Papers by Ganeshchandra Shinde
International Journal
... GN Shinde,Inamdar SA, Int. J. Comp. Tech. Appl., Vol 2 (2), 280-283 282 ISSN:2229-6093 Page 4... more ... GN Shinde,Inamdar SA, Int. J. Comp. Tech. Appl., Vol 2 (2), 280-283 282 ISSN:2229-6093 Page 4. ... REFERENCES [1] Li Zhan, Liu Zhijing, , ' Web Mining Based On Multi-Agents ', COMPUTER SOCIETY,IEEE(2003) [2] Margaret H. Dunham and Sridhar, Data Mining, Introduction ...
This paper presents a novel robust invisible watermarking method for still images. The scheme is ... more This paper presents a novel robust invisible watermarking method for still images. The scheme is implemented on hardware, and it can be incorporated with the lossless JPEG2000 compression standard. We have implemented Cohen-Daubechies-Favreau (CDF) 5/3 wavelet filters with lifting scheme which requires less hardware and they are also the basis of lossless JPEG2000. Its modular structure is well suitable for hardware implementation and it is more efficient use of power and chip area. The objective of the hardware assisted watermarking is to achieve low power usage, real-time performance, robust and ease of integration with existing consumer electronic devices such as scanners, cameras and handy camcorders. The proposed scheme of watermarking is tested with StirMark software which is a one of the benchmarking software for watermarking scheme. The experimental result shows that the proposed scheme of watermarking is robust against most of the geometric attacks such as scaling and rotation. We have proposed a dual detection technique for watermark detection which is a novelty of our algorithm.
Faster RSA Algorithm for Decryption Using Chinese Remainder Theorem G.N. Shinde1 and H.S. Fadewar... more Faster RSA Algorithm for Decryption Using Chinese Remainder Theorem G.N. Shinde1 and H.S. Fadewar2 Summary E-business security is an overarching business issues that, based of an analyzed risks, and establishes the threat acceptance and reduction parameters for the safe use of technology. As an overarching issue, e-business security can be thought of as being absolutely fundamental to the effective and efficient use of Information Technology in support of e-business. This paper proposed four time faster RSA-CRT algorithm for decryption of data and effective representation of encryption using Chinese Remainder Theorem (CRT) for the data security. The algorithm is implemented in Java source code. keywords: Encryption, Decryption, RSA, and CRT
Electronic Letters on Computer Vision and Image Analysis, 2006
A novel Adaptive Color Image Segmentation (ACIS) System for color image segmentation is presented... more A novel Adaptive Color Image Segmentation (ACIS) System for color image segmentation is presented. The proposed ACIS system uses a neural network with architecture similar to the multilayer perceptron (MLP) network. The main difference is that neurons here uses a multisigmoid activation function. The multisigmoid function is the key for segmentation. The number of steps i.e. thresholds in the multisigmoid function are dependant on the number of clusters in the image. The threshold values for detecting the clusters and their labels are found automatically from the first order derivative of histograms of saturation and intensity in the HSV color space. Here, the main use of neural network is to detect the number of objects automatically from an image. The advantage of this method is that no a priori knowledge is required to segment the color image. ACIS label the objects with their mean colors. The algorithm is found to be reliable and works satisfactorily on different kinds of color ...
2008 Congress on Image and Signal Processing, 2008
Journal of Software Engineering and Applications, 2011
Summary Data Mining (DM) techniques are well-known for providing flexible and efficient analytica... more Summary Data Mining (DM) techniques are well-known for providing flexible and efficient analytical tools for data processing. In this paper, we propose intelligent data control system design and specifications as an example of DM application in marketing data processing. E-Marketing businesses are using Data Mining to identify patterns in customers’ buying behavior; identify profitable customer segments; increase marketing return rates; prevent loss of valuable customers; estimate credit risk; identify fraudulent activity and much more.
International Journal of …, 2010
International Journal of Signal Processing, Ima International Journal of Signal Processing, Image... more International Journal of Signal Processing, Ima International Journal of Signal Processing, Image Processing and Pattern Recognition ge Processing and Pattern Recognition ge Processing and Pattern Recognition Vol. 3, No. Vol. 3, No. 2, June, 2010 ... A FUZZY LOGIC APPROACH ...
In this paper a novel multimedia architecture design pattern (MADP) is proposed which uses contro... more In this paper a novel multimedia architecture design pattern (MADP) is proposed which uses controlled synchronization signals. The architecture can be tested for multimedia production. It is expected that the synchronization signals will play a vital role in multimedia production. The advantages of design pattern and design formation are clearly used. The prototype presented in this paper focuses on control signal with the feature of delay remover. The multimedia architectures used for framing has importance over synchronization; control signal with delay remover presents a novel architecture for audio joiner prototype. The problems of journalism mass communication for audio transfer, broadcast and presentation are affected at the time of audio mixing by the problems of synchronization and delay occured in multimedia formation. This algorithm will set new benchmark in commercial, educational, communication, entertainment multimedia products.
E-business security is an overarching business issues that, based of an analyzed risks, and estab... more E-business security is an overarching business issues that, based of an analyzed risks, and establishes the threat acceptance and reduction parameters for the safe use of technology. As an overarching issue, e-business security can be thought of as being absolutely fundamental to the effective and efficient use of Information Technology in support of e-business. This paper proposed four time faster RSA-CRT algorithm for decryption of data and effective representation of encryption using Chinese Remainder Theorem (CRT) for the data security. The algorithm is implemented in Java source code.
Proceeding of First Doctoral Symposium on Natural Computing Research
Nowadays, significant demand for precision agriculture applications to monitor the farm condition... more Nowadays, significant demand for precision agriculture applications to monitor the farm conditions and enhance crop productivity using the wireless sensor networks (WSNs). Crop disease monitoring and early prediction are the core application of precision agriculture due to frequent climate variations. In this paper, we proposed the real-time design, deployment, and validation of powdery mildew crop disease monitoring using the automatic risk index computation-based decision support system (DSS). The sensor motes deployed in Sayal village of Nanded district, Marathwada region, India. The sensor motes collect the periodic environmental data from the Soyabean farm and transmit that data to the master node. The master node then transmits the collected periodic data to the remote server for disease monitoring and decision making. Each sensor mote consists of a group of five sensor nodes called Panchendriya such as temperature, soil moisture, relative humidity, wind speed, and light intensity. At the remote server, the DSS algorithm running for crop disease monitoring in which the risk index computed for each periodic data and compared with a pre-defined threshold value. If powdery mildew crop disease detected by the proposed DSS, then the automatic alarm messages sent to the farmers for immediate action. In this paper, the experimental results are presented in terms of detection accuracy and energy consumption analysis.
Nowadays, significant demand for precision agriculture applications to monitor the farm condition... more Nowadays, significant demand for precision agriculture applications to monitor the farm conditions and enhance crop productivity using the wireless sensor networks (WSNs). Crop disease monitoring and early prediction are the core application of precision agriculture due to frequent climate variations. In this paper, we proposed the real-time design, deployment, and validation of powdery mildew crop disease monitoring using the automatic risk index computation-based decision support system (DSS). The sensor motes deployed in Sayal village of Nanded district, Marathwada region, India. The sensor motes collect the periodic environmental data from the Soyabean farm and transmit that data to the master node. The master node then transmits the collected periodic data to the remote server for disease monitoring and decision making. Each sensor mote consists of a group of five sensor nodes called Panchendriya such as temperature, soil moisture, relative humidity, wind speed, and light intensity. At the remote server, the DSS algorithm running for crop disease monitoring in which the risk index computed for each periodic data and compared with a pre-defined threshold value. If powdery mildew crop disease detected by the proposed DSS, then the automatic alarm messages sent to the farmers for immediate action. In this paper, the experimental results are presented in terms of detection accuracy and energy consumption analysis.
This paper presents a novel robust invisible watermarking method for still images. The scheme is ... more This paper presents a novel robust invisible watermarking method for still images. The scheme is implemented on hardware, and it can be incorporated with the lossless JPEG2000 compression standard. We have implemented Cohen-Daubechies-Favreau (CDF) 5/3 wavelet filters with lifting scheme which requires less hardware and they are also the basis of lossless JPEG2000. Its modular structure is well suitable for hardware implementation and it is more efficient use of power and chip area. The objective of the hardware assisted watermarking is to achieve low power usage, real-time performance, robust and ease of integration with existing consumer electronic devices such as scanners, cameras and handy camcorders. The proposed scheme of watermarking is tested with StirMark software which is a one of the benchmarking software for watermarking scheme. The experimental result shows that the proposed scheme of watermarking is robust against most of the geometric attacks such as scaling and rotat...
The study proposes an Electronically Tunable Third-Order Switched-Capacitor Filter with Feedforwa... more The study proposes an Electronically Tunable Third-Order Switched-Capacitor Filter with Feedforward Signal to minimize Overshoot Configuration. This circuit is designed for center frequency f0=15 KHz. The proposed circuit discusses a new configuration to realize third-order with three filter functions low-pass, band-pass, and highpass simultaneously in single circuit. The circuit uses OP-AMP and MOSFET with Capacitor as Switched-Capacitor. The response of circuit is studied for different circuit merit factor Q and center frequency f0=15 KHz. The filter circuit can be used for both narrow as well as for wide bandwidth, Also, this circuit works for electronically tunable bandwidth. The gain roll-off for this circuit is close to the ideal value of 18 dB / octave (40dB/ decade) as for third order filters. This filter configuration shows better response for Q ≥ 0.4. Also, stabilization of gain for High pass filter function can be achieved at 0dB for Q≥0.4. In the proposed circuit configu...
Sadhana-academy Proceedings in Engineering Sciences, 2003
A realization of voltage-mode transfer functions with feedforward input signal for third-order ac... more A realization of voltage-mode transfer functions with feedforward input signal for third-order active-R filter using an oprational amplifier has been presented. This filter is useful for high frequency operation, monolithic IC implementation and is easy to design. The single circuit gives three filter functions, low pass, high pass and band pass. This filter circuit can be used for differentQ and
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
The paper focus on combination of K-Means algorithm for Fuzzy Mean Point Clustering Neural Networ... more The paper focus on combination of K-Means algorithm for Fuzzy Mean Point Clustering Neural Network (FMPCNN). The algorithm is implemented in JAVA program code for implementing the movecentroid function code into FMPCNN. Here we have provided movecentroid’s output to Fuzzy clustering as criteria, movecentroid is the base function of K-means algorithm as in Fuzzy Mean Point Clustering Neural Network (FMPCNN) algorithm, calculation of cluster based on pre-defined criteria and scope is done. In the experiment we have used four datasets and observed results in nano seconds there is huge difference in output as time is reduced for Fuzzy Min-Max code execution of fuzzy calculations of clustering.
Uploads
Papers by Ganeshchandra Shinde