Manuscripts

Recent Papers

Case Study

Retinex processing for automatic image enhancement using wavelet transformation

Retinex is a method used for image processing. Image processing has a great role in Medical science. Medical images such as MRI, CT, Ultrasound, X-Ray has to be processed for proper diagnosis. Retinex technique can be used for the processing of these images. By retinex processing it can provide better dynamic range compression, color consistency and lightness rendition. The different methods proposed by Retinex algorithm include Light Compensation Algorithm in Color Facial Image, Retinex for bridging the gap between color images and the human observation of scenes, Color Image Contrast Enhancement by Retinex, Color Image Enhancement with Adaptive Filter. Single scale Retinex causes halation due to Gaussian filter and it does not preserve the edges. While the multiscale Retinex has a very high computational cost. So in this project, we propose retinex algorithm based on wavelet transformation which has low computational cost, i.e. it takes a lesser amount of time and higher efficiency. The input image is processed by wavelet transform. Here the Gaussian filter and retinex is applied only to the half the resolution of the image. Thus the computational cost is reduced as the number of pixels for processing is reduced and the gaussian surround space can be small. Histogram equalization is applied to improve the visual effect. Moreover, we gain higher entropy by using clipping and gain/offset operation. At last, we compare the proposed output with that of the standard MSR output. The experimental results show that proposed method provides satisfactory image enhancement without halation.

Published by: Lokesh B S, Rohini L, Sanjana R, Sharath C M, Varsha Basavaraj

Author: Lokesh B S

Paper ID: V4I3-1656

Paper Status: published

Published: June 5, 2018

Full Details
Research Paper

Optimization of machining parameters in CNC turning with varying of insert nose radius

The objective of the study is to evaluate the effect of machining parameters on the Material Removal Rate and Surface Roughness in CNC Turning by implementing Taguchi technique. Based on the Taguchi method, turning experiments were designed and conducted on Nylon rods. CNC Turning is a machining process which is used for removing the unwanted material from the cylindrical surfaces of the workpiece. In this era of manufacturing, Material Removal Rate (MRR) and surface roughness qualities are of primary concern. Taguchi method has been employed with an L36 orthogonal array. Four cutting parameters namely cutting speed, feed, depth of cut and Insert Nose Radius is selected. Two different values are selected for insert nose radius and three values are selected for each of the other parameters. Turning operations are performed for maximum Material Removal Rate and minimum surface roughness response values. The material selected for machining is Nylon which is a thermoplastic material and the tools used for machining are of rigid Cast Iron with solid carbide inserts and AP68 servo oil is used as the coolant. Material Removal Rate is calculated for 36 experiments and surface roughness values are measured. Taguchi method in MINITAB software is used for optimization and the optimum values of the four parameters namely cutting speed, feed, depth of cut and insert nose radius to obtain a combination of higher material removal rate and lower surface roughness.

Published by: B. Thaviti Raju, E.Lakshmi Devi, P.Satya Nnarayana Murthy

Author: B. Thaviti Raju

Paper ID: V4I3-1737

Paper Status: published

Published: June 5, 2018

Full Details
Research Paper

Blockchain to monetize retail operations

Data monetization strategy can be defined as a re-engineering of business data to create a measurable and positive impact on business revenue by making efficient use of data. There are mainly two forms to transform data into money. Firstly, provide access to organizational data and get the benefit of supplemental revenue stream which is also called as direct data monetization. Secondly, client data can be used to get insights and enhance customer services and operations which is called as indirect data monetization. As this monetization has become crucial for industries, data creators such as healthcare, retailers etc. are pursuing new and significant ways to monetize their data. At the same time, consumers who are actual contributors of data demands for access control over their public data to get knowledge about usage of their data in the market. A solution is constituted known as Blockchain technology. Even though blockchain is under execution for some business applications, it holds promising transformations in various businesses, the retail market is one of them where data flow continues and sensitive to day to day operations. This paper focuses on the optimization of customer data in retail management by using manually taken customer transactions and applying data analytical techniques along with blockchain. It emphasizes the significant usage of customer data in retail operations.

Published by: Sneha Anil Bhatkar, Sonali Ajankar

Author: Sneha Anil Bhatkar

Paper ID: V4I3-1730

Paper Status: published

Published: June 5, 2018

Full Details
Research Paper

Alternative of retrofitting for ground soft story formation using concrete web stiffeners

Many of the high-rise structures are designed today to have an open base story for multiple reasons like parking, recreational area etc. Since infills are absent at this location the relative stiffness of the story decreases as compared to the above stories, due to which soft story formation may occur. For this purpose, to demonstrate rectification of soft-story formation a G+10 infilled framed structure is considered and 10 models are created, 9 models having different aspect ratios of web stiffener and 1 model without web stiffener. The stiffness of ground story (plinth level), inter-story drift and displacements are calculated and compared for all the 10 stories.

Published by: Tanvesh Dabholkar

Author: Tanvesh Dabholkar

Paper ID: V4I3-1741

Paper Status: published

Published: June 5, 2018

Full Details
Thesis

Effect of IPV6 security vulnerabilities on the future of autonomous car

An autonomous car may be a mystery to many but in real life application it is actually placeable but with the latest internet version protocol (IPV 6) to which automobile companies are running away from due to vulnerabilities it possesses. The autonomous car is generally a self-driven car via the internet a simple car we can talk to, communicate to in real life time domain, without the need for an individual to be in the actual wheel, on the other hand, IPv6 is the latest version of internet protocol that is used for communication via the internet. but due to security concern of IPv6 many organization have slowed their migration to the newest version of this internet protocol. Generally, the autonomous car is driven via the internet and it could have worked best with the help of a well secure internet since IPv6 can accommodate a greater number of host compare to IPv4. This paper covers and reviews some of the fundamental vulnerabilities topics of IPv6 security, considerations, issues, and threats. In the end, it summarizes some of the most common security concerns the new suite of protocols creates.

Published by: Mustapha Mboob, Ousman Manjang

Author: Mustapha Mboob

Paper ID: V4I3-1734

Paper Status: published

Published: June 5, 2018

Full Details
Research Paper

IoT based home security through image processing algorithms

Most doors are controlled by persons with the use of keys, security cards, password or pattern to open the door. The aim of this paper is to help users for improvement of the door security of sensitive locations by using face detection and recognition. The face is a complex multidimensional structure and needs good computing techniques for detection and recognition. This paper is comprised mainly of three subsystems: namely face detection, face recognition and automatic door access control. Face detection is the process of detecting the region of the face in an image. Viola jones method is used for face detection in ‘opencv’ technique and face recognition is employed by using the RANSAC (RANdom SAmple Consensus). Face Recognition based on RANSAC. If a face is recognized i.e., present in the database, it is known, and else is unknown. The door automatically opens for the known person by matching with known database image. On another side, for an unknown person, the image will be sent through Google Cloud Messaging to the owner’s Android app and based on owner command the door will be open or closed. Although many preliminary images are used, probabilistic efficiency cannot be decreased predominantly. Therefore, face recognition using OpenCV using Android can be more useful for door security system than any other face recognition techniques.

Published by: Supritha J Mannapur, Sanjay Raj, Sharath Kumar, Kiran B

Author: Supritha J Mannapur

Paper ID: V4I3-1746

Paper Status: published

Published: June 5, 2018

Full Details