Namdeo V. Kalyankar

Learn More
This paper attempts to undertake the study of three types of noise such as Salt and Pepper (SPN), Random variation Impulse Noise (RVIN), Speckle (SPKN). Different noise densities have been removed between 10% to 60% by using five types of filters as Mean Filter (MF), Adaptive Wiener Filter (AWF), Gaussian Filter (GF), Standard Median Filter (SMF) and(More)
—This paper attempts to undertake the study of segmentation image techniques by using five threshold methods as Mean method, P-tile method, Histogram Dependent Technique (HDT), Edge Maximization Technique (EMT) and visual Technique and they are compared with one another so as to choose the best technique for threshold segmentation techniques image. These(More)
—This paper attempts to undertake the study of Restored Gaussian Blurred Images. by using four types of techniques of deblurring image as Wiener filter, Regularized filter ,Lucy Richardson deconvlutin algorithm and Blind deconvlution algorithm with an information of the Point Spread Function (PSF) corrupted blurred image with Different values of Size and(More)
—The purposes of this paper have to discuss issues related to Network Traffic Management. A relatively new category of network management is fast becoming a necessity in converged business Networks. Mid-sized and large organizations are finding they must control network traffic behavior to assure that their strategic applications always get the resources(More)
Binarization and Segmentation are considered to be the vital tasks in Optical Character Recognition (OCR) for document digitization. This paper discusses the applications of powerful Level set methodologies on these important tasks associated with OCR. Results acquired for these essential procedures in turn govern the accuracy of the OCR system.(More)
Intrusion detection is the process of identifying unauthorized usage of a Network. It is important task to protect system from unauthorized users on the network and it is very difficult task to protect system from Intruder. For protecting such network-based system from unauthorized users, we have to implement some prevention measures. With the help of(More)
Network penetration testing identifies the exploits and vulnerabilities those exist within computer network infrastruc‐ ture and help to confirm the security measures. The objective of this paper is to explain methodology and methos behind penetra‐ tion testing and illustrate remedies over it, which will provide substantial value for network security(More)
Fruit categorizations in agriculture industry have upgraded from traditional grading to automatic grading over the past 25 years. To identify object residing in image, the image has to be described or represented by certain features. Shape is an important visual feature of an image. Shape extraction has attracted much attention lately. Many shape(More)
With the recent advances in the field of artificial intelligence and information technology, the improvement in the interpretation of the medical images has contributed significantly to the early diagnosis of different diseases. Medical images are difficult to process because they have various modalities. Therefore, the physicians cannot adequately detect(More)