Zobrazeno 1 - 6
of 6
pro vyhledávání: '"P. S Mohod"'
Autor:
P. S. Mohod, Monali Gulhane
Publikováno v:
International Journal of Computer Science and Information Technology. 6:87-92
This paper describes method for detecting the early signs of fatigue in train drivers. As soon as the train driver is falling in symptoms of fatigue immediate message will be transfer to the control room indicating the status of the drivers. In addit
Autor:
Dipali S. Matre, P. S. Mohod
Publikováno v:
2015 Global Conference on Communication Technologies (GCCT).
Now a days the work on Sparse representation of signals has emerged as a major research part. It is well-known that the many natural signals such as image, music and video signals are represented sparsely if decomposed by using a proper choosen dicti
Autor:
Madhurima Sant, P. S. Mohod
Publikováno v:
2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).
New art system is introduced in this paper, which contains image as well as keywords. By this art system the keywords are warped in the image by very artistic method. This method doesn't change the virtual effects of the image. First the original ima
Autor:
Rama B Dan, P. S Mohod
Publikováno v:
Computer Application and Signal Processing 2014.
Autor:
P. S. Mohod, D. Rajderkar
Publikováno v:
2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN).
Snowfall removal from an image is a challenging problem. In this paper, we propose a snowfall removal framework via image decomposition based on Morphological component analysis. The proposed methods first decompose an image into low frequency (LF) a
Autor:
Uma Yadav, P. S. Mohod
Publikováno v:
2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN).
Most of the existing authentication system has certain drawbacks for that reason graphical passwords are most preferable authentication system where users click on images to authenticate themselves. An important usability goal of an authentication sy