oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2015 ( 5 )

2014 ( 1 )

2013 ( 6 )

2012 ( 20 )

Custom range...

Search Results: 1 - 10 of 64 matches for " Manesh Kokare "
All listed articles are free for downloading (OA Articles)
Page 1 /64
Display every page Item
Optimization of Bit Plane Combination for Efficient Digital Image Watermarking
Sushma Kejgir,Manesh Kokare
Computer Science , 2009,
Abstract: In view of the frequent multimedia data transfer authentication and protection of images has gained importance in todays world. In this paper we propose a new watermarking technique, based on bit plane, which enhances robustness and capacity of the watermark, as well as maintains transparency of the watermark and fidelity of the image. In the proposed technique, higher strength bit plane of digital signature watermark is embedded in to a significant bit plane of the original image. The combination of bit planes (image and watermark) selection is an important issue. Therefore, a mechanism is developed for appropriate bit plane selection. Ten different attacks are selected to test different alternatives. These attacks are given different weightings as appropriate to user requirement. A weighted correlation coefficient for retrieved watermark is estimated for each of the alternatives. Based on these estimated values optimal bit plane combination is identified for a given user requirement. The proposed method is found to be useful for authentication and to prove legal ownership. We observed better results by our proposed method in comparison with the previously reported work on pseudorandom watermark embedded in least significant bit (LSB) plane.
Off-Line Handwritten Signature Identification Using Rotated Complex Wavelet Filters
M. S. Shirdhonkar,Manesh Kokare
International Journal of Computer Science Issues , 2011,
Abstract: In this paper, a new method for handwritten signature identification based on rotated complex wavelet filters is proposed. We have proposed to use the rotated complex wavelet filters (RCWF) and dual tree complex wavelet transform(DT-CWT) together to derive signature feature extraction, which captures information in twelve different directions. In identification phase, Canberra distance measure is used. The proposed method is compared with discrete wavelet transform (DWT). From experimental results it is found that signature identification rate of proposed method is superior over DWT.
Semantic Image Retrieval Using Relevance Feedback
Pushpa B. Patil,Manesh Kokare
International Journal of Web & Semantic Technology , 2011,
Abstract: This paper presents optimized interactive content-based image retrieval framework based on AdaBoost learning method. As we know relevance feedback (RF) is online process, so we have optimized the learning process by considering the most positive image selection on each feedback iteration. To learn the system we have used AdaBoost. The main significances of our system are to address the small training sample and to reduce retrieval time. Experiments are conducted on 1000 semantic colour images from Corel database to demonstrate the effectiveness of the proposed framework. These experiments employed large image database and combined RCWFs and DT-CWT texture descriptors to represent content of the images.
Off-Line Handwritten Signature Identification Using Rotated Complex Wavelet Filters
M. S. Shirdhonkar,Manesh Kokare
Computer Science , 2011,
Abstract: In this paper, a new method for handwritten signature identification based on rotated complex wavelet filters is proposed. We have proposed to use the rotated complex wavelet filters (RCWF) and dual tree complex wavelet transform(DTCWT) together to derive signature feature extraction, which captures information in twelve different directions. In identification phase, Canberra distance measure is used. The proposed method is compared with discrete wavelet transform (DWT). From experimental results it is found that signature identification rate of proposed method is superior over DWT
Relevance Feedback in Content Based Image Retrieval: A Review
Pushpa B. Patil,Manesh B. Kokare
Journal of Applied Computer Science & Mathematics , 2011,
Abstract: This paper provides an overview of the technical achievements in the research area of relevance feedback (RF) in content-based image retrieval (CBIR). Relevance feedback is a powerful technique in CBIR systems, in order to improve the performance of CBIR effectively. It is an open research area to the researcher to reduce the semantic gap between low-level features and high level concepts. The paper covers the current state of art of the research in relevance feedback in CBIR, various relevance feedback techniques and issues in relevance feedback are discussed in detail.
Off-Line Handwritten Signature Retrieval using Curvelet Transforms
M. S. Shirdhonkar,Manesh B. Kokare
Computer Science , 2011,
Abstract: In this paper, a new method for offline handwritten signature retrieval is based on curvelet transform is proposed. Many applications in image processing require similarity retrieval of an image from a large collection of images. In such cases, image indexing becomes important for efficient organization and retrieval of images. This paper addresses this issue in the context of a database of handwritten signature images and describes a system for similarity retrieval. The proposed system uses a curvelet based texture features extraction. The performance of the system has been tested with an image database of 180 signatures. The results obtained indicate that the proposed system is able to identify signatures with great with accuracy even when a part of a signature is missing.
Risk Factors of First Acute Myocardial Infarction: Comparison of Elderly and Non-Elderly: A 24-Year Study  [PDF]
Soheila Dabiran, Behrooz Khaleghi Manesh, Farahnaz Khajehnasiri
Advances in Aging Research (AAR) , 2015, DOI: 10.4236/aar.2015.41002
Abstract: Although risk factors of Ischemic Heart Disease (IHD) are well known, knowledge about the distribution of these risk factors in different subgroups of patients can be used for designing preventive programs. The aim of this study was to assess differences of prevalence of IHD risk factors in elderly and non-elderly patients in their first Acute Myocardial Infarction (AMI). In this retros-pective study, elderly (age > 65; n = 1060) and non-elderly (age ≤ 65; n = 2228) patients with first AMI who were admitted into four teaching hospitals in Tehran between 1982 and 2005 were recruited. Risk factors containing male gender, systolic and diastolic hypertension (HTN), diabetes, hypertriglyceridemia, hypercholesterolemia, smoking and family history of IHD were compared between the two groups. Among different risk factors, diabetes and systolic HTN were more common in elderly than their non-elderly counterparts, and male gender, smoking, family history of IHD and dyslipidemia were more common in non-elderly patients than elderly ones (p < 0.05 for all comparison). Diastolic HTN showed no significant difference between the two groups. Findings of this study, stating difference of prevalence of risk factors in two elderly and non-elderly groups, can be used by health policy makers to conduct preventive programs for AMI in this country.
Theories of Equity in Health Care, Implications for Developed and Developing Countries
AR Olyaee Manesh
Iranian Journal of Public Health , 2005,
Abstract: Objective: This abstract focuses on theoretical background for the notion of “equity in health care” and on the implications of applying these theories to the health care of developed and developing countries. Equity Principals and the Implications: There are different theories about the principle of Equity or Justice such as Altruism, Utilitarians, Marxists, Rawls’ theory and Nazick’s entitlement. Among these theories, some of them are applicable to health care such as Libertarianism and Egalitarianism. The focus of the Libertarians is on the extent to which people are free to purchase the health care that they want. The Libertarians’ principle is the main equity base for private health systems. In contrast, Egalitarians suggest that finance of the health care should be according to the ability to pay and distribution of health care should be according to the need (ill health). It seems that policy makers in most developed countries such as European countries accept the Egalitarians’ principle and application of this equity principle by their health systems has significantly reduced health inequities and inequalities in these countries. There are a limited number of studies to look at equity in the health care of developing countries. A common equity principle for these countries is “equal access for everyone” and different mechanisms are applied to attain this target. Despite the overall improvements in health care in recent years, evidence indicates that many of developing countries have failed to provide equal access to health care for all in need. The financial limitations of the governments, spending about 70% of the health care resources on hospital-based care, unequal access to hospital services in favour of urban population, income inequalities among population, and lack of consistent and up-to-date information of inequalities, make developing countries unable to monitor and prevent inequities and inequalities of health care. Conclusion: The main equity principle in the health care of developed countries is Egalitarians’ principle in which, health care should be financed according to ability to pay and should be delivered according to the need. Applying the equity principals to the health care of developed countries has deeply promoted equitable health care in these countries. There are a limited number of studies about this issue in developing countries. A common equity target in these countries is “equal access for everyone in need” which is close to the Egalitarians’ point of view. However, some factors have hampered these countries’ attempt
A Method of Detecting Sql Injection Attack to Secure Web Applications
Sruthy Manmadhan,Manesh T
International Journal of Distributed and Parallel Systems , 2012,
Abstract: Web applications are becoming an important part of our daily life. So attacks against them also increasesrapidly. Of these attacks, a major role is held by SQL injection attacks (SQLIA). This paper proposes anew method for preventing SQL injection attacks in JSP web applications. The basic idea is to checkbefore execution, the intended structure of the SQL query. For this we use semantic comparison. Ourfocus is on stored procedure attack in which query will be formed within the database itself and sodifficult to extract that query structure for validation. Also this attack is less considered in the literature.
The Ups and Downs of Sex Life in Menopausal Stage: a Qualitative Study
M Jamshidi Manesh
Qom University of Medical Sciences Journal , 2012,
Abstract: Background and Objectives: The meaning of menopause and women experience of this transitional stage are related to cultural norms, social factors and one's knowledge of menopause. Women’s image of menopasuse affects self-care and follow-ups during this stage. Among them is consideration of sexuality which is often ignored. The aim of this study was to discover menopausal complications in Iranian women. Methods: 14 women in menopausal stage were interviewed about their clinical experience. The interviews were transcribed and then analyzed using Van Manen’s phenomenology technique. Result: Data analysis showed that one of the women's most important clinical experiences of menopause which they can deliberately express was the start of a new stage. Since, according to those women, changes in their life style were being made in comparison with earlier stages, one of the most important problems that escaped unobserved was sexual challenges which started at this stage. Conclusion: The findings this study reveal women's beliefs about their sex life. This can be used as a basis for education and offering guidelines in order to increase their quality of life.
Page 1 /64
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.