• ijmece issn number
  • open access journal
  • impact factor
  • Home
    Current Issues
    Previous Issues
    +91-9950712474

    Volume-4 Issue-1


    Title: A Novel Approach for Detection of Anomalies in Images related to Diabetic Myonecrosis

    Authors: Fahimuddin Shaik, Dr.Anil Kumar Sharma and Dr.Syed. Musthak Ahmed

    Abstract: Diabetes mellitus (DM) and its complications is a comprehensive challenge to health care systems. Diabetic Myonecrosis or diabetic muscle infarct (DMI) is a rare complication of diabetes or possibly under diagnosed. Image processing methods have become crucial in solving various medical Imaging problems. The proposed work is mainly dealt with processing of medical images related to Diabetic Myonecrosis. A novel approach is designed in this paper by having Hybrid Morphological Reconstruction (HMR) Technique as Pre-Processing With Watershed Segmentation Method as Post-Processing.

    Download file

    Title: A Review on Multi-Keyword Based Image Retrieval System for Encrypted Image Data Stored On Cloud

    Authors: Pawandeep and Hardeep Singh

    Abstract: In recent years, cloud computing has become an advanced area, particularly due to its potential merits and applications. Also CBIR has become the active research topic in the area of computer science in past few years. In order to realize the cloud computing, many constraints are associated out of which multi-keyword search and privacy preserving are one of them. To enhance the use of data utilization search over multi-keyword encrypted cloud data a CBIR approach is used. CBIR is an effective method to retrieve the relevant images from large database. Searchable encryption scheme is proposed which focuses on multi keyword search and Boolean keyword search. For the efficient result, image segmentation approach is followed to extract the various features present in an image. Further, the use of other principle ?inner product similarity? is used therefore count of query keywords present in a document chooses for result ranking. Using secure inner product computation, MRSE scheme has been proposed.

    Download file

    Title: A Novel Fractal Shaped Slot Loaded Compact Printed Antenna for Wireless Communication Applications

    Authors: Rajnish Kumar Singh, Mr. Sudipta Das ad Atul kumar

    Abstract: In this paper, theoretical investigation of a single layer, single feed printed antenna has been carried out using method of moment based IE3D software. The proposed antenna is designed by cutting unequal fractal shaped slot on the radiating patch. By introducing open ended T Slot within the rectangular resonator, the proposed antenna offers 63.15% size reduction in comparison to the conventional microstrip antenna with same patch area. The proposed antenna resonates at multiple frequencies. A detail analysis of reflection coefficient, gain, directivity, and radiation efficiency and radiation pattern including surface current distribution is presented in this paper.

    Download file

    Title: Vehicle Identification and Tracking System based on Shape Parameters Analysis

    Authors: Kamaljit Kaur and Dr. Rinkesh Mittal

    Abstract: In the existing work, it is observed that the algorithms are language dependent i.e. characters and numbers should be in local language and if the language is changed, then the character identification algorithm will have to be changed each time the language changes. This kind of problem has been targeted in the proposed work by using the statistical features of the text and can be fine-tuned easily just by replacing the statistical features data base of the particular language characters. Though, it is observed that the vehicle is not only recognized by its number plate but the model of the motor vehicle also possesses many information so that it could be identified from the distance as the number plate can only be extracted once the camera is focussed on it. But at the first sight, the vehicle is identified by it manifestation i.e. its shape, model, colour or style of the body. Therefore, in order to identify a vehicle on road, prima facie, its data in terms of its body or appearance is an important source of information that must be retrieved or extracted from its image.

    Download file

    Title: Performance Analysis of SRAM Cell Using DG-MOSFETs

    Authors: Mukeem Ahmad and Abhinav Vishoni

    Abstract: As the technology in electronic circuits is improving, the complexity in these circuits also increases. The complexity in the circuits leads to the need of that type of circuits which are portable and fast circuits. The portability in the electronic circuits is achieved by the use of battery. So we have to develop such sort of circuits that use very less power. The main focal point in designing a high performance digital system such as microprocessors and various Digital signal Processors is given to low power design. The key part of any digital system is its memory unit. It is not possible to design a digital system without memory. So we can say that memory is the main part which employ the highest power in the system. The most used memory cell in the digital systems is the SRAM cells. They are the static RAM cells. Low-power Random Access Memory (RAM) has seen a remarkable and rapid progress in power reduction. The high density and low power SRAMs are needed for application such as hand held devices, laptops, notebooks, IC memory card because of the fact that they are portable devices and uses batteries for power source so they must consume power as low as possible. As the semiconductor technology scales down, the read stability and write capacity of a static random-access memory (SRAM) cell are degraded because of the increased mismatch among its transistors. In sub-threshold conduction, leakage current is main culprit to increased power dissipation and degradations. There are scale issues which arise in nanometer range of operation. These issues cannot be resolved in conventional MOS transistors. DG-MOSFETs are one of the attractive candidates to reduce these problems in extremely nano-scaled devices. Further SRAM cell are chief component for today?s electronic industry. This report presents a novel CMOS four and two-transistor SRAM cell for very high density and low power embedded SRAM applications as well as for stand-alone SRAM applications.

    Download file

    Title: A Systematic Approach for Various Phase Based Binarization and Segmentation of Ancient Document Images

    Authors: Ritika Sood and Mr. Manvinder Sharma

    Abstract: At present era, globalization and technology improves the growth of any country. With the passage of time and new technology there is need to maintain and care of various historical monuments, culture and civilization and has to learn about these to all of the country people. Since they explain about the historic events so they play a vital role in determining the culture and civilization through which the nation outperforms a special place in all around the world. With the various rush in life many people are not familiar these historical and ancient documents. Today is the time of modernization but our culture and civilization belongs to ancestral. So, there is need to work over these areas to uplifts the culture and civilization. In this paper, the main concern is about phase based binarization of ancient document images. The dataset collected from different areas to emphasize the various historical events occur in Ancient India. Binarization is the process in which we enhance the quality and features of any images. The proposed model consists of three standard steps: 1) preprocessing; 2) main binarization; and 3) postprocessing. In the preprocessing and main binarization steps, the features used are mainly phase derived, while in the postprocessing step, specialized adaptive Gaussian and median filters are considered. The proposed work was quiet reliable and optimist in terms of PSNR and RMSE and found that the final overall output is quiet superior as compare to initial point.

    Download file

    Title: A novel steganographic approach with center weighted least significant bit method with quick encryption

    Authors: Ravpreet Kaur and Mr. Manish Mahajan

    Abstract: The technique of concealing a message in such a way that only the intended recipient and the sender should know about it is called a steganography. To hide the data in a particular object, the no. of embedding methods are available. To accomplish private communications over the network, it had been found that merely covering the contents of an information using cryptography wasn?t acceptable. In steganography, various encryption and decryption algorithms are used to conceal the covert data in cover image to provide stego image. To embed the covert data in video images, the data hiding approach is used. Extreme secret data is transmitted by keeping the quality of video and its size as it is. Quadratic method is also used depending upon the area achieved by the binary image. The accomplishment of the steganography has been estimated in terms of bit mapped format (bmp) using the video images in red, green and blue components. Here the steganographic approach is implemented for hiding the secret message of variable size into video file. The password is used as a confidential for the encoding and decoding purposes.

    Download file

    Title: Study of Copy Move Image Forgery Detection Based On Surf Algorithm

    Authors: Gurmeet Kaur Saini and Manish Mahajan

    Abstract: Now a day?s verification of images plays an important role. Various modification (alteration of image) tools are available in the market which can make changes in different ways. By using these tools we can make so many slight changes in the image by resizing, rotating or copy move etc. which is difficult to detect by human eyes. This poses a need to verify the authenticity of images. So we need some forgery detection technique for digital image. This paper review technique for copy move image forgery detection. In copy move image forgery detection some portion of the image is copied and then pasted in another part of the same image. This proposed method is based on SURF (Speed Up Robust Features).

    Download file

    Title: SIFT Keypoint Removal and Injection

    Authors: Aarti Dogra and Isha Vats

    Abstract: Trend of counterfeiting digital images through various photo editing tools is now become easy and immediate in order to change the original content. Attacks which are capable to remove SIFT keypoints from image have compromised with the correct functioning of SIFT based copy-move forgery detection. Here we are introducing three forensic detectors to identify the images whose SIFT keypoints have been removed either locally or globally in order to tackle with these attacks. Main aim is to validate the methods on keypoint removal techniques and then determine their strength by constructing counter-forensic attack injecting fake keypoints to hide the traces of removal. Detectors are applied to practical image of copy-move forgery detection assume that there is intruder who aims to keypoint removal and injection to produce copy move forgeries that successfully escape from SIFT based detectors but in turn are exposed by newly proposed tools.

    Download file

    Title: An Accurate Segmentation of brain tumorby FCM and K-means Algorithm

    Authors: K. Banupriya and Dr.R.Sudarmani

    Abstract: Detection of brain tumor is the most common fatality in the current scenario of health care civilization. Computational applications are gaining significant importance in the routine life. Automated brain disorder diagnosis with Magnetic Resonance Images is one of the specific medical image analysing technique. Image segmentation is used to extract the tumor portion in brain. Improved k-means algorithm is used for segmentation, fuzzy c-means algorithms is applied over the segmented image for accurate detection. In this paper better performance has achieved due to the applications of fuzzy c-means over k-means algorithm.Compared to existing methods, this algorithm provides better accuracy, reproducibility and less time for testing. At the end of the process the tumour is extracted from the magnetic resonance image interms of position and shape. In proposed system, the simulation is carried out using MATLAB to detect tumor blocks or lesions and classify the type of tumor usingArtificial Neural Network in MRI images of different patients.

    Download file

    Title: Shortest Path Selection for UAVs using 3-D Coordinates with Collision Avoidance System

    Authors: Shivani Dhiman and Mandeep Singh Saini

    Abstract: The unmanned aerial vehicles are the planes used for the weather application, military applications, area surveillance, etc. The unmanned aerial vehicles are cheaper options to the smaller aero-planes which reduce the cost of the operation as well as save the human lives in many cases. Also the unmanned aerial vehicles are smaller in size, which makes the undetectable or untraceable on the ordinary radars. There are two certain types of the unmanned aerial vehicles (UAVs), where first is automatic UAVs and others are remotely controlled vehicles. The path planning and flight management are the real challenges for the automatic UAVs. The path planning and flight management or tracing requires a lot of computations which requires the fuel tracking and emergency landing management system for the smoother UAV flights. Also the collision arises as one of the major issues for the UAVs. The proposed model aims at the path planning and flight management in the case of collision possibility or taking the alternative path due to any hurdle. The proposed model has been primarily designed to calculate the point of collision, possibility of collision and alternative path planning (also called bypass routing). The proposed model UAV control and management system has been evaluated for its performance on the basis of various performance parameters. The experimental results have proved the efficiency of the proposed model in comparison with the existing models.

    Download file