Vision Defect Identification System (VDIS) using Knowledge Base and Image Processing Framework
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 1
Abstract
In this research paper, a novel system has been designed which is using two discipline of Computer science area which are Artificial intelligence and image Processing. Fuzzy sets and logic has been chosen from AI and image classification, filtering, matching & rendering has been used from IP. The rendering of the image has been done as per the specification given by the patient and then backend side image classification and matching has been done. Fuzzy rules are defined using fuzzy logic & fuzzy set; then by using rule base and database the inferences have been given by the system that is VDIS. Human perception is taken into consideration in both the areas to come on the final output of VDIP; the final output forwarded to the human expert to make final decision.
Authors and Affiliations
Mrs. Vishal Dahiya, Dr. Priti Srinivasan Sajja
Data Security in Cloud Computing using RSA Algorithm
Cloud Computing is an emerging paradigm which has become today’s hottest research area due to its ability to reduce the costs associated with computing. In today’s era, it is most interesting and enticing technology whi...
A Secured Dynamic Location Monitoring System in WSN
Wireless sensor network is broadly spreading network of the communication field. Wireless sensor network is having sensor nodes as sensing devices which sense physical or environmental conditions and a sink node is t...
Design and Study of Direct Sequence - CDMA RAKE Rx Simulator for Wireless Communication
In this paper, a software wireless communication simulator execute to simulate a Code division Multiple Access (CDMA) as Wireless cellular telephony has been growing at a quicker rate than wired-line telephone networ...
TPTD: Anonymization Of Large Scale Data Sets Using Map Reduce Jobs In Cloud
Cloud computing provides huge computation power and storage for users Forwarding their sensitive data for analysis or mining. Due to privacy issues Anonymizing datasets with kanonymity technique is used. But now a day...
Transient Authentication
In recent years, many people use their office or home PC for their work and store the sensitive information, at the same time mobile computing has enjoyed a Persistent tremendous rise in popularity. There are various...