Search Results - "2015 Third International Conference on Image Information Processing (ICIIP)"

Refine Results
  1. 1

    Face recognition for cattle by Kumar, Santosh, Tiwari, Shrikant, Singh, Sanjay Kumar

    “…Global standards for cattle recognition, registration and traceability are being developed. However missed or swapped cattle, false insurance claims and…”
    Get full text
    Conference Proceeding
  2. 2

    Detection of forest fires using machine learning technique: A perspective by Kansal, Aditi, Singh, Yashwant, Kumar, Nagesh, Mohindru, Vandana

    “…Wireless Sensor Networks (WSN) has gained attention as it has been useful in warning about disasters. Predicting natural disasters like hailstorm, fire,…”
    Get full text
    Conference Proceeding
  3. 3

    Emotion recognition based on physiological signals using valence-arousal model by Basu, Saikat, Jana, Nabakumar, Bag, Arnab, Mahadevappa, M., Mukherjee, Jayanta, Kumar, Somesh, Guha, Rajlakshmi

    “…This paper considers two dimensional valence-arousal model. Pictorial stimuli of International Affective Picture Systems were chosen for emotion elicitation…”
    Get full text
    Conference Proceeding
  4. 4

    A new LSB-S image steganography method blend with Cryptography for secret communication by Joshi, Kamaldeep, Yadav, Rajkumar

    “…In this paper, a new method of image steganography in spatial domain on gray images blend with cryptography is present. Steganography and cryptography are used…”
    Get full text
    Conference Proceeding
  5. 5

    Lane departure warning system based on Hough transform and Euclidean distance by Bhujbal, Pradnya N., Narote, Sandipann P.

    “…Unintended lane departure due to driver's inattention, drowsiness, or fatigue is the leading cause that is risking lives of people. Lane departure warning…”
    Get full text
    Conference Proceeding
  6. 6

    Bharatna̅~yam Adavu Recognition from Depth Data by Kale, Geetanjali, Patil, Varsha

    “…Human motion recognition is a challenging problem having applications in multifaceted domain. It has significance in sports, surveillance, human-computer…”
    Get full text
    Conference Proceeding
  7. 7

    An innovative method of Text Steganography by Gupta, Shashank, Jain, Rachit

    “…Text Steganography is a field of hiding text messages into multimedia (e.g. image) documents. In this method we apply DWT on input image to divide it into four…”
    Get full text
    Conference Proceeding
  8. 8

    A DTW and Fourier Descriptor based approach for Indian Sign Language recognition by Shukla, Pushkar, Garg, Abhisha, Sharma, Kshitij, Mittal, Ankush

    “…Humans with hearing disabilities are highly dependent on non-verbal forms of communication involving hand gestures. A gesture recognition system capable of…”
    Get full text
    Conference Proceeding
  9. 9

    A new and efficient buyer-seller digital Watermarking protocol using identity based technique for copyright protection by Kumar, Ashwani, Ghrera, S. P., Tyagi, Vipin

    “…Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents for copyright protection. Digital Watermarking…”
    Get full text
    Conference Proceeding
  10. 10

    Push notification as a business enhancement technique for e-commerce by Kumar, Arvind, Johari, Suchi

    “…Push notification can have a great impact on e-commerce. It makes business to attract more customers by tracking the interest area of the customers. The…”
    Get full text
    Conference Proceeding
  11. 11

    Comparative study of WSN Protocols (LEACH, PEGASIS and TEEN) by Khan, Abdul Rehman, Rakesh, Nitin, Bansal, Abhay, Chaudhary, Dev Kumar

    “…With this study three "Wireless Sensor Networks" protocols are being reviewed on the basis of their functioning. "Low Energy Adaptive Clustering Hierarchy"…”
    Get full text
    Conference Proceeding
  12. 12

    Double handed Indian Sign Language to speech and text by Dutta, Kusumika Krori, Raju K., Satheesh Kumar, Kumar G.S., Anil, Swamy B., Sunny Arokia

    “…Sign Language is the main communicating tool for hearing impaired and mute people, and to ensure an independent life for them, the automatic interpretation of…”
    Get full text
    Conference Proceeding
  13. 13

    IoT based power efficient system design using automation for classrooms by Gupta, Anisha, Gupta, Punit, Chhabra, Jasmeet

    “…The paper presents the design and implementation of an Ethernet-based intelligent automated system for conserving electrical energy using a INTEL GALILEO 2ND…”
    Get full text
    Conference Proceeding
  14. 14

    Posture recognition for safe driving by Gupta, Rajeev, Mangalraj, P., Agrawal, Anupam, Kumar, Anil

    “…Recent evolution in Human-Computer Interaction automation grant permission for the integration between the driver's nature and its causes of accidents. To make…”
    Get full text
    Conference Proceeding
  15. 15

    Algorithm for de-noising of color images based on median filter by Yadav, Ashwani Kumar, Roy, Ratnadeep, Kumar, Raj, Kumar, Cheruku Sandesh, Kumar, Archek Praveen

    “…Noise degrades the image quality at a large extent in all kinds of images. Impulse noise is the most common one. Correlation is used for analysis of features…”
    Get full text
    Conference Proceeding
  16. 16

    Development of a kinect-based physical rehabilitation system by Uttarwar, Param, Mishra, Deepak

    “…Shoulder injuries are very common in sports and certain labour intensive occupations. While some injuries are minor and full recovery is within 1-2 weeks, some…”
    Get full text
    Conference Proceeding
  17. 17

    Image fusion on digital images using Laplacian pyramid with DWT by Kaur, Harmandeep, Rani, Jyoti

    “…In today's computerized field digital image processing needs the efficient images with less distortions and the main process occurs through it is image fusion…”
    Get full text
    Conference Proceeding
  18. 18

    LSB modification based Audio Steganography using Trusted Third Party Key Indexing method by Sharma, Vipul, Thakur, Ravinder

    “…In the present scenario of extensive mediums for communication technologies, it has always been a challenging task to ensure the confidentiality of the…”
    Get full text
    Conference Proceeding
  19. 19

    Binarization of degraded handwritten documents based on morphological contrast intensification by Mandal, Sekhar, Das, Sugata, Agarwal, Amrit, Chanda, Bhabatosh

    “…Degraded handwritten document images pose several challenges such as faint characters, bleeding-through and large background ink stains for binarization…”
    Get full text
    Conference Proceeding
  20. 20

    Proposed algorithms for effective real time stream analysis in big data by Agnihotri, Nishant, Sharma, Aman Kumar

    “…Big data is emerging in all the fields of science. Scope of data analysis is not limited to the analysis of archival data, rather is it more concerned towards…”
    Get full text
    Conference Proceeding