Pradeep Mane - Academia.edu (original) (raw)

Papers by Pradeep Mane

Research paper thumbnail of Wireless Lan Intrusion Detection by Using Statistical Timing Approach

International Journal of Research in Engineering and Technology, 2014

Today as we all are habitual of using internet through wired or wireless LAN Networks, but using ... more Today as we all are habitual of using internet through wired or wireless LAN Networks, but using internet through Wireless LAN becomes harder as the threat of unauthorized access point is increasing day by day. In This paper we are focusing on different types of rogue access points (APs) that are masquerading and attracting people to get associate with them or to connect with them. We are implementing a solution to avoid people or users from connecting to the unauthorized access point by using experimental time dependent scheme. Our detection technique is a client-oriented method that uses the complete tour time between the DNS server and user that perfectly determine that whether an access point with which the user has connected is the legitimate access point or a unauthorized access point. In this paper we are implementing concept using .Net framework and sql server, Which gives us the characteristics like robust, accuracy and effectiveness for detecting rogue or unauthorized access point without getting any help from WLAN administrator. In this simulation technique we will get accurate values so that we can distinguish between rogue access point and legitimate access point

Research paper thumbnail of Linear Vector Quantization for the Diagnosis of Ground Bud Necrosis Virus in Tomato

International Journal of Electrical and Electronics Research

In this varying environment, a correct and appropriate disease diagnosis including early preclusi... more In this varying environment, a correct and appropriate disease diagnosis including early preclusion has never been more significant. Our study on disease identification of groundnut originated by Groundnut Bud Necrosis Virus will cover the way to the effective use of image processing approach in agriculture. The difficulty of capable plant disease protection is very much linked to the problems of sustainable agriculture and climate change. Due to the fast advancement of Artificial Intelligence, the work in this paper is primarily focused on applying Pattern Recognition based techniques. The purpose is to determine the grade of disease to control by developing a model for the selection of bud blight disease caused by GBNV in tomatoes. The images are classified according to the grade of the disease. Different methods have been applied to make a proper diagnosis by bringing clarity in the diagnostic results. Linear Vector Quantization works well than, Radial Basis Function, Back Propag...

Research paper thumbnail of Feed Forward Neural Network based Brain Tumor Diagnosis in Magnetic Resonance Images

International Journal of Electrical and Electronics Research

In the realm of medicine, value, resource use and final care are determined by good technological... more In the realm of medicine, value, resource use and final care are determined by good technological advancement. However, there are crucial components that must be present for a disease to be diagnosed. The monitoring of illness progression traditionally relies primarily on a subjective human judgment and is neither precise nor timely. One important aspect that utilizes data at various disease progression phases is to maintain routine disease surveillance. The Feed Forward Neural Network based Brain Tumor Diagnosis in Magnetic Resonance Images is provided in this paper as an automatic brain cancer diagnosis and grade classification method. It is highly helpful to have accurate information about the disease in order to classify it and make decisions. The suggested brain tumor diagnosis system can diagnose the condition and provide a reliable foundation for appropriate regulation, as opposed to manual approaches. Finally, the evaluated outcomes of the suggested model investigate numerou...

Research paper thumbnail of An Improved binarization based algorithm using minutiae approach for Fingerprint Identification

The long history of fingerprint, their extensive use in forensics and with need of automatic pers... more The long history of fingerprint, their extensive use in forensics and with need of automatic personal identification in recent years, fingerprints is receiving a lot of attention. There is misconception that fingerprint identification is a fully solved problem. However numerous fingerprint systems currently available which use minutiae based approach still do not meet performance requirement of several civilian applications. Performance of these systems degrades with deterioration in the quality of fingerprint image. In absence of an a priori enhancement step most of the binarization based techniques do not provide satisfactory results when applied to low quality images. Thus trying to eliminate these shortcomings we present an improved approach for fingerprint recognition providing accurate automatic personal identification. In this approach we use optical sensor which captures image of excellent quality with large capture area and superior reliability. The recognition algorithm fi...

Research paper thumbnail of An Approach of Combining Iris and Fingerprint Biometric At Image Level in Multimodal Biometrics System 103

102 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Abstract—Bi... more 102 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Abstract—Biometric systems depending on single source of information has many limitations. These are noisy input data, inability to enroll, unacceptable error rates, universality of traits and spoofing. Multimodal biometric system overcomes these limitations by combining information from multiple sensors. In Image fusion usually images are extracted from single trait using different sensors. This type of fusion is generally used when feature set are homogenous. In this paper a multibiometric system using image level fusion of two most used biometric traits, fingerprint and iris is proposed. The feature set obtained from iris and fingerprint images are incompatible, non-homogenous and relationship between them is not known. Here the pixel information is fused at image or feature level. A unique feature vector is constructed from the textural information of fused image of fingerprint and iris. Featur...

Research paper thumbnail of A Novel and Efficient Algorithm of Textural Feature Extraction for Fingerprint Identification

With the need of automatic personal identification and their extensive use in forensics, fingerpr... more With the need of automatic personal identification and their extensive use in forensics, fingerprints are receiving a lot of attention. However numerous fingerprint systems currently available still do not meet performance requirement of several civilian applications as they use traditional approach for fingerprint recognition. There is a major disadvantage of traditional approach, as they do not actually utilize the rich discriminatory information contained in fingerprint. Thus trying to eliminate this shortcoming we present an improved & efficient approach for fingerprint recognition providing accurate automatic personal identification. Here we extract the local ridge features of fingerprint image by a bank of 16 Gabor filters divided in squared blocks. The matching is based on Euclidian distance between Finger codes. Hence this approach make use of orientation and frequency of local ridge structure which is the rich discriminatory information in fingerprint, secondly square tessellation covers the entire image and Euclidian distance based matching of finger codes increases the speed of matching process.

Research paper thumbnail of Evolution of Novel Process for Smart Inverter for High Penetration of Rooftop Solar Energy in Power Utility With Secondary Distribution Network – A Review

Engineering World

With the critical change of Rooftop Solar Photovoltaic Energy System (RSPES) between the two diff... more With the critical change of Rooftop Solar Photovoltaic Energy System (RSPES) between the two different Renewable Energy Systems, the real problems, impacts and a few working qualities of the housetop sunlight based PVs with Low Power Utility Network Distribution System (DS) are currently to be examined and explored throught out the worldwide. The most vital target of review looks into about the load flow in LV Networks and searches a way for implementing high penetration PV network. The study papers discuss the implementation of the Smart Inverter-coordinated secondary distribution system with the proximity of distribution generation (DG) units. This paper reviews based on the methods which are utilized to tackle the issues and improvement of performance in the rooftop solar photovoltaic energy system in the period between 2014 to 2017.

Research paper thumbnail of Investigation of Effects of Solar Photovoltaic Penetration in an IEEE 13-bus Radial Low-Voltage Distribution Feeder System

2022 19th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)

Research paper thumbnail of A survey on energy efficient routing protocol for MANET

2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), 2016

Mobile Ad hoc network (MANET) is a set of two or more nodes that is used for wireless communicati... more Mobile Ad hoc network (MANET) is a set of two or more nodes that is used for wireless communication and networking capacity. These nodes are formed by the wireless hosts, without using pre-installed infrastructure and do not use centralized administration. Routing protocol define a set of rules which regulates the flow of data packets from source to destination. Distinctive features of MANET makes the routing process complex, therefore the routing protocol is very significant for determining the network performance and its networking capacity. Important issue is Energy consumption as mobile nodes in Ad hoc use battery power for operation. In this paper comparison between performance of Ad hoc On Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) is done. We have also analyzed the routing protocol AODV as well as DSR using NS-2 simulator, the obtained results show that DSR consume 40% less energy as compared to AODV.

Research paper thumbnail of Robust Invisible Watermarking for Image Authentication

Lecture Notes in Electrical Engineering, 2016

This paper proposes implementation of digital image watermarking using 3-level discrete wavelet t... more This paper proposes implementation of digital image watermarking using 3-level discrete wavelet transform. In this experimentation, digital image watermarking algorithm uses discrete wavelet transform (DWT) for decomposing cover image and watermark image. A defined algorithm does not change any information of the cover image. Information obtained from low frequency DWT coefficient of cover image and the watermark image is being used in order to get watermark embedding. Watermark extraction has been simply done by wavelet decomposition of watermarked image and cover image.

Research paper thumbnail of Development of Event Reporting (E-53) Standard in Generic Equipment Model Layer for Semi Automation Tool

Semiconductor Equipment and Materials International (SEMI) Standards [8] are written documents in... more Semiconductor Equipment and Materials International (SEMI) Standards [8] are written documents in the form of specifications, guides, test methods, terminology, practices etc. They are voluntary technical agreements between suppliers and customers, aimed at improving product quality and reliability at a reasonable price and steady supply. SEMI is the proprietary communication mechanism for communication between two Semiconductor Processing Equipments. Currently EuPhore Test Application tool is in the developing stage for testing the SEMI Library (Dynamic Link Library) and its compliance. The replacement of the processing equipment in the semiconductor Fabrication unit requires changes in the software but as this testing tool is compatible to SEMI standards, there is no overhead of changes in the host software. EuPhore testing tool takes care of the compatibility between the host and equipment. The complete communication protocol consists of four layers namely SECS-1/HSMS layer, SECS...

Research paper thumbnail of Rectangular Shaped Patch Antenna Design for WLAN (2.4 GHz)

This paper include the review of design of patch Antenna. We have already analysed patch antenn... more This paper include the review of design of patch Antenna. We have already analysed patch antennas with different variations of patch length, width, variations in dimensions of feed line and variations in dimensions of substrate. The proposed review of design of patch Antenna includes the required impedance bandwidth variation necessary for 2.4 GHz for WLAN application. Microstrip Antenna which are simulated using Ansoft HFSS and the results such as Return loss, VSWR etc. are calculated for better bandwidth.

Research paper thumbnail of DWT based robust invisible watermarking

This book is intended for researchers who are working on digital image watermarking. The book con... more This book is intended for researchers who are working on digital image watermarking. The book contents are designed in such a way that the reader can easily understand watermarking process. This includes students and professionals in the field of data processing and data communication, designers and implementers and data communication and networking customers and managers. This book will help the readers to implement the image watermarking by applying various attacks. This book is designed to be self–contained for reader with little or more background of watermarking algorithms. The objective of this book is to provide a comprehensive technical survey of watermarking algorithm and its implementation using DWT.

Research paper thumbnail of Haar Wavelet Approach of Iris Texture Extraction for Personal Recognition

Iris recognition is one of the fast, accurate, reliable and secure biometric techniques for human... more Iris recognition is one of the fast, accurate, reliable and secure biometric techniques for human identification. As the iris texture pattern is very unique and has no links with the genetic structure of an individual it is used as feature in iris recognition system. Poor quality images, high failure to accept rates (FTE) and high false reject rates (FRR) undermines the performance of iris recognition systems. The selection of subset of feature, its extraction and classification is a crucial step in this system. In this paper a method for iris recognition based on Haar wavelet approach of Iris texture extraction is proposed. Iris recognition system consists of iris localization, normalization, features extraction and matching modules. The feature extraction algorithm extracts haar wavelet packet energies of the normalized iris image (local features) to generate a unique code by quantizing these energies into one bit according to an adapted threshold. Hamming distance measure is used...

Research paper thumbnail of ZigBee topology: A survey

2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2016

Wireless technology having great application in office, home and business automation and it is a ... more Wireless technology having great application in office, home and business automation and it is a prominent field of research. ZigBee is built on the top of IEEE 802.15.4 standard for communication in wireless personal area network (WPAN). ZigBee is having feature of low cost of implementation, ease of access, low data over IEEE 802.15.4 standard and other traditional wireless network. ZigBee is mess networking topology having advance features over IEEE 802.15.4 like more reliability and long coverage area. This paper presents ZigBee networking topology, its types, architecture and its application.

Research paper thumbnail of Wireless LAN Intrusion Detection and Prevention system for Malicious Access Point

2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), 2015

In current trends, A Malicious AP might be set in any open spaces so as to imitate honest to good... more In current trends, A Malicious AP might be set in any open spaces so as to imitate honest to goodness APs for adaptation. Existing malicious AP detection methods analyze wireless traffic by using extra devices, and the data of traffic is collected by servers. Malicious Access Points, if undetected, can take important data from the network. So many attackers took advantages of the undetected Malicious Access Points in ventures to not just get free Internet. In this paper, we consider the problem of “malicious” attacks in wireless local area networks (WLANs). A Malicious is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID) and we consider an unprotected client, other networks client to avoid wireless unauthorized clients.

Research paper thumbnail of Detection of Rogue Access Point Using Various Parameters

The wireless local area network (WLAN) communication is a rapidly growing approach for data shari... more The wireless local area network (WLAN) communication is a rapidly growing approach for data sharing. A wireless network provides network access to mobile devices. Benefits of WLAN are like flexibility, mobility, portability, imposes performance, and security requirements. Such communication brings new network security threats. Physical security of wireless networks is impossible because wireless network signals are unidirectional and can proceed out of intended coverage area. Intruder with an apt wireless receiver can snoop into the network still remaining virtually undetected. In a WLAN, the most important security apprehension is the presence of rogue access point (RAP). These RAPs can be definitely used by persons with inadequate security knowledge. Most of the security threats require an advanced technical knowledge or expensive intrusion devices. A RAP is a wireless AP, which is installed in a secure wireless network without network administrator permission. Such RAP allows int...

Research paper thumbnail of Watermarking and Cryptography Based Image Authentication on Reconfigurable Platform

Bulletin of Electrical Engineering and Informatics, 2017

Now-a-days, multimedia based applications have been developed rapidly. Digital information is eas... more Now-a-days, multimedia based applications have been developed rapidly. Digital information is easy to process but it allows illegal users to access the data. For protecting the data from this illegal use, Digital Rights Management (DRM) can be used. DRM allows secure exchange of digital data over internet or other electronic media. In this paper, FPGA based implementation of DWT alongwith Advanced Encryption Standard (AES) based watermarking is discussed. With this approach, improved security can be achieved. The complete system is designed using HDL and simulated using Questasim and MATLAB Simulink model. The synthesis result shows that this implementation occupies only 2117 slices and maximum frequency reported for this design is 228.064 MHz.

Research paper thumbnail of Augmenting rooftop solar energy penetration ratio with secondary distribution network using smart inverter for maximum power transfer capacity for subordinate grid- A review

Energy Sources, Part A: Recovery, Utilization, and Environmental Effects, 2018

A rooftop photovoltaic power station, or rooftop PV system, is a photovoltaic system that has its... more A rooftop photovoltaic power station, or rooftop PV system, is a photovoltaic system that has its electricity-generating solar panels mounted on the rooftop of a residential or commercial building or structure. The various components of such a system include photovoltaic modules, mounting systems, cables, solar inverters, and other electrical accessories. Rooftop mounted systems are small compared to ground-mounted photovoltaic power stations with capacities in the MW (megawatt) range. With the significant improvement of Rooftop Solar Photovoltaic Energy System (RSPES) among various Renewable Energy Systems, the major issues, effects, and several operational characteristics of the rooftop solar PVs in the Distribution System (DS) with Low Power Utility Network are actively being studied and investigated by global researchers and operation engineers. The most important objective of various researches about RSPES is to design a Power System with Optimal Maximum Power Transfer Capacity (MPTC). These review papers analyze the performance of Secondary Distribution System integrated to grid with Smart Inverter with or without the presence of Distribution Generation (DG) units. The effects caused by the penetration of Rooftop Solar Photovoltaic (PV) units in the Distribution Equipment (DE) are detailed in this paper with various research techniques. With the consideration of different objective constraints, Optimization techniques are utilized for solving minimization problems of objectives such as Size, Area, Operational Characteristics, Energy Loss, Cost of Installation, Generation Cost, Peak Load, Reverse Power Flow, and maximization problems of objectives such as PV power generation, Energy Saving Capability, Electricity Energy Mix, etc.. The various optimization techniques and frameworks for improving the performance of Power System and their corresponding results are demonstrated in this paper. This paper reviews totally 42 related researches done on the different phases of Optimization based Rooftop Solar PV system in the period between 2015 and 2017. This review summarizes the evaluation of the i) Solar rooftop energy with effects of increase in penetration; ii) The performance of efficient secondary distribution system with grid integrated smart inverter; iii) Algorithms based on optimization for solving the objectives in rooftop solar PV system are investigated.

Research paper thumbnail of Image Processing Based Toll Automation Technique Using ANPR

HELIX, 2019

For heavy traffic highway roads, particularly in India delay at the toll booths is common scenari... more For heavy traffic highway roads, particularly in India delay at the toll booths is common scenario. There is a need of an intelligent system that will recognize the vehicle number plate which reduces the amount of time and efforts. Proposed system of toll automation technique using ANPR is designed to ensure a steady flow of traffic. Automatic Number Plate Recognition (ANPR) algorithm based system proposes a methodology in which every vehicle owner will yearly deposit the toll tax in government account if these vehicles are passing through the toll gates equipped with digital camera capturing image of vehicle number plate. Captured images then get processed with Proposed ANPR algorithm. The ANPR algorithm works on steps like extraction of numbers preprocessing via filtering, segmentation and character recognition. Central database is used to store the user's vehicle information. If user is registered account holder, then toll gate will opened and vehicle is passed from toll plaza. The user will be informed about the toll deduction and his account status through the SMS. The performance of algorithm is checked on real images with parameters like success rate, illumination conditions, and tilted position of number plates. Further this system can be utilized for investigation of stolen vehicles.

Research paper thumbnail of Wireless Lan Intrusion Detection by Using Statistical Timing Approach

International Journal of Research in Engineering and Technology, 2014

Today as we all are habitual of using internet through wired or wireless LAN Networks, but using ... more Today as we all are habitual of using internet through wired or wireless LAN Networks, but using internet through Wireless LAN becomes harder as the threat of unauthorized access point is increasing day by day. In This paper we are focusing on different types of rogue access points (APs) that are masquerading and attracting people to get associate with them or to connect with them. We are implementing a solution to avoid people or users from connecting to the unauthorized access point by using experimental time dependent scheme. Our detection technique is a client-oriented method that uses the complete tour time between the DNS server and user that perfectly determine that whether an access point with which the user has connected is the legitimate access point or a unauthorized access point. In this paper we are implementing concept using .Net framework and sql server, Which gives us the characteristics like robust, accuracy and effectiveness for detecting rogue or unauthorized access point without getting any help from WLAN administrator. In this simulation technique we will get accurate values so that we can distinguish between rogue access point and legitimate access point

Research paper thumbnail of Linear Vector Quantization for the Diagnosis of Ground Bud Necrosis Virus in Tomato

International Journal of Electrical and Electronics Research

In this varying environment, a correct and appropriate disease diagnosis including early preclusi... more In this varying environment, a correct and appropriate disease diagnosis including early preclusion has never been more significant. Our study on disease identification of groundnut originated by Groundnut Bud Necrosis Virus will cover the way to the effective use of image processing approach in agriculture. The difficulty of capable plant disease protection is very much linked to the problems of sustainable agriculture and climate change. Due to the fast advancement of Artificial Intelligence, the work in this paper is primarily focused on applying Pattern Recognition based techniques. The purpose is to determine the grade of disease to control by developing a model for the selection of bud blight disease caused by GBNV in tomatoes. The images are classified according to the grade of the disease. Different methods have been applied to make a proper diagnosis by bringing clarity in the diagnostic results. Linear Vector Quantization works well than, Radial Basis Function, Back Propag...

Research paper thumbnail of Feed Forward Neural Network based Brain Tumor Diagnosis in Magnetic Resonance Images

International Journal of Electrical and Electronics Research

In the realm of medicine, value, resource use and final care are determined by good technological... more In the realm of medicine, value, resource use and final care are determined by good technological advancement. However, there are crucial components that must be present for a disease to be diagnosed. The monitoring of illness progression traditionally relies primarily on a subjective human judgment and is neither precise nor timely. One important aspect that utilizes data at various disease progression phases is to maintain routine disease surveillance. The Feed Forward Neural Network based Brain Tumor Diagnosis in Magnetic Resonance Images is provided in this paper as an automatic brain cancer diagnosis and grade classification method. It is highly helpful to have accurate information about the disease in order to classify it and make decisions. The suggested brain tumor diagnosis system can diagnose the condition and provide a reliable foundation for appropriate regulation, as opposed to manual approaches. Finally, the evaluated outcomes of the suggested model investigate numerou...

Research paper thumbnail of An Improved binarization based algorithm using minutiae approach for Fingerprint Identification

The long history of fingerprint, their extensive use in forensics and with need of automatic pers... more The long history of fingerprint, their extensive use in forensics and with need of automatic personal identification in recent years, fingerprints is receiving a lot of attention. There is misconception that fingerprint identification is a fully solved problem. However numerous fingerprint systems currently available which use minutiae based approach still do not meet performance requirement of several civilian applications. Performance of these systems degrades with deterioration in the quality of fingerprint image. In absence of an a priori enhancement step most of the binarization based techniques do not provide satisfactory results when applied to low quality images. Thus trying to eliminate these shortcomings we present an improved approach for fingerprint recognition providing accurate automatic personal identification. In this approach we use optical sensor which captures image of excellent quality with large capture area and superior reliability. The recognition algorithm fi...

Research paper thumbnail of An Approach of Combining Iris and Fingerprint Biometric At Image Level in Multimodal Biometrics System 103

102 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Abstract—Bi... more 102 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Abstract—Biometric systems depending on single source of information has many limitations. These are noisy input data, inability to enroll, unacceptable error rates, universality of traits and spoofing. Multimodal biometric system overcomes these limitations by combining information from multiple sensors. In Image fusion usually images are extracted from single trait using different sensors. This type of fusion is generally used when feature set are homogenous. In this paper a multibiometric system using image level fusion of two most used biometric traits, fingerprint and iris is proposed. The feature set obtained from iris and fingerprint images are incompatible, non-homogenous and relationship between them is not known. Here the pixel information is fused at image or feature level. A unique feature vector is constructed from the textural information of fused image of fingerprint and iris. Featur...

Research paper thumbnail of A Novel and Efficient Algorithm of Textural Feature Extraction for Fingerprint Identification

With the need of automatic personal identification and their extensive use in forensics, fingerpr... more With the need of automatic personal identification and their extensive use in forensics, fingerprints are receiving a lot of attention. However numerous fingerprint systems currently available still do not meet performance requirement of several civilian applications as they use traditional approach for fingerprint recognition. There is a major disadvantage of traditional approach, as they do not actually utilize the rich discriminatory information contained in fingerprint. Thus trying to eliminate this shortcoming we present an improved & efficient approach for fingerprint recognition providing accurate automatic personal identification. Here we extract the local ridge features of fingerprint image by a bank of 16 Gabor filters divided in squared blocks. The matching is based on Euclidian distance between Finger codes. Hence this approach make use of orientation and frequency of local ridge structure which is the rich discriminatory information in fingerprint, secondly square tessellation covers the entire image and Euclidian distance based matching of finger codes increases the speed of matching process.

Research paper thumbnail of Evolution of Novel Process for Smart Inverter for High Penetration of Rooftop Solar Energy in Power Utility With Secondary Distribution Network – A Review

Engineering World

With the critical change of Rooftop Solar Photovoltaic Energy System (RSPES) between the two diff... more With the critical change of Rooftop Solar Photovoltaic Energy System (RSPES) between the two different Renewable Energy Systems, the real problems, impacts and a few working qualities of the housetop sunlight based PVs with Low Power Utility Network Distribution System (DS) are currently to be examined and explored throught out the worldwide. The most vital target of review looks into about the load flow in LV Networks and searches a way for implementing high penetration PV network. The study papers discuss the implementation of the Smart Inverter-coordinated secondary distribution system with the proximity of distribution generation (DG) units. This paper reviews based on the methods which are utilized to tackle the issues and improvement of performance in the rooftop solar photovoltaic energy system in the period between 2014 to 2017.

Research paper thumbnail of Investigation of Effects of Solar Photovoltaic Penetration in an IEEE 13-bus Radial Low-Voltage Distribution Feeder System

2022 19th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)

Research paper thumbnail of A survey on energy efficient routing protocol for MANET

2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), 2016

Mobile Ad hoc network (MANET) is a set of two or more nodes that is used for wireless communicati... more Mobile Ad hoc network (MANET) is a set of two or more nodes that is used for wireless communication and networking capacity. These nodes are formed by the wireless hosts, without using pre-installed infrastructure and do not use centralized administration. Routing protocol define a set of rules which regulates the flow of data packets from source to destination. Distinctive features of MANET makes the routing process complex, therefore the routing protocol is very significant for determining the network performance and its networking capacity. Important issue is Energy consumption as mobile nodes in Ad hoc use battery power for operation. In this paper comparison between performance of Ad hoc On Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) is done. We have also analyzed the routing protocol AODV as well as DSR using NS-2 simulator, the obtained results show that DSR consume 40% less energy as compared to AODV.

Research paper thumbnail of Robust Invisible Watermarking for Image Authentication

Lecture Notes in Electrical Engineering, 2016

This paper proposes implementation of digital image watermarking using 3-level discrete wavelet t... more This paper proposes implementation of digital image watermarking using 3-level discrete wavelet transform. In this experimentation, digital image watermarking algorithm uses discrete wavelet transform (DWT) for decomposing cover image and watermark image. A defined algorithm does not change any information of the cover image. Information obtained from low frequency DWT coefficient of cover image and the watermark image is being used in order to get watermark embedding. Watermark extraction has been simply done by wavelet decomposition of watermarked image and cover image.

Research paper thumbnail of Development of Event Reporting (E-53) Standard in Generic Equipment Model Layer for Semi Automation Tool

Semiconductor Equipment and Materials International (SEMI) Standards [8] are written documents in... more Semiconductor Equipment and Materials International (SEMI) Standards [8] are written documents in the form of specifications, guides, test methods, terminology, practices etc. They are voluntary technical agreements between suppliers and customers, aimed at improving product quality and reliability at a reasonable price and steady supply. SEMI is the proprietary communication mechanism for communication between two Semiconductor Processing Equipments. Currently EuPhore Test Application tool is in the developing stage for testing the SEMI Library (Dynamic Link Library) and its compliance. The replacement of the processing equipment in the semiconductor Fabrication unit requires changes in the software but as this testing tool is compatible to SEMI standards, there is no overhead of changes in the host software. EuPhore testing tool takes care of the compatibility between the host and equipment. The complete communication protocol consists of four layers namely SECS-1/HSMS layer, SECS...

Research paper thumbnail of Rectangular Shaped Patch Antenna Design for WLAN (2.4 GHz)

This paper include the review of design of patch Antenna. We have already analysed patch antenn... more This paper include the review of design of patch Antenna. We have already analysed patch antennas with different variations of patch length, width, variations in dimensions of feed line and variations in dimensions of substrate. The proposed review of design of patch Antenna includes the required impedance bandwidth variation necessary for 2.4 GHz for WLAN application. Microstrip Antenna which are simulated using Ansoft HFSS and the results such as Return loss, VSWR etc. are calculated for better bandwidth.

Research paper thumbnail of DWT based robust invisible watermarking

This book is intended for researchers who are working on digital image watermarking. The book con... more This book is intended for researchers who are working on digital image watermarking. The book contents are designed in such a way that the reader can easily understand watermarking process. This includes students and professionals in the field of data processing and data communication, designers and implementers and data communication and networking customers and managers. This book will help the readers to implement the image watermarking by applying various attacks. This book is designed to be self–contained for reader with little or more background of watermarking algorithms. The objective of this book is to provide a comprehensive technical survey of watermarking algorithm and its implementation using DWT.

Research paper thumbnail of Haar Wavelet Approach of Iris Texture Extraction for Personal Recognition

Iris recognition is one of the fast, accurate, reliable and secure biometric techniques for human... more Iris recognition is one of the fast, accurate, reliable and secure biometric techniques for human identification. As the iris texture pattern is very unique and has no links with the genetic structure of an individual it is used as feature in iris recognition system. Poor quality images, high failure to accept rates (FTE) and high false reject rates (FRR) undermines the performance of iris recognition systems. The selection of subset of feature, its extraction and classification is a crucial step in this system. In this paper a method for iris recognition based on Haar wavelet approach of Iris texture extraction is proposed. Iris recognition system consists of iris localization, normalization, features extraction and matching modules. The feature extraction algorithm extracts haar wavelet packet energies of the normalized iris image (local features) to generate a unique code by quantizing these energies into one bit according to an adapted threshold. Hamming distance measure is used...

Research paper thumbnail of ZigBee topology: A survey

2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2016

Wireless technology having great application in office, home and business automation and it is a ... more Wireless technology having great application in office, home and business automation and it is a prominent field of research. ZigBee is built on the top of IEEE 802.15.4 standard for communication in wireless personal area network (WPAN). ZigBee is having feature of low cost of implementation, ease of access, low data over IEEE 802.15.4 standard and other traditional wireless network. ZigBee is mess networking topology having advance features over IEEE 802.15.4 like more reliability and long coverage area. This paper presents ZigBee networking topology, its types, architecture and its application.

Research paper thumbnail of Wireless LAN Intrusion Detection and Prevention system for Malicious Access Point

2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), 2015

In current trends, A Malicious AP might be set in any open spaces so as to imitate honest to good... more In current trends, A Malicious AP might be set in any open spaces so as to imitate honest to goodness APs for adaptation. Existing malicious AP detection methods analyze wireless traffic by using extra devices, and the data of traffic is collected by servers. Malicious Access Points, if undetected, can take important data from the network. So many attackers took advantages of the undetected Malicious Access Points in ventures to not just get free Internet. In this paper, we consider the problem of “malicious” attacks in wireless local area networks (WLANs). A Malicious is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID) and we consider an unprotected client, other networks client to avoid wireless unauthorized clients.

Research paper thumbnail of Detection of Rogue Access Point Using Various Parameters

The wireless local area network (WLAN) communication is a rapidly growing approach for data shari... more The wireless local area network (WLAN) communication is a rapidly growing approach for data sharing. A wireless network provides network access to mobile devices. Benefits of WLAN are like flexibility, mobility, portability, imposes performance, and security requirements. Such communication brings new network security threats. Physical security of wireless networks is impossible because wireless network signals are unidirectional and can proceed out of intended coverage area. Intruder with an apt wireless receiver can snoop into the network still remaining virtually undetected. In a WLAN, the most important security apprehension is the presence of rogue access point (RAP). These RAPs can be definitely used by persons with inadequate security knowledge. Most of the security threats require an advanced technical knowledge or expensive intrusion devices. A RAP is a wireless AP, which is installed in a secure wireless network without network administrator permission. Such RAP allows int...

Research paper thumbnail of Watermarking and Cryptography Based Image Authentication on Reconfigurable Platform

Bulletin of Electrical Engineering and Informatics, 2017

Now-a-days, multimedia based applications have been developed rapidly. Digital information is eas... more Now-a-days, multimedia based applications have been developed rapidly. Digital information is easy to process but it allows illegal users to access the data. For protecting the data from this illegal use, Digital Rights Management (DRM) can be used. DRM allows secure exchange of digital data over internet or other electronic media. In this paper, FPGA based implementation of DWT alongwith Advanced Encryption Standard (AES) based watermarking is discussed. With this approach, improved security can be achieved. The complete system is designed using HDL and simulated using Questasim and MATLAB Simulink model. The synthesis result shows that this implementation occupies only 2117 slices and maximum frequency reported for this design is 228.064 MHz.

Research paper thumbnail of Augmenting rooftop solar energy penetration ratio with secondary distribution network using smart inverter for maximum power transfer capacity for subordinate grid- A review

Energy Sources, Part A: Recovery, Utilization, and Environmental Effects, 2018

A rooftop photovoltaic power station, or rooftop PV system, is a photovoltaic system that has its... more A rooftop photovoltaic power station, or rooftop PV system, is a photovoltaic system that has its electricity-generating solar panels mounted on the rooftop of a residential or commercial building or structure. The various components of such a system include photovoltaic modules, mounting systems, cables, solar inverters, and other electrical accessories. Rooftop mounted systems are small compared to ground-mounted photovoltaic power stations with capacities in the MW (megawatt) range. With the significant improvement of Rooftop Solar Photovoltaic Energy System (RSPES) among various Renewable Energy Systems, the major issues, effects, and several operational characteristics of the rooftop solar PVs in the Distribution System (DS) with Low Power Utility Network are actively being studied and investigated by global researchers and operation engineers. The most important objective of various researches about RSPES is to design a Power System with Optimal Maximum Power Transfer Capacity (MPTC). These review papers analyze the performance of Secondary Distribution System integrated to grid with Smart Inverter with or without the presence of Distribution Generation (DG) units. The effects caused by the penetration of Rooftop Solar Photovoltaic (PV) units in the Distribution Equipment (DE) are detailed in this paper with various research techniques. With the consideration of different objective constraints, Optimization techniques are utilized for solving minimization problems of objectives such as Size, Area, Operational Characteristics, Energy Loss, Cost of Installation, Generation Cost, Peak Load, Reverse Power Flow, and maximization problems of objectives such as PV power generation, Energy Saving Capability, Electricity Energy Mix, etc.. The various optimization techniques and frameworks for improving the performance of Power System and their corresponding results are demonstrated in this paper. This paper reviews totally 42 related researches done on the different phases of Optimization based Rooftop Solar PV system in the period between 2015 and 2017. This review summarizes the evaluation of the i) Solar rooftop energy with effects of increase in penetration; ii) The performance of efficient secondary distribution system with grid integrated smart inverter; iii) Algorithms based on optimization for solving the objectives in rooftop solar PV system are investigated.

Research paper thumbnail of Image Processing Based Toll Automation Technique Using ANPR

HELIX, 2019

For heavy traffic highway roads, particularly in India delay at the toll booths is common scenari... more For heavy traffic highway roads, particularly in India delay at the toll booths is common scenario. There is a need of an intelligent system that will recognize the vehicle number plate which reduces the amount of time and efforts. Proposed system of toll automation technique using ANPR is designed to ensure a steady flow of traffic. Automatic Number Plate Recognition (ANPR) algorithm based system proposes a methodology in which every vehicle owner will yearly deposit the toll tax in government account if these vehicles are passing through the toll gates equipped with digital camera capturing image of vehicle number plate. Captured images then get processed with Proposed ANPR algorithm. The ANPR algorithm works on steps like extraction of numbers preprocessing via filtering, segmentation and character recognition. Central database is used to store the user's vehicle information. If user is registered account holder, then toll gate will opened and vehicle is passed from toll plaza. The user will be informed about the toll deduction and his account status through the SMS. The performance of algorithm is checked on real images with parameters like success rate, illumination conditions, and tilted position of number plates. Further this system can be utilized for investigation of stolen vehicles.