scispace - formally typeset
Search or ask a question
Institution

SDM College of Engineering and Technology

About: SDM College of Engineering and Technology is a based out in . It is known for research contribution in the topics: Diesel fuel & Combustion. The organization has 350 authors who have published 351 publications receiving 2399 citations.


Papers
More filters
Proceedings Article
03 Oct 2012
TL;DR: Representation of iris as a barcode provides an efficient and encrypted way for storing the iris data and provides one more level of security.
Abstract: A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is one of such biometric systems and is regarded as the most reliable and accurate identification systems available. It is the process of recognizing a person by analyzing the random pattern of the iris [8]. It combines computer vision, pattern recognition, statistical inference, and optics. Its purpose is real-time, high confidence recognition of a person's identity by mathematical analysis of the random patterns that are visible within the iris of an eye[7][8]. The proposed system takes an image of the eye, detects the iris and extracts it. Then a binary image of the extracted iris is created in order to form an equivalent barcode. Similarly a test data is also processed into a barcode and is matched with the reference barcodes in the database [8]. Representation of iris as a barcode provides an efficient and encrypted way for storing the iris data and provides one more level of security. Thus, the system has its application in various areas like national border controls: the iris can be used as a living passport, cell phone and other wireless-device-based authentication, secure access to bank accounts at cash machines, premises access control, credit-card authentication, Internet security, Biometric-Key Cryptography, etc[10]. Following parameters are observed. i.e. ARAcceptance Ratio 58.90%. FRRFalse Rejection Ratio 41.10%.FAR-False Acceptance Ratio 33.34 %. RRRejection Ratio 66.66%. General Terms Encryption, Algorithms, Performance, Design, Experimentation, Security, Human Factors, Verification.

1 citations

Book ChapterDOI
01 Jan 2013
TL;DR: Shape Based Image Retrieval (SBIR) is proposed to retrieve shape features extracted using gradient operators and Block Truncation Coding (BTC), which improves the edge maps obtained using gradient masks like Robert, Sobel, Prewitt and Canny.
Abstract: The need of Content Based Image Retrieval (CBIR) arises because of digital era. It is very much required in the field of radiology to find the similar diagnostic images, in advertising to find the relevant stock, for cataloging in the field of geology, art and fashion. In CBIR, the set of image database is stored in terms of features where feature of an image can be calculated based on different criteria like shape, color, texture and spatial locations etc. Among three features shape is the prominent feature and helps to identify the image correctly. In this paper, we are proposing Shape Based Image Retrieval (SBIR) to retrieve shape features extracted using gradient operators and Block Truncation Coding (BTC). BTC improves the edge maps obtained using gradient masks like Robert, Sobel, Prewitt and Canny. The proposed image retrieval techniques are tested on generic image database with 1000 images spread across 10 categories. The average precision and recall of all queries are computed and considered for performance analysis. Among all the considered gradient operators for shape extraction “shape mask with BTC CBIR techniques” give better results. The performance ranking of the masks for proposed image retrieval methods can be listed as Canny (best performance), Prewitt, Sobel and lastly the Robert.

1 citations

Proceedings ArticleDOI
23 Jun 2007
TL;DR: A novel computing model is proposed to achieve an autonomous environment for home automation based on agent technology in which agents are assigned certain tasks to achieve and can easily integrated with other architectures.
Abstract: The world is moving towards automation and autonomous systems, in which devices are expected to be seamlessly integrated and complex, which act on our behalf and deliver better quality services anywhere anytime and in any fashion. However most of the Electrical Power Supply Companies across the world still use the good old traditional approaches for home related services pose big challenges for home automation. Author proposes a novel computing model to achieve an autonomous environment for home automation. A model is based on agent technology in which agents are assigned certain tasks to achieve. The architecture is portable, flexible and can easily integrated with other architectures.

1 citations

Proceedings ArticleDOI
01 Nov 2014
TL;DR: The studies of impact of interleaver on performance of Convolutional Encoder and Decoder (CODEC) for burst errors as well as for distributed errors are presented.
Abstract: An interleaving is a concept which is used in conjunction with error correcting codes to counteract the effect of burst errors. Convolutional codes are frequently used to correct errors in noisy channels. The Viterbi algorithm is the most extensively employed decoding algorithm for convolutional codes. In this paper we present our studies of impact of interleaver on performance of Convolutional Encoder and Decoder (CODEC) for burst errors as well as for distributed errors. Also the performance of the Viterbi algorithm for different generator polynomials is presented. The hard decision with ½ rate coding technique is considered in this paper.

1 citations

Journal ArticleDOI
15 Apr 2021
TL;DR: The study of DERD-domination in graphs is initiated and some sharp bounds are obtained and the decision problem for determining γ cl ^ e ( G ) is NP-complete.
Abstract: A subset D ⊆ V ( G ) is called an equitable dominating set of a graph G if every vertex v ∈ V ( G ) \ D has a neighbor u ∈ D such that | d G ( u )- d G ( v )| ≤ 1. An equitable dominating set D is a degree equitable restrained double dominating set (DERD-dominating set) of G if every vertex of G is dominated by at least two vertices of D , and 〈 V ( G ) \ D 〉 has no isolated vertices. The DERD-domination number of G , denoted by γ cl ^ e ( G ), is the minimum cardinality of a DERD-dominating set of G . We initiate the study of DERD-domination in graphs and we obtain some sharp bounds. Finally, we show that the decision problem for determining γ cl ^ e ( G ) is NP-complete.

1 citations


Network Information
Related Institutions (5)
National Institute of Technology, Tiruchirappalli
8K papers, 111.9K citations

80% related

Amrita Vishwa Vidyapeetham
11K papers, 76.1K citations

80% related

National Institute of Technology, Rourkela
10.7K papers, 150.1K citations

79% related

National Institute of Technology, Karnataka
7K papers, 70.3K citations

79% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20225
202145
202034
201936
201834
201742