An Attendance Monitoring System Using Biometric Technology and GSM Module
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 6
Abstract
In this work, review of various well-known algorithms for image denoising is carried out and their performances with their methodologies are comparatively assessed. A new algorithm based on the orthonormal wavelet transform OWT is developed. In this work images corrupted by AWGN are denoised. Simulation results shows that proposed method using Orthonormal wavelets for different values of noise Standard Deviation s in dB outperforms other available methods. Also Coiflet Wavelet performs better than Symlet, Haar and Daubechies wavelets. The proposed Orthonormal wavelet transform OWT method has minimum Mean Square and highest PSNR with Coif let wavelets. Simulation results shows that denoised image is 98.29 similar for 5 dB noise standard deviation and 84.42 similar for 30 dB noise standard deviation. The proposed method has 1.35 dB and 4 improvement for s =10 dB, 2.08 dB and 7 improvement for s =20 dB and 2.26 dB and 9 improvement for s =30 dB as compared to denoising with two thresholds for edge detection 1 . Shruti Badgainya | Prof. Pankaj Sahu | Prof. Vipul Awasthi "Image Denoising for AWGN Corrupted Image Using OWT & Thresholding" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18338.pdf
Notary Responsibilities in the Making of Nominee Arrangement by Foreign Citizens Related to the Ruling of the Laws of Land in Indonesia
The nominee agreement made by a notary public can be said to be a form of legal smuggling that is commonly used in the context of owning land rights by foreign parties. The existence of this nominee agreement in practice...
WSN Based Temperature Monitoring System for Multiple Locations in Industry
Wireless sensor network technology has demonstrated a great potential for industrial, commercial, and consumer applications. Speci cally, in process monitoring and control, process data such as pressure, humidity, temper...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique
Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types...
Identification of Disease in Leaves using Genetic Algorithm
Plant disease is an impairment of normal state of a plant that interrupts or modifies its vital functions. Many leaf diseases are caused by pathogens. Agriculture is the mains try of the Indian economy. Perception of hum...
Extraction of Iron (III) with Tributylphosphine Oxide from Hydrochloric & Sulphuric Acid Solutions
Solvent extraction of iron (III) from aqueous hydrochloric and sulphuric acid solutions was carried out using Tri butyl phosphine oxide [TBPO] in chloroform as extractant. Stripping of iron (III) from the organic phase w...