Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jaspreet Kaur.
International Journal of Computer Applications | 2012
Jaspreet Kaur; Alka Jindal
To integrate medical images and image processing, image segmentation plays an essential role. Image segmentation is an operation that separates the image into different segments. There are several image segmentation algorithms that are at present available. In this paper, three segmentation algorithms have been implemented and discussed namely: Active Contour without edges, Localized region Based active contour and Distance Regularized Level Set. To detect the thyroid disorders various imaging modalities are used: MRI, Scintigraphy, SPECT and Ultrasound. Out of these, Ultrasound Imaging and Scintigraphy have been discussed in this paper. The segmentation algorithms have been implemented on these two modalities to segment the thyroid gland.
International Journal of Computer Applications | 2013
Jaspreet Kaur; Ranbir Kaur Brar; Kanwarjit Singh; Mehar Chand
The aim of the present paper is an attempt to introduce a new sequence of functions , ; , , / 0,1,2,... n V x a k s n , which involving the Bessel function of first kind . J x By using operational technique, some interesting generating relations and summation formulas are obtained in sections 2 and 3. The remarkable thing of this paper is the crucial MATLAB coding of the new sequence of functions, Database and Graph established using the MATLAB (R2012a) in the section (5) and (6) for different values of parameters and n=1, 2, 3 and 4. The reader can establish Database and Graph using the same program for any value of n. General Terms Special function, Sequence of Function, Matlab.
International Journal of Computer Applications | 2013
Jaspreet Kaur; Anu Garg
Android is an open platform which is becoming very popular operating system. Its open source code is easily handled by the users to get and use new contents and applications on their handsets. Android is totally a permission based process to develop the applications. With the increasing popularity of these smart phones, additional privacy protection to these devices is required. Android is more flexible to become attractive targets for malicious attacks due to significant advances in both hardware and operating systems. Likewise, by installing malicious contents on the device, users can be breached of their security through the compromised information. By compromising user’s privacy, malicious applications can access voice recording devices, cameras, intercept SMS messages, usage information or gain location information. Thus the security and privacy are the two most important concerns in android. The need to maintain security and data confidentiality on the Android platform makes it an urgent issue to find loop holes in security. In this thesis I present an attack on user’s usage. This attack allows adversaries to steal the user’s usage information and enables attack to get information like what all applications are installed on the mobile, time stamp and date stamp of usage with implementation and a security measure for this spy attack theoretically.
Archive | 2012
Jaspreet Kaur; Alka Jindal
International Journal of Computer Applications | 2013
Jaspreet Kaur; Vishal Gupta
International Journal of Computer Applications | 2016
Jaspreet Kaur; Candy Goyal
International Journal of Computer Applications | 2016
Jaspreet Kaur; Rajesh Kochher
Archive | 2015
Gemini Garg; Jaspreet Kaur
International Journal of Computer Applications | 2015
Gemini Garg; Jaspreet Kaur
International Journal of Computer Applications | 2015
Jaspreet Kaur; Rupinder Singh; Pawandeep Kaur