00. Faculty Publications: Recent submissions

  • Raviya, Kapil; Vyas, Ved; Kothari, Ashish; Gohil, Gunvantsinh (Oriental Journal of Computer Science and Technology, 2019)
    The researcher have suggested real time depth based on frequency domain hole filling. It get better quality of depth sequence generated by sensor. This method is capable to produce high feature depth video which can ...
  • Solanki, Dhavalsinh; Kothari, Ashish (2015)
    Face recognition has been a fast emergent and exciting area in real time applications. Automatic face recognition has shown great achievement for high-quality images under embarrassed conditions. In this paper ...
  • Raval, Hardik; Kothari, Ashish (International Journal Of Engineering And Computer Science, 2014-11)
    The quality of Image is measured in terms of Resolution. The image clarity can be measured by Resolution. Better resolution can be generated by use of Good Sensors, but it can be very expensive .Instead of that we can ...
  • Ghedia, Navneet; Vithalani, C.; Kothari, Ashish (GIS Science Journal, 2020-10)
    Visual Monitoring System is the peak level research topic in Today’s era. Visual observation in computer vision helps to analyze object’s activities easily. Today’s era of computer vision will completely remove traditional ...
  • Ghedia, Navneet; Vithalani, C.; Kothari, Ashish (AEGAEUM Journal, 2020)
    In present days, Lively Environment considerations has nailed down towards an immense contract as a part of Visual Surveillance Systems. Its expansion tends towards extensive research scaling functioning as admittance ...
  • Ghedia, Navneet; Vithalani, C.; Kothari, Ashish (GIS Science Journal, 2020)
    Visual Monitoring System requires efficient estimation of the background, background modelling and accurate motion detection. Background subtraction is the simplest approach to classify the background and foreground. ...
  • Varia, Dhaval; Kothari, A. (Multidisciplinary International Research Journal of Gujarat Technological University, 2021-01)
    At the point when the size of the shortest path discovering problem increment, the intricacy of the issue increments. In such a situation, the best possibility to take care of this sort of issue is meta-heuristic ...
  • Thanki, Rohit; Kothari, Ashish; Trivedi, Deven (Journal of Information Security and Applications, Elsevier, 2019-06)
    In this paper, a hybrid and blind watermarking scheme is proposed for the protection of copyright of digital images. The scheme based on hybridization of two advance transforms such that discrete curvelet transform (DCuT) ...
  • Raviya, Kaushik; Vyas, Ved; Kothari, Ashish (International Journal of Advanced Trends in Computer Science and Engineering, 2019-04)
    The paper describes an effective method to embed grayscale images or watermarks in the original cover images. To do so, we used a famous linear algebra technique called Singular Value Decomposition. To carry out the ...
  • Thanki, Rohit; Kothari, Ashish; Borra, Surekha (Multimedia Tools and Applications, Springer, 2021-05)
    Images frequently are helpless to burglary and copyright encroachment. There are numerous events where pictures were illegally copied from websites for utilization or monetary profit and were gotten away from equity, ...
  • Doshi, Meera; Gajjar, Prakash; Kothari, Ashish (Journal of King Saud University-Computer and Information Sciences ,Elsevier, 2022)
    The prime intention of super-resolution (SR) technique is to restore the high-resolution images from one or more low-resolution (LR) images. These images are captured from the same scene with different acquisition systems ...
  • Ghedia, Navneet; Vithalani, C.; Kothari, Ashish (Indian Journal of Science and Technology, 2017-05)
    To evaluate the crowd densities in video scene under different constraints. For the crowded video analysis robust foreground detection methods are required to differentiate between moving or static foreground objects and ...
  • Ghedia, Navneet; Vithalani, C.; Kothari, Ashish (International Journal of Electronics Engineering Research., 2017)
    Our objective is to ensure high level of security in public places using static PTZ camera and robust detection and tracking algorithm for video sequences and also to generate the multi model background subtraction ...
  • Ghedia, Navneet; Vithalani, C.; Kothari, Ashish (International Journal of Computational Intelligence Research, 2017)
    Machine perception is an essential feature for an autonomous system. For the computer vision researcher perception of scene is an important aspect. Smart surveillance system can be able to sense the environments and ...
  • Raviya, Kapil; Vyas, Ved; Kothari, Ashish (I.J. Image, Graphics and Signal Processing,Modern Education and Computer Science Press(MECS), 2016-10)
    The main target of stereo matching algorithms is to find out the three dimensional (3D) distance, or depth of objects from a stereo pair of images. Depth information can be derived from images using disparity map ...
  • Kotecha, M.; Kothari, A. (International Journal of Advance Research in Computer Science and Management Studies, 2015-10)
    Image compression finds its application in those systems which require considerable reduction in storage space and bandwidth required for transmission. In this paper, we summarize about the different research papers ...
  • Kothari, Ashish; Vyas, Ved (International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE), 2014-06)
    In this paper, we have suggested the spatial domain method for the digital video watermarking for both visible and invisible watermarks. The methods are used for the copyright protection as well as proof of ownership. ...
  • Sheth, Kinjal; Vora, Vishal (Bulletin of Electrical Engineering and Informatics, 2023-04)
    Forgery with the digital images is being very easy now days due to the very advanced and open source image editing tools, software and devises which supports a high quality of resolutions. Tempering with digital documents ...
  • Vala, Mehul; Vora, Vishal (International Journal of Computer Networks and Applications (IJCNA), 2022-12)
    In vehicular ad hoc networks (VANETs), safety related applications require fast and reliable message broadcasting techniques for efficient performance. Reducing redundancy and increasing the reliability of message ...
  • Vala, Mehul; Vora, Vishal (International Journal of Computer Networks and Applications (IJCNA), EverScience Publications, 2022-08)
    The Intelligent transportation system (ITS) aims to improve the performance of the transportation systems. Vehicular ad hoc networks (VANETs) are the potential mechanism by which ITS can realize its goal. VANET ...

Search DSpace


Advanced Search

Browse

My Account