Rupali R. Deshmukh

Learn More
With the enormous growth of computer networks and the huge increase in the number of applications that rely on it, network security is gaining increasing importance. Moreover, almost all computer systems suffer from security vulnerabilities which are both technically difficult and economically costly to be solved by the manufacturers. Therefore, the role of(More)
With the growing popularity of digital Medias through the WWW, intellectual property needs copyright protection, prevention of illegal copying and verification of content integrity. The new data hiding techniques need to be developed that satisfy the requirements of imperceptibility, robustness, capacity, or data hiding rate and security of the hidden data(More)
Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To(More)
Video surveillance has long been in use to monitor security sensitive areas such as banks, department stores, highways, crowded public places and borders. The purpose of this application is to detect a human intruder. This application will detect the occurrence of motion within the area under surveillance. Further, it will also detect if the motion is(More)
Non-destructive testing (NDT) is used in the industry to check for the properties of the material, internal flaws, etc. without cutting open the samples. Digital Radiography (DR), an NDT, is a form of x-ray imaging, where digital x-ray sensors are used. Advantages of DR include time efficiency, ability to digitally enhance and transfer images. In the(More)
Kernel-based clustering provides a better analysis tool for pattern classification, which implicitly maps input samples to a highdimensional space for improving pattern separability. For this implicit space map, the kernel trick is believed to elegantly tackle the problem of "curse of dimensionality", which has actually been more challenging for(More)
Copper oxide nanoparticles within hollow mesoporous silica spheres were prepared by binding/adsorbing Cu 2+ or [Cu(NH 3) 4 (H 2 O) 2 ] 2+ ions on the surface of carbon spheres, followed by formation of a mesoporous silica shell by sol–gel processing and calcination in air. The CuO nanoparticles can subsequently be converted into Cu 3 N nanoparticles by(More)
  • 1