Image Processing and Restriction of Video Downloads Using Cloud

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Flower image classification using deep learning and convolutional neural network (CNN) based on machine learning in Tensor flow. Tensor flow IDE is used to implement machine learning algorithms. Flower image processing is based on supervised learning which detects the parameters of image. Parameters of the image were compared by decision algorithms. These images are classified by neurons in convolutional neural network. Video processing based on machine learning is used in restriction of downloading the videos by preventing the second response from the server and enabling the debugging of the video by removing the request from the user.

     

     

     


  • Keywords


    Image detection; convolutional neural network (CNN); Machine learning; Video restriction; Debugging, deep neural network.

  • References


      [1] Francesco Rossi, Alfredo benso , Stefano Di Carlo, Gianfranco Politano, Alessandro Savino and Pier Luigi Acutis ”FishAPP: a Mobile App to Detect Fish Falsification through Image Processing and Machine Learning Techniques”.

      [2] N.Srinivasan, R.S.Ponmagal ”Machine Learning Approach for Exploring Rock Arts through the Cloud Infrastructure”.

      [3] Fengying Xie, Mengyun Shi, Zhenwei Shi “Multilevel Cloud Detection in Remote Sensing Images Based on Deep Learning”.

      [4] SOHINI ROYCHOWDHURY,” Azure-Based Generalized Flow for Medical Image Classification”.

      [5] https://github.com/search?utf8=%E2%9C%93&q=org%3Atensorflow+machine+learning&type=

      [6] https://www.tensorflow.org/get_started/get_started.

      [7] Alapatt, B.P., Kavitha, A., Amudhavel, J., "A novel encryption algorithm for end to end secured fiber optic communication", (2017) International Journal of Pure and Applied Mathematics, 117 (19 Special Issue), pp. 269-275.

      [8] Amudhavel, J., Ilamathi, R., Moganarangan, N., Ravishankar, V., Baskaran, R., Premkumar, K., "Performance analysis in cloud auditing: An analysis of the state-of-the-art", (2015) International Journal of Applied Engineering Research, 10 (3), pp. 2043-2046.

      [9] Amudhavel, J., Inbavalli, P., Bhuvaneswari, B., Anandaraj, B., Vengattaraman, T., Premkumar, K., "An effective analysis on harmony search optimization approaches", (2015) International Journal of Applied Engineering Research, 10 (3), pp. 2035-2038.

      [10] Amudhavel, J., Kathavate, P., Reddy, L.S.S., Bhuvaneswari Aadharshini, A., "Assessment on authentication mechanisms in distributed system: A case study", (2017) Journal of Advanced Research in Dynamical and Control Systems, 9 (Special Issue 12), pp. 1437-1448.

      [11] Amudhavel, J., Kathavate, P., Reddy, L.S.S., Satyanarayana, K.V.V., "Effects, challenges, opportunities and analysis on security based cloud resource virtualization", (2017) Journal of Advanced Research in Dynamical and Control Systems, 9 (Special Issue 12), pp. 1458-1463.

      [12] Amudhavel, J., Kodeeshwari, C., Premkumar, K., Jaiganesh, S., Rajaguru, D., Vengattatraman, T., Haripriya, R., "Comprehensive analysis on information dissemination protocols in vehicular ad hoc networks", (2015) International Journal of Applied Engineering Research, 10 (3), pp. 2058-2061.

      [13] Amudhavel, J., Padmapriya, S., Nandhini, R., Kavipriya, G., Dhavachelvan, P., Venkatachalapathy, V.S.K., "Recursive ant colony optimization routing in wireless mesh network", (2016) Advances in Intelligent Systems and Computing, 381, pp. 341-351.


 

View

Download

Article ID: 15705
 
DOI: 10.14419/ijet.v7i2.32.15705




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.