GIMT

Kurukshetra, India
Kurukshetra, India
SEARCH FILTERS
Time filter
Source Type

Sengupta A.R.,GIMT | Biswas A.,National Institute of Technology Silchar | Gupta R.,National Institute of Technology Silchar
Journal of Renewable and Sustainable Energy | Year: 2017

In this paper, blade-fluid interactions of high-solidity unsymmetrical and symmetrical blade H-Darrieus rotors have been studied using detailed computational fluid dynamics simulations to obtain insight into their performance in low wind speed conditions. In the existing literature, such comparative studies of high-solidity rotors are few, but are required for improving their steady-state performance at low wind speeds. For this study, a thick S815 unsymmetrical airfoil and a NACA0018 symmetrical airfoil have been selected. The effects of variations of low wind speeds have been quantified with respect to their impact on the blade-fluid interactions of the rotors at various azimuthal positions. It has been found that in the advancing stroke, a trailing-edge vortex on the suction side of the S815 blade H-Darrieus rotor as well as the leading-edge shape of the S815 blade are responsible for the higher performance of the unsymmetrical blade rotor. Moreover, in the returning stroke, a strong recirculating secondary vortex interacts on the pressure side of the S815 blade H-Darrieus rotor, which also augments the performance of the unsymmetrical blade rotor. For the symmetrical blade rotor, there are no such blade-fluid interactions with the advancing and returning blades. © 2017 Author(s).


Johri P.,Galgotias University | Kumar A.,Galgotias University | Amba,GIMT
International Conference on Computing, Communication and Automation, ICCCA 2015 | Year: 2015

Steganography is used to hide the secret information within a cover media in such a way that the existence of the message could not be noticeable. Here we are considering audio file as cover media and text message as secret information. The secret information is embedded in a cover media as noise as the HAS cannot detect the sound less than 20Hz or greater than 20000Hz. Generally LSB algorithm is used to embed the secret information within a cover media. Here we are using genetic programming to increase the robustness of the data so that the secret data could not be noticeable as far as possible. © 2015 IEEE.


Gupta R.,GIMT | Garg D.,National Institute of Technology Kurukshetra
International Journal of Applied Engineering Research | Year: 2012

Just-In-Time was initially used by the Toyota Motor Company of Japan, after which it took them 20 years to fully implement the system. It is assumed to be a very effective means to reduce the wastage of resources and to keep it at its minimum level. It is an important philosophy to control the flow of materials within a company. It helps to improve the manufacturing efficiency by eliminating non-value added activities. Just-In-Time focuses on inventory to be supplied to concerned sections when it is needed and not before. JIT manufacturing by now is a widely researched and applied manufacturing philosophy, in a variety of industries across the globe. However, most of the reported instances of successful and unsuccessful JIT practices lie with in large manufacturing settings. Literature shows that JIT does not restrict itself to high technology environments which make extensive use of modern technologies. This paper makes an attempt to motivate SMEs to implement newer philosophies like JIT for improving productivity. © Research India Publications.


Kashyap M.,GIMT
International Journal of Applied Engineering Research | Year: 2012

When we speak of boosting energy efficiency in industries, Co-generation is the buzzword being advocated as the most beneficial technology. Many industries require electricity as well as heat in the form of steam or hot water for their operations. These requirements are normally met through different energy sources. Simultaneous production of electricity and heat from a single primary energy source is termed as co-generation or combined heat and power. Cogeneration is one of the most efficient energy conversion processes with large cost saving potential which boosts competitiveness of the industries. Higher energy conversion efficiencies will also contribute to lower emission in particular CO2, the main green house gas. The power generated from cogeneration projects could be used for meeting the captive requirements and the surplus power could be exported to the grid. Cogeneration is the environmentally-friendly, economically-sensible way to produce power, simultaneously saving significant amounts of money as well as reducing greenhouse gas emissions. It is a significant measure to enhance industrial competitiveness. This paper discusses selection & operational issues in common cogeneration systems. Also it gives insight into the operating parameters of cogeneration systems which exist in sugar industries. © Research India Publications.


Mandal S.,GIMT | Saha G.,NEHU | Pal R.K.,University of Calcutta
Advances in Intelligent Systems and Computing | Year: 2016

Current progress in cellular biology and bioinformatics allow researchers to get a distinct picture of the complex biochemical processes those occur within a cell of the human body and remain as the cause for many diseases. Therefore, this technology opened up a new door to the researchers of computer science as well as to biologists to work together to investigate the causes of a disease. One of the greatest challenges of the post-genomic era is the investigation and inference of the regulatory interactions or dependencies between genes from the microarray data. Here, a new methodology has been devised for investigating the genetic interactions among genes from temporal gene expression data by combining the features of Neural Network and Cuckoo Search optimization. The developed technique has been applied on the real-world microarray dataset of Lung Adenocarcinoma for detection of genes which may be directly responsible for the cause of Lung Adenocarcinoma. © Springer India 2016.


Singhal A.,GIMT | Mittal V.,MMU MULANA
International Journal of Applied Engineering Research | Year: 2012

This paper is a brief review in the field of fingerprint authentication. In the modern computerized world, it has become more important to authenticate people in a secure way. Applications such as online banking or online shopping use techniques that depend on personal identification numbers, keys, or passwords. However there may be risk of data being forgotten, lost, or even stolen. Therefore biometric authentication methods provide a unique way to be able to authenticate people. As features such as person's gait, face or signature may change with passage of time and may be fabricated. However fingerprints are the oldest and most widely used form of biometric identification as everyone is known to have unique, immutable fingerprints. In the fingerprint recognition pre-processing such as smoothing, binarization, and thinning are needed. Then, fingerprint minutiae feature is extracted. Some fingerprint identification algorithm such as Fast Fourier Transform may require so much computation as to be impractical while Wavelet based algorithm may be the key to making a low cost fingerprint identification system that would operate on a small computer. © Research India Publications.


De M.,GIMT | Dev Choudhury N.B.,National Institute of Technology Silchar | Goswami S.K.,Jadavpur University
IEEE EuroCon 2013 | Year: 2013

In competitive power system all services including transmission loss need to be priced properly to improve efficiency. Though a generally acceptable method for transmission loss allocation is yet to be developed, the proportional allocation technique has wide acceptance. But this method is not directly applicable to transaction based power system due to the absence of a proper transaction based power flow. This paper presents a critical analysis on the applicability of the proportional sharing principle for loss allocation to transaction based power system and suggests a modification to the method for application to transaction based power system. © 2013 IEEE.


Gogoi M.,GIMT | Bhattacharyya D.K.,Tezpur University
Advances in Intelligent Systems and Computing | Year: 2014

This paper presents an effective method for decision level fusion of fingerprint and iris biometrics using binary ant colony optimization (ACO) technique to identify the imposter instances. ACO is an evolutionary method. The selection of a proper set of optimization parameters for ACO is a multi-objective decision making optimization problem. Initially the matching scores for individual biometric classifiers are computed. Next, a ACO-based procedure is followed to simultaneously optimize the parameters and the fusion rules for fingerprint and iris biometrics. The proposed method has been found to perform satisfactorily on several benchmark datasets. © Springer India 2014.


Gupta K.,GIMT | Singh M.,Mm University
International Journal of Engineering and Technology | Year: 2012

Grid computing is concerned with coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations. Efficient scheduling of complex applications in a grid environment reveals several challenges due to its high heterogeneity, dynamic behavior and space shared utilization. Objectives of scheduling algorithms are increase in system throughput, efficiency and reduction in task completion time. The main focus of this paper is to highlight the merits of resource and task selection technique based on certain heuristics.


Dutta T.,GIMT | Sil J.,IIEST | Chottopadhyay P.,IIEST
2016 IEEE 1st International Conference on Control, Measurement and Instrumentation, CMI 2016 | Year: 2016

Excessive temperature rise leads to majority of failures in electrical equipment. Therefore, the thermal monitoring always plays a significant role for identifying incipient faults. Now a days cost effective, reliable and non contact type infrared thermographic inspection system is being widely utilized for monitoring and fault diagnosis. In this paper, thermal images of some electrical equipment have been taken and converted to HSI color model for further processing. Unlike other techniques, instead of gray scale images, in the proposed method hue region has been taken into consideration. Then different gradient based edge detection like Prewitt, Roberts and Sobel are used to identify hot region of the thermal image. Based on some image metrics like Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR), the best method is chosen for processing of the thermal image. Lastly, Clustering based Otsu image segmentation method is introduced taking hue region. These methods are tested on 27 numbers of standard thermal images. The proposed technique gives better segmentation results for all images than the standard grey scale approaches. Hence the proposed model may produce better features for thermal monitoring of electrical equipment in future. © 2016 IEEE.

Loading GIMT collaborators
Loading GIMT collaborators