Papers by Kajal Chaudhari
International Journal For Science Technology And Engineering, 2017
This paper describes the design and implementation of secure locking using raspberry pi 3 model B... more This paper describes the design and implementation of secure locking using raspberry pi 3 model B for door unlocking to provide essential security to our homes. The work starts with the introduction of face detection followed by detail study of Viola Jones Algorithm. For object detection we used Haar feature based cascade classifier which is an effective face detection method. For face recognition we used the technique of Eigen faces which was proposed by Sirovich and Kirby for efficiently representing pictures of faces using principal component analysis. Raspberry pi is used for signaling servo motor which controls door locking and unlocking.

Current pharmaceutical situation focuses on the preparation of gastro-retentive floating drug del... more Current pharmaceutical situation focuses on the preparation of gastro-retentive floating drug delivery system (GRFDDS). This systems has gained noteworthy interest in the past decades. These are the low density systems that float over the gastric contents and remain buoyant in the stomach for a prolonged period of time without affecting the gastric emptying rate. GRFDDS is used to delay the residence time of delivery in stomach. The controlled gastric retention of solid dosage forms may be achieved by the mechanism of mucoadhesion, floatation, sedimentation, expansion, modified shape systems or by the administration of pharmacological agents that delaying gastric emptying. This results in targeting of release of drug at a specific site for the systemic or local effects. GRDDS is used to overcome challenges associated with conventional oral dosage forms and to release the drug at a specific absorption site to improve bioavailability of particular drug substance. Some floating drug de...

With the advent of internet, various on-line attacks have been increased and among them, the most... more With the advent of internet, various on-line attacks have been increased and among them, the most well-liked attack is phishing. Phishing is a trial by an individual or a group to get personal confidential information like passwords, credit information from unsuspecting victims for identity theft, financial gain and different fraudulent activities, by simulation to be a trustworthy entity. Victims are tricked into providing such data by a combination of spoofing techniques and social engineering. Visual Cryptography (VC) is used. Visual cryptography is explored to convert the QR code into two shares and both these shares will then be transmitted separately. One time Passwords (OTP) is passwords that are valid just for a session to validate the user within a fixed amount of time. Here an image based mostly authentication using Visual Cryptography is implemented with the combination of OTP (One Time Password). The use of visual cryptography is explored to preserve the privacy of a pic...

International Journal of Advanced Research in Computer Science, 2017
Image mosaicing is one of the ongoing area of research of computer graphics and computer vision. ... more Image mosaicing is one of the ongoing area of research of computer graphics and computer vision. One of the popular techniques of image mosaicing is image stitching. There are mainly two approaches namely direct techniques and feature based technique. In direct technique, the intensity of the pixels of the image is compared with each other, and feature based techniques determines the relationship between images based on the features extracted from the processed images. This paper mainly focuses on individual algorithms of feature detectors and descriptors. The steps of image mosaicing are highlighted and the results are compared. The image is fed as the input. The ORB feature extraction method with Alpha blending technique extracts the features from the image. The third step computes the extracted features using homography. Then after the features are mapped with respect to the input image and blending of the image is carried out. The last step an image masaicing system depicted the...
Uploads
Papers by Kajal Chaudhari