33 results on '"Vishwanath P. Baligar"'
Search Results
2. Indian pothole detection based on CNN and anchor-based deep learning method
- Author
-
Mallikarjun Anandhalli, A. Tanuja, Vishwanath P. Baligar, and Pavana Baligar
- Subjects
Computational Theory and Mathematics ,Artificial Intelligence ,Computer Networks and Communications ,Applied Mathematics ,Electrical and Electronic Engineering ,Computer Science Applications ,Information Systems - Published
- 2022
- Full Text
- View/download PDF
3. Link Prediction in Social Networks Using Proximity-Based Algorithms
- Author
-
Aparna P M, Jayalaxmi G N, and Vishwanath P Baligar
- Published
- 2022
- Full Text
- View/download PDF
4. On Road Vehicle Detection and Tracking in Various Weather Conditions
- Author
-
Mallikarjun Anandhalli, Pavana Baligar, Vishwanath P. Baligar, and Prakash S. Hiremath
- Subjects
General Computer Science ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
5. Contrast Enhancement based CNN model for Lung Cancer Classification and Prediction using Chest X-ray Images
- Author
-
Swetha Kulkarni, Shrinivas D Desai, Nirmala Patil, Vishwanath P Baligar, Meena S M, and Nirmala S R
- Published
- 2022
- Full Text
- View/download PDF
6. Vehicle Detection and Tracking Based on Interest Points of Visual Appearance
- Author
-
Mallikarjun Anandhalli, A. Tanuja, Vishwanath P. Baligar, Pavana Baligar, and Santhosh S. Saraf
- Published
- 2022
- Full Text
- View/download PDF
7. Interpolation based Low Dose CT Image Reconstruction
- Author
-
Shrinivas D. Desai, Pooja Naik, Vishwanath P. Baligar, and Meena S M
- Subjects
medicine.diagnostic_test ,business.industry ,Computer science ,Cancer ,020206 networking & telecommunications ,Computed tomography ,02 engineering and technology ,Iterative reconstruction ,medicine.disease ,Sampling (signal processing) ,0202 electrical engineering, electronic engineering, information engineering ,Medical imaging ,medicine ,General Earth and Planetary Sciences ,Low dose ct ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,Noise (video) ,Medical diagnosis ,business ,General Environmental Science ,Interpolation - Abstract
Medical imaging has grown tremendously over years. The CT and MRI are used at most. MRI is less harmful, but one cannot underestimate the side effects of CT. Current study demonstrate the serious risk of cancer, due to repeated use of harmful X-rays. Consequently the plan of low dose imaging protocol is emerging as vital solution in the present scenario. Low dose imaging is achieved by sparse view scanning. The sparse-view x-ray computed tomography (CT) is appreciated in medical diagnosis and industrial non-destructive testing. However, when the sampling is insufficient due to sparse view, the reconstructed image usually suffers from complex artifacts and noise. In order to deal such issue, we present interpolation technique to fill the sinogram as promising method to address issues of low dose imaging. Reconstructed image quality parameters are recorded, and are compared to original image and the low dose image. The evidenced results convey substantial improved performance compared to conventional low does image.
- Published
- 2020
- Full Text
- View/download PDF
8. Block-Wise Image Compression Using Major and Minor Diagonal Pixels
- Author
-
Vishwanath P. Baligar, Vishwanath S. Kamatar, and Radhika Patil
- Subjects
Pixel ,Image quality ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data_CODINGANDINFORMATIONTHEORY ,computer.file_format ,JPEG ,Compression (functional analysis) ,Computer vision ,Artificial intelligence ,Raster graphics ,business ,computer ,Transform coding ,Data compression ,Image compression - Abstract
The important role played by the data compression is in reducing the storage space required, and ensuring bandwidth utilization in efficient manner and low transmission delays. Image compression is also a part of data compression. Images contain important data that is to be transmitted or stored. The compression must not degrade the quality of the image, and should be acceptable. This paper presents simple, low complexity image compression algorithm. Algorithm scans the image in a raster san manner in terms of 4X4 blocks. Compression is achieved by the diagonally situated pixels and indices their surrounding pixels of the block. The mages produced by proposed algorithm are high fidelity images at low PSNR values. The results are comparable with standard algorithm results. The reconstructed image quality is better than JPEG images at same PSNR.
- Published
- 2021
- Full Text
- View/download PDF
9. Low Complexity Gray-scale Image Compression Method Using Index-Based Approach
- Author
-
Vishwanath S. Kamatar and Vishwanath P. Baligar
- Subjects
Pixel ,Computer science ,Image quality ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Context (language use) ,Data_CODINGANDINFORMATIONTHEORY ,Huffman coding ,Grayscale ,Peak signal-to-noise ratio ,symbols.namesake ,Computer Science::Computer Vision and Pattern Recognition ,Computer Science::Multimedia ,symbols ,Computer vision ,Artificial intelligence ,business ,Transform coding ,Image compression - Abstract
Images consume more space when stored and use a lot of bandwidth during transmission. Hence, an image compression reduces storage space required, and time to transmit an image by making effective usage of bandwidth. In this paper, a simple image compression method using an index-based approach is proposed. This approach makes use of simple indices of an array to compress images. The context of nearby fifteen pixels is used, and the index for the current pixel is found. The indices are found for every pixel of an image. These indices are transformed and written into a transformed file. This transformed file is further compressed with Huffman compression to achieve a compressed file. Decompression uses a simple methodology to reconstruct the image. The pixel value is reconstructed using the index, and from previously reconstructed pixels of the image. The proposed algorithm provides high fidelity images at lower Peak Signal to Noise Ratio (PSNR). The results obtained from the proposed algorithm are compared with JPEG algorithm. At the same PSNR values, the quality of the reconstructed images by the proposed algorithm is comparable to that of the JPEG algorithm.
- Published
- 2021
- Full Text
- View/download PDF
10. Two Phase Image Compression Algorithm Using Diagonal Pixels of Image Blocks
- Author
-
Vishwanath S. Kamatar, Vishwanath P. Baligar, and Shivani S. Savanur
- Subjects
Pixel ,Image quality ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data_CODINGANDINFORMATIONTHEORY ,Iterative reconstruction ,computer.file_format ,Peak signal-to-noise ratio ,JPEG ,Computer Science::Computer Vision and Pattern Recognition ,Computer Science::Multimedia ,Computer vision ,Artificial intelligence ,business ,computer ,Transform coding ,Data compression ,Image compression - Abstract
Data compression is the way of reducing the number of bits required to store and efficiently utilize bandwidth during the transmission of data over a network channel. Image compression is also having importance as images contain important binary data to represent as image and that is to be stored and transmitted. The compression of an image must not reduce the quality of the image except in some cases. This paper proposes a compression algorithm with low PSNR, high fidelity images. The algorithm alienates the input image as non-overlapping blocks of size 4*4. Compression is achieved by using diagonally situated pixels and other adjacent pixels of the blocks. The decompression uses a simple approach. The diagonally situated pixels and other adjacent pixels are used to reconstruct images in decompression phase. The proposed algorithm reconstructs images with high fidelity at lower Peak Signal to Noise Ratio (PSNR). The results of proposed algorithm are compared with JPEG. Results have shown that at same PSNR values, reconstructed image quality by the proposed algorithm is better than that of the JPEG algorithm.
- Published
- 2021
- Full Text
- View/download PDF
11. Byte Shrinking Approach for Lossy Image Compression
- Author
-
Tanuja R. Patil and Vishwanath P. Baligar
- Subjects
Pixel ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Byte ,Data_CODINGANDINFORMATIONTHEORY ,Huffman coding ,Image (mathematics) ,symbols.namesake ,Digital image ,Transmission (telecommunications) ,Metric (mathematics) ,symbols ,Computer vision ,Artificial intelligence ,business ,Image compression - Abstract
Digital image storage and transmission is a challenging task nowadays. As per statistics, an average of 1.8 billion images are transmitted daily. Hence, image compression is inevitable. Here, we discuss a novel approach, which is a type of lossy image compression. But the quality of reconstructed image is higher. This method makes use of reducing the number of bytes by storing the number of ‘1’s in each bitplane of three adjacent pixels and recording the count of number of ‘1’s. This count value is stored, and later Huffman compression is applied. Reconstruction is done by energy distribution method. This gives better results in terms of quality at lower PSNR values compared to JPEG algorithm. Here we have used another metric to measure the quality of the image which is discussed in detail.
- Published
- 2021
- Full Text
- View/download PDF
12. A Systematic Review of Video Analytics Using Machine Learning and Deep Learning—A Survey
- Author
-
Prashant Narayankar and Vishwanath P. Baligar
- Subjects
Computer science ,business.industry ,Deep learning ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Cognitive neuroscience of visual object recognition ,Video processing ,Machine learning ,computer.software_genre ,Object detection ,Field (computer science) ,Analytics ,Video tracking ,Digital image processing ,Artificial intelligence ,business ,computer - Abstract
In recent years, video surveillance systems evolve a great interest as the application area. Recent studies have proven integration of digital image processing, computer vision, artificial intelligence and data analytics into video surveillance application. This paper provides a systematic review of the state-of-the-art video analysis techniques available in machine learning and deep learning. Video processing research trends illustrate a survey on practices like object detection, object recognition, object tracking, traffic control and monitoring, action and behaviour recognition, disaster management and so on. We further present focus on computational approaches for various challenges of video processing techniques, objectives of those techniques and evaluation based on multiple problems. In the end, we have discussed emerging issues in the field of video analytics and how machine learning and deep learning contribute to those issues.
- Published
- 2021
- Full Text
- View/download PDF
13. A Pixel Count Approach for Lossy Image Compression
- Author
-
Tanuja R. Patil and Vishwanath P. Baligar
- Subjects
Lossless compression ,Digital image ,Transmission (telecommunications) ,Pixel ,Computer science ,Compression (functional analysis) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Value (computer science) ,Data_CODINGANDINFORMATIONTHEORY ,Lossy compression ,Algorithm ,Data transmission - Abstract
Digital image storage and transmission plays a very important role in today’s modern world, as most of the data transfer involves images. Hence, digital image compression is of great importance. The compression leads to either lossy or lossless type of images. Here, we discuss about a unique approach for lossy image compression, which involves a threshold. The number of pixels whose sum is lesser than a threshold is counted, and this count is saved in a file instead of actual pixel intensity values. A difference between the threshold and the computed sum is also stored. Later, reconstruction is done by reading the count and difference values. Average is calculated, and the count number of pixels is replaced with this value. We find that we can achieve better quality at lower PSNR values with this approach as compared to JPEG algorithm.
- Published
- 2020
- Full Text
- View/download PDF
14. Real Time Vehicle Detection, Tracking and Counting Using Raspberry-Pi
- Author
-
Vishwanath P. Baligar and Apeksha P Kulkarni
- Subjects
050210 logistics & transportation ,Computer science ,05 social sciences ,Real-time computing ,Population explosion ,Python (programming language) ,01 natural sciences ,Raspberry pi ,Vehicle detection ,0502 economics and business ,0103 physical sciences ,Electronics ,Heavy traffic ,010306 general physics ,Video based ,computer ,Camera module ,computer.programming_language - Abstract
Population explosion leads to an unprecedented increase in the number of physical objects or vehicles on road. As a result, the number of road accidents increases due to a very heavy traffic flow. In this paper, traffic flow is monitored by using computer vision paradigm, where images or sequence of images provides a betterment on the road view. In order to detect vehicles, monitor and estimate traffic flow using low cost electronic devices, this research work utilizes camera module of raspberry pi along with Raspberry Pi 3. It also aims to develop a remote access using raspberry-pi to detect, track and count vehicles only when some variations occur in the monitored area. The proposed system captures video stream like vehicles in the monitored area to compute the information and transfer the compressed video stream for providing video based solution that is mainly implemented in Open CV by Python Programming. The proposed method is considered as an economical solution for industries in which cost-effective solutions are developed for traffic management.
- Published
- 2020
- Full Text
- View/download PDF
15. Low Cost IoT based Flood Monitoring System Using Machine Learning and Neural Networks: Flood Alerting and Rainfall Prediction
- Author
-
G N Jayalakshmi, Dola Sheeba Rani, and Vishwanath P. Baligar
- Subjects
Flood myth ,Artificial neural network ,business.industry ,Computer science ,020208 electrical & electronic engineering ,Complex system ,02 engineering and technology ,Machine learning ,computer.software_genre ,Field (computer science) ,Term (time) ,Work (electrical) ,Home automation ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,State (computer science) ,Artificial intelligence ,business ,computer - Abstract
The term Internet of Things [IoT] refers to the ever expanding complex system of basic things that emphasize communication between computing objects, devices and systems by offering connectivity from anyplace and at any time. It is estimated that by the end of 2020, 50 billion devices are said to be connected. IoT technologies play a crucial role to encompass many smart applications in real life. On the other hand, the crosscutting nature of IoT components and systems, introduce new security challenges. IoT covers advantages for various fields like agriculture, industry, healthcare, automobiles and home automation for improving and automating various day-to-day activities. Flood is usually caused either by change in the state of water body or due to the overflow of rivers, dams, etc. Due to advanced civilization and improved human life, environment problems also tend to increase. This paper includes the effective and flexible method for the detection of flood and alerting system. The most advanced technologies like machine learning (ML) provide significant boon to the field of technology are very powerful in monitoring the normal and abnormal behavioral characters of any machine. The objective of this work is to survey on flood issues. Neural networks are most popular, widely used for rainfall forecasting and perform efficiently.
- Published
- 2020
- Full Text
- View/download PDF
16. A novel approach in real-time vehicle detection and tracking using Raspberry Pi
- Author
-
Mallikarjun Anandhalli and Vishwanath P. Baligar
- Subjects
050210 logistics & transportation ,Motion analysis ,Engineering ,Vehicle tracking system ,business.industry ,05 social sciences ,Frame (networking) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,General Engineering ,0102 computer and information sciences ,HSL and HSV ,Kalman filter ,Engineering (General). Civil engineering (General) ,Tracking (particle physics) ,01 natural sciences ,010201 computation theory & mathematics ,0502 economics and business ,RGB color model ,Computer vision ,Artificial intelligence ,Noise (video) ,TA1-2040 ,business - Abstract
Real-time vehicle detection, tracking and counting of vehicles is of great interest for researchers and is a need of the society in general for comfortable, smooth and safe movements of vehicles in cities. We propose a video image processing algorithm which detects, tracks and finds the number of vehicles on a road. We convert RGB video frame to HSV color domain, which helps in differentiating the colors of the vehicles more absolutely. The noise is removed from each frame. Detection of the vehicles is purely carried on color features of the vehicles. Vehicle tracking is done using Kalman filter with the data association. The number of vehicles running in a video or in a particular lane is determined. We propose a novel idea to detect, track and count the vehicles on a road and it has been implemented on Raspberry Pi 3 using OpenCV and C++. We have compared the results of the proposed method with that of rear-view vehicle detection and tracking method (Bin et al., 2014) and morphological operation method (Zezhong et al., 2013), and found that the proposed algorithm is more effective in terms of accuracy of vehicle detection and cost. Keywords: Motion analysis, Moving vehicle detection, Tracking, Raspberry Pi and urban environment
- Published
- 2018
- Full Text
- View/download PDF
17. An Approach to Detect Vehicles in Multiple Climatic Conditions Using the Corner Point Approach
- Author
-
Vishwanath P. Baligar and Mallikarjun Anandhalli
- Subjects
050210 logistics & transportation ,Mathematical optimization ,Computer science ,Science ,05 social sciences ,QA75.5-76.95 ,02 engineering and technology ,corners ,tracking ,Tracking (particle physics) ,Computer Science::Robotics ,grouping ,Artificial Intelligence ,Electronic computers. Computer science ,Vehicle detection ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,vehicle detection ,020201 artificial intelligence & image processing ,Point (geometry) ,Algorithm ,Software ,Information Systems - Abstract
This paper presents a new method of detecting vehicles by using a simple and effective algorithm. The features of a vehicle are the most important aspects in detection of vehicles. The corner points are considered for the proposed algorithm. A large number of points are densely packed within the area of a vehicle, and the points are calculated by using the Harris corner detector. Making use of the fact that they are densely packed, grouping of these points is carried out. This grouping indicates that the group of corners belongs to each vehicle, and such groupings play a vital role in the algorithm. Once grouping is done, the next step is to eliminate the background noise. The Lucas-Kande algorithm is used to track the extracted corner points. Each corner point of the vehicle is tracked to make the output stable and reliable. The proposed algorithm is new, detect vehicles in multiple conditions, and also works for complex environments.
- Published
- 2018
- Full Text
- View/download PDF
18. A Novel Approach to Detect Phone Usage of Motor-vehicle Drivers by balancing Image Quality on Roads
- Author
-
Mallikarjun Anandhalli, Pavana Baligar, Vishwanath P. Baligar, and Srijan Bhattacharya
- Subjects
General Medicine - Published
- 2022
- Full Text
- View/download PDF
19. Image Compression Using Patterns
- Author
-
Vishwanath P. Baligar and Vishwanath S. Kamatar
- Subjects
Computer science ,business.industry ,Signal Processing ,Computer vision ,Artificial intelligence ,business ,Image compression - Published
- 2017
- Full Text
- View/download PDF
20. RADAR based Object Detector using Ultrasonic Sensor
- Author
-
Vishwanath P. Baligar, Suresh Hegde, Akshaya U Kulkarni, and Amit M Potdar
- Subjects
021110 strategic, defence & security studies ,business.industry ,Computer science ,020209 energy ,0211 other engineering and technologies ,Ranging ,02 engineering and technology ,Servomotor ,Rotation ,Object (computer science) ,Object detection ,law.invention ,law ,0202 electrical engineering, electronic engineering, information engineering ,Computer vision ,Ultrasonic sensor ,Artificial intelligence ,Radar ,business ,Radio wave - Abstract
Target/object detection, recognition, position, movement speed, etc. is easy when the object is near or easily visible. But, the same doesn’t stand true especially when the object is far or not visible due to so many factors like weather conditions, day/night cycle, etc. Therefore, Radio Detection And Ranging (RADAR) was invented, which uses radio waves to determine the range, angle, or velocity of objects. But, it uses long time to detect, has short detection range, not target specific because of wide range, oversensitive, costly, etc. A cheaper, easy and effective alternate solution is to use ultrasonic sensor which use sound waves for detection and ranging. Therefore, this paper provides a method in which the Ultrasonic Sensor (HC-SR04) acts as RADAR. The HC-RS04 is connected to Servo Motor (SG90) for the rotation/movement purpose. SIM808 module is also used to notify object detection via message/SMS. These components are connected to Arduino Uno and Raspberry Pi3 for being processed to detect and notify the object. Usually, the range of ultrasonic wave is 20kHz but here the HC-SR04 range is 3cm to 4m as it is smaller in terms of project usage. Advantages are: it is not affected by color or transparency of objects, can be used in dark environments, not highly affected by dust, dirt, or high-moisture environments, etc. The results show the object detected with its range/distance and angle in a java based GUI, different ranges of object in cm at which it is detected and the detection message sent to the admin.
- Published
- 2019
- Full Text
- View/download PDF
21. IoT based Smart Attendance Monitoring System using RFID
- Author
-
Akshata Rajoor, Akshata Shiralkar, Vishwanath P. Baligar, Shobha Hiremath, and Unnati Koppikar
- Subjects
Database server ,Web server ,Multimedia ,business.industry ,Computer science ,Attendance ,Monitoring system ,Card reader ,02 engineering and technology ,computer.software_genre ,020204 information systems ,Component-based software engineering ,0202 electrical engineering, electronic engineering, information engineering ,Radio-frequency identification ,Internet of Things ,business ,computer - Abstract
Most of the institutional authorities are troubled with the cumbersome method of maintaining manual attendance of their employees. The manual process of signing on a paper is prolonged and insecure. An efficient attendance monitoring system needs to be enforced at such places. Radio Frequency Identification (RFID) based attendance system provides us with a solution that caters to issues like proxy attendance. This paper describes the design of an RFID based attendance monitoring system which uniquely identifies each employee/student based on their RFID tag which is attached to their ID card. This makes the mechanism of recording the attendance effortless, quicker and protected as compared to conventional method. This system is designed to be used at different educational institutions, corporate offices, government offices etc. The proposed system consist of both hardware and software components based on IoT Technology. The hardware component consists of RC522 RFID card reader and RFID tags/cards. The software component consists of the Web-based GUI for viewing the employee’s or student’s attendance, which is hosted on a web server and which stores the data in a database server. The employees or students just need to place their RFID card or tag on the reader and their attendance will be recorded for the day. Also, the attendance recorded will be more accurate as the system is synced with a real-time clock.
- Published
- 2019
- Full Text
- View/download PDF
22. SLA-aware Virtual Machine Scheduling in OpenStack-based Private Cloud
- Author
-
Vishwanath P. Baligar, Preeti Parakh, Mohammed Moin Mulla, and Narayan D G
- Subjects
Service-level agreement ,Resource scheduling ,Computer science ,business.industry ,Distributed computing ,Energy cost ,Virtual machine scheduling ,Provisioning ,Cloud computing ,Cloud service provider ,business ,Scheduling (computing) - Abstract
Cloud computing is a distributed platform that offers dynamic provisioning of on-demand resources to the users. The rapid growth of cloud computing is due to its adaptive nature that brings enormous benefits to the organizations. OpenStack is a cloud operating system used to build public and private clouds. OpenStack consists of a number of interconnected entities that are combined to govern the processing of compute, network and storage resources. Resource scheduling in OpenStack deals with provisioning of compute resources. Nova-scheduler is a component of OpenStack Compute service which is responsible for resource scheduling. The default nova-scheduler used in OpenStack is Filter Scheduler. The scheduling approach presently used is ineffective in terms of cost, resource usage and energy cost per server. To address these issues, we propose a SLA (Service Level Agreement)-aware resource scheduling strategy which provides better gain to both customers and cloud service providers. We carry out the experiments using real-time multinode private cloud setup. The results reveals the effectiveness of the designed resource scheduling model.
- Published
- 2018
- Full Text
- View/download PDF
23. Lossless Image Compression using Proposed Equations and JPEG-LS Prediction
- Author
-
Vishwanath P. Baligar, Roopa P. Huilgol, and Tanuja R. Patil
- Subjects
Lossless compression ,Pixel ,Physics::Instrumentation and Detectors ,Computer science ,05 social sciences ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,050301 education ,Context (language use) ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,computer.file_format ,Huffman coding ,JPEG ,symbols.namesake ,Computer Science::Computer Vision and Pattern Recognition ,020204 information systems ,Compression (functional analysis) ,Computer Science::Multimedia ,Compression ratio ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,0503 education ,Algorithm ,computer ,Sign (mathematics) - Abstract
This paper proposes a new lossless image compression technique which makes use of simple mathematical equations along with Joint Photographic Expert Group Lossless (JPEG-LS) prediction technique to compress the image. Context of four pixels is used and the four pixels are varied in their signs which constitute a system of sixteen equations. Among the four context pixels, three pixels are actual pixels whereas the fourth pixel is the predicted value of the current pixel. Equations are solved to obtain the equation which result in minimum positive equation. Having obtained the minimum positive equation, it is solved by replacing the predicted pixel by the actual pixel value. Resulting absolute value is written in the image which results in transformed image and the sign of the result is written in a file. Both the transformed image and the sign file are Huffman encoded to reduce their size further. Compression ratio achieved for Lena image using the proposed compression technique is 1.6.
- Published
- 2018
- Full Text
- View/download PDF
24. Lossless Image Compression Using Seed Number and JPEG-LS Prediction Technique
- Author
-
Tanuja R. Patil, Vishwanath P. Baligar, and Roopa P. Huilgol
- Subjects
Lossless compression ,Pixel ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data_CODINGANDINFORMATIONTHEORY ,computer.file_format ,Huffman coding ,JPEG ,symbols.namesake ,Compression ratio ,symbols ,Rectangle ,Joint (audio engineering) ,computer ,Algorithm ,Block (data storage) - Abstract
This paper presents a new lossless image compression algorithm which uses Joint Photographic Expert Group-Lossless (JPEG-LS) prediction technique and the concept of the seed number for compression. Image is processed in blocks of size 4*4. Pixels of the blocks are placed in a table of size 16*16. The span across which the pixels of each block are spread in the table is determined which forms a rectangle. Seed number for that block is computed. Using the JPEG-LS prediction technique in regular mode, the pixels are predicted and their position in the rectangle is found. Huffman encoded seed number, rectangle position and the positions of the pixels constitute the compressed files. Image is decompressed by Huffman decoding the files and reconstructing the pixels with the help of the pixel position, rectangle position and the seed number. This approach gives a new technique to compress the image, It is a simple approach and though the compression ratio is slightly lesser compared to JPEG-LS, it can be improved by Iterative approach.
- Published
- 2018
- Full Text
- View/download PDF
25. Experimental study on JPEG-LS algorithm
- Author
-
Radhika Amashi, Priyadarshini Kalwad, and Vishwanath P. Baligar
- Subjects
Lossless compression ,Context model ,Pixel ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data_CODINGANDINFORMATIONTHEORY ,computer.file_format ,Huffman coding ,Grayscale ,JPEG ,symbols.namesake ,Encoding (memory) ,symbols ,Entropy encoding ,computer ,Algorithm - Abstract
In order to meet the increasing need of high quality images in the current trend, it is very important to manage image data so that they can be efficiently transmitted, received and stored without any loss of information. This motivates us to perform a research on the JPEG-LS, which is the current standard for lossless image compression. In this paper a comparative study of JPEG-LS algorithm is presented. 7 lossless techniques are proposed and compared with the performance of JPEG-LS. 5 of proposed techniques use the casual template used in JPEG-LS with fixed predictor and limited to work in regular mode of operation which involves prediction followed by entropy coding. Rest 2 techniques are independent of JPEG-LS and perform encoding based on position information of each pixel. Huffman coding is used for entropy coding of prediction errors and transformed images. Experimentation is done using 10 standard grayscale images of size 512∗512 and results show that the JPEG-LS performs better.
- Published
- 2017
- Full Text
- View/download PDF
26. Detection of distributed denial of service attacks using machine learning algorithms in software defined networks
- Author
-
Nisharani Meti, Vishwanath P. Baligar, and D. G. Narayan
- Subjects
Artificial neural network ,Computer science ,business.industry ,020206 networking & telecommunications ,Denial-of-service attack ,02 engineering and technology ,Network behavior ,Machine learning ,computer.software_genre ,Control system ,Server ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,Software-defined networking ,business ,Classifier (UML) ,computer ,Algorithm - Abstract
Software Defined Networking (SDN) is a new promising networking concept which has a centralized control over the network and separates the data and control planes. This new approach provides abstraction of lower-level functionality and allows the network administrators to initialize, control, change, and manage network behavior programmatically. The centralized control, being the major advantage of SDN can sometimes also be a major security threat. If the intruder succeeds in attacking the central controller, he would get access to the entire system. The controller is highly vulnerable to Distributed Denial of Service (DDoS) attacks which lead to exhaustion of the system resources which causes non-availability of the services given by the controller. It is critical to detect the attacks in the controller at earlier stage. Many algorithms and techniques have been discovered for this purpose. But less work has been done in the field of SDN networks. Using machine learning algorithms for classifying the connections into legitimate and illegitimate is one such solution. We use two machine learning algorithms namely, the Support Vector Machine (SVM) classifier and the Neural Network (NN) classifier to detect the suspicious and harmful connections.
- Published
- 2017
- Full Text
- View/download PDF
27. Optimization of wright Huang-HYPR low dose reconstruction technique using taguchi method
- Author
-
Shrinivas D. Desai, Vishwanath P. Baligar, Priya Powar, and Amreen Kausar Gorvankolla
- Subjects
medicine.diagnostic_test ,Image quality ,Computer science ,Radiation dose ,Cancer ,Computed tomography ,Iterative reconstruction ,030204 cardiovascular system & hematology ,medicine.disease ,030218 nuclear medicine & medical imaging ,Image (mathematics) ,03 medical and health sciences ,Taguchi methods ,Range (mathematics) ,0302 clinical medicine ,medicine ,Medical imaging ,Algorithm design ,Noise (video) ,Radiation-induced cancer ,Algorithm - Abstract
Medical imaging has been identified as one of the fastest growing of all health care sectors. Despite the overwhelming benefits of computed tomography (CT) in diagnosis, there is concern over radiation induced cancer. Retaining diagnostically acceptable medical image quality with minimum radiation dose is the current need in the healthcare system. In this paper we have optimized WH-HYPR low dose image reconstruction algorithm using Taguchi method of experimental design and also studied the clinical permissible low dose range. The Wright Huang-Highly constrained back Projection (WH-HYPR) algorithm is considered as most promising low dose image reconstruction technique. This technique involves the formation of composite and weighted image whose product results in HYPR image with good temporal and spatial characteristics. Taguchi Method is a statistical approach used to fine tune the process influenting parameters more methodically and speedily [1]. Through the research work it is found that the algorithm can be optimized by considering a static constraint angle of 120° while the formation of the backprojection and also CT datasets containing around 15 to 20 time frames with least noise, maximum 20% structural and contrast variability generated a better quality HYPR image. An angle of 1° was found to be the threshold incremental angle for clinically acceptable low dose CT datasets used in WH-HYPR reconstruction. The proposed WH-HYPR algorithm allows better retention of image quality when compared with other reconstruction methods like FBP, AIDR3D and IR for undersampled data.
- Published
- 2017
- Full Text
- View/download PDF
28. IoT based flow control system using Raspberry PI
- Author
-
Ashok K. Chikaraddi, Shavarsidha Gunde, and Vishwanath P. Baligar
- Subjects
0301 basic medicine ,Flow control (data) ,business.industry ,Wireless network ,Computer science ,Real-time computing ,Cloud computing ,law.invention ,Water resources ,03 medical and health sciences ,Water conservation ,Upload ,030104 developmental biology ,law ,Wireless ,The Internet ,Submersible pump ,business - Abstract
The Internet of Things (IoT) defines that objects are interconnected through wired and wireless networks without user intervention. The current IoT perform, sensing, actuating, data gathering, storing, and processing by connecting physical or virtual devices to the Internet. The application of IoT brings the higher efficiency and the more convenient life. Meanwhile, data collection will benefit from the ability to detect changes in the physical status of things. Large quantities of low cost, unattended wireless sensor nodes may be deployed to monitor a wide range of environments. Water is an essential resource and its management is a key issue. The proposed work is IOT based system for management of water distribution on a large campus. Depending on the level of the water, the submersible pump starts and stops automatically. When a level of water in an overhead tank is minimum then submersible pump automatically starts pumping and when it reaches to maximum level then submersible pump stops automatically. If the level of water reaches the maximum then intimate the user through SMS and upload detected water levels to the cloud. This system works automatically without any human intervention.
- Published
- 2017
- Full Text
- View/download PDF
29. Vehicle Detection and Tracking Based on Color Feature
- Author
-
Mallikarjun Anandhalli and Vishwanath P. Baligar
- Subjects
Convex hull ,Engineering ,business.industry ,Feature (computer vision) ,Feature extraction ,Centroid ,Computer vision ,Kalman filter ,Artificial intelligence ,business ,Tracking (particle physics) ,Connected-component labeling ,Intelligent transportation system - Abstract
Determining the vehicle density running on the specific road is an important topic in Intelligent Transportation System. Reliable and robust vehicle detection from video sequence is an important problem in the application to control the traffic. The processing time of the vehicle detection system should meet the real time and should be free from false detection. The density of the vehicles defines the usage of road, traffic signals, etc. If the congestion is high road widening should be taken place or the vehicle should be diverted to the other way so that congestion cannot take place the next time. The algorithm proposed in the system detects vehicle and track them in real time. Detection of the vehicles is purely carried on color features of the vehicles. After detection of the vehicles they are tracked using enhanced Kalman filter with the data association. Cost matrix for data association plays an important role in allocating a centroid to each enhanced Kalman filter. So, that Kalman filter tracks the same centroid. The number of vehicles running in a video or in particular lane can be determined. Detection, tracking, convex hull, connected component labeling, color extraction.
- Published
- 2017
- Full Text
- View/download PDF
30. A Survey on Intelligent Security Techniques for High-Definition Multimedia Data
- Author
-
Vishwanath P. Baligar, N. R. Pudakalakatti, and Shrinivas D. Desai
- Subjects
0209 industrial biotechnology ,Steganography ,Multimedia ,business.industry ,Computer science ,020208 electrical & electronic engineering ,Intelligent decision support system ,Data security ,Cryptography ,Watermark ,02 engineering and technology ,computer.software_genre ,Encryption ,020901 industrial engineering & automation ,0202 electrical engineering, electronic engineering, information engineering ,business ,Digital watermarking ,computer ,3D computer graphics - Abstract
Multimedia security has advanced tremendously over the decades due to the change in variety and volume of data. In the current security context, intelligent systems for multimedia security are very much in demand. Various applications such as biometric, e-commerce, medical imaging, forensics, aerospace, and defense require high-end data security systems. Conventional cryptography, watermarking, and steganography fall in short to provide security for high-resolution 2D/3D image and high-definition video. Persistent demand exists for designing new security algorithms for 3D graphics, animations, and HD videos. Traditional encryption method does not suffice the current need, as its securing ability is limited when it gets decoded. Steganography techniques are reported for securing text, audio, and video content, but observed to be few in number compared to image steganography techniques. Watermarking techniques for securing video content, text, and animations are reported in the literature but seem to be few in numbers as compared to image watermarking techniques. Majority of the literature is observed to apply digital watermarking as security means for video and image data. However, digital watermarking for 3D graphics is a current research topic. On the other hand, video watermarking techniques shall be broadly classified based on domain and human perception. Usually, video watermarking techniques do not alter video contents. But current trend shows that security techniques are designed based on video content. This kind of security methods is claimed to be far superior as they concentrate not only on watermarking but also on synchronization of watermark. In this chapter, we present a comprehensive review of multimedia security techniques emphasizing on their applicability, scope, and shortcomings especially when applied to high-definition multimedia data. Problematic issues of intelligent techniques in signal processing for multimedia security and outlook for the future research are discussed too. The major goal of the paper was to provide a comprehensive reference source for the researchers involved in designing multimedia security technique, regardless of particular application areas.
- Published
- 2016
- Full Text
- View/download PDF
31. Improvised approach using background subtraction for vehicle detection
- Author
-
Mallikarjun Anandhalli and Vishwanath P. Baligar
- Subjects
Background subtraction ,Pixel ,business.industry ,Computer science ,Sight ,Computer graphics (images) ,Component (UML) ,Vehicle detection ,Shadow ,Computer vision ,Artificial intelligence ,business ,Intelligent transportation system ,Real time tracking - Abstract
In advanced intelligent transport systems, detection of the vehicles has become very popular in the traffic area and also to identify the density of the vehicles in that particular area. As per the survey background subtraction is identified as one of the best approaches in identifying the vehicles for static camera. An improvised background subtraction model is adopted, wherein it works for real time tracking and also solves the problems of shadow detection. In background subtraction each pixel is updated with update equations. A component labeling technique is introduced after background subtraction to label the different objects so as to bifurcate between the two objects and each region is labelled with the different label values. Detections of the moving vehicles are identified and the density of vehicles travelling in the sight of the camera is determined
- Published
- 2015
- Full Text
- View/download PDF
32. Low complexity, and high fidelity image compression using fixed threshold method
- Author
-
G. R. Nagabhushana, Vishwanath P. Baligar, and Lalit M. Patnaik
- Subjects
Lossless compression ,Information Systems and Management ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Wavelet transform ,Data_CODINGANDINFORMATIONTHEORY ,Computer Science Applications ,Theoretical Computer Science ,Tree (data structure) ,Set partitioning in hierarchical trees ,Artificial Intelligence ,Control and Systems Engineering ,Computer Science::Computer Vision and Pattern Recognition ,Codec ,Computer vision ,Artificial intelligence ,business ,Computer Science & Automation ,Software ,High Voltage Engineering (merged with EE) ,Image compression ,Data compression - Abstract
This paper deals with the design and implementation of an image coding algorithm based on fixed threshold method. Threshold is the Peak Absolute Error (PAE) allowed in the reconstructed image. It has been shown that lossless edges with near-lossless/lossless filled area give a high fidelity images. Results are compared with Set Partitioning In Hierarchical Tree (SPIHT) [A. Said, W.A. Pearlman, A new, fast, and efficient image codec based on set partitioning in hierarchical trees, IEEE Trans. Circ. Syst. Video Technol. 12 (1996) 243–250] method. Experimented results show that the proposed method provides high fidelity images, and it has been shown that these images are visually better than images reconstructed using SPIHT algorithm for the same compression ratio. The execution time of the algorithm is almost half compared to that of the SPIHT algorithm which requires wavelet transform of an image.
- Published
- 2006
- Full Text
- View/download PDF
33. High compression and low order linear predictor for lossless coding of grayscale images
- Author
-
Vishwanath P. Baligar, G. R. Nagabhushana, and Lalit M. Patnaik
- Subjects
JBIG2 ,Lossless compression ,Computer science ,business.industry ,Tunstall coding ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data_CODINGANDINFORMATIONTHEORY ,computer.file_format ,Lossy compression ,Computer Science::Computer Vision and Pattern Recognition ,Computer Science::Multimedia ,Signal Processing ,Computer vision ,Computer Vision and Pattern Recognition ,Entropy encoding ,Artificial intelligence ,business ,computer ,Algorithm ,Computer Science & Automation ,Context-adaptive binary arithmetic coding ,High Voltage Engineering (merged with EE) ,Data compression ,Image compression - Abstract
In this paper we propose a novel method for designing block-wise lossless image compression scheme using linear predictors. In this prediction scheme, the prediction for each pixel is formed by using a set of least-square-based linear prediction coefficients of the block to which the current pixel belongs. Predicted value of each pixel is subtracted from the actual value of the current pixel to get an error image. An error image is compressed using grayscale bit plane coding using quadtree method. Experimental results show that the compression performance of the proposed method is superior to Joint Photographics Expert Group's [1] JPEG-LS [IEEE Trans. Image Processing 9 (2000) 1309] method, and Classified Adaptive Prediction and Entropy Coding in terms of coding performance.
- Published
- 2003
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.