Time filter

Source Type

Sriram C.,Gurunanak Institute of Technology | Kumar D.R.,VNR Vignana Jyothi Institute of Engineering and Technology | Raju G.S.,VNR Vignana Jyothi Institute of Engineering and Technology
2014 International Conference on Smart Electric Grid, ISEG 2014 | Year: 2014

The power swing caused by various transient disturbances which exists only for a few seconds will affect the zone 3 distance relay behavior and may result in relay mal-operation. By improving the operation of zone 3 distance relays, it is possible to prevent mal-operations, so that the cascaded line tripping is avoided. This paper proposes a transient stability prediction based on polynomial curve fitting method. The novelty of the proposed method is that it accurately predicts the transient stability based on only few samples of fault data with solving computationally extensive electromechanical dynamics and also determine the optimal tripping time for zone 3 so that the relay will be block the tripping for stable power swings. Performance of the proposed scheme is evaluated on the IEEE 14 bus system and the results are presented in this paper. © 2014 IEEE.


Ghosal S.,Jadavpur University | Goswami B.,Jadavpur University | Ghosh R.,Jadavpur University | Banerjee P.,Gurunanak Institute of Technology
Proceedings - 2nd International Conference on Emerging Applications of Information Technology, EAIT 2011 | Year: 2011

A new method is being proposed in this paper to ascertain the stability of the dental implant after its placement in situ. One of the established methods of doing this is by monitoring the change of resonance frequency of the system with time which is typically referred to as Resonance Frequency Analysis [1]. Traditionally, the resonance frequency is identified from the magnitude of measured voltage using a two piezo arrangement in which one piezo acts as the source for the mechanical vibration transmitted into the system while the second piezo acts as the pick up [2]. In the present work, the resonance frequency has been identified separately by analysing the magnitude as well as the phase plots of the impedance of the (single piezo) transducer attached to the total system. A comparative study has been done of the magnitude and the phase of the impedance of the total system as the resonance frequencies change with time. From this study, it is observed that the phase of the impedance is a more reliable indicator for inferring the stability of the dental implant. © 2011 IEEE.


Biswas S.,Gurunanak Institute of Technology | Sil J.,Bengal Engineering and Science University
Smart Innovation, Systems and Technologies | Year: 2014

In the paper, a gender recognition scheme has been proposed based on fusion of spatial and temporal features. As a first step, face from the image is detected using Viola Jones method and then spatial and temporal features are extracted from the detected face images. Spatial features are obtained using Principal Component Analysis (PCA) while Discrete Wavelet Transform (DWT) has been applied to extract temporal features. In this paper we investigate the fusion of both spatial and temporal features for gender classification. The feature vectors of test images are obtained and classified as male or female by Weka tool using 10 fold cross validation technique. To evaluate the proposed scheme FERET database has been used providing accuracy better than the individual features. Experimental result shows 9.77% accuracy improvement with respect to spatial domain recognition system. © Springer International Publishing Switzerland 2014.


Biswas S.,Gurunanak Institute of Technology | Sil J.,Indian Institute of Science
Proceedings of 2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks, ICRCICN 2015 | Year: 2015

The paper proposes a novel face recognition technique based on discrete Contourlet Transform (CT). CT represents smooth contour information in different directions and so relevant to recognize individuals more accurately. Each face image is decomposed up to fourth level in transformed domain using Contourlet Transform and coefficients are analyzed to obtain statistical features. For classification feature vectors are obtained considering training images of each database. To reduce dimension of the feature vectors, directional subbands are selected by analyzing the entropy of the feature vectors. For the recognition of face images Support Vector Machine (SVM) is used. The experimental results give promising performance of the proposed face recognition method on JAFFE and ORL database compare to other transformed domain methods. © 2015 IEEE.


Das B.,Gurunanak Institute of Technology | Saha M.,National Institute of Technology Durgapur | Das S.,Indian Institute of Science | Sikdar B.K.,Indian Institute of Science
11th IEEE India Conference: Emerging Trends and Innovation in Technology, INDICON 2014 | Year: 2015

This work proposes an efficient scheme for identification of L2 cache module zone (low level cache) for data migration in Chip Multiprocessors (CMPs), during program execution, exploiting the benefits of Non-Uniform Cache Architecture (NUCA). Selection of an exact cache module for migration is always not realizable. A more efficient scheme can be the prediction of cache zone for migration. The proposed scheme is developed around the modelling tool of periodic boundary cellular automata (CA) to satisfy the requirement. The CA employed performs density classification of the instances of data request generated by different processor cores and predicts the best placement for data (up to an acceptable level) in the low level NUCA cache. © 2014 IEEE.


Biswas S.,Gurunanak Institute of Technology | Sil J.,Indian Institute of Science
Smart Innovation, Systems and Technologies | Year: 2015

In this paper a low computation feature space has been proposed to recognize expressions of face images. The image is divided into number of blocks and binary pattern corresponding to each block is generated by modifying the Local Binary Pattern (LBP). The proposed method generates compressed binary pattern of images and therefore, reduced in size. Features are extracted from transformed image using block wise histograms with variable number of bins. For classification we use two techniques, template matching and Support Vector Machine (SVM). Experiments on face images with different resolutions show that the proposed approach performs well for low resolution images. Considering Cohn-Kanade database, the proposed method is compared with LBP feature based methods demonstrating better performance. © Springer India 2015.


Ghosh T.,Gurunanak Institute of Technology | Mitra S.,Bengal Engineering and Science University
International Conference on Intelligent Systems Design and Applications, ISDA | Year: 2012

The wireless access in vehicular environment system is developed for enhancing the driving safety and comfort of automotive users. However, such system suffers from quality of service degradation for safety applications caused by the channel congestion in scenarios with high vehicle density. The present work is a congestion control mechanism in vehicular ad-hoc network. It supports the communication of safe and unsafe messages among vehicles and infrastructure. Each node maintains a control queue to store the safe messages and a service queue to store the unsafe messages. The control channel is used for the transmission of safe messages and service channel is used for the transmission of unsafe messages. Each node computes its own priority depending upon the number of waiting messages in control queue and service queue. Each node reserves a fraction of control channel and service channel dynamically depending upon the number of waiting messages in its queue. The unsafe messages at a node may also be transmitted using control channel provided the control channel is free and service channel is overloaded which helps to reduce the loss of unsafe message at a node which in turn reduces the congestion level of a node and also improves its quality of service. The available bandwidth is also distributed among the nodes dynamically depending upon their priority. The performance of the proposed scheme is evaluated on the basis of average loss of unsafe message, average delay in safe and unsafe message, storage overhead per node. © 2012 IEEE.


Biswas S.,Gurunanak Institute of Technology | Sil J.,Indian Institute of Science
ACM International Conference Proceeding Series | Year: 2015

The paper proposes an efficient human expression recognition method in transformed domain using discrete Contourlet transform (DCT). DCT represents smooth contour information in different directions reflecting human perception and so relevant to recognize facial expressions more accurately. Each face is decomposed using discrete Contourlet transform up to fourth level and coefficients of high frequency and low frequency components with varied scales and angles are obtained.Logarithmic invariant moments of directional coefficients at different levels and histogram analysis are used to build the feature vectors for classification. To reduce dimension of the feature vectors, directional subbands are selected by analyzing the entropy of the feature vectors. Support Vector Machine (SVM) is applied to classify different expressions using the proposed method. Experimental results show promising performance applied on JAFFE and Cohn-Kanade database compare to other transformed domain methods. Copyright 2015 ACM.


Ashok J.,Gurunanak Institute of Technology | Rajan E.G.,Pentagram Research Center
European Journal of Scientific Research | Year: 2012

Handwriting has continued to persist as a means of communication and recording information in day-to-day life even with the introduction of new technologies. This paper describes performance comparison of Rajan transform and Radial basis function on offline hand written character recognition. Importance of handwriting in human transactions, machine recognition of handwriting has practical significance, as in reading handwritten notes in a personal Digital Assistant (PDA), in postal addresses on envelopes, in amounts in bank checks, in handwritten fields, in forms etc. Algorithms of preprocessing, character and word recognition, and performance with practical system are indicated. The comparision has been made among Radial Basis Function (RBF) and Rajan Transform and found to be better compared to that of rate in the proposed system lies between 98% to 100%. © EuroJournals Publishing, Inc. 2011.


Biswas S.,Gurunanak Institute of Technology | Sil J.,Bengal Engineering and Science University
2013 IEEE Recent Advances in Intelligent Computational Systems, RAICS 2013 | Year: 2013

Automatic gender classification has immense applications in many commercial domains. In the paper, spatial and temporal feature based gender classification technique has been proposed. In the first step, texture based features in the spatial domain are extracted by dividing the training images into no. of blocks. Covariance matrix and singular value decomposition method has been applied on each block to extract the features. Discrete Wavelet Transform (DWT) has been introduced in the second step to extract temporal features. The feature vectors of test images are obtained and classified as male or female by Weka tool using 10 fold cross validation technique. The proposed approach provides 98% recognition rate on GTAV database while 91% on FERET database. © 2013 IEEE.

Loading Gurunanak Institute of Technology collaborators
Loading Gurunanak Institute of Technology collaborators