Time filter

Source Type

Shidaganti G.I.,Sambhram Institute of Technology
Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013 | Year: 2013

Various prominent feature points of human faces play a critical role for designing a system that can perform facial recognition. Involvement of facial expression as precision parameter exponentially increases the challenges in developing a face recognition system. There exist abundant volume of studies in the area of face recognition, but majority of the techniques are either computationally not viable or uses complex algorithms. Hence, the prime aim of this paper is to introduce a very simple and cost effective solution for face recognition system from facial expressions by using two techniques i.e. Singular Value Decomposition (SVD) and Rational Value Sequence based Singular Value Decomposition (RSVD). Results were evaluated for both the cases to find RSVD approach as a better alternative to SVD approach for face recognition in terms of preciseness and computational effectiveness. © 2013 IEEE.

Siddegowda M.S.,University of Mysore | Jasinski J.P.,Keene State College | Golen J.A.,Keene State College | Yathirajan H.S.,University of Mysore | Swamy M.T.,Sambhram Institute of Technology
Acta Crystallographica Section E: Structure Reports Online | Year: 2011

In the crystal structure of the title salt {systematic name: 4-[3-(5H-dibenz[b,f]azepin-5-yl)propyl]-1-(2-hydroxyethyl)piperazin-1-ium (2Z)-3-carboxyprop-2-enoate}, C 23H 30N 3O +·C 4H 3O 4 -, the piperazine group in the opipramol cation is protonated at only one of the N atoms. In the cation, the dihedral angle between the two benzene rings is 53.5 (6)°. An extensive array of intermolecular O - H⋯O, O - H⋯N and N - H⋯O hydrogen bonds and weak intermolecular N - H⋯O, C - H⋯O and C - H⋯π interactions dominate the crystal packing.

Essaki Muthu P.,Dr. M.G.R. Educational and Research Institute | Gemson R.M.O.,Sambhram Institute of Technology
Journal of Theoretical and Applied Information Technology | Year: 2014

H.264 encoder has to evaluate exhaustively all the mode combinations of intra 4x4 predictions for deciding coding mode to achieve the minimum coding bits and high video quality. An Integer Transform-based Intra 4x4 Prediction method is proposed here to reduce the computational complexity of Intra 4x4 mode decision. This method calculates the transform domain residues in three steps, 1) calculating predicted coefficients directly 2) performing transform on input original coefficients and 3) finds the tranform domain residue coefficients by subtracting the transform domain predicted coefficients from transform domain original coefficients. The experimental results demonstrate that proposed method reduces at least 40% of computational complexity without compromising the coding efficiency (bitrate) and performance (quality). © 2005 - 2014 JATIT & LLS. All rights reserved.

Ghosh D.,Indian Institute of Technology Roorkee | Dube T.,Indian Institute of Management Ahmedabad | Shivaprasad A.,Sambhram Institute of Technology
IEEE Transactions on Pattern Analysis and Machine Intelligence | Year: 2010

A variety of different scripts are used in writing languages throughout the world. In a multiscript, multilingual environment, it is essential to know the script used in writing a document before an appropriate character recognition and document analysis algorithm can be chosen. In view of this, several methods for automatic script identification have been developed so far. They mainly belong to two broad categoriesstructure-based and visual-appearance-based techniques. This survey report gives an overview of the different script identification methodologies under each of these categories. Methods for script identification in online data and video-texts are also presented. It is noted that the research in this field is relatively thin and still more research is to be done, particularly in the case of handwritten documents. © 2010 IEEE.

Arakeri M.P.,M.S. Ramaiah Institute of Technology | Lakshmana,Sambhram Institute of Technology
Procedia Computer Science | Year: 2016

Agriculture sector plays a key role in the economic development of India. The task of fruit grading is vital in the agricultural industry because there is a great demand for high quality fruits in the market. However, fruit grading by human is inefficient, labor intensive and prone to error. The automated grading system not only speeds up the time of processing, but also minimizes error. There is a great demand for tomatoes in both local and foreign markets. The tomato fruit is very delicate and hence careful handling of this fruit is required during grading. Thus, this paper proposes an automatic and effective tomato fruit grading system based on computer vision techniques. The proposed quality evaluation method consists of two phases: development of hardware and software. The hardware is developed to capture the image of the tomato and move the fruit to the appropriate bins without manual intervention. The software is developed using image processing techniques to analyze the fruit for defects and ripeness. Experiments were carried out on several images of the tomato fruit. It was observed that the proposed method was successful with 96.47% accuracy in evaluating the quality of the tomato. © 2016 The Authors.

Manjunatha B.,Acharya Institute of Technology | Niranjan H.B.,Sambhram Institute of Technology | Satyanarayana K.G.,Poornaprajna Institute of Scientific Research PPISR
Materials Science and Engineering A | Year: 2015

Metal Matrix Composites (MMC) considered as one of the 'advanced materials' have evoked growing interest during the last three decades due to their high performance and applications in strategic sectors. These composites exhibit unique and attractive properties over the monolithic alloys, but suffer from low ductility, which makes them not so attractive for some of the applications where high toughness is one of the design criteria. This limitation of MMCs has been overcome by resorting to various treatments such as mechanical and thermal loading. Considering very limited reports available on Al alloy reinforced with boron carbide (B4C) particles, this paper presents (i) preparation of Al-6061 alloy reinforced with 1.5-10wt% B4C, (ii) subjecting them to mechanical and thermal treatments and (iii) characterization of all the above samples. Specific ultimate tensile strength and hardness of all the composites were higher than those of matrix. Also, these values increased with increasing amount of particles, with composites containing 8wt% B4C showing the maximum values in all the three conditions. These observations are supported by the uniform distribution of particles in the matrix as observed in their microstructure. © 2015 Elsevier B.V.

Prabhakar M.,Sambhram Institute of Technology | Singh J.N.,Sambhram Institute of Technology | Mahadevan G.,Amc Engg College
2013 International Conference on Computer Communication and Informatics, ICCCI 2013 | Year: 2013

The communications in VANET consists of roadside units (RSUs) linked to each other or even to the Internet. In the recent vehicular approach, VANETs security properties have received more attention in research community. We improve the game theoretic approaches for the application cases having scenarios with few known opponents and others with opponent uncertainty. In this work, we plan to introduce a defensive mechanism for the VANET security with heuristic based ant colony optimization. The heuristic based ant model, worked with known opponents and unknown opponents based on the density of pheromone deposited in the road network path with new road path exploration with traversal of ants. Then the Nash equilibrium is applied with the game theoretic framework to identify the stability state of the players involved in it. Optimal exploitation of traffic organizes and security framework is investigated both in the static (e.g., preset roadside units) and active cases (e.g., mobile law enforcement units). An experimental evaluation is carried out to evaluate the performance of the proposed defensive mechanism in game theoretic approach using heuristic based ant colony optimization [DMGTA] for VANET security. © 2013 IEEE.

Maheswari A.,Sambhram Institute of Technology | Sangaiah A.K.,Vellore Institute of Technology
Advances in Intelligent Systems and Computing | Year: 2015

Premature death and disability from sudden cardiac arrest continue to be a serious public health burden. Electrocardiography (ECG) is a ubiquitous vital sign health monitoring method used in the healthcare systems. The early detection of abnormality in ECG signal for cardiac disease leads to timely diagnosis and prevents the person from death. Normally the surgeons have to study a large amount of ECG data to search for abnormal beat in ECG. If the surgeons fail to note the abnormal cycles that are very less in number, it leads to fatigue. In the proposed research work, an intelligent ECG digital system is designed to interpret these abnormal signals which reduce the tedious work of interpreting ECG. The proposed work monitors the heart beat continuously in a convenient manner and with maximum accuracy for diagnosing. The ECG signals are acquired in real time and amplified through an Instrumentation amplifier. The resulting signals are processed for the cancellation of noise through a low pass filter and notch filter. Further processing of these signals in the microcontroller detects the abnormalities of cardiac arrest. The result is communicated through GSM which reduces the burden of the doctors to a greater extent. These signals are stored in the Secure Data (SD) card to have a complete history of the signals before and after the occurrence of the cardiac event. The proposed research work combines the capabilities of real-time monitoring of ECG signals and the abnormal symptom-reporting systems. © Springer International Publishing Switzerland 2015.

Latha P.H.,Atria Institute of Technology | Vasantha R.,Sambhram Institute of Technology
International Journal of Electrical and Computer Engineering | Year: 2015

The utmost security standards over Wireless Local Area Network (WLAN) are still an unsolved answer in research community as well as among the commercial users. There are various prior attempts in proposing security of WLAN that lacks focus on access point and is found to be quite complex implementation of cryptography. The proposed paper presents a novel, simple, and yet robust technique called as MDS-WLAN i.e. maximal data security in WLAN. The system is evaluated over laboratory prototype and mitigation measures are drawn for resisting wormhole attack, Sybil attack, and rogue access point issue in WLAN. The outcome of the MDS is compared with conventional AES and SHA that shows optimal communication performance and highest data security. Copyright © 2015 Institute of Advanced Engineering and Science. All rights reserved.

Vinay H.B.,Government Engineering College | Govindaraju H.K.,BMS College of Engineering | Banakar P.,Sambhram Institute of Technology
Polymers and Polymer Composites | Year: 2016

Polymer composites are used in various applications because of its universal properties. In the present investigation the vinyl ester matrix composites were developed with glass fiber and carbon fiber as reinforcements. The composites were manufactured by using hand layup process and the tests were conducted as per ASTM testing standards. The inter laminar shear strength and impact strength of carbon reinforced composites have improved when compared with glass fiber reinforced composites. Whereas glass fiber reinforced composites have shown better shore-D hardness. © 2016 Smithers Information Ltd.

Loading Sambhram Institute of Technology collaborators
Loading Sambhram Institute of Technology collaborators