Journal of Computer Based Parallel Programming
Latest Publications


TOTAL DOCUMENTS

8
(FIVE YEARS 8)

H-INDEX

0
(FIVE YEARS 0)

Published By MAT Journals (A Unit Of ARV Infomedia Pvt. Ltd.)

2582-2179

Author(s):  
Manoj Kumar Dixit

Text detection in video frames provide highly condensed information about the content of the video and it is useful for video seeking, browsing, retrieval and understanding video text in large video databases. In this paper, we propose a hybrid method that it automatically detects segments and recognizes the text present in the video. Detection is done by using laplacian method based on wavelet and color features. Segmentation of detected text is divided into two modules Line segmentation and Character segmentation. Line segmentation is done by using mathematical statistical method based on projection profile analysis. In line segmentation, multiple lines of text in video frame obtained from text detection are segmented into single line. Character segmentation is done by using Connected Component. Analysis (CCA) and Vertical Projection Profile Analysis. The input for character segmentation is the line of text obtained from line segmentation, in which all the characters in the line are segmented separately for recognition. Optical character recognition is Processed by using template matching and correlation technique. Template matching is performed by comparing an input character with a set of templates, each comparison results in a similarity measure between the input characters with a set of templates. After all templates have been compared with the observed character image, the character’s identity is assigned with the most similar template based on correlation. Eventually, the text in video frame is detected, segmented, and processed to OCR for recognition.


Author(s):  
Chitra Bhole

Handwritten character recognition a field of research in AI, computer vision, and pattern recognition. Devanagari handwritten Marathi compound character recognition is most tedious tasks because of its complexity as compared to other languages. As compound character is combination of two or more characters it becomes challenging task to recognize it. However, the researchers used various methods like Neural Network, SVM, KNN, Wavelet transformation to classify the features of compound Marathi characters and tried to give the accuracy in the recognition of it. But the problem of feature extraction, and time required is large. In this paper I am proposing the Offline handwritten Marathi compound character recognition using deep convolution neural network which reduces the computational time and increases the accuracy.


Author(s):  
G Sriman Narayana ◽  
Kuruva Arjun Kumar

In privacy-enhancing technology, it has been inevitably challenging to strike a maintain balance between privacy, efficiency and usability (utility). We propose a highly practical and efficient approach for privacy-preserving integration and sharing of datasets among a group of participants. At the heart of our solution is a new interactive protocol, Secure Channel. Through Secure Channel, each participant is able to randomize their datasets via an independent and untrusted third party, such that the resulting dataset can be merged with other randomized datasets contributed by other participants group in a privacy-preserving manner. Our process does not require any public or key sharing between participants in order to integrate different datasets. This, in turn, leads to a user can understand and use easily and scalable solution. Moreover, the accuracy of a randomized dataset which are returned by the third party can be securely verified by the other participant of group. We further demonstrate Secure Channel’s general utilities, using it to construct a structure preserving data integration protocol. This is mainly useful for, good quality integration of network traffic data.


Author(s):  
C Santha Kumar ◽  
V Mallesi

In recent years, photo-based social media has become one of the most common social media platforms. Understanding user preferences in user-generated images and making suggestions has become a major necessity due to the large number of images uploaded daily. Several types of hybrids have been suggested to improve the performance of the recommendations by combining different types of third-party information (e.g., image representation, interaction) with user object history. Previous research, however, has failed to incorporate complex factors that affect user preferences into the corresponding framework due to various image features created by users on social media. In addition, many of these hybrid models have used pre-defined weights to combine different types of data, resulting in less favorable performance. To this end, we present a consistent model for capturing public imagery in this paper. We define three key elements (i.e., upload history, social exposure, and proprietary information) that affect each user's preferences, where each item summarizes the content aspect from complex interactions between users and images, in addition to the basic matrix interest model matrix factorization proposal. After that, we create a consecutive natural attention network that demonstrates a consistent relationship between hidden user interests and known key elements (elements at each level and feature level). A sequential attention network will learn to pay attention to more or less content using embedding from higher learning models designed for each type of data. Finally, the availability of extensive tests on real-world information indicates that our proposed model is superior.


Author(s):  
C Vijaya Kumar ◽  
G S Udaya Kiran Babu
Keyword(s):  

Steganography is a way of hiding data in the context of an image, preventing a person from finding it by mistake. This is an explicit text file with an image file. Due to the need for steganography, we have proposed a new algorithm called the use of steganography. In our algorithm, we should have a cover and a message. It can be pixel-for-pixel in an image. In it, we will have to use every bit of encryption. This process will continue until the final track of encryption. After this step, the data is hidden in the image. We will send the image file to the client, and the client will need to change the process to download the source code to the image.


Author(s):  
Niharika Jain ◽  
Shiv Kumar Agarwal ◽  
Tushar Sharma ◽  
Nitesh Kaushik
Keyword(s):  

2020 ◽  
Vol 5 (2) ◽  
pp. 22-25
Author(s):  
Rekha VS ◽  
Mani Barathi SP S ◽  
M. Sujithra

2020 ◽  
Vol 05 (02) ◽  
pp. 1-5
Author(s):  
S. Kalpana Devi ◽  
Bitra Sainadh ◽  
Hemanth T ◽  
Hariharan K

Sign in / Sign up

Export Citation Format

Share Document