F: Graphics & Vision

F: Graphics & Vision (133)

GJCST: F

In the world we live in today we can safely say that the internet revolution, digital representation and transportation of data had offered efficient solution for information delivery. But these phenomenal developments brought their own concern and problems in area of searching, security, monitoring and use of information by qualified end users. In early days the information was generall...
Paper Information
Authors Muqaddas Bin Tahir
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 30

In this paper we proposed, a novel framework to assist and automate the diagnosis of diseases from computer-based image analysis method using Content-based image retrieval (CBIR). CBIR is the process of retrieving related images from large database collections by using low level image features such as color, texture and shape etc. we have used fuzzy texton and discrete shearlet transform...
Paper Information
Authors Sudhakar Putheti, Mohan Krishna kotha,Srinivasa Reddy Edara
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 22

Automatic classification of brain tumor is area of concern from last few decades for better perceptive analysis in accurate manner. In this paper an automatic brain tumor classification approach namely probabilistic neural network are proposed with image and data processing techniques. The conventional algorithms which are reported in the literature are not automatic in nature and mainly...
Paper Information
Authors Adapala Praveen Kumar,J Krishna Chaithanya
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 13

Pathfinding has been one of major research areas in video games for many years. It is a key problem that most of the video games are confronted with. Search algorithms such as the A* algorithm and the Dijkstra’s algorithm representing such regular grid, visibility graphs also have significant impact on the performance. This paper reviews the current widely used solutions...
Paper Information
Authors Geethu Elizebeth Mathew, Mrs. G.Malathy
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 7

An Image fusion is the development of amalgamating two or more image of common characteristic to form a single image which acquires all the essential features of original image. Nowadays lots of work is going to be done on the field of image fusion and also used in various application such as medical imaging and multi spectra sensor image fusing etc. For fusing the image various techniqu...
Paper Information
Authors Vinay Sahu, Dinesh Sahu
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 28

In this paper the suitability of Dual Tree Complex Wavelet Transform for pose invariant Face Recognition is studied and a feature extraction frame work is proposed. This proposed framework will aid in design of Face Recognition system to address the challenging issue like Pose Variation. In contrast to the discrete wavelet Transform (DWT) the design of Dual Tree Complex Wavelet Transform...
Paper Information
Authors K. Punnam Chandar, T. Satyasavithri
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 20

Illumination is an important concept in computer science application. A good tracker should perform well in a large number of videos involving illumination changes, occlusion, clutter, camera motion, low contrast, specularities and at least six more aspects. By using the review approach, our tracker is able to adapt to irregular illumination variations and abrupt changes of brightness. I...
Paper Information
Authors Kalpesh R Ranipa, Dr. Kiritkumar Bhatt
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 13

Today, because of the vulnerability of standard authentication system, law-breaking has accumulated within the past few years. Identity authentication that relies on biometric feature like face, iris, voice, hand pure mathematics, handwriting, retina, fingerprints will considerably decrease the fraud, so that they square measure being replaced by identity verification mechanisms. Among b...
Paper Information
Authors P,Sreenivasa Moorthy
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 7

This paper about the study of Secure message Recovery and batch verification using Digital Signature. Security is increased in batch verification through triple DES algorithm. Encryption is used for the Security in which the plaintext is transforming into the cipher text. A digital signature scheme involves two phases, the signature generation phase which is performed at the sender side ...
Paper Information
Authors Makkar,Sarika, Thakral,Silvi
Read Journal Click Here
Read Paper Click Here
Page No. 55 to 57

The characters of any languages having scripts are formed by basic units called primitives. It is necessary to practice writing the primitives and their appropriate combinations while writing different characters. In order to automate character generation, primitives‟ recognition becomes important. In this paper, we propose a zone-features based nearest neighbor classificat...
Paper Information
Authors Basavaraj. S. Anami, Deepa S Garag, P. Shivakumara
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 54