
Jagdish RahejaCentral Electronics Engineering Research Institute | CEERI · Machine Vision Lab, Control & Automation Group
Jagdish Raheja
M.Tech. (IIT KGP) PhD [Eng.] (Technical Univ. Munich, Germany)
About
125
Publications
65,204
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,675
Citations
Citations since 2017
Introduction
Additional affiliations
August 2016 - September 2016
University of Maribor, Maribor, Slovenia
Position
- Visiting Scientist
July 2015 - present
University of Maribor, Maribor, Slovenia
Position
- Visiting Scientist
June 2012 - August 2012
Technical University Dortmund, Germany
Position
- Guest Scientist
Education
January 2001 - January 2005
June 1985 - December 1986
Publications
Publications (125)
Human beings' health is affected by physical ventures and emotional states endured by regular activities, which frequently develop attitudes and substantially affect health outcomes. Human Emotions play a vital role in deciding perception, cognition, memory, attention, reasoning, and decision-making. Several approaches have been used for automatica...
Feelings such as fear, anger, happiness, pain, love, and hatred, are arisen due to the surrounding environment or people, generally known as emotions. Emotions are the part of a human character that consists of their feelings, contrasting to their thoughts. Emotion detection is viral nowadays, as humans do their work from day to night without givin...
The Republic of India is a densely populated country where quality medical facilities are not much available in country-side areas. If it is about animal health the ratio of the number of animals per Vet is very high and it is not possible for the Vet to go to every sick animal. In a few cases, the owner has to take the animal to the Vet and would...
An approach to accurately recognize various Yoga asanas using deep learning algorithms has been presented in this work. A dataset of six Yoga asanas (i.e. Bhujangasana, Padmasana, Shavasana, Tadasana, Trikonasana, and Vrikshasana) has been created using 15 individuals (ten males and five females) with a normal RGB webcam and is made publicly availa...
Modern world’s incessantly increasing outdoor traffic load has eventually led to structural health concern and continuous health monitoring of large scale civil structures such as bridges, roads, highways, etc. In this paper, we propose a computer vision based non-destructive structural health monitoring (SHM) method using high speed camera system...
This section summarizes the quantitative results of the experiments carried out during the assembling of the final prototype. The major participant algorithm in the system is the neural network that classifies the electroencephalographic signals received from the user’s brain and makes the decision of what was intended through the process. Therefor...
The proposed system comprises of three main parts, the first one being the wireless acquisition module, second is the signal processing module and the third, the last one is the output hardware module in which the user inputs get implemented as the final desired outputs. The following Fig. 4.1 shows the overall block diagram of the system implement...
The human brain is a major part of the central nervous system (CNS). The CNS and the peripheral nervous system (PNS) are two major sections of the human nervous system. The CNS comprises of the brain and the spinal cord, whereas, the PNS connects the CNS to primary sensory organs of the body such as the eye, ear, nose, etc., and other organs of the...
Many classes of electrophysiological activities of the brain are used in designing various types of brain–computer interfaces (BCIs). Those are discussed briefly in this section. Sensorimotor activity generally corresponds to the behavior of the brain rhythms (mu, beta, and gamma), movement-related potentials (MRPs), etc. Next, the classification o...
Early detection of cancer can lead to a higher likelihood of survival, lower costs of care which would further result in lowering death rates and disability due to cancer. Introduced in March 1924, colposcopy was used to detect the cause of abnormal looking cervix and hence provide appropriate treatment. Being prone to human errors, colposcopy can...
This book discusses the basic requirements and constraints in building a brain–computer interaction system. These include the technical requirements for building the signal processing module and the acquisition module. The major aspects to be considered when designing a signal acquisition module for a brain–computer interaction system are the human...
Computer vision has spread over different domains to facilitate difficult operations. It works as the artificial eye for many industrial applications to observe elements, process, automation and to find defects. Vision-based systems can also be applied to normal human life operations but changing light conditions is a big problem for these systems....
The stereo vision ability of human beings enables the surgeon with depth perception, and thus can allow for organ localization in human body. In this work, we propose an approach of developing a 3D prototype for stereo endoscopes. The stereo calibration and rectification processes have been implemented in order to nullify the effects of lens distor...
Overlaid texts are annotated text on video frames embedded externally for providing additional information to viewer of video sequences. The externally embedded texts can be used for auto-indexing and searching of video files in a video library using contextual contents inside video files. In this paper, we proposed a novel algorithm to detect and...
In densely populated countries, medical facilities are not much available in country-side areas. If it is about animal health, it is rare to get a good cure. The owner has to take the animal to the Vet and will have to do it every time if he is living in remote places. Most countries in South Asia have this situation where animal husbandry is a com...
The advent of 3D endoscope has revolutionized the field of industrial and medical inspection. It allows visual examination of inaccessible areas like underground pipes and human cavity. Miniature-sized objects like kidney stone and industrial waste products like slags can easily be monitored using 3D endoscope. In this paper, we present a technique...
Among other naturally performed gestures by users, pointing gesture is one of the most intuitive interfaces for selection. Many systems have been proposed on pointing gesture for HCI systems. The detection and selection of pointed object can be helpful in many applications. In this paper, we approximate the pointing location of the user by localizi...
This paper presents a new method for text extraction from word cloud images. In order to recognize characters, edge mapping was carried out with the help of a 2D-DWT which helped to perform multi-resolution analysis too. In order to reduce the number of training samples k-mean clustering algorithm and support vector machine (SVM) was used. Since, t...
Telepresence is a necessity for present time as we can't reach everywhere and also it is useful in saving human life at dangerous places. A robot, which could be controlled from a distant location, can solve these problems. This could be via communication waves or networking methods. Also controlling should be in real time and smooth so that it can...
Objectives: Topographic map has been studied to observe the amount of neuronal activity at various electrode locations. Methods/Statistical Analysis: Electroencephalography (EEG) refers to recording of electrical activities (potential or current density) produced by neurons. A raw EEG signal obtained through electrodes placed in a specific pattern...
We developed smart footwear that comprises two three-axis accelerometers and an array of 16 capacitive electrodes to measure plantar pressures. The shoes are wirelessly connected to a computer server and can be used in on-line observations of walking and other in-door and out-door activities. To assess its practical value in recognising different h...
Hand Gesture has been used in different applications and also implemented on different platforms. A faster and smooth approach with reasonable accuracy is always needed to make smart devices smarter and faster. This paper describes a novel procedure of hand gesture recognition using Principal Component Analysis (PCA) implemented in FPGA Simulator....
Needs and new technologies always inspire people to make new ways to interact with machines. This interaction can be for a specific purpose or a framework which can be applied to many applications. Sign language recognition is a very important area where an easiness in interaction with human or machine will help a lot of people. At this time, India...
A real time pellet size distribution using a DSP platform has been implemented in this work. The proposed system has been developed using the TI’s (Texas Instruments) DM642 EVM (Digital Media 642 Evolution Module) board which is a standalone Digital Media Processing board. Iron ore pellets are used in steel production and to make the production mor...
Recent advances in technology have paved way for 3D endoscope, which has propelled the progress of minimum invasive surgical methods. The conventional two dimensional endoscopy based Minimally Invasive Surgery (MIS) can be performed by experienced surgeons. Inability to perceive depth was the main cause of migration to 3D endoscope. In this paper,...
Text detection from a video stream is less explored area but very useful for many researches and applications in the field of Artificial intelligence, robotics, and computer vision. In this paper, we proposed a novel approach to detect text, based on Maximally Stable Extremal Regions (MSER) feature and geometrical properties analysis. The method us...
Detection and extraction of text from natural scene image or video stream is an important task for intelligent text detection system. In this paper, a text detection algorithm is proposed for natural scene image and complex video stream. The algorithm detects text from the input video frames / scene images, taken from smart phone, and converts the...
Automatic surveillance is an important research area and has been studied for many years. In this paper, a new method of Cross Border Intrusion detection in hilly region has been discussed. The Kinect camera ensures that intruders crossing the border can be detected during daytime as well as in night. We introduce a border surveillance system that...
The invention of several machine assisted systems has increased the scope of security in the society. Human Activity Recognition is one such very useful human computer interactive system that has gained the attention of the researchers for decades. By identifying and recognizing di�erent actions performed by people, proper surveillance of di�erent...
When a patient come to hospital and able to walk then he could be conscious, walking but he need help from hospital staff if he is not feeling well. The time he come to consolation to doctor, it may be late and he may be more critical. Lets call this situation ‘pre-consultation urgent help needed’. Many time it happen that person coming to hospital...
Human computer interaction through hand gestures is one of the most intuitive ways of communicating with machines and thus it is no surprise that the field of real time gesture detection has seen significant interest among the scientific community in recent times. In this paper a hand gesture recognition method using the Microsoft Kinect has been p...
These days mobile devices like phones or tablets are very common among people
of all age. They are connected with network and provide seamless communications
through internet or cellular services. These devices can be a big help for the
people who are not able to communicate properly and even in emergency
conditions. A disabled person who is not ab...
The inspiration for the book was the intention to facilitate the plant care system by means of the latest growing technology, i.e. Mobile Technology. In the modern era, information and communication technology is gradually stretching its roots in the human life. It has done wonders for sustaining the human health. Many systems have been developed t...
Defects, voids and cracks are the most ineffective components of buildings and bridges, respectively. The steady state vibrations and involuntarily happenings like earth quake triggers events such as accident and incident. The presence of air gaps or voids caused by the shifting of components like steel rods accelerates towards such catastrophic fa...
Defects, voids and cracks are the most ineffective components of buildings and bridges, respectively. The steady state vibrations and involuntarily happenings like earth quake triggers events such as accident and incident. The presence of air gaps or voids caused by the shifting of components like steel rods accelerates towards such catastrophic fa...
In this paper, a Brain Computer Interactive (BCI) robot motion control system for patients’ assistance is designed and implemented. The proposed system acquires data from the patient’s brain through a group of sensors using Emotiv Epoc neuroheadset. The acquired signal is processed. From the processed data the BCI system determines the patient’s re...
One of the interesting surgery visualization that has helped the surgeon is in the field of endoscope. Endoscopic surgery is rapidly spreading in various areas since it is less invasive than conventional open surgery. Further, it helps the surgeon to have the internal view of the human body to identify and localize the damaged area. The recent and...
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6918605
In the old age, few people need special care if they are suffering from
specific diseases as they can get stroke while they are in normal life routine.
Also patients of any age, who are not able to walk, need to be taken care of
personally but for this, either they have to be in hospital or someone like
nurse should be with them for better care. Th...
In the current age, use of natural communication in human computer
interaction is a known and well installed thought. Hand gesture recognition and
gesture based applications has gained a significant amount of popularity
amongst people all over the world. It has a number of applications ranging from
security to entertainment. These applications gene...
Gesture recognition has been implemented in many systems for different purposes. The way it is used can be different from system to system. Few used them as touch objects using sensors while few use them as pointing object where the camera is in front of the hand, but the location is being pointed by human, can be detected only if the camera is beh...
This paper proposes a method to perform expression invariant face recognition using dictionary learning approach. The proposed method performs the operation in the following stages: the T-region extraction
from the face to get the facial region having minimum variation with expression, determination of the wavelet coefficients of the extracted region...
Fabric defect detection has been an active area of research since a long time and still a robust system is needed which can fulfill industrial requirements. A robust automatic fabric defect detection system (FDDS) would results in quality products and more revenues. Many different approaches and method have been tried to implement FDDS. Most of the...
In industrial fabric productions, automated real time systems are needed to
find out the minor defects. It will save the cost by not transporting defected
products and also would help in making compmay image of quality fabrics by
sending out only undefected products. A real time fabric defect detection
system (FDDS), implementd on an embedded DSP p...
Abstract
In this paper, we propose a novel method of object detection in bad weather conditions like Fog and smoke. It is based on statistical model of dark channel prior to estimate the thickness of the haze and physics based image restoration approach. Further applying simple image enhancement techniques improve the visibility of an obstacle in t...
There are several methods for image encryption using chaotic function. In recent year, several new image encryption variation of chaotic method has been developed. This paper presents a new 2-D chaos based lossless image encryption method. This method is user key based encryption and decryption. Presented method is based on series of confusion and...
In this paper we describe a lucid model for efficient localization of an active speaker in a real-time video for a video conference. The system is built on a simple and robust method of contour detection of grey images and frame differencing of binary images for motion detection. The proposed method is independent of luminosity and removes unnecess...
This paper discusses a vision based health monitoring system which would be very easy in use and deployment. Elder and sick people who are not able to talk or walk, they are dependent on other human beings for their daily needs and need continuous monitoring. The developed system provides facility to the sick or elder person to describe his or her...
Hand Gesture is a popular way to interact or control machines and it has been
implemented in many applications. The geometry of hand is such that it is hard
to construct in virtual environment and control the joints but the
functionality and DOF encourage researchers to make a hand like instrument.
This paper presents a novel method for fingertips...
Use of optimum sized pellets makes the steel production process more reliable and energy efficient. The development of the vision based system to keep these pellets size in check is discussed in this paper, which involves integrating industrial grade IBM-PC with a high resolution industrial camera. We have applied this method to the pelletizing sys...
Detection of circular shape from grey scale images is explored in this paper. The algorithm used for detection of circles is Circular Hough Transform which is one of the types of Hough Transform. The algorithm is implemented in VHDL. In this paper IEEE-754 single precision standard floating point number has been discussed and also the arithmetic op...
Many vision based applications have used fingertips to track or manipulate gestures in their applications. Gesture identification is a natural way to pass the signals to the machine, as the human express its feelings most of the time with hand expressions. Here a novel time efficient algorithm has been described for fingertip detection. This method...
This paper presents fast and effective technique for determining the size of pellets from real-time video stream. The circular Hough transforms had been used by several researches in iris detection for face recognition, automatic ball recognition and detecting fingertips position. Here we used circular Hough transform to determine size of pellets i...
This paper proposes an improved steganography approach for hiding text
messages in lossless RGB images. The objective of this work is to increase the
security level and to improve the storage capacity with compression techniques.
The security level is increased by randomly distributing the text message over
the entire image instead of clustering wi...
Hand gesture recognition is an important area of research in the field of Human Computer Interaction (HCI). The geometric attributes of the hand play an important role in hand shape reconstruction and gesture recognition. That said, fingertips are one of the important attributes for the detection of hand gestures and can provide valuable informatio...
Hand gesture recognition is an important area of research in the field of Human Computer Interaction (HCI). The geometric attributes of the hand play an important role in hand shape reconstruction and gesture recognition. That said, fingertips are one of the important attributes for the detection of hand gestures and can provide valuable informatio...
People tracking and counting system is being widely used in modern days in the video surveillance for security purpose. In the recent, many algorithms have been proposed and developed in designing the system. But there always been confusions of using these algorithms based on their limitations and benefits. This paper provides a review on the metho...
Full Paper can be downloaded from http://ojs.academypublisher.com/index.php/jsw/issue/view/342
Abstract
A novel method to calculate the bended finger’s angle has presented here which could be used to control the electro-mechanical robotic hand. It is assumed that the robotic hand has the human hand like joints and same number of degree of freedom...
Video processing serves as a hidden treasure, rather a boon in disguise to surveillance system. The counting of people passing through a surveillance area is an important issue of this domain. It always relies on the process of background subtraction. The estimation of dynamic background model and the shadow removal are two main challenges of backg...
In the last few years gesture recognition and gesture-based human computer interaction has gained a significant amount of popularity amongst researchers all over the world. It has a number of applications ranging from security to entertainment. Gesture recognition is a form of biometric identification that relies on the data acquired from the gestu...
Interpretation of human gestures by a computer is used for human-machine interaction in the area of computer vision [3][28]. The main purpose of gesture recognition research is to identify a particular human gesture and convey information to the user pertaining to individual gesture. From the corpus of gestures, specific gesture of interest can be...
When a given 3D city model, consisting of mainly buildings and roads, is viewed at reduced scale, its objects not only become smaller but tend to conflict due to small area available. Generalization plays an important role to overcome these effects and helps in preserving the required legibility. Various operations are performed during generalizati...
Its a new approach for controlling robotic hand or an individual robot by merely showing hand gestures in front of a camera. With the help of this technique one can pose a hand gesture in the vision range of a robot and corresponding to this notation, desired action is performed by the robotic system. Simple video camera is used for computer vision...
Disasters in coal mines are very common and keep appearing frequently in our country as well as in the other countries in different parts of the world. Analysis on these accidents shows that most of the accidents are related to human factors. It affects the efficiency of the miners and that in turn affects the productivity of the mines. Several tec...
http://research.microsoft.com/en-us/events/techvista2012/techvista2012_selected_posters.pdf
This paper describes an intelligent system ABHIVYAKTI, which would be
pervasive in nature and based on the Computer Vision. It would be very easy in
use and deployment. Elder and sick people who are not able to talk or walk,
they are dependent on other human beings and need continuous monitoring, while
our system provides flexibility to the sick or...