A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Santhosh, M.
- Image Representation by First Generation Wavelets and its Application to Compression
Authors
1 Department of Electronics and Communication Engineering, Stanley Stephen College of Engineering & Technology, Kurnool, IN
2 Stanley Stephen College of Engineering and Technology, Kurnool, IN
3 Department of Electronics and Communication Engineering, JNTUCE, JNTUA, Anantapur, IN
Source
Digital Image Processing, Vol 5, No 6 (2013), Pagination: 281-286Abstract
Image is a two dimensional plot of intensity information. A digital image is a collection of numbers representing the intensity values. The digital image is stored primarily as a matrix (more specifically as an array of multi-dimension). Hence the processing of the image is done primarily on this representation of the image. Because this representation is a raw data of pixels and distributed along the plane non-uniformly, one cannot apply any operation more effectively. The aim of this paper is to analyze the wavelet representation of an image. In this paper, the representation of image by wavelets is presented and verified the effectiveness of the representation by performing compression on the new representation. This paper proposes a new composite design metric to analyze image compression. The first generation wavelets Haar, Daubechies, Bioorthogonal, Coiflet, Symlet and Di-Meyer are considered. The work was tested on a large number of images and the results are presented.Keywords
Image Representation, Wavelet, Compression, SPIHT.- CSR Communication-A Study on Scale Development
Authors
1 IIT, Madras, IN
Source
International Journal of Innovative Research and Development, Vol 5, No 2Sp (2016), Pagination: 251-256Abstract
The 21st century business has reached a paramount change by addressing the versatile demands of its stakeholders. From the notion that there are no obligations for the organizations to address common man needs, business are now extending their support towards various sections of the society in order to create impact on human lives. This clearly tells us the importance of Corporate Social Responsibility (CSR) in today’s challenging environment. The need for and advantages of CSR communication is widely acknowledged. CSR communication- the way in which organization communicates their CSR activities is one such feature that attracts many scholars. Hardly very few studies have looked at CSR communication. Despite the proven benefits of CSR communication, organizations fail to link it in CSR practices (Chaudhri& Wang, 2011).Thus, this paper aims to fill this gap by conducting an exploratory study to examine the various CSR practices and the mode of communication to internal as well as external stakeholders. The authors by using content analysis technique have explored various aspects of CSR communication in 26 companies’ through snow ball sampling method.
Keywords
CSR Practices, CSR Communication, Content Analysis, Manufacturing/ IT Industries.- Secured Source Location Privacy using Infrastructure Centric Method
Authors
1 Department of Electronics and Communication Engineering, Sri Eshwar College of Engineering, Coimbatore, IN
Source
Wireless Communication, Vol 12, No 2 (2020), Pagination: 31-36Abstract
Wireless Sensor Network attains the major issue of localization problems. The accuracy of the localization depends upon the localization of sensor nodes with the highest security requirements. The source network consists of two parts which is named as common nodes as well as beacon nodes. The localization process is highly depends upon the common nodes. The proposed method consists of infrastructure- centric technique. The proposed technique is used to secure locate the common nodes within the routing protocol. It consists of multi-hop localization technique. Many attackers comprises of many wireless network attacks which initiates many false beacons as well as many false location of the beacons. The proposed methodology will eliminate the security problem within the common nodes during the localization of sensor nodes of the protocol. The network consists of various random nodes which has the deployment as well as the mobility concern. The implemented protocol consists of Infrastructure-centric localization systems to secure the source node location. Further, our projected set of rules presents low overhead thanks to the employment of abundant less manipulate messages in an exceedingly restricted transmission selection. Similarly, we've got to boot projected an formula to return across the malicious anchor nodes within the network. The simulated effects show that our projected formula is inexperienced in phrases of your time consumption, localization accuracy, and localization magnitude relation inside the presence of malicious nodes. Time Difference of Arrival (TDOA) is the major factor indicating the location of nodes at the required position. The performance of the metrics can be analyzed using the energy calculation, alive and dead nodes during the transmission.