Pages

Wednesday, September 14, 2011

Tips for Final Year Project

Every professional course will have the Project in the Final year. The Education includes the project for the students to get an project experience before they enter to a company. Project is for the students to d themselves. But nowadays people are doing the project on their own. Most of the students are buying the project from the project centers and submitting the project in their college and score their marks. It is not the way to submit the project. We have to do our own project. 


Doing the project on our own will give us the confident to do the work in the company from the beginning stage. People get the project from the centers will suffer in the office at the beginning. I faced the same problem in my office. I did not did the project on my own. I got the project from the project center and submitted in the college. That time i did not worried about the future. Later i understood the mistake i have done in my college. Do not do the mistake of doing the project in the project centers. 


Tips to Start the project:


Start thinking of your project in the 3rd year. Decide the platform of your project. Read many presentation papers from online to get more ideas. The best way doing the project is to select your interested subject. Many people will choose the technology and think about the idea. Don't do that. First think the idea, get a logic, design the project and then select the technology suits for the project. Keep in mind "Projects are not meant for technology, Technology was discovered for the projects". 


The best time to start the project is the 7th semester. In many colleges, they will start the project in the 8th semester. To get the better results start your project in the 7th semester.


Speak with your college staffs who are well known about the subject and about the area your took for the project. Get the help from them. Start coding from the 7th semester. Learn the languages and the tips for doing the projects. 


Think only about the project in the 8th semester. Try to innovate some new, good stuffs in your project. 


While doing project on your own, you will get to know many things in the technology wise as well as in domain. Get help from the people working in the domain you have choose. They will help you more than your college staffs. You can get the help for any technology and for any domain in online with the forums.  All the best for your project. 



Friday, September 2, 2011

Get the Website for the College and for the Department


The number of websites has increased in the recent years. Most of the sites are blogs. Most of the blogs are run by students. Professionals also have blogs. Many people are using the website for business purpose and some people are using for the service purpose. Only few people having websites will design the websites for themselves.

Many people will develop their websites with the help of Website design companies. Website design companies will develop the pages according to the client requirement. They are ready to develop the websites at any requirements. With the help of them, we can develop the websites that faster and easily accessible to the users. Today every department in every college have their own website. They will update all their department news in their website.

Every college have their own Logo. Some college logo will look good and some other logos will look average. Many people will design the logo for themselves. Logo design is an art. People having creative mind only can create the best logo for a company or for a website. We can even design the logo for ourselves with the website design companies. They will provide you the logos they have created before. We will get to know about the quality of the logo design from their previous work. Every website should have their own logo.

Websites will be useful for the colleges and for the departments. It will helpful for them in the college cultural and in symposium. People can register for the cultural program and for the symposium in online. The college will get an image when they have the website of their own. Before selecting the college all the students are looking the details of the college in internet. Create the website for the college and for the department and create an impact between the students. 

Wednesday, August 31, 2011

Choose the path in College days

Everyone will step into the college life with an aim. Everyone would like to learn new things in college. Every thing is new in college compared to school. We can have lot of fun in the college days. The friends in college will come with you till the end of your life. Along with the fun, your future is depend on your college days. You should think about your future in your college days.

When your college ends, you are entering into a new world. People will expect more from you. You should be prepared for anything. You should be dare to face all the problems. The days between your college final day and the day you get the jobs is the most critical days in your life. You will feel bad in those days even you never take care of anything in your life. If you got the job within 3 to 6 months, you will not face any problems in your life. If you did not get within 6 months you have to answer everyone in your family, street, your parent friends and many more people.

To get the job within 6 months of time, you need to be prepared in the last semester itself. If you are prepared, even in the recession period you will get the job. Few ways are there to prepare for the interview.

First, Choose the Stream or the field you like to work.

Second, you need to have some list of companies in your field.

Third, you have to prepare a resume with your qualification, with your personal details, your interest, awards, courses completed, extra curricular activities. You have to mention the area of interest  in resume.

Be prepare for the question "Tell me about yourself ?". This is the question that judges your future. The HR will get to know about yourself with this question. The HR will listen you for just 30 seconds and decide to RECRUIT you or NOT. Get prepare for first 30 seconds. You have to tell your name, your positive, negative, your attitude and your achievements. You should be bold while taking to the HR. Your Voice should be in high Pitch.

College is the best place to practice to tell about yourself. Practice with your friends in free periods. Choose the area of interest in the college. Be the master in any one language and you should be adapt to the new languages also. It is not confirm that you will get the job in your area of interest.

Start preparing for the Interview in your college days itself. All the best for your future.

Tuesday, August 16, 2011

Freshers Recruitment in ZOHO CORP


This year has the great benefits for the fresher’s. Most of the software companies have started recruiting the fresher’s. Many of the companies have got new projects across world. Already HCL and Wipro have called the fresher’s to apply through online. Now ZOHO CORP is calling the 2010 and 2011 passed out students to attend the interview. The Interview is going to be held in the Velachery office on 19th and 20th of August 2011. To attend the interview, you need to apply in online.

The Link to register in Online is:


Click the above link and fill the online form. You will get the confirmation mail to your inbox to attend the interview.
Note: People who attended the interview within last 6 months are not eligible to attend this interview. 

Friday, August 5, 2011

Freshers Recruitment in HCL


As the Software industry is growing, many companies are recruiting the fresher’s through campus interview, off-campus interview and through walk-in. Even all the companies are providing a good package for the fresh candidates. Now HCL is calling for the 2011 B.E, M.E and arts and science graduates. To attend the off-campus interview, we need to apply through online. Please find more details to apply for the HCL off-campus in the Jobs page. In the jobs page, you will find the eligibility criteria to apply for HCL campus and the online registration Link.

Note: If you are applying for the HCL interview, kindly post you details as comments. Post a thanks comment if you got Selected in the interview.

ALL THE BEST

Wednesday, August 3, 2011

Wipro interview in SJBIT college Bangalore

Wipro is recruiting students through campus interview in SJB Institute of technology, Bangalore. They are recruiting 2010 passed out students. Students have to register for the campus interview. Students are requested to send the mail to the following mail-ID with the resume.

Mail-ID: sjbit.freshers@gmail.com

Once we send the resume, they will send you all the interview details with the venue.

Tuesday, August 2, 2011

File Systems in Unix OS.

many of you have heard about File system. But many of the people do not know about the file system. I am going to explain a few things about Unix file system. 

What is an File system?

In Simple words the File system is to organize the data in the computer that handled by the Operating System. 

Many OS's are available in the market. I am going to explain a few things about the Unix OS.  In the olden days like 1980's file systems were either disk based in which all the files were held on a physical disk or were RAM based. In the RAM based file system, the file system will be survive only till the system was rebooted. In the last 15 years many pseudo file systems have introduced. 

The Unix File system is a collection of  files and directories. It has the following properties. 

It has a root directory (/) that contains other files and directories. Most disk-based filesystems will also contain a lost+found directory where orphaned files are stored when recovered following a system crash.

Each file or directory is uniquely identified by its name, the directory in which it resides, and a unique identifier, typically called an inode.

By convention, the root directory has an inode number of 2 and the lost+found directory has an inode number of 3. Inode numbers 0 and 1 are not used. File inode numbers can be seen by specifying the -i option to ls.

It is self contained. There are no dependencies between one file system and any other.  

Monday, July 25, 2011

Best reviews for the Paint Zoom Products

Everything in the world would look good if they are colored and the colouring was done perfect. People like more colours in their life. But not everyone can paint. Only few people can paint using the painting brush and roller. Everyone cannot paint very accurately with good finishing. But we can paint now very easily with the painting sprayer. Many brands are available in the market
.
Only few brands will have the good quality. We need to be careful when purchasing any product. With the advanced technology many duplicate brands have come with the same appearance like the original brand. Many people will get fooled by the appearance. Buy the original products. It will long last for years. We will have more features in the branded products than the local or the duplicate brands.

We can easily find the difference between the original product and the duplicate product. For that we need to search about the product in the web world. We can find many reviews about a product. The reviews will tell us about the quality and the originality of the product. We can also find the users comment about the product. The comments will tell you about the products benefit and the faults.

Like other products we can also find the review for the Paint sprayers. You can find the Paint Zoom Review in many blogs and in review websites. With the review from the websites and in blogs we can easily find the features and the usage of the product. We can even find some videos about the product. We can even know better about the product before we purchase the product with the reviews in the websites.

With the reviews, we can save our time and our energy spending in the street shops. When we read the reviews and got satisfied we can purchase the product by ordering in online. We will receive the product to our home. Read the Paint Zoom Review and get to know about the product. Get the product and paint your home walls and the furniture’s by yourself and enjoy the joy of painting. 

Friday, July 22, 2011

Ford is recruiting B.E freshers

As with the growth in many companies, they are recruiting many new people to their organization. Yesterday i posted about the Polaris recruitment. This is for the Ford recruitment.

FORD is recruiting 2010 and 2011 passed out B.E Graduates. People should apply through online in their career page of the ford website.

Please find more details in the Jobs page and apply.

Thursday, July 21, 2011

Polaris Recruiting Freshers and Experienced in all Technology

2008 and 2009 is the worst period for the Software industry. Software industry was developed now and many companies have started recruiting people including freshers. I am working in Polaris Software lab ltd

Polaris is recruiting Freshers and Experienced in all the technologies. You can apply for the jobs in online. More than 1000 vacancies are available in Polaris. Most of the vacancies are in Chennai.

You have to register in the website to apply for the job. You will receive your Login ID and Password to your mail. You need to upload the resume in Online. HR people will review your resume and they will call you, if they are interested in your profile. 

Click here to know more details.

Thursday, July 7, 2011

How to encrypt the password (or) How to encrypt a string

Cryptography plays an important role in the computing world.  All the passwords will be saved in the encrypted format. All the organizations and the websites will store their user’s password in encrypted format. No one will save the password in plain format. Many problems will arise if the passwords were saved in plain format. For example, if the passwords were saved in plain format in the file or in the oracle database, hackers can easily ­­access the file and access their accounts and can transfer all the money to their accounts.

Because of the above said problems, scientists have started the concept of cryptography. The main concept of cryptography is to change the password into some other text and save the changed password in some files or in table. When the user enters the password the password will be encrypted and the password will be compared with the password stored in the password file (if UNIX machine) or in password table.

Many encryption and decryption algorithms are there in the computing technology. Many people had spent their whole life for cryptography. The first encryption program was written for Unix Operating System to maintain the user’s password.

crypt is the common c function used to crypt the string. It is the library function. This function is the one-way encryption method. There is no decryption program or the function is available. The crypt function will have two arguments. First argument is the password and the second argument is the salt. This function will take only the first eight digits and take the first two digits of the salt and create the encrypted password.

The encrypted password is of eight digits. The first two digit of the encrypted password contains the salt key used. The resulting 6 digits is the encrypted password. Crypt function uses the AES like algorithm.

Syntax for crypt function:

crypt( char *key, char *salt);

Sample program to encrypt the string:
#include<stdio.h>
#include<unistd.h>

main()
{
          char    passwd[10];
          char    salt[3];
          char    *encpasswd;
         
          printf("Enter the passwd:");
          scanf("%s",passwd);
          printf("Enter the Salt Key:");
          scanf("%s",salt);
         
          encpasswd =  crypt(passwd, salt);
         
          printf("The crypted passwd is: [%s]\n",encpasswd);
          exit(0);
}

The above program will encrypt the passwd and return the encrypted password to the encpasswd. This program works fine in the unix environment. 

Tuesday, June 28, 2011

Trick to list the links in the Google search page

As students we will use the internet for our assignments and for our projects. Some students will even use the internet for their knowledge. I hope 99% of the people will use the Google search engine. Have you ever wondered how the search engine is listing the website links and most of the times some websites link will always in the top. The link of some websites will always be in the first page. To bring the link in the first page is very simple. 

There are many ways to bring the link to the first page. First the topic should be simple. The topic should be chosen in such a way that relevant to the topic and should contain the hot keyword of the users search. For a particular topic people will search the content with similar keywords. If the keyword matches to the topic, the link will be displayed in the Google pages. If many people clicked the link, the link will display in the first page of Google search engine. 


The second way to list the links in the first page is to submit link in the social network sites and the links exchange sites. When the link was submitted in these sites many people will visit the website through the links. This will bring the traffic to the websites and the site will get the page rank according to the popularity of the link and by the quality of the contents. 

Saturday, May 28, 2011

Wipro is recruting BE/B.Tech 2010 passedouts

Its already one year over for the 2010 batches. Usually Software companies won't recruit freshers when they have more than one year gap. But with the recession of the last few years IT companies are recruiting freshers even they have more than one year gap. Wipro has called the 2010 passed out batches to attend the interview. They are recruiting 2010 BE/B.Tech passed outs. Even they are calling for the 2009 passed outs. I hope this is the last chance for the 2009 and 2010 passed outs. You can apply directly from the Wipro's website. Click Here to apply to Wipro. This link will redirect you to the Wipro's website. Last day to apply for this job is 30th May 2011. Apply for the job. They will call you or mail you for the interview. All the best for your interview.

Chetanas has created a new website for Java Programers

Day by day JAVA programmers are increasing. Most of the applications are done through Java coding. We can do any kind of applications with JAVA. All the companies are hiring JAVA professionals. Every company are in need of JAVA professionals. Its easy to get a job if you know JAVA. But the pay will be vary from company to company. Chetanas forun is one of the best online job portal as they are doing  wonderful job for the freshers as well as the experienced professionals. The percentage of fake jobs was less when compared to other job portals. We can assure the company posted in chetanas forum was a good company. Now Chetanas forum has a new portal for JAVA professionals. We can search JAVA programming vacancies in this portal.Click Here to visit the portal for JAVA vacancies. The portal name is http://javaken.com

Tuesday, May 24, 2011

DIGITAL IMAGING PROCESSING ONE MARK

DIGITAL IMAGE PROCESSING

1. Preprocessing of an image is done in

image acquisition
image segmentation
image restoration
image enhancement

2. Which process is called subjective process?

image acquisition
image segmentation
image restoration
image enhancement

3. Which process is called an objective process?

image compression
image segmentation
image restoration
image enhancement

4. Which process split an input image into its constituent parts

image acquisition
image segmentation
image restoration
image enhancement

Which process involves the mathematical or probabilistic methods in its operation

image acquisition
image segmentation
image restoration
image enhancement

6. Which process is used in improving image contrast?

image acquisition
image segmentation
image restoration
image enhancement

7. Which Process is used in removal of optical distortions?

image acquisition
image segmentation
image restoration
image enhancement

8. Which technique is used for reducing the storage required to save an image

image compression
image segmentation
image restoration
image enhancement

9. Which Process is used in sharpening or de-blurring an out of focus image?

image acquisition
image segmentation
image restoration
image enhancement

10. Which Process is used in removing periodic interference?

image acquisition
image segmentation
image restoration
image enhancement

11. Which process uses tools for extracting image components

Compression
Morphological Processing
Restoration.
Segmentation

12. Which Process involves removing of blur caused by linear motion?

image compression
image segmentation
image restoration
image enhancement

13. Which process transforms raw data into a form suitable for subsequent processing

Image Representation
Morphological Processing
Image Restoration
Image compression

14. Which process is also called feature selection?

Image Description
Morphological Processing
Image Restoration
Image Segmentation

15. Which is the process that assigns a label (e.g., “vehicle”) to an object based on its descriptors?

Image Description
Morphological Processing
Image Recognition
Image Segmentation

16. In each eye, cones are in the range of

6-7 million.
75-150 million
65-75 million
5-7 million

17. In each eye, rods are in the range of

6-7 million
75-150 million
65-75 million
5-7 million

18. Scotopic vision is also called as

Dim light vision
Bright light vision
Moderate vision
No vision

19. Photopic vision is also called as

Dim light vision
Bright light vision
Moderate vision
No vision

20. Cone vision is called as

Dim light vision
Bright light vision
Moderate vision
No vision

21. The observer is looking at a tree15 m high at a distance of 100 m , Calculate the height in mm of
that object in the retinal image

0.15 mm
2.55 mm
0.55 mm
6.66 mm

22. Weber Ratio is given by

∆i * i
∆i / i
i /∆i
i-∆i

23. The spatial interaction of Luminance from an object and its surround creates a phenomenon
called

Subjective brightness
Brightness adaptation
Mach band effect
Simultaneous Contrast

24. Intensity as preserved by the human visual system is called as

Subjective brightness
Brightness adaptation
Mach band effect
Simultaneous Contrast

25. Which operation increases the dynamic range of the gray levels in the image?

Subjective brightness
Brightness adaptation
Mach band effect
Contrast stretching

26. Digitizing the amplitude values is called

Quantization
Compression
Sampling
Restoration

27. Digitization of spatial coordinates (x,y) is called

Quantization
Compression
Sampling
Restoration

28. Which type of image is commonly used as a multiplier to mask regions within another image.

Binary images
Indexed Images
Gray scale image
RGB image

29. Find the number of bits required to store a M X N image with 2m gray levels?

M X N X m bits
m X N bits
M X N bits
m X M bits

30. Find the number of bits required to store a 256 X 256 image with 64 gray levels?

655360 bits
65536 bits
393216 bits
327680bits

31. Find the number of bits required to store a 512 X 512 RGB color image with 2 grey levels?

.786 MB
.262 MB
512 MB
1024 MB

32. The Euclidean distance between p and q is defined as

Max | ( x – s ) | , | ( y – t ) |
[( x – s )2 + ( y – t ) 2 ]
[( x – s )2 + ( y – t ) 2 ]1/2
|(x–s)|+|(y–t)|

33. Chess board (D8) distance is calculated by

Max | ( x – s ) | , | ( y – t ) |
[( x – s )2 + ( y – t ) 2 ]
[( x – s )2 + ( y – t ) 2 ]1/2
|(x–s)|+|(y–t)|

34. The effect of aliased frequencies can be seen under the right conditions in the form of so called

Moire Patterns
Brightness adaptation
Mach band effect
Simultaneous Contrast

35. City block (D4) distance is calculated by

Max | ( x – s ) | , | ( y – t ) |
[( x – s )2 + ( y – t ) 2 ]
[( x – s )2 + ( y – t ) 2 ]1/2
|(x–s)|+|(y–t)|

36. Give the relation for 1d DCT

1/N x=0∑N-1 f(x) exp [-j2Ï€ux/N]

α(u) x=0∑N-1f(x)cos[(2x+1)uÏ€/2N]

N −1



1/N

x =0

1/N

x=0∑ N-1 f(x) i=0

f(x) (-1) ∑i =0

Π n-1 (-1) bi (x) bn-1-I (u)

37. Give the relation for 1d DFT

1/N x=0∑N-1 f(x) exp [-j2Ï€ux/N]

α(u) x=0∑N-1f(x)cos[(2x+1)uÏ€/2N]

N −1



1/N

x =0

1/N

x=0∑ N-1 f(x) i=0

f(x) (-1) ∑i =0

Π n-1 (-1) bi (x) bn-1-I (u)

38. Give the relation for Hadamard Transform

1/N x=0∑N-1 f(x) exp [-j2Ï€ux/N]

α(u) x=0∑N-1f(x)cos[(2x+1)uÏ€/2N]

N −1

1/N



x =0

1/N

x=0∑ N-1 f(x) i=0

f(x) (-1) ∑i =0

Π n-1 (-1) bi (x) bn-1-I (u)

39. Give the relation for Walsh Transform

1/N x=0∑N-1 f(x) exp [-j2Ï€ux/N]

α(u) x=0∑N-1f(x)cos[(2x+1)uÏ€/2N]

N −1



1/N

x =0

1/N

x=0∑ N-1 f(x) i=0

f(x) (-1) ∑i =0

Π n-1 (-1) bi (x) bn-1-I (u)

40. Which model is used for color monitor & color video camera?

RGB model
CMY model
YIQ model
HIS model

41. Which model is used for color printing?

YIQ model
CMY model
HIS model
RGB model

42. Which model is used for color image processing?

RGB model
YIQ model
CMY model
HIS model

43. Which model is used for color picture transmission?

RGB model
YIQ model
HIS model
CMY model

44. Zooming of digital images may be viewed as

over sampling
under sampling
flat sampling
critical sampling

45. Shrinking of digital images may be viewed as

over sampling
under sampling
flat sampling
critical sampling

46. Give the Conditions for perfect transform

Transpose of matrix ! = Inverse of a matrix.
Transpose of matrix = ( inverse of a matrix )2
Transpose of matrix = Inverse of a matrix
Transpose of matrix = ( inverse of a matrix )1/2.

47. Which transform is called very fast transform?

HAAR Transform
HADAMARD Transform
SINE Transform
COSINE Transform

48. Which transform has very poor energy compaction for images?

COSINE Transform
HADAMARD Transform
SLANT Transform
HAAR Transform

49. Which transform has very good energy compaction for images?

COSINE Transform
HADAMARD Transform
SLANT Transform
HAAR Transform

50. The basic vectors of Slant matrix are

Uniformly ordred
sequensely ordered
Randomly ordred
not sequensely ordered

51. The basic vectors of HAAR matrix are

Uniformly ordred
sequensely ordered
Randomly ordred
not sequensely ordered

52. Which Transform is an optimal in the sense that it minimizes the mean square error between the
vectors X and their approximations X^?

KL Transform
HADAMARD Transform
SLANT Transform
HAAR Transform

53. Which Transform is very good energy compaction for highly correlated images?

KL Transform
HADAMARD Transform
SLANT Transform
HAAR Transform

54. Which Transform has excellent energy compaction for highly correlated data?

SLANT Transform
HADAMARD Transform
COSINE Transform
HAAR Transform

55. A measure of the smallest discernible detail in an image is

Intensity Resolution
Frequency Resolution
Spatial resolution
Spectral resolution

56. The negative of an image with gray levels in the range [0,L-1] is obtained by using the negative
transformation given as:

s=(L+1)-r
s=(L-1)-r
s=(L-1)+r
s=(L+1)+r

57. Which domain refers to image plane itself?

Laplace
Frequency
Spatial
Spectral

58. Which method is based on modifying the image by Fourier transform?

Image domain
Frequency domain
Spatial domain
Spectral domain

59. Which operation reduces an image of higher contrast than the original by darkening the levels
below m and brightening the levels above m in the image?

Contrast stretching
Grey level slicing
Bit plane slicing
Subjective Brightness

60. Which operation is used in enhancing masses of water in satellite imagery?

Contrast stretching
Grey level slicing
Bit plane slicing
Subjective Brightness

61. Which operation is used in enhancing flaws in x-ray images?

Contrast stretching
Grey level slicing
Bit plane slicing
Subjective Brightness

62. Which operation is used in highlighting the contribution made to total image appearance by
specific bits might be desired?

Contrast stretching
Grey level slicing
Bit plane slicing
Subjective Brightness

63. The histogram of a digital image with gray levels in the range [0,L-1] is h(rk)=

k
nk
n
n/k

64. An information about the degradation must be extracted from the observed image either explicitly
or implicitly is called as

Blind image restoration
Inverse Filtering
Least Mean square filtering
Singular value Decomposition

65. This PDF P(Z)= 2(z-a)e-(z—a)2/b/b for Z>=a belongs to which noise model?

Gaussian noise
Erlang noise
Rayleigh noise
Impulse Noise

66. This PDF P(Z)=e-(Z-µ)2/2σ2/√2πσ belongs to which noise model?

Gaussian noise
Gamma Noise
Rayleigh noise
Impulse Noise

67. This PDF P(Z)=ab zb-1 ae-az/(b-1) for Z>=0 belongs to which noise model?

Gaussian noise
Erlang noise
Uniform noise
Gamma Noise

68. This PDF P(Z)= ae-az

Z>=0 belongs to which noise model?

Gaussian noise
Exponential noise
Rayleigh noise
Gamma Noise

69. This PDF P(Z)=1/(b-a) if a<=Z<=b belongs to which noise model?

Gaussian noise
Erlang noise
Uniform noise
Gamma Noise

70. ------------ is the process of recovering the input of the system from its output?

Blind image restoration
Inverse Filtering
Least Mean square filtering
Singular value Decomposition

71. Wiener filtering is a method of restoring images in the

presence of blurr as well as noise
presence of noise only
abscence of blurr as well as noise
absence of blurr only

72. Which transform gives best energy packing efficiency for any given image?

SLANT Transform
HADAMARD Transform
SVD Transform
HAAR Transform

73. Which transform is useful in the design of filters finding least square?

SLANT Transform
HADAMARD Transform
KL Transform
SVD Transform

74. Hotteling Transform is also called as

KL Transform
HAAR Transform
SLANT Transform
SVD Transform

75. Which transform involves Principle of component analysis

SLANT Transform
HADAMARD Transform
KL Transform
SVD Transform

76. The basis of reduction process is removal of redundant data is called

image compression
image segmentation
image restoration
image enhancement

77. The pseudo inverse filter is defined as

H^(u,v)=1/(H(u,v)
H^(u,v)=1/(H(u,v)
H^(u,v)=(H(u,v)
H^(u,v)=(H(u,v)

78. This function represents which filter?

Contra harmonic mean filter
Geometric mean filter
Harmonic filters
Arithmetic mean filter

79. This function represents which filter?

Arithmetic mean filter
Geometric mean filter
Harmonic filters
Contra harmonic mean filter

80. This function represents which filter?

Arithmetic mean filter
Geometric mean filter
Contra harmonic mean filter
Harmonic filters

81. This function represents which filter?

Arithmetic mean filter
Geometric mean filter
Harmonic filters
Contra harmonic mean filter

82. The effect of salt and pepper noise can be eliminated using

Arithmetic mean filter
Geometric mean filter
Contra harmonic mean filter
Harmonic filters

83. Which filter has positive coefficient near the center and negative in the outer periphery.

Median filter
High pass spatial filter
Derivative filter
Low pass spatial filter

84. The first derivative at any point in an image is obtained by using

Laplacian at that point
the magnitude of the gradient at that point
the phase of the gradient at that point
Fourier transform at that point

85. The second derivative at any point in an image is obtained by using

Laplacian at that point
the magnitude of the gradient at that point
the phase of the gradient at that point
Fourier transform at that point

86. Compression Ratio =

original size - compressed size: 1
original size * compressed size: 1
original size + compressed size: 1
original size / compressed size: 1

87. Which is a technique used to reduce the size of a repeating string of characters?

Huffman coding
Runlength coding
Arithmetic coding
LZW coding

88. Run length coding is the example of

coding redundancy
compression redundancy
psycho visual redundancy
interpixel redundancy

89. ------------ transforms the input data into non-visual format.

Symbol encoder
Mapper
Quantizer
Symbol decoder

90. Which of this step is omitted if the system is error free.

Symbol encoder
Mapper
Quantizer
Symbol decoder

91. ----------- reduces the coding redundancy.

Symbol encoder
Mapper
Quantizer
Symbol decoder

92. ---------- reduces the interpixel redundancy.

Symbol encoder
Mapper
Quantizer
Symbol decoder

93. -------------- reduces the psycho visual redundancy of the input images.

Symbol encoder
Mapper
Quantizer
Symbol decoder

94. Hamming code is the example for

Symbol encoder
Mapper
Quantizer
Channel encoder

95. Variable Length Coding reduces

coding redundancy
compression redundancy
psycho visual redundancy
interpixel redundancy

96. A code word that is not a prefix of any other code word is called

Huffman code
Block code
Instantaneous code
Arithmetic code

97. One to one corresponds between source symbols and code word doesn’t exist in

Huffman code
Block code
LZW code
Arithmetic code

98. JPEG stands for

Joint Pixel Expert Group
Joint Photographic Expert Group
Joint Photographic Expand Group
Joint Picture Expert Group

99. Data Redundancy Rd =

1-Cr
1/Cr
1-1/Cr
1+1/Cr

Calculate the data redundancy if N1 = 2 , n2 =1

0.5
1
0
-1


Download this one mark with Answers

PREPARED BY

___
Er. M. ARUN M.E. MIEEE, MISTE

LECTURER ECE

Monday, May 9, 2011

Lock and Unlock Folders Using Text files

Windows needs special software's to lock and unlock the files. But windows itself providing the feature to lock and unlock the files. Here i am going to explain about the options to lock and unlock the files using the notepad.


 First create a folder with any name (ex. bensh)

Now open a notepad and type the following inthe notepad

ren bensh bensh.{21EC2020-3AEA-1069-A2DD-08002B30309D}

now save the file with the name lock.bat.

Now open a new notepad and type the following in the notepad.

ren bensh.{21EC2020-3AEA-1069-A2DD-08002B30309D}bensh

now Save the file with the name key.bat.

Now Double click on the lock.bat file.

The folder will be locked.

To open the folder double click on the key.bat file.

Note that the lock.dat and the key.dat files should be in the same folder where the bensh folder was there.

This lock technique will not work in the Windows 7 OS.

Sunday, May 8, 2011

Clean Up your PC and Improve the performance

Most of the people are using computers. All the offices and colleges have the computers for the business as well as for educational purpose. The computer’s plays an important role in the technology world. Every people are in need of computers in their daily life. Many applications have come to improve the business. 

Every one use computer. But not everyone use the computer efficiently. Most of the computers will slow down the performance after some months. This is because of the unwanted memory in the hard disk.  Windows provides some tools to improve the performance of the computer. These tools are Disk Cleanup, Disk Defragmenter, and Check Disk. We will see about how to do Disk Cleanup and make your computer works faster. Better do automatic schedule for Disk cleanup instead of doing it manually. 

Follow the below steps to perform the Disk Cleanup:

Windows 7:
  1. Open Task Scheduler: Click the Start button, click Control Panel, click Administrative Tools, and then double-click Task Scheduler. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
  2. Click the Action menu, and then click Create Basic Task. This opens the Create Basic Task Wizard.
  3. Type a name for the task and an optional description, and then click Next.
  4. To select a schedule based on the calendar, click Daily, Weekly, Monthly, or One time, and then click Next.
  5. Specify the schedule you want to use, and then click Next.
  6. Click Start a program, and then click Next.
  7. Click Browse, and, in the File name box, type cleanmgr.exe, click Open, and then click Next.
  8. Click Finish.

  1. Open Task Scheduler: Click the Start button, click Administrative Tools, and then click Task Scheduler. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
  2. Click the Action menu, and then click Create Basic Task.
  3. Type a name for the task and an optional description, and then click Next.
  4. To select a schedule based on the calendar, click Daily, Weekly, Monthly, or One time, and then click Next.
  5. Specify the schedule you want to use, and then click Next.
  6. Click Start a program, and then click Next.
  7. Click Browse, and, in the File name box, type cleanmgr.exe, click Open, and then click Next.
  8. Click Finish.

  1. Click Start, and then click Control Panel.
  2. Click Performance and Maintenance.
  3. Under or pick a Control Panel icon, click Scheduled Tasks.
  4. In the Scheduled Tasks window, double-click Add Scheduled Task.
  5. In the Scheduled Task Wizard, click Next.
  6. Scroll down to Disk Cleanup in the list of Applications, click it (to highlight it), and then click Next.
  7. Under Perform this task, click Weekly, and then click Next.
  8. Set the time and day of the week you would like to run Disk Cleanup. For best results, choose a time when you're typically at your computer so you can provide any required input. Click Next.
  9. Type your password in both the Enter the password and Confirm password boxes, and then click Next.
  10. Click Finish.

Tuesday, April 26, 2011

Best fun kid School items for your kids

Kids are the life for their parents. Every one love their kids. People will do more for their kids. They take care of their kids very much. They spend most of their time for their kids. school days are most memorable for the kids. Parents will do what ever they want in their school days. In the school days they will take the lunch in the lunch bags. kids lunch totes will be perfect for the cute kids. Many types of totes are available. They are available in variant colors and various designs. The best days in the school days are the picnic and the tours arranged in the college. Kids will take the bags to carry their clothes and their snacks to the vacation tours. Get the small duffle bags to the kids. Small kids will like the duffle bags very much. Because they comes in different colors and designs. They comes with very quality material. The duffle bags comes with the very cheap cost. The small duffle bags comes with the starting range of $17.99. Variety of designs were embedded in the duffle bag. People can choose from the best designs they like. Every people likes the back bag. People likes the back bag when it comes with good quality cloth and with good design. If you are looking for the best back bag, then Stephen Joseph toddler backpacks is the best choice for you. You can get the back bags from $7.00 itself. You can also buy the bags in online. You will get the best design with the good material at this cost from Stephen Joseph toddler backpacks  only. Get the best bags for your kids and make them happy and save your money. The back bags will last for more than three or four years. Save your money and get more than for the money you spend.

Monday, March 28, 2011

Shell Types in Unix

Just like people know different languages and dialects, your UNIX system will usually offer a variety of shell types:
sh or Bourne Shell: the original shell still used on UNIX systems and in UNIX-related environments. This is the basic shell, a small program with few features. While this is not the standard shell, it is still available on every Linux system for compatibility with UNIX programs.

bash or Bourne Again shell: the standard GNU shell, intuitive and flexible. Probably most advisable for beginning users while being at the same time a powerful tool for the advanced and professional user. On Linux, bash is the standard shell for common users. This shell is a so-called superset of the Bourne shell, a set of add-ons and plug-ins. This means that the Bourne Again shell is compatible with the Bourne shell: commands that work in sh, also work in bash. However, the reverse is not always the case. All examples and exercises in this book use bash.

csh or C shell: the syntax of this shell resembles that of the C programming language. Sometimes asked for by programmers.

tcsh or TENEX C shell: a superset of the common C shell, enhancing user-friendliness and speed. That is why some also call it the Turbo C shell.

ksh or the Korn shell: sometimes appreciated by people with a UNIX background. A superset of the Bourne shell; with standard configuration a nightmare for beginning users.
·
The file 
/etc/shells gives an overview of known shells on a Linux/Unix system:

mia:~> cat /etc/shells
/bin/bash
/bin/sh
/bin/tcsh
/bin/csh

Your default shell is set in the /etc/passwd file, like this line for user pertsch:

pertsch:L2NOfqdlPrHwE:504:504:pertsch Maya:/home/pertsch:/bin/bash

To switch from one shell to another, just enter the name of the new shell in the active terminal. The system finds the directory where the name occurs using the PATH settings, and since a shell is an executable file (program), the current shell activates it and it gets executed. A new prompt is usually shown, because each shell has its typical appearance:

pertsch:~> tcsh

ORBI-SCH=>

Friday, March 25, 2011

Start Fight against the aging after your college

College is the days where we will have our young days. College is the days where we will spend our young days. People can see the young faces in college. Our faces will look brighter in the young age. When we finished our college days, we have to go for a job. To get a job, we have to attend more number of interviews. We have to roam a lot in the sunlight to get a job. From that our aging problem starts. Our skins will dry when we are roaming. Its because of the harmful rays in the sunlight, dust and pollution. With all these problem we will look aged people in the young age itself. It's because our skin becomes dry when we roam outside. Start your anti-aging skin care once you finish the college. You can take the treatment for aging problem as well as you can use the anti-aging skin care products. With the skin-care products and treatment you will look young even at the old age. With this kind of treatments, you will look 28 to30 when you are at the age of 40 to 45. Do the treatment of anti-aging and look young even at your old age.

Friday, February 25, 2011

An Introduction for HTML - part 1

HTML is the basic code for the websites. HTML is not a programming language. It is a markup language. HTML stands for Hyper Text Markup Language. HTML is easy to learn and easy to understand. Here the codes are called as tags. HTML is a set of mark up tags. HTML tags are keywords surrounded by angle tags <,>

Eg. <html>
</html>

The tags started will be close with the tag using.  / is the closing tag.

Rules for the HTML.

HTML pages start with the tag <html> and end with the </html>.
The next is the head part <head> </head>
You can add the head part or else you can leave the head part.

The most important part is the body part. Body part is the texts and the images shown in the websites. 

body part starts with the tag <body> and ends with the tag </body>.

HTML doesn't need any tool to develop. Just notepad and a web browser is enough for HTML coding.

Example: 
Try this code in your browser.

<html>
<head>
Hello Browser
</head>
<body>
<h1> Hello World </h1>
<h3> Bensh </h2>
</body>
</html> 


Copy the above  code and save it in your desktop as Helloworld.html.
The saved file will be the html format. double click on the icon and you can view the result.


Will continue the tutor in the next posts.