Papers by Ramachandran Bremananth
International Journal of Advanced Computer Science and Applications, 2010
He received the M N Saha Memorial award for the best application oriented paper in 2006 by Instit... more He received the M N Saha Memorial award for the best application oriented paper in 2006 by Institute of Electronics and Telecommunication Engineers (IETE). His fields of research are acoustic holography, pattern recognition, computer vision, image processing, biometrics, multimedia and soft computing. Dr. Bremananth is a member of Indian society of technical education(ISTE), advanced computing society(ACS), International
International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007), 2007
Human hair analysis and synthesis is an important and challenging problem in computer graphics an... more Human hair analysis and synthesis is an important and challenging problem in computer graphics and vision. This paper surveys the important topics of human hair analysis and synthesis: hair attributes, hair animation, hair simulation, hair rendering and applications. Because of difficulty, often unsolved problems that arise in all these areas.
Proceedings of 2005 International Conference on Intelligent Sensing and Information Processing, 2005., 2005
... Character Segmentation and recognition: Segmentation is carried out using blob-coloring metho... more ... Character Segmentation and recognition: Segmentation is carried out using blob-coloring method supported with constraint checking. ... two important ta ks involved in the license plate identification process, character segmentation and recognition. ...
The proposed system identifies the species of the wood using the textural features present in its... more The proposed system identifies the species of the wood using the textural features present in its barks. Each species of a wood has its own unique patterns in its bark, which enabled the proposed system to identify it accurately. Automatic wood recognition system has not yet been well established mainly due to lack of research in this area and the
2009 International Conference on Advances in Recent Technologies in Communication and Computing, 2009
In this paper sequence of execution of algorithms are explained visually in an interactive manner... more In this paper sequence of execution of algorithms are explained visually in an interactive manner. It helps to realize the fundamental concept of algorithms such as searching and sorting method in a simple manner. Visualization gains more attention than theoretical study and it is an easy way of learning process. We propose methods for finding runtime of each algorithm and
2009 International Conference on Advances in Recent Technologies in Communication and Computing, 2009
This paper describes a system to identify Tamil numerals using a two-stage approach, for a subset... more This paper describes a system to identify Tamil numerals using a two-stage approach, for a subset of Tamil alphabet or numerals. In the first stage, five sets of each Tamil numeral are trained and in the second stage un-trained Tamil numerals are tested against the trained numerals. We use some pre-processing steps to enhance the images. Resizing has been performed
2005 Annual IEEE India Conference - Indicon, 2005
Sadhana, 2006
Reliable person identification is a key factor for any safety measure. Unlike other biometrics su... more Reliable person identification is a key factor for any safety measure. Unlike other biometrics such as the palm, retina, gait, face and fingerprints, the characteristic of the iris is stable in a person's lifetime. Iris patterns are chaotically distributed and well suited for recognizing persons throughout their lifetime with a single conscription. This paper proposes a new approach to person recognition based on iris patterns, which works with indoor outdoor conditions, spectacles contact lens wearing persons and diseased eyes. A challenge-response method is used for eye aliveness checking that puts off artificial sources from entering the iris database. The proposed algorithm can work with 84 statistical iris features that are extracted from an individual. Space and time complexity of the proposed approach is lesser than the existing methods. This algorithm has been implemented and results have been analysed on 2500 different iris patterns acquired in India under different real-time conditions. Experimental results illustrate that the proposed method has been easily espoused in elections, bank transactions and other security applications.
In this paper, a new approach based on Artificial Neural Network for data compression is presente... more In this paper, a new approach based on Artificial Neural Network for data compression is presented. ANN (Artificial Neural Network) is playing a vital role to do complex works like face recognition, pattern recognition, currency recognition, compression, decompression etc. Artificial Neural networks have the potential to extend data compression algorithms beyond the character level n-gram models now in use, but
The dynamic software development organizations optimize the usage of resources to deliver the pro... more The dynamic software development organizations optimize the usage of resources to deliver the products in the specified time with the fulfilled requirements. This requires prevention or repairing of the faults as quick as possible. In this paper an approach for predicting the run-time errors in java is introduced. The paper is concerned with faults due to inheritance and violation of java constraints. The proposed fault prediction model is designed to separate the faulty classes in the field of software testing. Separated faulty classes are classified according to the fault occurring in the specific class. The results are papered by clustering the faults in the class. This model can be used for predicting software reliability.
Cryptography provides the secure manner of information transmission over the insecure channel. It... more Cryptography provides the secure manner of information transmission over the insecure channel. It authenticates messages based on the key but not on the user. It requires a lengthy key to encrypt and decrypt the sending and receiving the messages, respectively. But these keys can be guessed or cracked. Moreover, Maintaining and sharing lengthy, random keys in enciphering and deciphering process
In this paper, a new approach based on Artificial Neural Network for data compression is presente... more In this paper, a new approach based on Artificial Neural Network for data compression is presented. ANN (Artificial Neural Network) is playing a vital role to do complex works like face recognition, pattern recognition, currency recognition, compression, decompression etc. Artificial Neural networks have the potential to extend data compression algorithms beyond the character level n-gram models now in use, but
The main objective of this paper is to verify bank cheques by using account number and account ho... more The main objective of this paper is to verify bank cheques by using account number and account holder's signature present on the cheque image. Main problem is to exact localization of active regions among non-active contours in the image. Here, we locate the regions based on the prior knowledge of Cartesian coordinate space. It further involves various steps such as
Intelligent and reliable person identification system is an essential goal for any security measu... more Intelligent and reliable person identification system is an essential goal for any security measures. Distinctive features of iris are stable in a persons' lifetime. Its well-distributed patterns are suited for recognizing persons throughout their life. This paper proposes a person recognition system based on iris patterns, which works in different sessions such as indoor/outdoor conditions, eyewear and diseased eyes. This method incorporates an anti-spoofing module, which prevents artificial sources entering into the iris database. Local segmentation is suggested to extract iris portions without obscuring eyelashes/eyelids. Multi resolution wavelets are used for iris feature extraction. A set of 135-bit iris features is extracted to train the Hamming neural network (HNN) which is used to classify iris patterns. The algorithm has been implemented and results are analyzed based on 2500 eye images acquired from 500 subjects. The experimental results show that the proposed algorithm is suitable for any on-line security applications.
Abstract This paper,proposes,a person,identification system (PID), which works with non-illuminat... more Abstract This paper,proposes,a person,identification system (PID), which works with non-illumination low-resolution eye images. Radial-Scan and threshold methods,are used for Iris normalization,and Iris segmentation,from the eye image,respectively. Conventional neural network is used for iris matching. The proposed,algorithm works with 96 features of the iris. Space complexity is less and Iris codes are stored in an encrypted file. The Algorithm has been im- plemented,and tested on 1500 iris patterns. Images include normal iris captured under in-door and out-door conditions and from disease affected eyes.
Advances in Recent …, 2009
International Journal of Advanced Computer Science and Applications, 2010
... for clustering large amounts of data because it groups the Gabor parameters using their local... more ... for clustering large amounts of data because it groups the Gabor parameters using their local ... EXPERIMENTS In order to evaluate the efficacy of the estimation process, comparison of rotation ... These methods respond a bit different response of peak projection data at a particular ...
Uploads
Papers by Ramachandran Bremananth