scispace - formally typeset
Search or ask a question

Showing papers by "Narula Institute of Technology published in 2019"


Journal ArticleDOI
TL;DR: Different aspects of design and implementation of multifunctional sensor technology have been addressed in this paper and can serve as a basic reading material for students and researchers pursuing research on a multi-sensor system.
Abstract: Due to rapid advancement in technology, recently a significant amount of work has been carried out in the field of multi-mode sensor and multifunctional sensor. A single unit of multifunctional sensor provides multiple measurements, which eventually reduces the cost of multiple sensors and makes the system compact. Though the risk of sensor failure and reliability of the multifunctional sensor is always imminent, researchers are working out different methods to make the sensor fault tolerant. Multifunctional sensors are getting widespread acceptance in a variety of fields. This paper provides a review of recent advances in multifunctional sensor technology in the perspective of a multi-sensor system. Different aspects of design and implementation of multifunctional sensor technology have been addressed in this paper. This paper can serve as a basic reading material for students and researchers pursuing research on a multifunctional sensor.

51 citations


Journal Article
TL;DR: Manifestation of de-neutrosophication technique of linear pentagonal neutrosophic number using removal area method has been developed here which has a remakable impact in crispfication of pentagonal neutron number.
Abstract: In this current era, neutrosophic set theory is a crucial topic to demonstrate the ambiguous information due to existence of three disjunctive components appears in it and it provides a wide range of applications in distinct fields for the researchers. Generally, neutrosophic sets is the extended version of crisp set, fuzzy set and intuitionistic fuzzy sets to focus on the uncertain, hesitant and ambiguous datas of a real life mathematical problem. Demonstration of pentagonal neutrosophic number and its classification in different aspect is focused in this research article. Manifestation of de-neutrosophication technique of linear pentagonal neutrosophic number using removal area method has been developed here which has a remakable impact in crispfication of pentagonal neutrosophic number. Afterthat, utilizing this invented result, a minimal spanning tree problem has been solved in pentagonal neutrosophic environment. Comparision analysis is done with the other established method in this article and this noble design will be benificial for the researchers in neutrosophic domain in future.

32 citations


Proceedings ArticleDOI
13 May 2019
TL;DR: This paper aims to estimate and classify the traffic congestion state of different road segments within a city by analyzing the road traffic data captured by in-road stationary sensors using the Artificial Neural Network (ANN) based system.
Abstract: Managing the ever increasing road traffic congestion due to enormous vehicular growth is a big concern all over the world. Tremendous air pollution, loss of valuable time and money are the common consequences of traffic congestion in urban areas. IoT based Intelligent Transportation System (ITS) can help in managing the road traffic congestion in an efficient way. Estimation and classification of the traffic congestion state of different road segments is one of the important aspects of intelligent traffic management. Traffic congestion state recognition of different road segments helps the traffic management authority to optimize the traffic regulation of a transportation system. The commuters can also decide their best possible route to the destination based on traffic congestion state of different road segments. This paper aims to estimate and classify the traffic congestion state of different road segments within a city by analyzing the road traffic data captured by in-road stationary sensors. The Artificial Neural Network (ANN) based system is used to classify traffic congestion states. Based on traffic congestion status, ITS will automatically update the traffic regulations like, changing the queue length in traffic signal, suggesting alternate routes. It also helps the government to device policies regarding construction of flyover/alternate route for better traffic management.

22 citations


Proceedings ArticleDOI
04 Jan 2019
TL;DR: A Blockchain based incentive scheme for DTN based post disaster communication network that uses Bitcoin to incentivize nodes for cooperation is proposed that uses a novel reward strategy to bring rationality in the incentivizing process.
Abstract: Delay tolerant network (DTN) is successfully proposed for setting up emergency post disaster communication networks when normal communication infrastructure is incapacitated. Performance of such networks get affected by selfish nodes that do not participate in message forwarding. Thus, nodes must receive satisfactory rewards for cooperation. The available incentive schemes either rely on central trusted authorities or do not use an explicit and secure digital currency. Blockchain, a decentralized digital ledger of immutable transactions, is an attractive approach for addressing the incentive challenges in peer-to-peer networks that lack central trusted authorities. Bitcoin, the Blockchain based cryptocurrency, make it possible to devise practical credit based incentive schemes for such networks. In this paper, we propose a Blockchain based incentive scheme for DTN based post disaster communication network that uses Bitcoin to incentivize nodes for cooperation. The scheme uses a novel reward strategy to bring rationality in the incentivizing process.

17 citations



Proceedings ArticleDOI
18 Apr 2019
TL;DR: This work identifies traffic congestion pattern which can classify the different road segments based on traffic density and average speed of vehicles, which uses k-means clustering algorithm to categorize the differentRoad segments.
Abstract: With increase in urbanization and socio-economical growth, the number of vehicles in major metropolitan cities is increasing day by day. Therefore, traffic congestion is becoming a major concern of metropolitan cities all over the world. This results in tremendous air pollution, loss of valuable time and money of citizens. Hence, traffic congestion monitoring of different road segments is very essential for analyzing the problem associated with smooth mobility. Identifying the problematic road segments within the city is one of the important job for the transport authority to assess the road condition. That will assist the government agencies or policy makers to optimize traffic rules and regulations. This work identifies traffic congestion pattern which can classify the different road segments based on traffic density and average speed of vehicles. The traffic parameters are captured by in-road stationary sensors deployed in road segments. The proposed system uses k-means clustering algorithm to categorize the different road segments.

15 citations


Journal ArticleDOI
TL;DR: In this paper, the experimental and numerical investigations on vibration characteristics of laminated skewed shells with cutout are presented, and the results obtained in the present investigation indicate that cutout and skew angle bear remarkable influencing factor to control the frequencies of laminate skewed shells.
Abstract: The findings of the experimental and numerical investigations on vibration characteristics of laminated skewed shells with cutout are presented in this paper. The shell laminates have been fabricated in the laboratory by adopting resin infusion technique. Experimental analysis is conducted using Photon plus data acquisition system along with accelerometer and impact hammer to identify the influence of skew angle and cutout on the natural frequencies of laminated shell. The results obtained in the present investigation indicate that cutout and skew angle bear remarkable influencing factor to control the frequencies of laminated skewed shells. Additional results obtained from extensive parametric study on various shells with cutout are presented which may be helpful for future researchers.

12 citations


Book ChapterDOI
01 Jan 2019
TL;DR: This research work proposes an approach which can identify potential customers through sentiment analysis of audience’s activities which will be created to automate entire advertisement system that identifies potential customer base.
Abstract: This research work addresses a problem of social media domain where identification of potential customer base for advertisement is the objective of this work. Social media contains huge number of audience but every audience may not be a potential customer. This situation leads the advertisers to a wrong notion of having positive customers. This research work proposes an approach which can identify potential customers through sentiment analysis of audience’s activities. The proposed framework has four steps. In first step, clustering will be done according to type of product or service. In second step, every unique product will be identified among product type cluster. In third step, user’s sentiments will be identified related to each product or service. In fourth step, a sentiment based hierarchical clustering will be obtained based on identified sentiments. Based on these, a framework will be created to automate entire advertisement system that identifies potential customer base.

12 citations


Journal ArticleDOI
TL;DR: Results of extensive simulation substantiate the effectiveness of the proposed iDetect scheme over state-of-the-art competing schemes, in terms of detection ratio, availability ratio, etc. while not compromising on standard network performance in a post disaster communication scenario.
Abstract: Delay tolerant network (DTN) has been successfully proposed for setting up emergency post disaster communication networks when normal communication infrastructure is typically incapacitated. DTN being a network where participating nodes transmit messages to the final destination in multiple hops, its success depends on the cooperation of these participating nodes. Performance of such cooperation based networks get severely affected by misbehaving nodes that do not participate in message forwarding either due to reasons that are beyond its control (non-availability of appropriate forwarders, decreasing battery life, etc.) or out of certain malicious intentions. The misbehavior detection schemes, proposed so far, rarely investigate the actual intention behind misbehavior of participating nodes and do not attempt to restore the reputation of falsely alleged nodes. In this paper, we propose iDetect, a reputation based intention aware misbehavior detection scheme that uses contextual evidences to analyze the intention behind a node’s misbehavior. The scheme boosts the low reputation of incorrectly ostracized nodes and includes them in future communication. Re-inclusion of these nodes increases the number of genuine forwarders in the network which, in turn, assists in efficient delivery of crucial post disaster situational messages. Results of extensive simulation, using ONE simulator, substantiate the effectiveness of the proposed iDetect scheme over state-of-the-art competing schemes, in terms of detection ratio, availability ratio, etc. while not compromising on standard network performance in a post disaster communication scenario.

11 citations


Journal ArticleDOI
TL;DR: The novel designs here validated fully exploit the intrinsic repetitive capabilities of the Layered T Exclusive OR (LTEx) module in the QCA domain to realize the ultra-fast quantum-dot cellular automata (QCA) generic binary to gray converter.
Abstract: A modular approach to realize the ultra-fast quantum-dot cellular automata (QCA) generic binary to gray converter is presented in this paper. The novel designs here validated fully exploit the intrinsic repetitive capabilities of the Layered T Exclusive OR (LTEx) module in the QCA domain. An efficient logic formulation of QCA design metrics like O-Cost and delay is proposed for the n-bit QCA binary to gray converter designs. The QCA implementation of n-bit LTEx binary to gray converter is compared with the conventional converters. An attempt has been made to enhance the speed of modular binary to gray converter designs. The proposed 4, 8, 16, 32, 64-bit binary to gray converters need 4.35, 15.88, 15.96, 15.7, 16.68% less O-cost and 11.57, 2.61, 9.32, 12.64, 29.25% less effective area, respectively. Thus the proposed layouts offer the smaller feature size, reduced circuit complexity exploiting the modular based design approach. The simulation results have been carried out in the renowned computer aided design tool, namely QCADesigner 2.0.3 with gallium arsenide heterostructure based parameter environment.

10 citations


Journal ArticleDOI
TL;DR: This paper illustrates a cost-effective, energy-efficient Universal Reversible Logic Gate in QCA framework which is capable of designing power analysis attack resistable hardware cryptographical circuit.
Abstract: Quantum-dot cellular automata (QCA) technology leads to rapid high-density combinatory low power exploitation to realize the reversible logic circuit in the nanoscale era. Reversible logic is an alternative to overcome excess energy indulgence of irreversible process. This paper illustrates a cost-effective, energy-efficient Universal Reversible Logic Gate in QCA framework which is capable of designing power analysis attack resistable hardware cryptographical circuit. The proposed (URLGs: U1 and U2) has been tested with simulator QCADesigner V2.0.3, outshined the existing pattern relating to the area, gate count, garbage count, and quantum cost. We found 37.5% garbage minimization is achieved compared to NFT, which is utmost minimization of garbage ever reported in QCA literature. Thirteen three variable standard Boolean functions are considered as logic benchmarks to guesstimate the capability and efficiency of proposed URLG in QCA circuit implementation and synthesizing logic gates. In average, our proposed U2 achieved 36.66% improvement in energy dissipation for different kink energy ratios over early reported work.

Journal ArticleDOI
TL;DR: The proposed novel TRNG based hardware cryptographic architecture can be considered as a potential next-generation network-on-chip (NoC) realization for a large-scale cryptosystem in QCA technology.
Abstract: Information processing and conventional computing are usually resource constrained; evermore they need to operate in a physically suspicious environment. Consequently, communication architectures, protocol and its security aspects have been the focus of many recent research works. Our proposal demonstrates how to amend this vulnerable circumstance through a three-stage security scheme in quantum-dot cellular automata (QCA) based nano-architecture. The primary objective of this hardware-based cryptographic architecture using QCA is to intend a distinctly secure communication architecture comprising less number of QCA cells, which enchant the comparative performance investigation along with the power-area constraints. In our proposed design the random bits are extorted from an asymmetrically arranged crossed loop TRNG where the seed circuits are used to boost the volatility of initiated number sequences as well as the distinction of the random numbers. In this work, a novel encryption-decryption prototype for a secure communication system has been implemented. The simulation results are obtained from QCADesigner tool v2.0.3, which fruitfully agreed with the industry standard. An intact evaluation of the proposed TRNG and the comparative analysis with a recent work of TRNG has been authorized by the 7.79% improvements in average energy dissipation for different Kink energy ratio. Altogether the proposed architecture and its contemporary implementation in QCA framework can be recognized by means of the advantages in 7.02% circuit complexity, 11.53% area, and 13.77% average leakage power dissipation with respect to the recent work of TRNG. Thus our proposed novel TRNG based hardware cryptographic architecture can be considered as a potential next-generation network-on-chip (NoC) realization for a large-scale cryptosystem in QCA technology.

Journal ArticleDOI
TL;DR: The result explored that proposed dual port memory proportionately efficient with respect to the QCA single port memory as well as CMOSDual port memory in terms of area-delay-energy.


Book ChapterDOI
01 Jan 2019
TL;DR: In this article, the authors have modeled finite-difference time domain based analysis for plasmonic nanostructures for manipulating various plasmoric field components with eigenvalue and characterized optical improvement including photonic absorption and scattering cross sections as well as extinction in thin-film solar cell.
Abstract: Recently, plasmonic is given very much interest in analysis as a likely to manner to improvement in photonic extinction in solar cell structure. Its main expose is to concentrate and enhance the optical field due to strong interaction in plasmonic nanostructure that manipulates and concentrate photonic propagation at nano-dimension length scales. When light incident on the surface of plasmonic nanostructures it can excite mostly the valence electron gas which oscillates at the plasmonic frequency. In this paper, we have modeled finite-difference time domain based analysis for plasmonic nanostructure for manipulating various plasmonic field components with eigenvalue and characterized optical improvement including photonic absorption and scattering cross sections as well as extinction in plasmonic thin-film solar cell.

Journal ArticleDOI
TL;DR: This work mitigates the gap between QCA and coding theory, particularly finite field addition through a redesign-able, reproducible and scalable modular based approach to Galois field (GF)-based polynomial adders.
Abstract: The quantum-dot cellular automata, which provides a novel nano-computation paradigm, has got wide acceptance owing to its ultra-high operating speed, extremely low power dissipation with a considerable reduction in feature size. The QCA architectures are emerging as a potential alternative to the conventional complementary metal oxide semiconductor technology. This work mitigates the gap between QCA and coding theory, particularly finite field addition through a redesign-able, reproducible and scalable modular based approach. Primarily, a module to perform modulo-2 addition, namely M2A module is introduced. The notion of M2A module further results in a novel algorithm that generates an approach of QCA design of Galois field (GF)-based polynomial adders. The cost functions are calculated to estimate the operation of M2A-based polynomial adders, the proposed adders are compared with the conventional counterpart, and the best one is reported. The defect- and fault-tolerant behavior of GF(28) polynomial adder is also examined as a particular instance.

Journal ArticleDOI
01 Jan 2019
TL;DR: An image formation optical model is presented where a clear day image has high contrast with respect to an image plagued with bad weather and the resulting high-quality haze free image with linear computational complexity O(n) is appropriate for real time applications.
Abstract: At present the classical problem of visibility improvement is hot topic of research. An image formation optical model is presented where a clear day image has high contrast with respect to an image plagued with bad weather. A degraded daytime image has high intensity with minimum deviation among pixels in every channel. No reference digital image haze removal is a problem. The static haziness factor for all types of images cannot be applicable for effective haze removal. A minimum intensity channel of the three RGB channels is estimated as transmission of an image with a dynamic haziness factor to be a ratio of minimum to maximum pixel intensity of the hazy image. Adaptive contrast, extinction coefficient, the maximum visible distance of hazy images as well as dehazed images from each image are evaluated uniquely. The resulting high-quality haze free image with linear computational complexity O(n) is appropriate for real time applications. The effectiveness of the technique is validated by quantitative, and qualitative evaluations.


Book ChapterDOI
01 Jan 2019
TL;DR: This work presents the design and implementation of a pruning algorithm to capture a part of the large graph-based data model and it is demonstrated on Disease-Symptom graph database.
Abstract: Breadth-first search (BFS) is one of the most fundamental algorithms for searching a graph. In our previous work, a mobile-assisted diagnosis scheme has been proposed and we have designed a Disease-Symptom data model as a large knowledge base. In this work, we present the design and implementation of a pruning algorithm to capture a part of the large graph-based data model. Generally, to search a large graph, most of the graph queries are too long and very cumbersome to write and sometimes very difficult to implement. Pruning algorithm is one of the prominent solutions of this problem. It results a subgraph or forest for the desired input. Here, our proposed pruning algorithm is multi-source sequential BFS algorithm and it is demonstrated on Disease-Symptom graph database.

Book ChapterDOI
01 Jan 2019
TL;DR: The concept of multilayer based Layered T Exclusive OR module, namely LTEx module is proposed to design 3 × 3 Toffoli Gate, showcasing that the circuits designed in the proposed methodology are more efficient in terms of effective area, O-Cost and input to output delay of the circuit.
Abstract: Reversible logic design using Quantum Cellular Automata (QCA) is considered as a promising area in nanotechnology. Previously designed QCA layouts of the reversible gates have generally been designed in single layer except for the interconnections where multilevel wire crossing was used. In this paper the concept of multilayer based Layered T Exclusive OR module, namely LTEx module is proposed to design 3 × 3 Toffoli Gate. A comparison has made with the existing designs of Toffoli Gate and the result is showcasing that the circuits designed in the proposed methodology are more efficient in terms of effective area, O-Cost and input to output delay of the circuit. Moreover, the 3 × 3 Toffoli gate is designed with the scope for multi-control Toffoli gate to make reversible circuit design compact.

Proceedings ArticleDOI
01 Aug 2019
TL;DR: A preliminary investigation is carried out by applying Z-transform technique on different types of images with sole intention to record the z-score of any binary image to help for the segments of cancerous portion.
Abstract: A preliminary investigation is carried out by applying Z-transform technique on different types of images with sole intention to record the z-score of any binary image. Bandwidth of the images are computed, and compared with that obtained from Fourier technique. Length of z-score matrix is graphically represented. Result is also analyzed for smooth, shiny and rough images. This preliminary investigation will help in sending multimedia content, precisely images through network and in signal processing which helps for the segments of cancerous portion.

Journal ArticleDOI
TL;DR: In this paper, a balance between strength and ductility in AA6061 alloy was achieved by tailoring the microstructure through sequential combinations of multi-pass rolling near sub-zero temperature and age hardening.

Journal ArticleDOI
TL;DR: An efficient fault detection mechanism is formulated to identify multiple numbers of defective/faulty electrodes on an m × n biochip array, where m and n can be of any positive number.
Abstract: The involvement of Digital Microfluidic Biochips (DMFBs) in the field of disease detection, automated drug discovery, on-chip DNA (Deoxyribonucleic acid) analysis has become well-accepted d...

Journal ArticleDOI
TL;DR: Transmission map is a crucial reference to retrieve the dehazed output in single image dehazing, and it is suggested that this map should be placed at the top of the output list to facilitate easy retrieval of the data.
Abstract: Single image dehazing is an ill-posed, challenging issue out of several dehazing techniques due to its limited information. Transmission map is a crucial reference to retrieve the dehazed o...

Proceedings ArticleDOI
04 Jan 2019
TL;DR: A compromise-tolerant DTN is envisioned, where time-varying pseudonyms are used to obscure the actual identity and safeguard the privacy of genuine nodes, and unique implicit session key agreement facilitates the establishment of credential-free secure communication session between two legitimate nodes and protects the data from being revealed to the adversaries.
Abstract: Researchers have proposed to set up "infrastructure-less" peer-to-peer opportunistic network (also known as Delay Tolerant Network) using smart phones carried by different victims or volunteers in post-disaster scenario. Volunteers may use this DTN to relay sensitive situational data. However, in such fragile network environment, some malicious nodes may try to intercept, manipulate data with the intention of corruption and fraud. Furthermore, an adversary node may compel a trusted node to compromise its security credentials or may physically capture the node. As a result, attackers get the authority to sign any message on behalf of the compromised node and can launch various attacks to perturb the network. To combat these attacks, we envision a compromise-tolerant DTN, where time-varying pseudonyms are used to obscure the actual identity and safeguard the privacy of genuine nodes. Unique implicit session key agreement facilitates the establishment of credential-free secure communication session between two legitimate nodes and protects the data from being revealed to the adversaries. Periodic certificate revocation scheme restricts use of any compromised credentials beyond a certain time. We evaluate iSecure scheme using ONE simulator to understand feasibility, performance and overhead.

Journal ArticleDOI
TL;DR: The proposed wireless-communication-enabled low-cost, automated drip rate monitoring system, used for intravenous (IV) therapy, is simple, user-friendly and can reduce the workload of the healthcare givers by reducing their regular visit to the patient site.
Abstract: Biotelemetry increases the efficiency of the healthcare professionals. This study proposes the development of a wireless-communication-enabled low-cost, automated drip rate monitoring system, used for intravenous (IV) therapy. The proposed system monitors the falling fluid drops inside the drip chamber, and subsequently calculates and displays the drip rate on a liquid crystal display (LCD) panel. It is capable of wirelessly notifying the central monitoring station when the drip rate is outside the set range. The system was designed using a light emitting diode (LED), a light-dependent resistor (LDR), a microcontroller and an Xbee wireless module. The proposed device is simple, user-friendly and can reduce the workload of the healthcare givers by reducing their regular visit to the patient site.

Proceedings ArticleDOI
01 Jun 2019
TL;DR: The functional relationship between the limb joints and the end-effector of a lower extremity has been incorporated and the relevant Jacobian matrix has been formed utilizing the kinematic equation.
Abstract: An approach towards the mathematical model generation of the natural motion of the human lower limb has drawn the attention of researchers’ in the field of exoskeleton design. In this present work, the functional relationship between the limb joints and the end-effector of a lower extremity has been incorporated. Rehabilitation requires the knowledge of the connectivity of the joints, links and ultimate body orientation to control the motion of the actuators. The mechanical motions have been manipulated by the information of kinematic equations. The Jacobian matrix has an interaction in the analytical methods, designing and controlling locomotive system development. In this paper, the relevant Jacobian matrix has been formed utilizing the kinematic equation. System stability analysis is involved in determining the zeros of Jacobi polynomial and the corresponding transfer function generation. The initiative of system performance assessment for the lower limb movement is the main focus of this research work.

Journal ArticleDOI
TL;DR: The present scenario, power, speed, and area of an electronic device play a significant role specifically in the field of modern VLSI technology, and small power dissipatio...
Abstract: In the present scenario, power, speed, and area of an electronic device play a significant role specifically in the field of modern VLSI technology. In this research, small power dissipation and a ...

Journal ArticleDOI
TL;DR: It has been observed that power consumption of the 4 bit binary to Gray converter with 8 × 4 barrel shifter has been reduced by reducing the power supply voltage VDD, and the circuit is suited for low power and high speed application in the area of arithmetical, logical and telecommunication.
Abstract: In this work the design of 4 bit binary to Gray code converter circuit with 8 × 4 barrel shifter has been carried out The circuit has been designed using metal oxide semiconductor (MOS) transistor The verification of the functionality of the circuits has been performed using Tanner-SPICE software Power consumption and speed are the major design metrics for very large scale integrated circuit In this work the average power consumption and gate delay analysis of 4 bit binary to Gray converter with 8 × 4 barrel shifter has been carried out using nano dimensional MOS transistor having channel length of 150 nm Power consumption, delay analysis has been carried out for different set of supply voltage It has been observed that power consumption of the 4 bit binary to Gray converter with 8 × 4 barrel shifter has been reduced by reducing the power supply voltage VDD The power consumption and delay offers by the circuit is very less At 1 V VDD, power consumption and delay are 015 μW and 527 ps respectively Therefore the circuit is suited for low power and high speed application in the area of arithmetical, logical and telecommunication

Journal ArticleDOI
TL;DR: An efficient pruning algorithm is proposed by introducing a new approach to decompose the Disease-Symptom graph into a series of symptom trees (ST) and all the Symptom trees are merged to build a pruned subgraph which is the requirement.