Beruflich Dokumente
Kultur Dokumente
Ph: 9949981281
PROJECT ABSTRACTS FOR YOUR
EASY REFERENCE
IEEE PAPERS
2009, 2008, 2007 and so on…
2|Page #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
IMAGE SEGMENTATION USING ITERATIVE
WATERSHEDING PLUS RIDGE DETECTION
3|Page #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
HIERARCHICAL CONTOUR MATCHING FOR
DENTAL X-RAY RADIOGRAPHS
Received 6 October 2006; received in revised form 9 April 2007; accepted 18 May 2007
After matching all the teeth in the PM image, voting is used to obtain a list of
best matches for the PM query image based upon the matching results of the
individual teeth. Analysis of the time complexity of the proposed algorithm
prove that the hierarchical matching significantly reduces the search space
and consequently the retrieval time is reduced. The experimental results on a
database of 187 AM images show that the algorithm is robust for identifying
individuals based on their dental radiographs.
4|Page #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
RECONSTRUCTION OF UNDERWATER IMAGE
BY BISPECTRUM
Results show that our algorithm is very promising. Such technique has
wide applications to areas such as ocean study and submarine
observation.
5|Page #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
AUTOMATIC RECOGNITION OF EXUDATIVE
MACULOPATHY USING FUZZY CMEANS
CLUSTERING AND NEURAL NETWORKS
6|Page #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
International Conference on Computer Systems and Technologies -
CompSysTech’07
The Paper justifies need to work with new technology for perfect safety in
specific area of the human deal (the business).
In this directions will lay each leading security system and modern
password with electronic document and key system of the passage with
modern cryptographic system. We discuss one problem with
watermarks, used biometric code for perfect the algorithm of the
watermark to safety.
7|Page #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
CALL ADMISSION CONTROL OPTIMIZATION
IN WIMAX NETWORKS
Worldwide interoperability for microwave access (WiMAX) is a promising technology for
lastmile Internet access, particularly in the areas where wired infrastructures are not
available. In a WiMAX network, call admission control (CAC) is deployed to effectively control
different traffic loads and prevent the network from being overloaded.
THERE exist many regions in the world where wired infrastructures (i.e., T 1, DSL, cables,
etc.) are difficult to deploy for geographical or economic reasons. To provide broadband
wireless access to these regions, many researchers advocate worldwide interoperability for
microwave access (WiMAX), which is an IEEE 802.16 standardized wireless technology based
on an orthogonal frequency-division multiplexing (OFDM ) physical-layer architecture.
To support a variety of applications, IEEE 802.16 has defined four types of service:
1) unsolicited grant service (UGS);
2) real-time polling service (rtPS);
3) non-real-time polling service (nrtPS); and
4) best effort (BE) service.
In a WiMAX network with heterogeneous traffic loads, it is essential to find a call admission
control (CAC) solution that can effectively allocate bandwidth resources to different
applications. In this Project, a proposed WiMAX CAC framework, which effectively meets all
operational requirements of WiMAX networks. In this CAC framework, we decompose the 2-D
uplink (UL) and downlink (DL) WiMAX CAC problem into two independent 1-D CAC problems.
We further formulate the 1-D CAC as an optimization problem under a certain objective
function, which should be chosen to maximize either the revenue of service providers or the
satisfaction of subscribers.
With respect to 1-D CAC optimization problems, most previous studies were focused only on
two approaches:
1) the optimal revenue strategy (also known as the stochastic knapsack problem) and
2) the minimum weighted sum of blocking strategy .
In this project, we will show that these two strategies are, in fact, equivalent. Therefore, we
can mainly concentrate on the investigation of the optimal revenue strategy and view the
minimum weighted sum of blocking strategy as the basis for fast calculation algorithms.
Clearly, the optimal revenue policy only considers the profit of service providers. As an
8|Page #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
effort to conduct a multi objective study, in this paper, we will also take into account the
requirements from WiMAX subscribers and develop a policy with a satisfactory tradeoff
between service providers and subscribers.
Modules:
CAC model for WiMAX networks
Calculate the UL and DL capacity
1-D CAC optimization strategies and develop their corresponding approximation algorithms
Simulation graphs:
Traffic arrival vs Revenue
Traffic arrival vs Utility
Blocking probability vs Traffic arrival
9|Page #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
ROBUST DWT-SVD DOMAIN IMAGE
WATERMARKING
Watermarking (data hiding) is the process of embedding data into a
multimedia element such as image, audio or video. This embedded data
can later be extracted from, or detected in, the multimedia for security
purposes. A watermarking algorithm consists of the watermark structure,
an embedding algorithm, and an extraction, or a detection, algorithm.
11 | P a g e #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
information is embedded in the cover image. The detector actually
reconstructs the watermark, and computes its visual quality using an
appropriate measure.
FILTERBANK-BASED
FINGERPRINT MATCHING
With identity fraud in our society reaching unprecedented proportions and with an
increasing emphasis on the emerging automatic personal identification applications,
biometrics-based verification, especially fingerprint-based identification, is receiving a
lot of attention. There are two major shortcomings of the traditional approaches to
fingerprint representation.
We are able to achieve a verification accuracy which is only marginally inferior to the
best results of minutiae-based algorithms published in the open literature. Our
system performs better than a state-of-the-art minutiae-based system when the
performance requirement of the application system does not demand a very low false
acceptance rate. Finally, we show that the matching performance can be improved by
combining the decisions of the matchers based on complementary (minutiae-based
and filter-based) fingerprint information.
12 | P a g e #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
EIGENFACES FOR RECOGNITION
Research on automatic face recognition in images has rapidly
developed into several inter-related lines, and this research has
both lead to and been driven by a disparate and expanding set of
commercial applications.
13 | P a g e #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
PROJECT ABSTRACTS FOR YOUR EASY
REFERENCE
IEEE PAPERS
2009, 2008, 2007 and so on…
14 | P a g e #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
15 | P a g e #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
SPEECH RECOGNITION SYSTEM
FOR ISOLATED WORDS
Speech recognition technology is used more and more for telephone
applications like travel booking and information, financial account
information, customer service call routing, and directory assistance.
The iris remains stable throughout one's lifetime, barring rare disease or
trauma. The random patterns of the iris are the equivalent of a complex
"human barcode," created by a tangled meshwork of connective tissue and
other visible features. The iris recognition process begins with video-based
image acquisition that locates the eye and iris.
The boundaries of the pupil and iris are defined, eyelid occlusion and specular
reflection are discounted, and quality of image is determined for processing.
The iris pattern is processed and encoded into a record (or "template"), which is
stored and used for recognition when a live iris is presented for
comparison. Half of the information in the record digitally describes the
features of the iris, the other half of the record controls the comparison,
eliminating specular reflection, eyelid droop, eyelashes, etc.
Finally, the phase data from 1D Log-Gabor filters was extracted and
quantised to four levels to encode the unique pattern of the iris into a
bit-wise biometric template. The Hamming distance was employed for
classification of iris templates, and two templates were found to match if
a test of statistical independence was failed. The system performed with
perfect recognition on a set of 75 eye images; however, tests on another
17 | P a g e #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
set of 624 images resulted in false accept and false reject rates of
0.005% and 0.238% respectively. Therefore, iris recognition is shown to
be a reliable and accurate biometric technology.
And each year, the technology frees acres of storage space once given
over to file cabinets and boxes full of paper documents. Before OCR can
be used, the source material must be scanned using an optical scanner
(and sometimes a specialized circuit board in the PC) to read in the page
as a bitmap (a pattern of dots). Software to recognize the images is also
required.
18 | P a g e #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
19 | P a g e #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
EIGENEXPRESSIONS FOR FACIAL
EXPRESSION RECOGNITION
The extracted feature vectors in the reduced space are used to train the
supervised Neural Network classifier. This approach results extremely
powerful because it does not require the detection of any reference point or
node grid.
The proposed method is fast and can be used for real-time applications.
A simple watermarking method for color images is proposed. The proposed method
is based on watermark embedding for the histograms of the HSV planes using visual
cryptography watermarking. The method has been proved to be robust for various
image processing operations such as filtering, compression, additive noise, and
various geometrical attacks such as rotation, scaling, cropping, flipping, and
shearing.
It can be retrieved from the marked image without making comparison with the
original image. The notary also can off-line adjudge the ownership of the suspect
image by this method. The watermark pattern can be any significant black/white
image that can be used to typify the owner.
Experimental results show that the watermark pattern in the marked image has good
transparency and robustness. By the proposed method, all the pixels of the marked
image are equal to the original image.
Index Terms: Matlab, source, code, histogram, HSV, visual, cryptography, watermark,
hue, saturation, value.
23 | P a g e #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
HIGH DEFINITION IMAGE COMPRESSION
TECHNOLOGY
24 | P a g e #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
FAST DCT VIA MOMENTS
Discrete cosine transforms (DCTs) are widely used in speech coding and
image compression. They resemble Karhunen- Loeve transform for first-
order Markov stationary random data and are classified into four groups.
Finding fast computational algorithms for DCTs has been a rather active
subject. These methods all tried to reduce the amount of multiplications.
It is very important to low -power implementations of DCTs on mobile
devices that no floating multiplications or less multiplications are
needed.
At the same time, the parallel hardware methods also have been
developed for designing fast DCT processors. Among them the systolic
array methods have been given more attentions due to their easy VLSI
implementation.
25 | P a g e #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
FAST AND ROBUST SPEECH RECOGNITION
BASED ON DYNAMIC TIME-WARPING
Searching for the best path that matches two time-series signals is the
main task for many researchers, because of its importance in these
applications. Dynamic Time-Warping (DTW) is one of the prominent
techniques to accomplish this task, especially in speech recognition
systems. DTW is a cost minimisation matching technique, in which a test
signal is stretched or compressed according to a reference template.
26 | P a g e #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281
PROJECT ABSTRACTS FOR YOUR EASY
REFERENCE
IEEE PAPERS
2009, 2008, 2007 and so on…
www.sahasratechnology.com
27 | P a g e #107, AmeerEstate, Besides ICICI Bank, SR Nagar, Hyderabad. 500 038. Ph: 9949981281