Video To Animated Cartoon Conversion
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: the logic of animation making from real video fully depends on various image processing techniques and various kinds of filtering like Gaussian filtering, bilateral filtering, and flow based bilateral filtering, mean-shift filtering etc. It also includes edge detecting methods like canny edge detector, dog edge detector, flow based dog edge detector etc. All this technique works differently on the measurement of quality and run time factor. In this research we have gone through all this techniques and proposed a suitable approach which is convenient to the subject.
Authors and Affiliations
Munira Akther , Md. Jahirul Islam
Comparing Ethernet and Soft RoCE for MPI Communication
Abstract: RDMA has pleasant consideration in the late 1990 when the Virtual Interface Architecture was introduced. This growth has accelerated with the introduction of Open Fabrics Alliance’s (OFA’s) Verb Interface...
Vtalk: Secure Deployment of VoIP over LAN’S
Peer-to-peer VoIP (voice over IP) networks, exemplified by Skype, are becoming increasingly popular due to their significant cost advantage and richer call forwarding features than traditional public switched t...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Session Grouping
Cataloging traffic keen on precise network applications is vital for application-aware network organization and it turn into more taxing because modern applications incomprehensible their network behaviors. Whe...
Personality Based Dispersed Provable Information Ownership in Multi Distributed Storage
Abstract: The cloud storage administration has turned into a speedier benefit development by giving its components to customer's information. Security protection and information respectability are the two principle issue...
Authentication of grayscale document images using shamir secret sharing scheme.
Abstract: This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme in...