluster method for creating bounding boxes of specific height and width, which are used for predicting output. The model training is based on the Common Object in Context (COCO) Dataset. The dataset has around 164K images based on 80 categories, also called as classes. Thus, this object detection model takes an image from the user and then with the help of YOLO algorithm, predicts the types of objects present in that image and marks them accurately., the lower complex CNN model achieves an accuracy of 0.93.
MANET is determined as a network that has many free autonomous nodes that can move locations and ... more MANET is determined as a network that has many free autonomous nodes that can move locations and configure itself to various networks and operate without any centralized administration. Some MANETs are restricted to a local area of wireless devices (such as a group of laptop computers), while others may be connected to the Internet. For example, A VANET (Vehicular Ad Hoc Network), is a type of MANET that allows vehicles to communicate with roadside equipment. Because of the dynamic nature of MANETs, they are typically not very secure, so it is important to be cautious what data is sent over a MANET. There are various applications of MANET, In Commercial Sector: e.g. in fire, flood, or earth-quake. Local Level: e.g. conference or classroom. In MANET, congestion can take place between two intermediate nodes, occurs when bandwidth is insufficient and network data traffic exceeds capacity. This paper mainly studies and compares the performance of MANET routing protocols namely PSR, DSR,...
In today’s world security become a major issue, so it is very important to hide the data in such ... more In today’s world security become a major issue, so it is very important to hide the data in such a way that attacker cannot access it. Data is mostly in form of text, image, audio and video. So steganography is a best scheme for hiding the data from attacker. Steganography is a one type of algorithm that can be applied on text, image, audio and video file and the secret data generally in form of text, image, audio and video. The method of hiding secret information in video file is called video steganography. In this paper a review on different video steganography technique are discussed. Different spatial domain, frequency domain techniques of video steganography have been presented in this paper.
With the popularity of outsourcing data to the server, it is essential to secure the protection o... more With the popularity of outsourcing data to the server, it is essential to secure the protection of data and empower the server to effortlessly deal with the data in the meantime. Under such demands, reversible data hiding away in encrypted multimedia (image, audio also, video) draws in more analysts consideration. Existing framework proposes a novel structure for RDH-EI based on reversible image transformation (RIT). In this paper reversible transformation is carried on data and it is encrypted utilizing AES algorithm and again it is hidden into media document utilizing powerful BPCS algorithm. Again this hid media document is encoded utilizing standard AES algorithm. Also, it applies turn around operations at the recipient's side. Generally operations give a productivity and strength to the framework. RIT-based structure permits the user to transform the content of unique image into the content of another objective image with a similar size. The transformed image, which looks l...
Traditional encryption techniques are just converting the readable images into some unreadable fo... more Traditional encryption techniques are just converting the readable images into some unreadable format i.e. cipher text format. This encrypted cipher text can be very conveniently transmitted over the network, but anyone who gets the key can easily get the secret encrypted message from cipher text. But the new Secret sharing scheme is a process of sharing and transmitting the images over the network. But the major drawback over here is that transmitting images over network pulls attackers attention as the images are in noise like format. In the recent study, many researchers tried to make the VSS system more secure. This paper presents the survey of the studies done earlier and thereby analyses the drawbacks and proposed a new technique considering VSS.
International Journal of Advanced Technology and Engineering Exploration, 2018
International Journal of Innovative Research in Computer and Communication Engineering, 2016
A mobile ad hoc network (MANET) is determined as a network that has many free autonomous nodes i.... more A mobile ad hoc network (MANET) is determined as a network that has many free autonomous nodes i.e. that can move locations and configure itself. It is often composed of mobile devices that can arrange themselves in various ways using wireless connections such as a cellular or satellite transmission to connect to various networks and operate without strict top-down network or any centralized administration. There are various applications of MANET, In Commercial Sector: Ad hoc can be implemented in emergency, rescue operations for disaster relief efforts, e.g. in fire, flood, or earthquake. Local Level: e.g. conference or classroom. In mobile ad hoc network, congestion can take place between two intermediate nodes, Congestion occurs when bandwidth is insufficient and network data traffic exceeds capacity. This paper mainly studies and compares the performance of MANET routing protocols namely PSR, DSR, DSDV and AODV under various traffic loads with various maximum TCP congestion window size to improve congestion control in the routing. The metrics used to compare routing protocol performance are packet delivery ratio, average routing load, the average end-to-end time required with delay and average network throughput and mainly to overcome congestion situation and avoid packet loss in wireless networks.
A trademarks is a mark that you can use to recognize your business products or services from thos... more A trademarks is a mark that you can use to recognize your business products or services from those of other vendors. It can be represented graphically in the form of any Symbol, logo, words etc. so, they need to be protection. The conceptual similarities among trademarks, which happens when more than two or more trademark similar. Trademarks are possessory words and images with high reputation they are main assets, often used as a application, which need infringement protection. The problems considered until infringement cases is the aspects, hypothetic and phonetic similarity of various trademarks. This paper focuses on important aspect by proposing a conceptual similarity of trademarks that can be provide distance computation and suggestions of input retrieving conceptually similar trademarks. The search and indexing technique developed uses similarity distance, which is derived using of similarity trademark. Propose a computational approach based on semantics that can be used to ...
International Journal for Research in Applied Science and Engineering Technology
Automatic voice detection of baby cry plays an outstanding role in different applications for sma... more Automatic voice detection of baby cry plays an outstanding role in different applications for smart monitoring of smart baby condition. In this proposed model, a baby's cry is being detected and a music player will be played after detection in order to create a soothing environment for the baby. This system employs a machine learning approach to recognize newborn cry sounds in a variety of residential settings under difficult situations. The automatic detection of a baby cry can be used in a variety of situations involving various types of sounds in the environment. The proposed system also provided with alert-based notifications to parents. Also, in commercial used products such as remote monitoring of baby, baby facial recognition as well as in medical applications. Also, evaluate K-Nearest Neighbours (KNN) algorithm for baby cry detection and perform priority queue functions for playing music. In this system, the input consists of the cry sound with k nearest training samples in the database. The output is depended on analysis of the cry-detection performance with KNN which is used for classification.
Object Detection is one of the important entities in the field of Computer Vision with a large nu... more Object Detection is one of the important entities in the field of Computer Vision with a large number of applications. This project demonstrates Object detection using You Only Look Once (YOLO) Algorithm, version 3. YOLOv3 method is prominently used in object detection methods which are based on Deep Learning. It uses k-means cluster method for creating bounding boxes of specific height and width, which are used for predicting output. The model training is based on the Common Object in Context (COCO) Dataset. The dataset has around 164K images based on 80 categories, also called as classes. Thus, this object detection model takes an image from the user and then with the help of YOLO algorithm, predicts the types of objects present in that image and marks them accurately., the lower complex CNN model achieves an accuracy of 0.93.
IJETT, Jul 8, 2017
MANET is determined as a network that has many free autonomous nodes that can move locations and ... more MANET is determined as a network that has many free autonomous nodes that can move locations and configure itself to various networks and operate without any centralized administration. Some MANETs are restricted to a local area of wireless devices (such as a group of laptop computers), while others may be connected to the Internet. For example, A VANET (Vehicular Ad Hoc Network), is a type of MANET that allows vehicles to communicate with roadside equipment. Because of the dynamic nature of MANETs, they are typically not very secure, so it is important to be cautious what data is sent over a MANET. There are various applications of MANET, In Commercial Sector: e.g. in fire, flood, or earthquake. Local Level: e.g. conference or classroom. In MANET, congestion can take place between two intermediate nodes, occurs when bandwidth is insufficient and network data traffic exceeds capacity. This paper mainly studies and compares the performance of MANET routing protocols namely PSR, DSR, DSDV and AODV under various traffic loads with various maximum TCP congestion window size to improve congestion control in the routing. The metrics used to compare routing protocol performance are packet delivery ratio, average routing load, the average end-to-end time required with delay and average network throughput and mainly to overcome congestion situation and avoid packet loss in wireless networks. Index Terms-Congestion control, Mobile Ad Hoc Networks (MANET), On-demand (reactive) routing protocol, Packet Delivery Ratio, Table-driven (proactive) routing protocol.
International Journal of Innovative Research in Computer and Communication Engineering, Oct 30, 2016
2022 International Conference on Emerging Smart Computing and Informatics (ESCI)
Object Detection is one of the important entities in the field of Computer Vision with a large nu... more Object Detection is one of the important entities in the field of Computer Vision with a large number of applications. This project demonstrates Object detection using You Only Look Once (YOLO) Algorithm, version 3. YOLOv3 method is prominently used in object detection methods which are based on Deep Learning. It uses k-means cluster method for creating bounding boxes of specific height and width, which are used for predicting output. The model training is based on the Common Object in Context (COCO) Dataset. The dataset has around 164K images based on 80 categories, also called as classes. Thus, this object detection model takes an image from the user and then with the help of YOLO algorithm, predicts the types of objects present in that image and marks them accurately., the lower complex CNN model achieves an accuracy of 0.93.
MANET is determined as a network that has many free autonomous nodes that can move locations and ... more MANET is determined as a network that has many free autonomous nodes that can move locations and configure itself to various networks and operate without any centralized administration. Some MANETs are restricted to a local area of wireless devices (such as a group of laptop computers), while others may be connected to the Internet. For example, A VANET (Vehicular Ad Hoc Network), is a type of MANET that allows vehicles to communicate with roadside equipment. Because of the dynamic nature of MANETs, they are typically not very secure, so it is important to be cautious what data is sent over a MANET. There are various applications of MANET, In Commercial Sector: e.g. in fire, flood, or earth-quake. Local Level: e.g. conference or classroom. In MANET, congestion can take place between two intermediate nodes, occurs when bandwidth is insufficient and network data traffic exceeds capacity. This paper mainly studies and compares the performance of MANET routing protocols namely PSR, DSR,...
In today’s world security become a major issue, so it is very important to hide the data in such ... more In today’s world security become a major issue, so it is very important to hide the data in such a way that attacker cannot access it. Data is mostly in form of text, image, audio and video. So steganography is a best scheme for hiding the data from attacker. Steganography is a one type of algorithm that can be applied on text, image, audio and video file and the secret data generally in form of text, image, audio and video. The method of hiding secret information in video file is called video steganography. In this paper a review on different video steganography technique are discussed. Different spatial domain, frequency domain techniques of video steganography have been presented in this paper.
With the popularity of outsourcing data to the server, it is essential to secure the protection o... more With the popularity of outsourcing data to the server, it is essential to secure the protection of data and empower the server to effortlessly deal with the data in the meantime. Under such demands, reversible data hiding away in encrypted multimedia (image, audio also, video) draws in more analysts consideration. Existing framework proposes a novel structure for RDH-EI based on reversible image transformation (RIT). In this paper reversible transformation is carried on data and it is encrypted utilizing AES algorithm and again it is hidden into media document utilizing powerful BPCS algorithm. Again this hid media document is encoded utilizing standard AES algorithm. Also, it applies turn around operations at the recipient's side. Generally operations give a productivity and strength to the framework. RIT-based structure permits the user to transform the content of unique image into the content of another objective image with a similar size. The transformed image, which looks l...
Traditional encryption techniques are just converting the readable images into some unreadable fo... more Traditional encryption techniques are just converting the readable images into some unreadable format i.e. cipher text format. This encrypted cipher text can be very conveniently transmitted over the network, but anyone who gets the key can easily get the secret encrypted message from cipher text. But the new Secret sharing scheme is a process of sharing and transmitting the images over the network. But the major drawback over here is that transmitting images over network pulls attackers attention as the images are in noise like format. In the recent study, many researchers tried to make the VSS system more secure. This paper presents the survey of the studies done earlier and thereby analyses the drawbacks and proposed a new technique considering VSS.
International Journal of Advanced Technology and Engineering Exploration, 2018
International Journal of Innovative Research in Computer and Communication Engineering, 2016
A mobile ad hoc network (MANET) is determined as a network that has many free autonomous nodes i.... more A mobile ad hoc network (MANET) is determined as a network that has many free autonomous nodes i.e. that can move locations and configure itself. It is often composed of mobile devices that can arrange themselves in various ways using wireless connections such as a cellular or satellite transmission to connect to various networks and operate without strict top-down network or any centralized administration. There are various applications of MANET, In Commercial Sector: Ad hoc can be implemented in emergency, rescue operations for disaster relief efforts, e.g. in fire, flood, or earthquake. Local Level: e.g. conference or classroom. In mobile ad hoc network, congestion can take place between two intermediate nodes, Congestion occurs when bandwidth is insufficient and network data traffic exceeds capacity. This paper mainly studies and compares the performance of MANET routing protocols namely PSR, DSR, DSDV and AODV under various traffic loads with various maximum TCP congestion window size to improve congestion control in the routing. The metrics used to compare routing protocol performance are packet delivery ratio, average routing load, the average end-to-end time required with delay and average network throughput and mainly to overcome congestion situation and avoid packet loss in wireless networks.
A trademarks is a mark that you can use to recognize your business products or services from thos... more A trademarks is a mark that you can use to recognize your business products or services from those of other vendors. It can be represented graphically in the form of any Symbol, logo, words etc. so, they need to be protection. The conceptual similarities among trademarks, which happens when more than two or more trademark similar. Trademarks are possessory words and images with high reputation they are main assets, often used as a application, which need infringement protection. The problems considered until infringement cases is the aspects, hypothetic and phonetic similarity of various trademarks. This paper focuses on important aspect by proposing a conceptual similarity of trademarks that can be provide distance computation and suggestions of input retrieving conceptually similar trademarks. The search and indexing technique developed uses similarity distance, which is derived using of similarity trademark. Propose a computational approach based on semantics that can be used to ...
International Journal for Research in Applied Science and Engineering Technology
Automatic voice detection of baby cry plays an outstanding role in different applications for sma... more Automatic voice detection of baby cry plays an outstanding role in different applications for smart monitoring of smart baby condition. In this proposed model, a baby's cry is being detected and a music player will be played after detection in order to create a soothing environment for the baby. This system employs a machine learning approach to recognize newborn cry sounds in a variety of residential settings under difficult situations. The automatic detection of a baby cry can be used in a variety of situations involving various types of sounds in the environment. The proposed system also provided with alert-based notifications to parents. Also, in commercial used products such as remote monitoring of baby, baby facial recognition as well as in medical applications. Also, evaluate K-Nearest Neighbours (KNN) algorithm for baby cry detection and perform priority queue functions for playing music. In this system, the input consists of the cry sound with k nearest training samples in the database. The output is depended on analysis of the cry-detection performance with KNN which is used for classification.