Atul Patel
Charotar University of Science and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Atul Patel.
International Journal of Computer Applications | 2012
Chirag Patel; Atul Patel; Dharmendra T. Patel
ABSTRACT Optical character recognition (OCR) method has been used in converting printed text into editable text. OCR is very useful and popular method in various applications. Accuracy of OCR can be dependent on text preprocessing and segmentation algorithms. Sometimes it is difficult to retrieve text from the image because of different size, style, orientation, complex background of image etc. We begin this paper with an introduction of Optical Character Recognition (OCR) method, History of Open Source OCR tool Tesseract, architecture of it and experiment result of OCR performed by Tesseract on different kinds images are discussed. We conclude this paper by comparative study of this tool with other commercial OCR tool Transym OCR by considering vehicle number plate as input. From vehicle number plate we tried to extract vehicle number by using Tesseract and Transym and compared these tools based on various parameters. explained.Keywords like: Desktop OCR, Server OCR, Web OCR etc.
International Journal of Computer Applications | 2013
Chirag Patel; Dipti Shah; Atul Patel
Traffic control and vehicle owner identification has become major problem in every country. Sometimes it becomes difficult to identify vehicle owner who violates traffic rules and drives too fast. Therefore, it is not possible to catch and punish those kinds of people because the traffic personal might not be able to retrieve vehicle number from the moving vehicle because of the speed of the vehicle. Therefore, there is a need to develop Automatic Number Plate Recognition (ANPR) system as a one of the solutions to this problem. There are numerous ANPR systems available today. These systems are based on different methodologies but still it is really challenging task as some of the factors like high speed of vehicle, non-uniform vehicle number plate, language of vehicle number and different lighting conditions can affect a lot in the overall recognition rate. Most of the systems work under these limitations. In this paper, different approaches of ANPR are discussed by considering image size, success rate and processing time as parameters. Towards the end of this paper, an extension to ANPR is suggested.
computational intelligence | 2015
Jai Prakash Verma; Bankim Patel; Atul Patel
Recommendation system provides the facility to understand a persons taste and find new, desirable content for them automatically based on the pattern between their likes and rating of different items. In this paper, we have proposed a recommendation system for the large amount of data available on the web in the form of ratings, reviews, opinions, complaints, remarks, feedback, and comments about any item (product, event, individual and services) using Hadoop Framework. We have implemented Mahout Interfaces for analyzing the data provided by review and rating site for movies.
International Journal of Computer Applications | 2013
Jai Prakash Verma; Bankim Patel; Atul Patel
Big amount of data available in the forms of reviews, opinions, feedbacks, remarks, comments, observations, clarifications, and explanations that require a robust mechanism to store, retrieve, analyze, and management. In this paper, we are proposing system that provides review or summary of above mention text data available on web for an educational institute. Due to big data size above system can be extended as real time recommendation system for Big Data analysis as future enhancement.
computational intelligence | 2015
Nirali Honest; Atul Patel; Bankim Patel
Path completion is a critical and difficult task in the preprocessing phase of web usage mining. We mold the data preprocessing phase to accomplish our goal to mine websites designed using a content management system (cms). The data preprocessing phase includes data cleaning, user identification, session identification, site structure and link details formation, path completion and event generation. The paper includes work on path completion by considering different types of path generated in accessing the website designed using cms and gives a novel algorithm to form the path.
International Journal of Computer Applications | 2013
Pranav Vyas; Bhushan Trivedi; Atul Patel
As the internet grows rapidly, role of security of information of users gain more importance than ever. Key exchange protocols are important in this regard. In this paper we evaluate performance of well known key exchange algorithms. In this paper we analyze their encryption speed and their power consumption on different platforms. We analyze algorithms on both traditional PC and mobile phones. Experiment result shows that protocols which are less computationally intensive and less power consuming but not very secure. We select the protocol which is most suitable for mobile computers.
International Journal of Image, Graphics and Signal Processing | 2015
Chirag Patel; Atul Patel; Dipti Shah
International Journal of Information Sciences and Techniques | 2016
Sanskruti Patel; Atul Patel
Archive | 2013
Maitri Patel; Atul Patel; Paresh Virparia
International journal of engineering research and technology | 2013
Atul Patel; S A Shah; Hitesh Bhargav