Manuscripts

Recent Papers

Review Paper

Crack Detection in Railway Track Using Image Processing

Computer vision can provide many potential advantages over manual methods of railway track inspection. Great levels of performance can be achieved through the automation of inspection using computer vision systems, as they allow scalable, quick, and cost-effective solutions to tasks otherwise unsuited to humans. At a minimum, railway track components can be objectively and quantitatively inspected, as the system does not suffer from fatigue or the subjectivity inherent with human inspectors. The digital nature of the data collection involved with a computer vision based method, archiving inspection results and trending of the data becomes feasible, leading to more advanced failure prediction models for maintenance scheduling and a more thorough understanding of railway track structure. In this research paper, a computer vision based method is presented. A system has been suggested which can periodically take images of the railway tracks and compared with the existing database of non-faulty track images on a continuous basis. If a fault arises in the track section, the system will automatically detect the fault and necessary actions can be taken, to avoid any mis-happening.

Published by: Aliza Raza Rizvi, Pervez Rauf Khan, Dr. Shafeeq Ahmad

Author: Aliza Raza Rizvi

Paper ID: V3I4-1266

Paper Status: published

Published: July 31, 2017

Full Details
Research Paper

Gateway Based Energy Efficient Routing: GEER

Wireless Sensor Networks comprise of an extensive number of little and minimal effort sensor nodes energised by little non rechargeable batteries and furnished with different detecting gadgets. WSN is sent, most likely in a rough and inhospitable landscape, it is relied upon that all of a sudden dynamic to accumulate the required information for a few times when something is identified, and after that outstanding to a great extent idle for drawn out stretches of time. In this way, scientists are constantly persuaded to configuration create effective energy efficient plans and relating calculations with a specific end goal to give sensible optimal utilization of battery power and to enhance the system lifetime for WSNs. The lifetime of wireless sensor network systems is enhanced by cluster location and balancing the network loading among the clusters. In this research work a gateway based technique has been contemplated. The nodes have been isolate into ordinary, middle of the road and progressed in light of their vitality arrangement and every class has its own particular paradigm for determination likelihood. The calculation performs well as far as number of alive nodes, network lifetime, average energy and so forth. A comprehensive investigation as far as different graphical parameters is additionally introduced in this work.

Published by: Naziya Anjum, Masood Ahmad, Dr. Shafeeq Ahmad

Author: Naziya Anjum

Paper ID: V3I4-1263

Paper Status: published

Published: July 31, 2017

Full Details

Universal Dependencies of Sanskrit

We present the first steps towards a treebank of Sanskrit within the Universal Dependencies framework. our dataset is tiny at the moment, consisting of less than 200 sentences—a result of a summer internship project. Nevertheless, this seems to be, to the best of our knowledge, the first publicly available piece of syntactically annotated Sanskrit text.We also present a parsing experiment, with results surpassing delexicalized parsing.

Published by: Puneet Dwivedi, Easha Guha

Author: Puneet Dwivedi

Paper ID: V3I4-1252

Paper Status: published

Published: July 31, 2017

Full Details

Parametric Study of Multi-Storey Buildings for Blast Load

An explosive is a mixture of compounds which, when initiated by heat, impact, friction, or shock, undergoes a rapid decomposition in the form of heat and gas where tremendous amounts of energy is released. Full or partial collapse of buildings, minor and major cracks are the most perceptible type of failure that may result from a blast load. The level of damage produced in a structure depends on charge weight, distance of building from point of explosion . This work deals with study of nature of blast loading and its effects on regular and irregular multi-storey building with and without shear wall opening.

Published by: Prajna, Deepthishree S. Aithal

Author: Prajna

Paper ID: V3I4-1248

Paper Status: published

Published: July 31, 2017

Full Details

Review of Classification of Copy Move Forgery

Copy move forgery is one of the important fields in forensic science for image pro-cessing. Image forgery is different like copy move attack, image splicing and image retouching. In this paper review the specific copy move forgery images and its detection methods.

Published by: Rekha Devi, Deepti Chauhan

Author: Rekha Devi

Paper ID: V3I4-1247

Paper Status: published

Published: July 31, 2017

Full Details
Research Paper

Classification of copy move forgery and normal images by ORB features and SVM classifier

Today, the characterization of the technological age is done by the digital images spread. They are the most common form of conveying information whether through internet, newspapers, magazines, or scientific journals. They are used as a strong proof against various crimes and as evidence used for various purposes. The modification, capturing or creating of the image has become easier and available with the emergence of means of image editing and processing tools. One of the most important and popular type of image forgery is copy-move forgery in which an image part is copied and then pasted into the same image that has intention of hiding something important or showing a false scene. Because the important properties of the copied parts comes from the same image, such as brightness, noise, and texture which will be compatible with the entire image that makes more difficult for experts for the detection and distinguishing the alteration. Usually, the detecting copy move forgery conventional techniques suffer severely from the time-consuming problem. The evaluation of the improved method had been done using (150) images that was selected from two different datasets, “CoMoFoD” and “MICC-F2000”. Experimental results show that the improved method can accurately and quickly reveal the doubled regions of a tampered image. In addition, greatly reducing the processing time in comparison to the khan algorithm, and the accuracy is kept at the same level. Owing to the availability and technological advancement of the image editing sophisticated tools, there is increase in the loss of authentication in digital images. Thus, this led us to the proposal of different detection techniques that checks whether the digital images are forged or authentic. The specific type of forgery technique is copy move forgery in which widely used research topic is detection under digital image forensics. In this thesis an enhancement of copy move image forgery classification is done by implementing a hybrid features with classification algorithm like SIFT with SVM and EM algorithm and ORB with SVM and EM .The technique works by applying firstly the DCT on an image and then on an resultant image, SIFT is obtained after applying DCT. A supervised learning method is proposed for classifying a copy-move image forgery of TIFF, JPEG, and BMP. The process starts with reducing the color of the photos. Achieve the accuracy more than 90%.

Published by: Rekha Devi, Deepti Chauhan

Author: Rekha Devi

Paper ID: V3I4-1246

Paper Status: published

Published: July 31, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X