AN AUTOMATED RECOGNITION OF FAKE OR DESTROYED INDIAN CURRENCY NOTES IN MACHINE VISION
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 2
Abstract
Almost every country in the world face the problem of counterfeit currency notes, but in India the problem is acute as the country is hit hard by this evil practice. Fake notes in India in denominations of Rs.100, 500 and 1000 are being flooded into the system. In order to deal with such type of problems, an automated recognition of currency notes in introduced by with the help of feature extraction, classification based in SVM, Neural Nets, and heuristic approach. This technique is also subjected with the computer vision where all processing with the image is done by machine. The machine is fitted with a CDD camera which will scan the image of the currency note considering the dimensions of the banknote and software will process the image segments with the help of SVM and character recognition methods. ANN is also introduced in this paper to train the data and classify the segments using its datasets. To implement this design we are dealing with MATLAB Tool.
Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures
Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asym...
A Recovery Method for Greedy Routing Protocols in Web Communications
Greedy Perimeter Stateless Routing (GPSR) protocol is an appropriate and the most well-known routing protocol for high mobile vehicular ad-hoc networks. The protocol includes two routing modes, the greedy mode and the re...
ATTACKS ON WIRELESS SENSOR NETWORK: A SURVEY
Security is a crucial service in wireless sensor networks that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible host...
Improvement of contrast of images in Poor Light: a Research and Analysis
In this paper, the four morphological operator’s erosion, dilation, opening and closing are used to detect the background. After the background is extracted, contrast of bad lightning image is improved by the application...
Operation Management of a GTPPS Based on Field Failure Data: A Case Study
Reliability analysis for Gas turbine power plant over a period of 66-month was carried out. The most important failure modes units were identified and the descriptive statistics at failure and machine level were calculat...