Pankaj Chitte - Academia.edu (original) (raw)
Papers by Pankaj Chitte
Bulletin of Electrical Engineering and Informatics, Jun 1, 2024
A design of a compact dual-band antenna for 5G application is presented in this research article.... more A design of a compact dual-band antenna for 5G application is presented in this research article. The dual-band operation includes the 3.6 GHz and 5.4 GHz frequency bands of the sub-6 GHz frequency band for 5G technology. The proposed antenna offers a compact design with satisfactory antenna performance parameters. Moreover, the dual-band antenna showcases the independent tuning ability for both frequency bands. The prototype of the dual-band antenna is manufactured and when tested for various antenna performance parameters shows a good agreement between the simulated and measured results. The proposed dual-band antenna has compact dimensions along with a peak gain of 2.2 dB and antenna efficiency of more than 90%.The antenna performance parameters are also compared with various dual-band antenna designs from the literature. The proposed dual-band antenna offers a compact design with satisfactory performance parameters and outperforms its counterparts.
International Journal on Recent and Innovation Trends in Computing and Communication
An astute metropolis is an urbanized region that accumulates data through diverse numerical and e... more An astute metropolis is an urbanized region that accumulates data through diverse numerical and experiential understanding. Cloud-connected Internet of Things (IoT) solutions have the potential to aid intelligent cities in collecting data from inhabitants, devices, residences, and alternative origins. The monitoring and administration of carrying systems, plug-in services, reserve managing, H2O resource schemes, excess managing, illegal finding, safety actions, ability, numeral collection, healthcare abilities, and extra openings all make use of the processing and analysis of this data. This study aims to improve the security of smart cities by detecting attacks using algorithms drawn from the UNSW-NB15 and CICIDS2017 datasets and to create advanced strategies for identifying and justifying cyber threats in the context of smart cities by leveraging real-world network traffic data from UNSW-NB15 and labelled attack actions from CICIDS2017. The research aims to underwrite the developm...
Cervical Spondylosis is a cervical vertebrae problem that can convert into a big injury if it is ... more Cervical Spondylosis is a cervical vertebrae problem that can convert into a big injury if it is not detected in the early stage. For the detection of Cervical Spondylosis, we are using MRI mages. Hence data become nonlinear and dynamic for image processing so here in the system early-stage detection is decided to avoid further complications using deep dense inception method which will help the physician to detect Cervical Spondylosis in early stage.
International Journal of Advance Research and Innovative Ideas in Education, 2016
Now a day ration card is extremely vital for every home and used for various field such as family... more Now a day ration card is extremely vital for every home and used for various field such as family members details, to obtain gas connection, it perform as address evidence for various purposes etc. All the people having a ration card to obtain the various materials (sugar, rice, oil, kerosene, etc) from the ration shops. But in this system having two disadventages, first one is weight of the material may be incorrect due to human mistakes and secondly, if not buy the materials at the ending of the month, they will sale to others without any intimation to the government and consumers In this paper, proposed an Automatic Ration Materials Distribution Based on GSM (Global System for Mobile) and RFID (Radio Frequency Identification) technology as a replacement for of ration cards. To get the materials in ration shops require to confirm the RFID tag into the RFID reader, then controller verify the customer codes and entire of amounts in the card. once confirmation these systems illustrat...
In this paper we have compared different methods of Cervical Spondylosis detection. There are var... more In this paper we have compared different methods of Cervical Spondylosis detection. There are various measuring tools to evaluate the neck pain, regional pain, neurologic deficits of the sphincters, torso caused by cervical spondylosis. However, the results are challenged because cervical spondylosis can be subdivided into different sub-types due to different pathological diagnosis. After comparison we have found that for the analysis of Cervical Spondylosis (CS) detection requires an extensive knowledge of the anatomy, skill and experience of specialist. We also found one interesting thing that Doctors are doing manual inspection by using MRI and CT scans. There is no automatic method available so we propose the system which can automatically detect and analyses the Cervical Spondylosis using CNN-LSTM algorithm. The Long Short-Term Memory (LSTM) and the Convolutional Neural Networks (CNNs) is an algorithm to make automation in various real life applications by using machine learnin...
The basic aim of this paper is to study the system, which is used for ATM access to cash withdraw... more The basic aim of this paper is to study the system, which is used for ATM access to cash withdrawal with more security. In this system, Bankers will collect the customer finger prints and mobile number while opening the account then only customer can access ATM machine. The working of system will start when our customer goes at ATM center. First there is switch for entry. After getting entry customer has to places his finger on the finger print module. Then system will check for user identity and checks validity of finger if it finds as a valid then ATM machine will ask to customer for 4-digit ATM pin, which is fixed. If that 4-digit code match with entered pin code then system will automatically generates another different 4-digit code i.e. OTP. And that code will be message to the customer's registered mobile number through GSM modem which is connected to ARM 7. Here customer has to enter this code again .After entering OTP, System will checks whether entered code is a valid o...
International Journal of Advance Research and Innovative Ideas in Education, 2017
The purpose of this paper is to accumulate the far flung electric parameters like current and vol... more The purpose of this paper is to accumulate the far flung electric parameters like current and voltage and send these real time values over GSM network the use of GSM Modem or telephone and laptop of the owner. This undertaking is likewise designed to govern the electrical circuitry by operating an Electromagnetic Relay. This Relay gets activated by means of the owner while the electricity invoice exceed the predefined values. The Relay can be used to perform a Circuit Breaker to interchange off the primary electric supply. User can send instructions within the form of SMS messages to examine the far flung electrical parameters. This device also can automatically send the actual time electrical parameters periodically (based totally on time settings) within the shape of SMS. This venture makes use of an onboard pc which is typically termed as microcontroller. This onboard pc can efficaciously communicate with the distinctive sensors being used. The controller is provided with some internal memory to keep the code. This memory is used to unload some set of meeting instructions into the controller. And the functioning of the controller is depending on those assembly instructions.
International Journal of Advance Research and Innovative Ideas in Education, 2017
The purpose of this paper is to accumulate the far flung electric parameters like current and vol... more The purpose of this paper is to accumulate the far flung electric parameters like current and voltage and send these real time values over GSM network the use of GSM Modem or telephone and laptop of the owner. This undertaking is likewise designed to govern the electrical circuitry by operating an Electromagnetic Relay. This Relay gets activated by means of the owner while the electricity invoice exceed the predefined values. The Relay can be used to perform a Circuit Breaker to interchange off the primary electric supply. User can send instructions within the form of SMS messages to examine the far flung electrical parameters. This device also can automatically send the actual time electrical parameters periodically (based totally on time settings) within the shape of SMS. This venture makes use of an onboard pc which is typically termed as microcontroller. This onboard pc can efficaciously communicate with the distinctive sensors being used. The controller is provided with some in...
International Journal of Computer Applications, 2012
Iris recognition is the mean of biometric identification using very large amount of iris database... more Iris recognition is the mean of biometric identification using very large amount of iris database taken without contact to the human body. Basically three main methods are available to process iris data, out of which in this paper, an iris image synthesis method based on Principal Component Analysis (PCA), Independent component analysis (ICA) and Daugman's rubber sheet model& hybrid model is proposed. Iris Recognition is a most secure biometric authentication that uses pattern-recognition techniques. The video based iris recognition system is used to locate eye and iris, to evaluate degree of occlusion by eyelids, determine the centre & boundary of pupil and outer edge of iris. The measured features are encoded into 512-byte iris code which is further enrolled for identification. Here we compared different techniques i.e. ICA, PCA, Daugman's rubber sheet model & hybrid model which is combination of all above three along with RFID system. Out of 400 degrees of freedom (measurable variables), 200 features are compared to create the code which can be compared to an entire database in milliseconds. After using lot many algorithms for iris recognition we found that existing system shows, Daugman's rubber sheet model is better. The comparative study of the various algorithms proposed above shows some interesting results which is the achievement of the practical study on iris recognition.
Proceedings of the CUBE International Information Technology Conference, 2012
This paper is based on biometrics which provides automatic identification of an individual based ... more This paper is based on biometrics which provides automatic identification of an individual based on a unique feature or characteristics possessed by an individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. The system has been effectively implemented for the intensive care units in the hospital as a security measure to prevent illegal access. Implementation of this algorithm is done in Matlab.
International Journal on Recent and Innovation Trends in Computing and Communication
An astute metropolis is an urbanized region that accumulates data through diverse numerical and e... more An astute metropolis is an urbanized region that accumulates data through diverse numerical and experiential understanding. Cloud-connected Internet of Things (IoT) solutions have the potential to aid intelligent cities in collecting data from inhabitants, devices, residences, and alternative origins. The monitoring and administration of carrying systems, plug-in services, reserve managing, H2O resource schemes, excess managing, illegal finding, safety actions, ability, numeral collection, healthcare abilities, and extra openings all make use of the processing and analysis of this data. This study aims to improve the security of smart cities by detecting attacks using algorithms drawn from the UNSW-NB15 and CICIDS2017 datasets and to create advanced strategies for identifying and justifying cyber threats in the context of smart cities by leveraging real-world network traffic data from UNSW-NB15 and labelled attack actions from CICIDS2017. The research aims to underwrite the developm...
Bulletin of Electrical Engineering and Informatics, Jun 1, 2024
A design of a compact dual-band antenna for 5G application is presented in this research article.... more A design of a compact dual-band antenna for 5G application is presented in this research article. The dual-band operation includes the 3.6 GHz and 5.4 GHz frequency bands of the sub-6 GHz frequency band for 5G technology. The proposed antenna offers a compact design with satisfactory antenna performance parameters. Moreover, the dual-band antenna showcases the independent tuning ability for both frequency bands. The prototype of the dual-band antenna is manufactured and when tested for various antenna performance parameters shows a good agreement between the simulated and measured results. The proposed dual-band antenna has compact dimensions along with a peak gain of 2.2 dB and antenna efficiency of more than 90%.The antenna performance parameters are also compared with various dual-band antenna designs from the literature. The proposed dual-band antenna offers a compact design with satisfactory performance parameters and outperforms its counterparts.
International Journal on Recent and Innovation Trends in Computing and Communication
An astute metropolis is an urbanized region that accumulates data through diverse numerical and e... more An astute metropolis is an urbanized region that accumulates data through diverse numerical and experiential understanding. Cloud-connected Internet of Things (IoT) solutions have the potential to aid intelligent cities in collecting data from inhabitants, devices, residences, and alternative origins. The monitoring and administration of carrying systems, plug-in services, reserve managing, H2O resource schemes, excess managing, illegal finding, safety actions, ability, numeral collection, healthcare abilities, and extra openings all make use of the processing and analysis of this data. This study aims to improve the security of smart cities by detecting attacks using algorithms drawn from the UNSW-NB15 and CICIDS2017 datasets and to create advanced strategies for identifying and justifying cyber threats in the context of smart cities by leveraging real-world network traffic data from UNSW-NB15 and labelled attack actions from CICIDS2017. The research aims to underwrite the developm...
Cervical Spondylosis is a cervical vertebrae problem that can convert into a big injury if it is ... more Cervical Spondylosis is a cervical vertebrae problem that can convert into a big injury if it is not detected in the early stage. For the detection of Cervical Spondylosis, we are using MRI mages. Hence data become nonlinear and dynamic for image processing so here in the system early-stage detection is decided to avoid further complications using deep dense inception method which will help the physician to detect Cervical Spondylosis in early stage.
International Journal of Advance Research and Innovative Ideas in Education, 2016
Now a day ration card is extremely vital for every home and used for various field such as family... more Now a day ration card is extremely vital for every home and used for various field such as family members details, to obtain gas connection, it perform as address evidence for various purposes etc. All the people having a ration card to obtain the various materials (sugar, rice, oil, kerosene, etc) from the ration shops. But in this system having two disadventages, first one is weight of the material may be incorrect due to human mistakes and secondly, if not buy the materials at the ending of the month, they will sale to others without any intimation to the government and consumers In this paper, proposed an Automatic Ration Materials Distribution Based on GSM (Global System for Mobile) and RFID (Radio Frequency Identification) technology as a replacement for of ration cards. To get the materials in ration shops require to confirm the RFID tag into the RFID reader, then controller verify the customer codes and entire of amounts in the card. once confirmation these systems illustrat...
In this paper we have compared different methods of Cervical Spondylosis detection. There are var... more In this paper we have compared different methods of Cervical Spondylosis detection. There are various measuring tools to evaluate the neck pain, regional pain, neurologic deficits of the sphincters, torso caused by cervical spondylosis. However, the results are challenged because cervical spondylosis can be subdivided into different sub-types due to different pathological diagnosis. After comparison we have found that for the analysis of Cervical Spondylosis (CS) detection requires an extensive knowledge of the anatomy, skill and experience of specialist. We also found one interesting thing that Doctors are doing manual inspection by using MRI and CT scans. There is no automatic method available so we propose the system which can automatically detect and analyses the Cervical Spondylosis using CNN-LSTM algorithm. The Long Short-Term Memory (LSTM) and the Convolutional Neural Networks (CNNs) is an algorithm to make automation in various real life applications by using machine learnin...
The basic aim of this paper is to study the system, which is used for ATM access to cash withdraw... more The basic aim of this paper is to study the system, which is used for ATM access to cash withdrawal with more security. In this system, Bankers will collect the customer finger prints and mobile number while opening the account then only customer can access ATM machine. The working of system will start when our customer goes at ATM center. First there is switch for entry. After getting entry customer has to places his finger on the finger print module. Then system will check for user identity and checks validity of finger if it finds as a valid then ATM machine will ask to customer for 4-digit ATM pin, which is fixed. If that 4-digit code match with entered pin code then system will automatically generates another different 4-digit code i.e. OTP. And that code will be message to the customer's registered mobile number through GSM modem which is connected to ARM 7. Here customer has to enter this code again .After entering OTP, System will checks whether entered code is a valid o...
International Journal of Advance Research and Innovative Ideas in Education, 2017
The purpose of this paper is to accumulate the far flung electric parameters like current and vol... more The purpose of this paper is to accumulate the far flung electric parameters like current and voltage and send these real time values over GSM network the use of GSM Modem or telephone and laptop of the owner. This undertaking is likewise designed to govern the electrical circuitry by operating an Electromagnetic Relay. This Relay gets activated by means of the owner while the electricity invoice exceed the predefined values. The Relay can be used to perform a Circuit Breaker to interchange off the primary electric supply. User can send instructions within the form of SMS messages to examine the far flung electrical parameters. This device also can automatically send the actual time electrical parameters periodically (based totally on time settings) within the shape of SMS. This venture makes use of an onboard pc which is typically termed as microcontroller. This onboard pc can efficaciously communicate with the distinctive sensors being used. The controller is provided with some internal memory to keep the code. This memory is used to unload some set of meeting instructions into the controller. And the functioning of the controller is depending on those assembly instructions.
International Journal of Advance Research and Innovative Ideas in Education, 2017
The purpose of this paper is to accumulate the far flung electric parameters like current and vol... more The purpose of this paper is to accumulate the far flung electric parameters like current and voltage and send these real time values over GSM network the use of GSM Modem or telephone and laptop of the owner. This undertaking is likewise designed to govern the electrical circuitry by operating an Electromagnetic Relay. This Relay gets activated by means of the owner while the electricity invoice exceed the predefined values. The Relay can be used to perform a Circuit Breaker to interchange off the primary electric supply. User can send instructions within the form of SMS messages to examine the far flung electrical parameters. This device also can automatically send the actual time electrical parameters periodically (based totally on time settings) within the shape of SMS. This venture makes use of an onboard pc which is typically termed as microcontroller. This onboard pc can efficaciously communicate with the distinctive sensors being used. The controller is provided with some in...
International Journal of Computer Applications, 2012
Iris recognition is the mean of biometric identification using very large amount of iris database... more Iris recognition is the mean of biometric identification using very large amount of iris database taken without contact to the human body. Basically three main methods are available to process iris data, out of which in this paper, an iris image synthesis method based on Principal Component Analysis (PCA), Independent component analysis (ICA) and Daugman's rubber sheet model& hybrid model is proposed. Iris Recognition is a most secure biometric authentication that uses pattern-recognition techniques. The video based iris recognition system is used to locate eye and iris, to evaluate degree of occlusion by eyelids, determine the centre & boundary of pupil and outer edge of iris. The measured features are encoded into 512-byte iris code which is further enrolled for identification. Here we compared different techniques i.e. ICA, PCA, Daugman's rubber sheet model & hybrid model which is combination of all above three along with RFID system. Out of 400 degrees of freedom (measurable variables), 200 features are compared to create the code which can be compared to an entire database in milliseconds. After using lot many algorithms for iris recognition we found that existing system shows, Daugman's rubber sheet model is better. The comparative study of the various algorithms proposed above shows some interesting results which is the achievement of the practical study on iris recognition.
Proceedings of the CUBE International Information Technology Conference, 2012
This paper is based on biometrics which provides automatic identification of an individual based ... more This paper is based on biometrics which provides automatic identification of an individual based on a unique feature or characteristics possessed by an individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. The system has been effectively implemented for the intensive care units in the hospital as a security measure to prevent illegal access. Implementation of this algorithm is done in Matlab.
International Journal on Recent and Innovation Trends in Computing and Communication
An astute metropolis is an urbanized region that accumulates data through diverse numerical and e... more An astute metropolis is an urbanized region that accumulates data through diverse numerical and experiential understanding. Cloud-connected Internet of Things (IoT) solutions have the potential to aid intelligent cities in collecting data from inhabitants, devices, residences, and alternative origins. The monitoring and administration of carrying systems, plug-in services, reserve managing, H2O resource schemes, excess managing, illegal finding, safety actions, ability, numeral collection, healthcare abilities, and extra openings all make use of the processing and analysis of this data. This study aims to improve the security of smart cities by detecting attacks using algorithms drawn from the UNSW-NB15 and CICIDS2017 datasets and to create advanced strategies for identifying and justifying cyber threats in the context of smart cities by leveraging real-world network traffic data from UNSW-NB15 and labelled attack actions from CICIDS2017. The research aims to underwrite the developm...