Skip navigation
Beta Version
ImageForgeryThesis.pdf.jpg
Thesis
2019
Punjab Agricultural University, Ludhiana

Digital images are a momentous part of today’s digital communication. It is very easy to manipulate digital images for hiding some useful information by image rendering tools such as Adobe Photoshop, Microsoft Paint etc. The common image forgery which is easy to carry out is copy-move in which some part of an image is copied and pasted on another part of the same i...

1
36
0
0
SonalPaliwal.pdf.jpg
Thesis
2016-07
G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand)
1
11
0
0
Bhoomika.pdf.jpg
Thesis
2016-07
G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand)
1
14
0
0
Akansha.pdf.jpg
Thesis
2016-07
G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand)
1
14
0
0
Disha.pdf.jpg
Thesis
2018-08
G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand)

Satellite captured images are eyes in the sky that contain information from around the globe. The information derived from the Satellite Images is helpful in Remote Sensing Applications, Research and Analysis, Organizations or Government bodies in monitoring space, Civil defence operations, etc. Satellites captures huge collection of images at a regular interval of...

1
30
0
0
AKYadav.pdf.jpg
Thesis
2017-08
G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand)

Cloud computing is a rapidly growing paradigm, which has gained tremendous interest in researchers at the industrial level and at the academic level. As a result, many researchers have been enthusiastically involved in research projects related to cloud computing. Researcher's major challenge in cloud computing is to provide a solution to the scheduling problem. We...

1
9
0
0
M.Tech..pdf.jpg
Thesis
2019
Punjab Agricultural University, Ludhiana

In today’s world there are large amount of data which need to be processed with big databases. From the past years, there is plethora of organisations that has adopted many types of non-relational database. The goal of this research is to implement techniques to retrieve big database for the big datasets and investigate the performance of the big database technique...

1
42
0
0
TH-1503.pdf.jpg
Thesis
1980
UNIVERSITY OF AGRICULTURAL SCIENCES GKVK, BANGALORE

ABSTRACT NOT AVAILABLE

1
8
0
0
Thesis
2021-01
G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand)

In the field of image processing, edge detection plays a significant role in recent years to detect images more accurately, for this purpose it is important to choose the edge detection techniques wisely and correctly based on their properties. Therefore this work aims to give a comparative study of different edge detection technique using some parameters to check ...

1
0
0
0
Thesis
2020-11
G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand)

In the field of Number Plate Recognition System Artificial Intelligence and Deep Learning have played a crucial role in recent years. Therefore this work aims to establish a model of plate detection with the aid of Deep Learning. It gives us an idea of the method of object detection which gives the utmost precision. The aim of this research is to extract accurate p...

1
8
0
0
Download File.pdf.jpg
Thesis
2019
Punjab Agricultural University, Ludhiana

Cloud computing in the last few years has emerged as a modern computing paradigm with its establishment. This is becoming quite popular due to the reduction in cost, scalability and improvements in the IT industry. Virtualization technology has great contribution in field of computing platform. Cloud computing allows you to use services and resources online. It is ...

1
42
0
0
M.Tech..pdf.jpg
Thesis
2019
Punjab Agricultural University, Ludhiana

The security and management of network has become a major issue in the arena of Internet. The attacker can access different types of data i.e. personal data, bank account data, and unauthorized use of system resources in campus network. Various policies and procedures have been developed to secure the network communication over the internet by employing firewalls, ...

1
31
0
0