Time filter

Source Type

A novel histogram generation hardware architecture, which can develop histogram for all types of grayscale images of size (256 x 256), is presented in this paper. The histogram produced from the proposed hardware gives exactly the same information as obtained from a histogram plot using simulation tool like Matlab with 100 percent accuracy. Hardware realization of the architecture makes it suitable for generating real-time histogram in medical and military applications which is practically difficult in software based implementations. Experimental results shows that the frequency of operation of the proposed architecture is very high both for Field Programmable Gate Array (FPGA) as well as for Programmable SoC (PSoC) based implementation. To the best of our knowledge, this is the first hardware implementation for grayscale image histogram generator for the selected histogram generation algorithm mentioned in this paper. © 2016 The Authors. Published by Elsevier B.V.

Chanda S.,Budge Budge Institute of Technology | De A.,IIEST Shibpur
2016 2nd International Conference on Control, Instrumentation, Energy and Communication, CIEC 2016 | Year: 2016

This paper proposes the development of an intelligent Energy Management System (EMS) at consumer end to utilize the sensitivities of the local renewable generation, battery backup and Plug In Electric Vehicle resources to the changes in grid power input and price of electricity for utility and Demand Response optimization in Smart Micro Grids. In Demand Response usually the price elasticity of demand is considered as per statistical data. In this work the development of an optimized Demand Response(DR) has been depicted for reliable and efficient operation of Micro grids with Smart Communication facility. A housing complex, in the proposed work has been viewed as a future micro-grid and it has been demonstrated that the EMS developed can be effectively programmed to minimize the consumer payment by efficient utility and load management with the assistance of pricing signals from the Smart Grid. The choice of Particle Swarm Optimization(PSO) was compelling for the nonlinear nature of the optimization surface. The results obtained from simulation looked promising from context of future Smart Micro Grids. © 2016 IEEE.

Mitra A.,IIEST Shibpur | Islam S.N.,IIEST Shibpur | Mandal T.,Government College of Engineering and Textile Technology , Berhampore | Das S.,IIEST Shibpur
Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016 | Year: 2016

This paper presents the design and analysis of a low profile compact Coplanar waveguide fed monopole antenna loaded with metamaterial inspired structure. The Zeroth Order Resonance phenomenon of CRLH Transmission Line has been explored to reduce antenna size however the antenna is fabricated single layered without any via. The proposed structure offers compact size with dimensions of the radiating element (0.06λ0 × 0.053λ0) and lower resonance band centered at 2.5GHz. While the upper band due to the regular monopole resonance is at 6.8GHz enabling possibility of dual band operation with an impedance bandwidth (S11< -10dB) of 9.43% and 29% at lower and upper band respectively. The antenna offers stable radiation characteristics with peak gain of 4.1dB and 4.95dB for the first and second band respectively. © 2016 IEEE.

De P.,IIEST Shibpur | Mandal S.,IIEST Shibpur | Das A.,IIEST Shibpur | Chanda B.,Electronics and Communication science Unit
Proceedings of SPIE - The International Society for Optical Engineering | Year: 2015

In this paper a method to detect the electrical circuit elements from the scanned images of electrical drawings is proposed. The method, based on histogram analysis and mathematical morphology, detects the circuit elements, for example, circuit components, wires, and generates a connectivity matrix which may be used to find similar, but spatially different looking circuit using graph isomorphism. The work may also be used for vectorization of the circuit drawings utilising the information on the segmented circuit elements and corresponding connectivity matrix. The novelty of the method lies in its simplicity and adaptability to work with a tolerable skewed image and the capability to segment symbols irrespective of their orientation. The proposed method is tested over a data-set containing more than one hundred scanned images of a variety of electrical drawings. Some of the results are presented in this paper to show the efficacy and robustness of the proposed method. © 2015 SPIE.

De P.,IIEST Shibpur | Mandal S.,IIEST Shibpur | Das A.,IIEST Shibpur | Bhowmick P.,Indian Institute of Technology Kharagpur
Proceedings - 4th International Conference on Emerging Applications of Information Technology, EAIT 2014 | Year: 2014

This paper presents a method to recognize and classify graphics in engineering drawing. The method consists of skeletonizing the input image, followed by segmentation of lines, arcs, and circles. Extracted line segments are classified into object lines, centerlines, dashed lines, and section lines, along with detection of arrowheads attached with lines and arcs. The stages of segmentation and classification are based on novel ideas of dominant chain code in digital geometry, unreliable area, and real-geometric analysis. Experimental results on various datasets demonstrate the efficiency and robustness of the proposed method. © 2014 IEEE.

Roy S.,IIEST Shibpur | Sharma A.,National Institute of Technology Durgapur | Bhattacharya U.,IIEST Shibpur
ACM International Conference Proceeding Series | Year: 2015

With surveys of what is happening around us, it is beyond any argument to state that women are not safe enough to move freely alone. It is high time for the women to give a good retort to the society and raise their voice against the crimes that are taking place regularly. Pervasive computing with its omnipresent nature is emerging with a revolutionary approach towards technological growth. Anything and everything of the surroundings can be made to act as a computing device using the concept of pervasive computing. This paper makes use of the ever-present nature of pervasive computing to provide security to women. The work of this paper aims at designing a pervasive system comprising of a wearable computer that will act as a guardian angel for women in danger. The design of the system makes use of body area sensors, Bluetooth communication, GPS, SMS and MMS, Internet connection and mobile database system. A machine learning approach based on supervised classification is used to determine whether a woman is in danger. A prototype of the system is implemented in android. © 2015 ACM.

Bhattacharjee D.,IIEST Shibpur | Shaw T.,IIEST Shibpur | Das T.,Heritage Institute of Technology | Mitra D.,IIEST Shibpur
2015 IEEE Applied Electromagnetics Conference, AEMC 2015 | Year: 2015

This paper presents a technique to increase the gain of a slot antenna with the help of a single layer metamaterial (MTM) superstrate. The gain enhancement is achieved using the zero-index property of the metamaterial. The increased broadside gain for the proposed antenna is 6.42dB more in comparison to that of the reference slot antenna. The overall thickness of the MTM loaded antenna is 0.15λ0, where λ0 is the free-space wavelength at the resonance frequency of the antenna. A high efficiency of about 96.20% is obtained for proposed antenna. The loading of the metamaterial superstrate produces minimal effect on the cross polarization performance of the slot antenna. © 2015 IEEE.

Basak S.,IIEST Shibpur | Acharya T.,IIEST Shibpur
Mobile Networks and Applications | Year: 2015

We investigate the problems of route lifetime maximization and interference to primary user minimization jointly in outage constrained stationary cognitive radio ad hoc networks. It may be noted that although, both lifetime maximization schemes in wireless ad hoc networks (WANETs) and interference minimization schemes in cognitive radio networks mostly aim to minimize transmission power of nodes in a given routing session, using any one of them to achieve both of the said objectives simultaneously does not yield satisfactory performance. In this paper, first, we study both minimum total interference (MTI) and maximum lifetime (ML) routing problems separately as joint power allocation and routing problems. Next closed form expressions for power allocation for both MTI and ML strategies are derived and, from these solutions, we obtain corresponding routing metrics to solve the routing problems. Moreover, closed form expression for a hybrid-ML-MTI power allocation approach is also proposed followed by a new hybrid routing metric. We also present implementation issues related to the proposed hybrid routing and power allocation scheme. Extensive simulation results are used to evaluate performance of our proposed schemes both in regular grid and random networks. Results show that while in grid networks, a straightforward combination of MTI routing with ML power allocation scheme strikes a good balance between interference and lifetime performances, in random networks, our proposed hybrid approach is found to extend lifetime and control interference performances simultaneously in a significant manner. © 2015, Springer Science+Business Media New York.

Roy S.,IIEST Shibpur | Bhattacharya U.,IIEST Shibpur
ACM International Conference Proceeding Series | Year: 2015

Pervasive computing has emerged as a technological renaissance in which anything and everything of the surroundings can be made to act as a computing device. With the advent of the concept of Internet of Things (IoT), the concept of computation has extended its horizon from the traditional computing devices to everything belonging to the material world. Since a long time, it has been a serious problem especially for the working mothers to take care of their kids at home. Even if those women leave their children at home with a governess, they are not free from concerns like whether the child is taken care properly, if the child is physically fit or not, whether there is any risk around the child at the current moment, whether the child is afraid and so on. The paper addresses this problem and aims in minimizing the concerns of a working mother who leaves her child at home. In this paper a smart home architecture named as Smart Mom is proposed which can give pervasive care to children at home, having age between five to fourteen years. The overall modular architecture is given here and each module is also described in details. © 2015 ACM.

Basak S.,IIEST Shibpur | Acharya T.,IIEST Shibpur
Physical Communication | Year: 2015

An opportunistic routing problem in a cognitive radio ad hoc network is investigated with an aim to minimize the interference to primary users (PUs) and under the constraint of a minimum end-to-end data rate for secondary users (SUs). Both amplify-and-forward (AF) and decode-and-forward (DF) relaying techniques are considered for message forwarding by SU nodes in the network. Unlike popular transmit power control based solutions for interference management in cognitive radio networks, we adopt a cross layer approach. The optimization problem is formulated as a joint power control, channel assignment and route selection problem. Next, closed form expression for transmission power is derived and corresponding channel selection scheme and routing metric are designed based on this solution. The proposed route selection schemes are shown to depend not only on gains of the interference channels between SUs and PUs but also on the values of the spectrum sensing parameters at the SU nodes in the network. Two distributed routing schemes are proposed based on our analysis; (i) optimal_DF and (ii) suboptimal_AF. The routing schemes could be implemented using existing table driven as well as on demand routing protocols. Extensive simulation results are provided to evaluate performance of our proposed schemes in random multihop networks. Results show significant reduction in PUs' average interference experience and impressive performance as opportunistic routing schemes can be achieved by our schemes compared to traditional shortest path based routing schemes. Performance improvement is also reported over prominent recent schemes. © 2015 Elsevier B.V.

Loading IIEST Shibpur collaborators
Loading IIEST Shibpur collaborators