scispace - formally typeset
Search or ask a question
Institution

College of Engineering, Pune

About: College of Engineering, Pune is a based out in . It is known for research contribution in the topics: Computer science & Sliding mode control. The organization has 4264 authors who have published 3492 publications receiving 19371 citations. The organization is also known as: COEP.


Papers
More filters
Proceedings ArticleDOI
07 Apr 2014
TL;DR: CIA (Confidentiality, Integrity, Availability)[1] factors are used for data classification which is done by client before storing the data on server and 3D security is recommended on that data or file.
Abstract: Cloud computing is an emerging, on-demand and Internet based popular technology. It provides lots of services over Internet such as, software, hardware, network, data storage, and computing and memory management. Besides this companies are binding their business from cloud computing because the fear of data leakage. Due to lack of security control mechanism and weakness in safeguard which lead to many security issues in cloud computing. In internet world, Confidentiality, Integrity and availability is a model designed to guide policies for information security within business organization. CIA (Confidentiality, Integrity, Availability)[1] factors are used for data classification which is done by client before storing the data on server. The CIA factors are the measure part of CIA Algorithm. The client who wants to upload the data for storage needs to give the value of the factors C (confidentiality), I (integrity), and A (Availability). The value of C is depends on level of secrecy at each level of data accessing and prevents unauthorized access of files, value of I based on how much accuracy is provided, unauthorized modification is required and reliability of information, and value of A is depends on accessibility of file. With the help of proposed method, the priority rating is calculated. Accordingly if data having the higher priority rating is considered to be critical and 3D security is recommended on that data or file. After completion of this phase the data which is received by cloud user for storage, uses 3Dimentional system for accessibility.

9 citations

Journal ArticleDOI
TL;DR: In this article, a low-grade solar thermal energy and many other sources are used for absorbing cooling using energy media like low grade solar thermal heat energy and other sources for energy needs.
Abstract: Absorption cooling using energy media like low-grade solar thermal energy and many other sources is of utmost importance for energy needs. To enhance the coefficient of performance of system, an ex...

9 citations

Book ChapterDOI
27 Apr 2012
TL;DR: An algorithm is proposed, which uses fourth order Runge-Kutta method to solve differential equations involved in PID, which eventually improves the peak overshoot of AZNPID compared to ZNPID.
Abstract: Ziegler Nichols is oldest and widely accepted PID tuning method. Due to excessive overshoot in Ziegler-Nichol tuned PIDs (ZNPID), their performance is usually not acceptable for applications where small error tolerance band and precise control is required. To overcome this problem, we propose the gain updating method called as Augmented Ziegler-Nichols PID (AZNPID). We proposed an algorithm, which uses fourth order Runge-Kutta method to solve differential equations involved in PID, which eventually improves the peak overshoot of AZNPID compared to ZNPID. The proposed AZNPID is tested for third order and fourth order linear processes and its performance is compared with ZNPID.

9 citations

Proceedings ArticleDOI
21 Nov 2016
TL;DR: In this paper exemplar based error concealment algorithm is compared with Frequency Selective Extrapolation algorithm, based on concealment of manually created images or error video frames as input.
Abstract: Error Concealment (EC) is a popular technique at the decoder side to removing the transmission errors. It is done analyzing the spatial or temporal information from available image regions. Many researches are going on based on this due to its application in different fields such as video-telephone, video-conference, TV, DVD, internet video etc. According to literature survey, there are various types of spatial error concealment techniques such as tensor voting based, interpolation based, stochastic based, etc. In this paper exemplar based error concealment algorithm is compared with Frequency Selective Extrapolation algorithm. Both the works are based on concealment of manually created images or error video frames as input. The parameter used for objective quality measurement was PSNR (Peak Signal to Noise Ratio). The test frame with different error patches are compared with both the Error concealment algorithms. According to simulation results, Frequency Selective Extrapolation is better than patch matching algorithm in terms of both subjective and objective quality of the images or error video frames.

9 citations

Proceedings ArticleDOI
06 Apr 2018
TL;DR: The proposed system utilizes the voluntary eye blink as an event to trigger an action to aid in mobility of physically disabled people and utilizes the BCI technology to control it using brain to overcome the limitations of conventional wheelchair.
Abstract: Movement is an important aspect of any human being's life therefore lack of it has adverse effect on their overall development. Physically disabled people unfortunately are devoid of this privilege. Mechanical wheelchairs provided some form of mobility but they relied on external help for moving around. Moreover, people with tetraplegia couldn't benefit from it due to loss of all four limbs. Brain Computer Interface (BCI) is construed as interacting with an electronic device solely with brain with the help of Electroencephalogram (EEG) Signals. This technology is applied to existing mechanical wheelchair to control it using brain to overcome the limitations of conventional wheelchair. This paper proposes cost effective application of BCI technology to aid in mobility of physically disabled people. The proposed system utilizes the voluntary eye blink as an event to trigger an action. An eye blink pattern is mapped to a context based physical action like moving the wheelchair in particular direction.

9 citations


Authors

Showing all 4264 results

Network Information
Related Institutions (5)
Amrita Vishwa Vidyapeetham
11K papers, 76.1K citations

89% related

National Institute of Technology, Karnataka
7K papers, 70.3K citations

86% related

National Institute of Technology, Rourkela
10.7K papers, 150.1K citations

86% related

National Institute of Technology, Tiruchirappalli
8K papers, 111.9K citations

86% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202227
2021491
2020323
2019325
2018373
2017334