Showing posts with label call for research paper. Show all posts
Showing posts with label call for research paper. Show all posts

Tuesday, 11 August 2015

Special Issue For Image Processing



Best 25 papers will be published online.Participate in this special issue and get a chance to win the Best Paper Award for Image Processing. Also other authors will have special prizes to be won.

What is Image Processing?
Image processing is a method to convert an image into digital form and perform some operations on it, in order to get an enhanced image or to extract some useful information from it. It is a type of signal dispensation in which input is image, like video frame or photograph and output may be image or characteristics associated with that image. Usually Image Processingsystem includes treating images as two dimensional signals while applying already set signal processing methods to them. 
It is among rapidly growing technologies today, with its applications in various aspects of a business. Image Processing forms core research area within engineering and computer science disciplines too.Image processing usually refers to digital image processing, but optical and analog image processing also are possible.
Analog or visual techniques of image processing can be used for the hard copies like printouts and photographs. Image analysts use various fundamentals of interpretation while using these visual techniques. The image processing is not just confined to area that has to be studied but on knowledge of analyst. Association is another important tool in image processing through visual techniques. So analysts apply a combination of personal knowledge and collateral data to image processing.
Digital Processing techniques help in manipulation of the digital images by using computers. As raw data from imaging sensors from satellite platform contains deficiencies. To get over such flaws and to get originality of information, it has to undergo various phases of processing. The three general phases that all types of data have to undergo while using digital technique are Pre- processing, enhancement and display, information extraction.
If you have worked on any part of image processing prepare a research paper and submit to us
Image processing basically includes the following three steps.
  • Importing the image with optical scanner or by digital photography.The acquisition of images (producing the input image in the first place) is referred to as imaging.
  • Analyzing and manipulating the image which includes data compression and image enhancement and spotting patterns that are not to human eyes like satellite photographs.
  • Output is the last stage in which result can be altered image or report that is based on image analysis.

Purpose of Image processing
The purpose of image processing is divided into various groups. They are:
  • Visualization - Observe the objects that are not visible.
  • Image sharpening and restoration - To create a better image.
  • Image retrieval - Seek for the image of interest.
  • Measurement of pattern – Measures various objects in an image.
  • Image Recognition – Distinguish the objects in an image.

Applications of Image processing
Image processing has been an important stream of Research for various fields. Some of the application areas of Image processing are….
Intelligent Transportation Systems – E.g. Automatic Number Plate Recognition, Traffic Sign Recognition
Remote Sensing –E.g.Imaging of earth surfaces using multi Spectral Scanners/Cameras, Techniques to interpret captured images etc.
Object Tracking – E.g. Automated Guided Vehicles, Motion based Tracking, Object Recognition
 Defense surveillance – E.g. Analysis of Spatial Images, Object Distribution Pattern Analysis of Various wings of defense. Earth Imaging using UAV etc.
 Biomedical Imaging & Analysis – E.g. Various Imaging using X- ray, Ultrasound, computer aided tomography (CT) etc. Disease Prediction using acquired images, Digital mammograms.etc.
Automatic Visual Inspection System – E.g.Automatic inspection of incandescent lamp filaments, Automatic surface inspection systems,    Faulty component identification etc.
And many other applications…..
To contribute your research work in Image processing please prepare an article on it and submit to us. 

http://www.ijsrd.com/SpecialIssuehttp://www.ijsrd.com/SubmitManuscript





Tuesday, 7 October 2014

A Glimpse into the 3-D brain | #IJSRD

People who wish to know how memory works are forced to take a glimpse into the brain. They can now do so without bloodshed: Ruhr Univ. Bochum (RUB) researchers have developed a new method for creating 3-D models of memory-relevant brain structures. They published their results in the trade journal Frontiers in Neuroanatomy.
3-D image of the hippocampus of a rat. Image
Lets Research !!! DO IT >>>> IJSRD
Seahorse gave the hippocampus the name
The way neurons are interconnected in the brain is very complicated. This holds especially true for the cells of the hippocampus. It is one of the oldest brain regions and its form resembles a seahorse (hippocampus in Latin). The hippocampus enables us to navigate space securely and to form personal memories. So far, the anatomic knowledge of the networks inside the hippocampus and its connection to the rest of the brain has left scientists guessing which information arrived where and when.
Signals spread through the brain
Accordingly, Dr. Martin Pyka and his colleagues from the Mercator Research Group at RUB have developed a method which facilitates the reconstruction of the brain's anatomic data as a 3-D model on the computer. This approach is quite unique, because it enables automatic calculation of the neural interconnection on the basis of their position inside the space and their projection directions. Biologically feasible network structures can thus be generated more easily than it used to be the case with the method available to date. Deploying 3-D models, the researchers use this technique to monitor the way neural signals spread throughout the network time-wise. They have, for example, found evidence that the hippocampus’ form and size could explain why neurons in those networks fire in certain frequencies.
Information become memories
In future, this method may help us understand how animals, for example, combine various information to form memories within the hippocampus, in order to memorise food sources or dangers and to remember them in certain situations.
main source: click here
For more information: Click here. . .

Tuesday, 19 August 2014

#IJSRD Digital Watermarking Methods in Spatial Domain and Transform Domain

#IJSRD
Digital Watermarking Methods in  Spatial Domain and Transform Domain
Abstract--- The ease of digital media modification and dissemination necessitates content protection beyond encryption. Information hidden as digital watermarks in multimedia i.e. text, image, video, audio enables protection mechanism in decrypted contents. In a way that protects from attacks several common image processing techniques are used in Spatial Domain and Transform Domain. In Spatial Domain Least Significant Bit(LSB) is used and in Transform domain Discrete Cosine Transform(DCT) & Discrete Wavelet Transform(DWT) are used. Among these DWT is best method due because of using embedded zero tree wavelet image compression scheme and high frequency sub bands.  

For More Details 
Click on Below Links :



Friday, 15 August 2014

#IJSRD advanced persistent threat (APT)


Advanced Persistent Threats (APTs) are a cybercrime category directed at business and political targets. APTs require a high degree of stealithiness over a prolonged duration of operation in order to be successful. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com

#IJSRD MOBILE PROTECTION VICTIMISATION VOICE VERIFICATION


Cellular communication business has developed leaps and bounds to become the core of day to day science. Mobile phones is that the spirit of cellular business. the quantity of mobile phones users is rising exponentially. however the privacy of user and security of mobile phones leftovers a difficult question. Theft of mobile phones has become the attention catching business for offender. There ought to be a reliable methodology of protective the instrument from thief. My paper proposes a brand new innovative, reliable, trick proof precautions for mobile phones victimization VOICE VERIFICATION. Voice verification is that the identification of a personal identity victimization speech because the spotting quality. The voice of the user is processed employing a digital gesture processor that is that the prime a part of a mobile. we have a tendency to are programming this DSP to implement this safety technique. For most a resourceful voice record of the user is formed. This record is hold on within the Flash read-only storage that is out there within the mobile. Then whenever the user speaks through the mobile phones a part of the speech sample is taken and hold on. This processed voice of the user is compared with the first folder to examine the identity of the user. If the user is allowed, he’s allowed to continue his speak. If not the transmission is cut unexpectedly by creating the DSP in inactive state. Therefore the mobile is being shielded from any extralegal user. Not with standing the mobile phones was purloined or lost it won’t be helpful for the other individual. The programmability of DSP and generality of Voice based mostly classification has given our methodology a twin advantage. Our set up demands neither external hardware nor additional price. The on top of methodology cause no hardship for the user not like this safety systems. This methodology may be adopted universally altogether models of Mobile phones and mobile phones for cover.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….
kindly share to all engineers…
Visit us on www.ijsrd.com

Wednesday, 13 August 2014

#IJSRD Cost effective and innovative housing technology


The current paper describes how quaternions are used successfully and effectively in simulations of unmanned aerial vehicles (UAVs) and satellite motion through definition of the UAV airframe or satellite body as a rigid body. By such means the authors try to raise interest among students and scientists in the mathematical formalism of quaternions that was very popular more than 100 years ago, but was replaced by vectors and matrices. Nevertheless, quaternions benefits make them valuable in numerous tasks, among others the numerical integration of rigid body motion dynamics equations.Simulations, part of the current project, can be viewed on http://ialms.net/sim/ web address.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com