{"title":"A framework for human-machine interaction using Depthmap and compactness","authors":"P. Jyothilakshmi, K. Rekha, K. Nataraj","doi":"10.1109/ERECT.2015.7499060","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499060","url":null,"abstract":"In recent past research and development in the field of Human-computer/machine interaction (HMI) is on fast track because there has been enough advancement of technologies such as advanced image processing techniques and sensors etc. which provides ease to formulate a test bed to experiment various HMI. A device called Kinect has been introduced for controlling functionalities of windows operating system, which is being widely used in Xbox games by Microsoft. This paper illustrates one of the popular HMI application called mouse control using hand gesture recognition. The method is named as hand-mouse (HM). HM tracks the full body vital core point and the movement of palm controls the movement of mouse cursor and the opening and closing of palm controls a mouse click events. The HM system is using Kinect in order to avoid wearing of any sensors or gesture training dataset, which reduces the computational overhead and experimental results demonstrates a real time output with satisfactory results having higher true positive and lesser false negative.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129124420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the efficiency of LTE-MIMO performance by utilizing Carrier Aggregation method","authors":"B. S. Yashoda, K. Nataraj","doi":"10.1109/ERECT.2015.7499023","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499023","url":null,"abstract":"Smart electronic gadgets are used to increase the data usage in recent mobile communications. But, the spectrum efficiency cannot be increased in terms of data rates in 4G LTE. To improve this high data rates, it is essential to improve the bandwidths (≤ 100 MHz) using multiple carrier or channel since it is not possible by single channel or carrier. For improving data rates high, here it is utilized the Carrier Aggregation-[CA] method which aggregates more than two component carriers from the continuous [or Intraband continuous] components in the spectrum. With CA, single user equipment on multiple carriers can be scheduled concurrently, which fulfills the huge set of bandwidth necessities to attain the service for amended performance. Since CA is a multi-carrier method any available SCC-[Secondary Component Carrier] can be combined with the PCC-[Primary Component Carrier], which is allocated to the user equipment. For example, five component carriers each of 20 MHz are combined to increase bandwidth to 100 MHz for high data rates. The extensive simulation is carried out in MATLAB software and the performance of the CA method utilization for LTE-MIMO is presented.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134167083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Priority based slot allocation for media access in Wireless Sensor Networks","authors":"M. Patil, R. Biradar","doi":"10.1109/ERECT.2015.7498995","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498995","url":null,"abstract":"In most computer and communication networks, nodes share common medium for transmitting data. The Medium Access Control (MAC) protocol is responsible for regulating access to common medium. The use of Wireless Sensor Networks (WSNs) has been widely accepted in almost all the walks of life. As the nodes in WSN have limited power source, energy efficiency plays an important role. To increase the lifetime of WSNs, energy conservation must be essential for different layers of protocol suite especially the MAC layer. MAC protocols improve energy efficiency of WSNs by reducing collisions, control overhead, idle listening and overhearing. MAC protocol design varies according to application requirements and network architecture. In this paper, we discuss Priority based Slot Allocation scheme for media access in WSN (PSAWSN) where nodes are assigned a Priority Index (PI) based on the number of requests by nodes in a particular period modelled by Poisson distribution. Slot is allocated to node having higher priority stored in PI. PSAWSN also provides reliability by handling node failures and analyses parameters such as Average Service Utilization of Manager (ASU) and Average Waiting Time (AWT) of contending nodes. Analysis of results shows that both ASU and AWT increase as the number of contending nodes is increased for increasing values of mean arrival rate.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131597047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power quality disturbances monitoring using Hilbert-Huang transform and SVM classifier","authors":"R. Shilpa, S. Prabhu, P. Puttaswamy","doi":"10.1109/ERECT.2015.7498978","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498978","url":null,"abstract":"The voltage signal disturbances may lead to the difficulties viz. heating, device aging, etc. Enhancement of the devalued supplied power voltage is a prime task that needs identification and also the classification of the noise. Therefore, for disturbances namely voltage sag, transients, swell and harmonic voltage disparities, identification by Hilbert-Huang transform and classification by Support Vector Machine is presented. The fault location in the gathered real-time substation data is analyzed by Hilbert transform. Also the performance estimation of Empirical Mode Decomposition with its noise assisted version called Ensemble Empirical Mode Decomposition is presented. The comparison amongst the classification results of cross-correlation and SVM are also proposed.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122838379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust and secure key management in WSN using arbitrary key-deployment","authors":"Jyothi Metan, K. N. Narasimha Murthy","doi":"10.1109/ERECT.2015.7499021","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499021","url":null,"abstract":"The area of wireless sensor network is already shrouded with various issues e.g. energy issues, routing issues, QoS issues, and security issues. Although in past there were evolution of various secure techniques, but majority of the technique were sophisticated cryptographic implementations where time and space complexities were less emphasized. This paper presents a simple and a novel technique called as MLKS i.e. Multi Level Key Security that applies simple set theory and key distribution mechanism for securing the data aggregation in wireless sensor network. The technique is also applicable on multiple security standards supporting 128, 216, 160, or 512 bits of key size. The outcome of the proposed system is compared with the most significant work to find the proposed system outperforms the existing system with respect to computational time and storage cost.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123205383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronically linked Brain to Brain communication in humans using non-invasive technologies","authors":"K. Ravikumar, M. Siddappa","doi":"10.1109/ERECT.2015.7499019","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499019","url":null,"abstract":"In this paper we will discuss on how electronically linked Brain to Computer Interface(BCI) and Computer to Brain Interface(CBI) can be used to develop Brain to Brain Interface(BBI). In this system, non-invasive technology is deployed to achieve conscious Brain to Brain(B2B) communication. At BCI site, data is transmitted using ElectroEncephaloGraphy (EEG) a non-invasive method to record electrical activity of the brain along the scalp. At CBI site Transcranial Magnetic Stimulation (TMS) or Transcranial direct current stimulation (tDCS) again a non-invasive method used to stimulate small regions of the brain is used to receive the data. From the proposed system, it allows information transfer between brains to do away with language or can send thoughts from one brain to another brain in a way not represented by sounds or words. Connecting brains with computers as well as other brains is profoundly important as it will change human society in future communication technology.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126433782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. D. Chethan, H. Ravindra, N. Prashanth, Y. T. Krishne Gowda, T. Gowda
{"title":"Machine vision for correlating Tool status and machined Surface in Turning Nickel-base super alloy","authors":"Y. D. Chethan, H. Ravindra, N. Prashanth, Y. T. Krishne Gowda, T. Gowda","doi":"10.1109/ERECT.2015.7498986","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498986","url":null,"abstract":"Substantial amount of research has been performed on automated tool status monitoring systems. The research has tended to focus on the development of Tool and work Surface Texture Monitoring using machine vision. However, there has been relatively less effort to monitor surface texture. This paper presents machine vision system, capable of providing surface texture information in Turning Inconel 718 material. Images of the turned surface specimens were acquired using the machine vision system. The images were pre-processed to eliminate noise present in the image. An image histogram quantifies the distribution of all image pixels against the grey level and is a measure of the reflectance properties of the surface under monitoring. The histogram shape changes as the wear state of tool increases. From the analysis of the intensity distribution in the region of interest of the tool and surface, a good correlation between the tool image and corresponding surface image was found. It is expected that these results would support further to establish a criteria for tool replacement in turning operation.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient implementation of scalar multiplication for ECC in GF (2m) on FPGA","authors":"N. Shylashree, V. Sridhar","doi":"10.1109/ERECT.2015.7499063","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499063","url":null,"abstract":"In the era where major portion of transactions take place online, security of the data becomes prime concern. Elliptic Curve Cryptography (ECC) is an approach to public-key cryptography based on Elliptic curves over finite fields. Elliptic curve cryptography is used for secure transmission of data with smaller key length. The underlying operation of ECC is scalar point multiplication. For the ECC to be efficient, the multiplication should be done at high speed. In this work high speed crypto-processor architecture for computing point multiplication for the elliptic curves defined over the binary field is designed. The projective coordinate system is used to increase the efficiency. The proposed architecture for computing 163-bit scalar multiplication for ECC can reach maximum frequency of 45.60 MHz and occupies 101 slices. It completes one 163-bit scalar multiplication in 9.9μs.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"56 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of microstrip antenna performance by varying length of rectangular slot DGS","authors":"R. Anita, M. V. C. Chaitanya kumar","doi":"10.1109/ERECT.2015.7498984","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498984","url":null,"abstract":"This paper presents the study on the effect of a rectangular slot defective ground structure on a rectangular microstrip patch antenna operating at 2.4 GHz. The rectangular microstrip antenna with rectangular defective ground structure(DGS) is simulated using HFSS software. The effect of defective ground structure on the rectangular microstrip patch antenna is observed by varying the length of the rectangular slot and the performance of the antenna in terms of return loss and bandwidth are analyzed. The simulation results show that the performance of the antenna is improved by inserting a rectangular slot defect on the ground plane and further improved by varying the length of the slot-defect. The bandwidth is increased from 56 MHz to 67 MHz and the return loss is improved from -20 dB to -39.31 dB.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133331996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Champa, A. N. Nagashree, B. V. Sumangala, G. Nagabhushana
{"title":"Investigations on dielectric behaviour of a new ecofriendly dielectric coolant for transformers","authors":"V. Champa, A. N. Nagashree, B. V. Sumangala, G. Nagabhushana","doi":"10.1109/ERECT.2015.7499055","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499055","url":null,"abstract":"Electrical transformers are very widely used in the Electrical Power sector at frequencies of 50Hz/60Hz. The liquid dielectric used in power transformers for many decades [1] has been mineral oil. Special applications such as Defence and Airborne equipments use silicone fluid as a dielectric coolant because of its higher operating temperatures of about 150°C- 200°C. Of late, natural vegetable seed oils are also used in power transformers, mainly due to their bio-compatibility, bio-degradability and they are also from a `renewable source'. These have resulted in the increased usage of natural esters (vegetable oils) as dielectric fluids in electrical equipments. They have greater advantage of having a high flash point (above 300°C) which is an important property of a dielectric coolant. Therefore, the present work focuses on investigations on the dielectric behavior of a new indigenous vegetable seed oil codenamed as IO-18, particularly for use at high voltage and high frequencies. Though, a few indigenous vegetable oils were considered for initial study, IO-18 was selected for the present extensive investigations as some physical and thermal properties of IO-18 are more advantageous. Extensive investigations were carried out experimentally to study the important dielectric properties namely, breakdown voltage, dielectric dissipation factor and relative permittivity at 50Hz and over a temperature range from room temperature to 90°C in both `as received' condition and treated conditions. Behaviour of the oil under high frequencies and at higher temperatures was also investigated. The results of these investigations have been compared with those of mineral oil and silicone fluid to validate the dielectric behavior of vegetable oil.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132074723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}