{"title":"Motion trajectory based human face and hands tracking for sign language recognition","authors":"Naresh Kumar","doi":"10.1109/UPCON.2017.8251049","DOIUrl":"https://doi.org/10.1109/UPCON.2017.8251049","url":null,"abstract":"The real life communication is not possible without interaction which is consist of text, voice or visual expressions. The communication among the deaf and dumb people is carried by text and visual expressions. Lacking of proper copra and its feature representation makes the sign communication a hot issues in machine learning research. In this work, it has been proposed a sign language recognition scheme for hearing impaired people. It has been computed trajectory by Cam Shift algorithm from the face and hands motion. Hidden Markov Model is used to recognize the signs. The problem of automated sign language recognition in video sequences can be divided into many inter-dependent modules. These include hand and face detection, hand tracking, finger tracking, feature extraction and gesture recognition. This research achieved 97% accuracy for single and double hand gesture and 70.74% for overall signs recognition in which 78.12% for double hand and 67.74% is for single hand sign recognition.","PeriodicalId":422673,"journal":{"name":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","volume":"63 32","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120888809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme","authors":"Sakshi Yadav, M. Trivedi, V. Singh, M. L. Kolhe","doi":"10.1109/UPCON.2017.8251012","DOIUrl":"https://doi.org/10.1109/UPCON.2017.8251012","url":null,"abstract":"Imposing security in MANET is very challenging and hot topic of research science last two decades because of its wide applicability in applications like defense. Number of efforts has been made in this direction. But available security algorithms, methods, models and framework may not completely solve this problem. Motivated from various existing security methods and outlier detection, in this paper novel simple but efficient outlier detection scheme based security algorithm is proposed to protect the Ad hoc on demand distance vector (AODV) reactive routing protocol from Black hole attack in mobile ad hoc environment. Simulation results obtained from network simulator tool evident the simplicity, robustness and effectiveness of the proposed algorithm over the original AODV protocol and existing methods.","PeriodicalId":422673,"journal":{"name":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127215970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Singh, A. Amruthakala, M. Sudheer, A. S. Murthy
{"title":"Analysis of noise in broadband Powerline Communications (B-PLC) in frequency range of 150kHz–30MHz","authors":"M. Singh, A. Amruthakala, M. Sudheer, A. S. Murthy","doi":"10.1109/UPCON.2017.8251030","DOIUrl":"https://doi.org/10.1109/UPCON.2017.8251030","url":null,"abstract":"Over the past few decades PowerLine Communications(PLC) has evolved, that can be seen through improvement in data transmission rate from few kbps to hundreds of Mbps. However, there is also rapid growth in appliances/loads connected to the same power line which introduces electromagnetic interference(EMI)/noise that degrades communication performance. The noise that exists in power line communication are different from conventional communication system noise which is AWGN (Additive White Gaussian Noise) and hence conventional mitigation techniques (which considering noise as AWGN) cannot be applied directly. To mitigate noise from PLC receiver, it's required to understand the characteristics of noise and based on these noise modeling is carried out. In this paper, measurement and analysis of noise in the frequency range of 150 kHz to 30 MHz is carried out. From the measurement, it is found that impulsive noise is the major noise in PLC, which are generated from high frequency devices used in electrical appliances, or due to switching transients introduces by connection and disconnection of electrical appliance from mains, etc. And important parameters that describes impulsive noise are highlighted in subsequent sections.","PeriodicalId":422673,"journal":{"name":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125171133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power improvement using hartley S-transform for solar energy conversion system","authors":"K. Mathuria, Ikhlaq Hussain, Bhim Singh","doi":"10.1109/UPCON.2017.8251086","DOIUrl":"https://doi.org/10.1109/UPCON.2017.8251086","url":null,"abstract":"This study presents an approach of Hartley S-transform (HST) control algorithm for a solar energy conversion system (SECS) to improve the power quality of the distribution network. HST control algorithm is a time-varying function which uses Kernel function and applied to the load currents to extract their fundamental component. The load currents are non-stationary (spectrum is changing with time) and these signals require a sample method so HST provides reliable and desired time-frequency spectrum. The algorithm is tested in the presence of distorted load current and response of the algorithm is shown to be precise and fast. The grid current distortion is kept below 5% as specified by the IEEE 519 standard.","PeriodicalId":422673,"journal":{"name":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125997601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Z-source DC-DC dual output converter","authors":"Punit Kumar, M. Veerachary","doi":"10.1109/UPCON.2017.8251074","DOIUrl":"https://doi.org/10.1109/UPCON.2017.8251074","url":null,"abstract":"A Z-source dc-dc dual output converter is presented in this paper, which has inherent behavior of two conventional converters, i.e. Z-source dc-dc converter and buck-boost converter. The proposed converter is synthesized using Z-source network and integrated dual output converter (IDOC). In comparison with conventional topologies, the proposed converter uses lesser number of components and hence it is more reliable. The proposed converter exhibits a high voltage gain, while boosting, over the IDOC topology. The operating principle is introduced first and then steady-state, small-signal analysis is presented. Converter parameters design equations are formulated and then comparison with other converters is presented. The dynamic behavior of the converter is analyzed through its control-to-output transfer functions. Simulation results validates the effectiveness of theoretical analysis of proposed converter.","PeriodicalId":422673,"journal":{"name":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","volume":"1686 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114057962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A region growing based imaging method for lesion segmentation from dermoscopic images","authors":"Ashi Agarwal, Ashish Issac, M. Dutta","doi":"10.1109/UPCON.2017.8251123","DOIUrl":"https://doi.org/10.1109/UPCON.2017.8251123","url":null,"abstract":"Melanoma is a fatal skin cancer. Correct localization and segmentation of a lesion is decisive in proper detection of a skin cancer from dermoscopic images. This work proposes an image processing technique for automatedlesion segmentation using a region growing technique. Low pass filtering techniques like median filter, are employed to remove the edges generated by the hair, which reduce the accuracy of correct segmentation. Multi-threshold and geometrical features as solidity and extent makes the proposed method adaptive. The ground truth, provided with the database used, has been used as a benchmark to determine the accuracy of segmentation using the proposed work. An average correlation and overlapping score are found out to be 93.79% and 91.13% between the ground truth and segmented lesion using proposed method.","PeriodicalId":422673,"journal":{"name":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117267426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sarwar, Abdulla Shahid, Abdul Hudaif, Utkarsh Gupta, Mohd Wahab
{"title":"Generalized state-space model for an n-phase interleaved buck-boost converter","authors":"A. Sarwar, Abdulla Shahid, Abdul Hudaif, Utkarsh Gupta, Mohd Wahab","doi":"10.1109/UPCON.2017.8251023","DOIUrl":"https://doi.org/10.1109/UPCON.2017.8251023","url":null,"abstract":"An n-phase interleaved buck-boost converter (IBBC) with generalized steady state model has been presented in this paper. Development in distributed generation system requires low cost, high efficient converters for power conversion. Paralleling of converters is done so as to minimize the ripples at the output and reduce the size of passive components and improve the overall efficiency and cost of the system. An interleaved buck boost converter finds application in fuel cells, electric vehicles and various solar charging applications. The steady state and small signal analysis of an n phase buck-boost converter in CCM mode have been carried out and average state space equations have been developed. In averaging, parasitic elements have been excluded for simplifying the calculations. A simulation model for a three phase interleaved buck boost converter has been presented initially which is then generalized.","PeriodicalId":422673,"journal":{"name":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128596269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting academic performance of student using classification techniques","authors":"Sagardeep Roy, A. Garg","doi":"10.1109/UPCON.2017.8251112","DOIUrl":"https://doi.org/10.1109/UPCON.2017.8251112","url":null,"abstract":"Data Mining methods are applied on educational data with the intent of enhancing teaching methods, improving quality of teaching, identifying weak students, identify factors that influence Student's academic performance. This utilization of data mining methods to elevate quality of education, identifying students who need improvement is termed as educational data mining. EDM has become a major research interest for many researchers. The primary function of educational data mining is prediction of student's academic performance. [1] Predicting student's academic performance helps in identifying a number of things like students who are likely to drop out, students who are weak and needs improvement, students who are good in academics but lately deteriorated. The intent of this paper is to determine factors that can influence a student's academic performance.","PeriodicalId":422673,"journal":{"name":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stabilization of the cart-inverted pendulum system using PIλDμ controller","authors":"R. Mondal, J. Dey, S. Halder, Arindam Chakraborty","doi":"10.1109/UPCON.2017.8251060","DOIUrl":"https://doi.org/10.1109/UPCON.2017.8251060","url":null,"abstract":"Efficient and careful adjustment of dynamical properties of a system can be obtained by Fractional PIλDμ Controller because there are five parameters compared with integer order PID controllers. Literature survey reveals that some attempts were mostly made to control the stable plants like speed control of DC Motors and pH neutralization chemical processes using these controllers. A typical cart-inverted pendulum control system on the other hand is unstable, non-minimum phase and highly non-linear with one input voltage of a DC Motor which can change the position of the cart and the angle of the inverted pendulum arm which makes the analysis of this system more efficacious to understand the different aspects and strategies of the control engineering. Based on the mathematical representation of the plant, a fractional order PIλDμ controller is designed and verified in MATLAB to stabilize the unstable pendulum at its upright equilibrium point and to compare the performance of these fractional order PIλDμ controllers over conventional integer order classical PID controller which confirms the effectiveness of the approach.","PeriodicalId":422673,"journal":{"name":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129250896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach of dredging the interconnected nodes and repudiating attacks in cloud network","authors":"Raziqa Masood, Nitin Pandey, Q. P. Rana","doi":"10.1109/UPCON.2017.8251021","DOIUrl":"https://doi.org/10.1109/UPCON.2017.8251021","url":null,"abstract":"In cloud computing environment, there are malignant nodes which create a huge problem to transfer data in communication. As there are so many models to prevent the data over the network, here we try to prevent or make secure to the network by avoiding mallicious nodes in between the communication. So the probabiliostic approach what we use here is a coherent tool to supervise the security challenges in the cloud environment. The matter of security for cloud computing is a superficial quality of service from cloud service providers. Even, cloud computing dealing everyday with new challenges, which is in process to well investigate. This research work draws the light on aspect regarding with the cloud data transmission and security by identifying the malignanat nodes in between the communication. Cloud computing network shared the common pool of resources like hardware, framework, platforms and security mechanisms. therefore Cloud Computing cache the information and deliver the secure transaction of data, so privacy and security has become the bone of contention which hampers the process to execute safely. To ensure the security of data in cloud environment, we proposed a method by implementing white box cryptography on RSA algorithm and then we work on the network, and find the malignant nodes which hampering the communication by hitting each other in the network. Several existing security models already have been deployed with security attacks. A probabilistic authentication and authorization approach is introduced to overcome this attack easily. It observes corrupted nodes before hitting with maximum probability. here we use a command table to conquer the malignant nodes. then we do the comparative study and it shows the probabilistic authentication and authorization protocol gives the performance much better than the old ones.","PeriodicalId":422673,"journal":{"name":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129679093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}