Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rani, Shaveta
- Segmentation of Isolated and Touching Characters in Handwritten Gurumukhi Word Using Clustering Approach
Abstract Views :104 |
PDF Views:2
Authors
Affiliations
1 GZS PTU Campus, Bathinda, IN
1 GZS PTU Campus, Bathinda, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 13 (2014), Pagination: 174-174Abstract
Segmentation is one of the important steps of character recognition system. It is an important step because inaccurate segmentation of characters will cause errors in the recognition stage. In optical character Recognition (OCR) system the presence of touching characters decreases the accuracy rate of character recognition. Touching of half character or full character with other full character makes the character segmentation very challenging or difficult task. In this paper, the method of segmentation for touching characters of handwritten Punjabi text that is the Gurumukhi script has been proposed. The main purpose of this paper is to provide the new segmentation technique based on clustering technique for touching characters.Keywords
Segmentation, Feature Extraction, Binarization, Classification, Proposed Work, Results.- Performance Optimization in Geographical Based Routing Protocol in MANETS
Abstract Views :120 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Giani Zail Singh Punjab Technical University Campus, Bathinda, IN
1 Department of Computer Science and Engineering, Giani Zail Singh Punjab Technical University Campus, Bathinda, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 11 (2014), Pagination: 79-86Abstract
MANET deals with the wireless links of concern resources. Each device connects using the dynamically configuration in the whole network. To require the more than one hop communicate as intermediate node between source nodes to destination node during the lack of available the transmission range. In the research paper, there is analysis of performance of GRP with proposed algorithm MGRP. The performance analyzed by using OPNET MODELER 14.5" Simulator. The simulation performance parameters are - Packet Dropped, Total Number of Backtracks, Delay, Traffic Sent and Throughput for comparing existing GRP and proposed algorithms MGRP.Keywords
MANET, GRP, OPNET Modeler 14.5.- Survey of various Active Attacks in MANETS
Abstract Views :128 |
PDF Views:0
Authors
Affiliations
1 PTU Jalandhar, Bathinda, Punjab, IN
2 CSE Department, GZS, PTU Campus, Bathinda, Punjab, IN
1 PTU Jalandhar, Bathinda, Punjab, IN
2 CSE Department, GZS, PTU Campus, Bathinda, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 11 (2014), Pagination: 91-95Abstract
Networks have flourished due to the advent of new technology. There is a mushroom growth in technology and day to day needs for communication which was never experienced before. A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies. People and vehicles can be internetwork in areas without a preexisting communication infrastructure or when the use of such infrastructure requires wireless extension. Various attacks needed to be detected on order to secure the wireless ad-hoc network. In this paper we are discussing various active attacks.Keywords
MANET, Network Security, Active Attacks, Rushing Attack, Balckhole attack, Neighbor Attack, Sink Hole Attack.- Review of WiMax Services and Security Threats
Abstract Views :133 |
PDF Views:4
Authors
Affiliations
1 Dept. of Computer Science, GZS College, PTU Campus, Bathinda, IN
1 Dept. of Computer Science, GZS College, PTU Campus, Bathinda, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 11 (2014), Pagination: 107-112Abstract
Now a day, there is a lot of technologies for communication. Wimax is an anticipated technology for wireless communication. Its aim is to provide high data rate at low cost. In this paper, all the basics for Wimax and their security threats will be discussed. Wimax can provide high data rate, quality of services, scalability and routing method. This paper will describe possible numbers of threats in Wimax due to different reasons.Keywords
Wimax, Architecture, Threats, Cause, Standards.- Comprehensive Study and Review Various Routing Protocols in MANET
Abstract Views :126 |
PDF Views:0
Authors
Affiliations
1 GZS PTU CAMPUS, Bathinda, IN
2 CSE Dept., GZS PTU CAMPUS, Bathinda, IN
1 GZS PTU CAMPUS, Bathinda, IN
2 CSE Dept., GZS PTU CAMPUS, Bathinda, IN