Dr Krupa Rasane | Jain college of engineering belgaum (original) (raw)
Papers by Dr Krupa Rasane
Lecture notes in electrical engineering, 2022
Zenodo (CERN European Organization for Nuclear Research), Dec 24, 2022
In recent years, the usage of unmanned aerial vehicles (UAVs) for military and civilian missions ... more In recent years, the usage of unmanned aerial vehicles (UAVs) for military and civilian missions such intelligence collection, surveillance, reconnaissance, Suppression of Enemy Air Defenses (SEAD), search and rescue, and goods delivery has increased. A common and long-term topic among such missions is the development of an intelligent system that enables UAVs to conduct tasks autonomously without human intervention. [2]. Unmanned aerial vehicle (UAV) networks are one of the technologies that are frequently brought up during discussions of smart city scenarios [3]. Data gathering from sensor nodes in urban scenarios is highly convenient due to the extensive deployment of communication base cable networks, stations and so on. A sensor node can send data through a base station and to a data center in IoT applications. An unmanned aerial vehicle (UAV) is one of the most logical solutions for collecting data in areas that are difficult to access, such as deserts and oceans.
Indian Journal of Computer Science and Engineering
Indian Journal of Computer Science and Engineering
The emerging area for researchers in the field of power concern embedded system is wireless senso... more The emerging area for researchers in the field of power concern embedded system is wireless sensor network (WSN) to develop a platform capable of analyzing and controlling the power behavior of low power embedded system and achieve high performance in terms of battery life. In recent days, the embedded systems use ultra-low powered hardware components at the node level, yet there is a need to analyze the consumption of power in sensor node and performance of the complete network. This motivates us to provide a power analyzer unit on the wireless sensor node based on stochastic process that can be used to monitor, analyze and control the node energy by switching to low power down modes or turn off other peripherals and improve the lifetime of a node. The mathematical model for power consumption and lifetime is developed to observe the effect of proposed system using stochastic approach. This paper presents simulation results that are evident to improve the battery lifetime of a node ...
This paper presents an overview of two automotive networked communications protocols LIN (Local I... more This paper presents an overview of two automotive networked communications protocols LIN (Local Interconnect Network) and FLEXRAY developed by the FlexRay Consortium and are used to govern on-board automotive computing and communication between the ECUs (Electronic Control Units) and various other components of a car. In today’s highly automated world, with millions of cars crowding the streets and innumerable people asking for automatic features, in-vehicle communication and vehicle to vehicle communication have become a part for the modern evolution of the automotive industry. LIN and CAN protocols have already made their mark on the automotive industry. FLEXRAY however is yet to be fully exploited. As of today, FLEXRAY protocol has been accepted as the future of the automotive industry because of its advantages in performance and flexibility of design as compared to the other protocols. This paper peeks into the two protocols LIN and FLEXRAY and compares them with the CAN (Contro...
Image compression plays a vital role in many important and diverse applications, including video ... more Image compression plays a vital role in many important and diverse applications, including video conferencing, remote sensing etc. To achieve the image compression, DWT is being used for decomposition and the decomposed subband is quantized and encoded. In most of the earlier work compression is obtained using multi-resolution DWT, quantization and encoding. It is observed that hardware implementation enhances speed and can be built as an Application Specific Integrated Circuits (ASIC) for many real time applications. This project performs image compression using DWT for multi-resolution decomposition. Further, in our work the lower frequency sub-band is quantized using DPCM and encoded.
Requantization of pre-compressed multimedia is a popular method for reducing the bit rate of a pr... more Requantization of pre-compressed multimedia is a popular method for reducing the bit rate of a previously compressed data. The need for bit-rate reduction of the data stream, known as transcoding, requires adjustment of the transmission of bit-rate according to the bandwidth of the available channels. This introduces distortion of the reconstructed data. For real time applications the transcoding should be of low computational complexity, while ensuring low distortion. This paper introduces a fast algorithm which aims at reducing both distortion and enhances the speed of constructing the requantized codebook. The requantized codebook can be directly used for transcoding or could be used as an initial codebook instead of a blind or random initial codebook during the codebook reconstruction in an iterative method. Simulation results shows that the proposed codebook when used as an initial codebook requires less number of iterations, reduces distortion and minimizes the local optimizat...
Deep learning has detonated in the public responsiveness, primarily as predictive and analytical ... more Deep learning has detonated in the public responsiveness, primarily as predictive and analytical products pervade our world, in the form of innumerable humancentered smart-world systems, including targeted advertisements, natural language assistants and interpreters, and mock-up self-driving vehicle systems. In contrast, researchers across disciplines have been including into their research to solve various natural language processing issues. In this paper we seek to provide a thorough exploration of Deep learning and its applications like sentimental analysis and natural language processing (NLP). Deep learning has an edge over the traditional machine learning algorithms, like support vector machine (SVM) and Naïve Bayes, for sentiment analysis because of its potential to overcome the challenges faced by sentiment analysis and handle the diversities involved, without the expensive demand for manual feature engineering. Deep learning models promise one thing given sufficient amount ...
The unmanned aerial vehicles or drones are gaining popularity because of increased demand for les... more The unmanned aerial vehicles or drones are gaining popularity because of increased demand for less human intervention in the automotive sector. Customer driven markets are encouraging the unmanned vehicles oriented industries toinnovate towards the average user level. Despite the improvements in the parameters like cost, user friendliness and technological capabilities people hesitate to work with the unmanned vehicle technology and the major reason for this would be the vehicles behavior in the known and unknown environments, the unavoidable obstacles on the path of travel or the doubt on risk factor associated with the collision avoidance system. So this paper presents the various techniques used in the smooth navigation and collision/obstacle avoidance system over past years.
In this paper, the current consumption of microcontroller with varying frequency and voltage has ... more In this paper, the current consumption of microcontroller with varying frequency and voltage has been experimented in an attempt to understand the power consumption of microcontroller. The power consumption of microcontroller, when connected to an active load, is investigated. The microcontroller is experimented in sleep mode and analyzed the current consumption in its deepest sleep mode and active mode. Among the various wake-up sources, we have used an external input pin and watchdog timer method for the experimental setup. Using the obtained values the battery life is estimated.
Present wireless communication offers flexibility and mobility across cellular system. The modern... more Present wireless communication offers flexibility and mobility across cellular system. The modern cellular systems deploy smaller cells to accommodate large number of users. Due to smaller cell size area, probability of Mobile Station (MS) crossing the cell boundary increases. Thus to provide seamless connection across the cell boundary, a process called handoff has to occur i.e. when MS moves from one Base Station (BS) to another, the ongoing calls are transferred to another BS which gives best connectivity to the MS. This paper consists of a Fuzzy logic based Handoff Decision (FHD) approach to predict the correct and efficient handoff decision, thus preventing unnecessary handoffs and therefore ensure the Quality of Service (QoS). The Matlab tool is used for designing the Fuzzy Inference System (FIS) to process the handoff decision metrics and the proposed FHD is implemented on FPGA. A hardware implementation provides faster handoffs decision making compared to a software approach. Also, FPGA implementation offers flexibility, and reduced design time, this device is chosen to implement the Fuzzy Logic Controller (FLC) for handoff decision.
For the resource constrained devices such as Radio Frequency Identification (RFID) tags, smart ca... more For the resource constrained devices such as Radio Frequency Identification (RFID) tags, smart cards and wireless sensor networks, novel ultra lightweight Hummingbird cryptographic algorithm is presented. In this paper an attempt has been made to improve the architectural area as compared to previous hardware implementation on low cost Field Programmable Gate Array (FPGA) devices. Hummingbird provides design security with small block size and it is resistant to the most common attacks. Our results are compared with FPGA implementations of the various cryptographic algorithms. The results show that the work presented in this report gives optimization with respect to area utilization and hence cost effective in comparison to the referred papers. This paper is the reimplementation of the concept described in[1] with optimized programming in VHDL. Index Terms — RFID, Cryptography, Hummingbird, Encryption, Decryption.
Lecture Notes in Networks and Systems
The pomegranate fruit has gained popularity due to its nutritional values and pharmacological pro... more The pomegranate fruit has gained popularity due to its nutritional values and pharmacological properties. India ranks high among growers of pomegranates across the world and hence there is tremendous potential for its export. Here in our work the Bhagwa, a prime Indian pomegranate cultivar was studied. Total soluble solids (TSS) were measured experimentally. Internal images of the fruit were obtained nondestructively using Magnetic Resonance Imaging (MRI). The textural features from image were given as input to the nonlinear autoregressive neural network. The results showed that T1-weighted MR images were sensitive to physical and chemical changes. The R-value for measured TSS and model-predicted TSS for training data was 0.99 and testing data was 0.92. This study shows that MRI has higher potential for nondestructive method of grading pomegranate fruit based on the chemical values which are the basis for determining the maturity of the fruit.
Communications in Computer and Information Science, 2011
In this paper a 4 codebook, Vector Quantization (VQ) core is implemented on FPGA (Field Programma... more In this paper a 4 codebook, Vector Quantization (VQ) core is implemented on FPGA (Field Programmable Gate Array). The proposed design has certain advantages over the earlier architecture in the form of design reuse of VQ core to build a large VQ system. The proposed core aims at increased compressing speed, modular design for design flexibility, easy reconfigurability. Modularity helps
Communications in Computer and Information Science, 2011
Voltage Control Oscillator (VCO) is an integral part of many electronic applications like PLL, cl... more Voltage Control Oscillator (VCO) is an integral part of many electronic applications like PLL, clock generation in microprocessors & carrier synthesis in cellular telephones etc. Such applications require different topologies which gives robust high performance. Consequently, VCO design in CMOS technology continues to pose interesting challenges. This paper presents the design of Voltage Control Ring Oscillator with the oscillation frequency
Procedia Engineering, 2011
2010 2nd International Conference on Electronic Computer Technology, 2010
This paper presents a review and improvement in the architecture of our earlier work presenting t... more This paper presents a review and improvement in the architecture of our earlier work presenting the `k Dimensional 4 codebook encoder'. A new VLSI LUT based “Mean Square distortion error” core is introduced in the VQ Encoder architecture. The paper focuses mainly on the modified technique utilized in our new VQ Encoder architecture which utilizes the repeatability and symmetric property
Lecture notes in electrical engineering, 2022
Zenodo (CERN European Organization for Nuclear Research), Dec 24, 2022
In recent years, the usage of unmanned aerial vehicles (UAVs) for military and civilian missions ... more In recent years, the usage of unmanned aerial vehicles (UAVs) for military and civilian missions such intelligence collection, surveillance, reconnaissance, Suppression of Enemy Air Defenses (SEAD), search and rescue, and goods delivery has increased. A common and long-term topic among such missions is the development of an intelligent system that enables UAVs to conduct tasks autonomously without human intervention. [2]. Unmanned aerial vehicle (UAV) networks are one of the technologies that are frequently brought up during discussions of smart city scenarios [3]. Data gathering from sensor nodes in urban scenarios is highly convenient due to the extensive deployment of communication base cable networks, stations and so on. A sensor node can send data through a base station and to a data center in IoT applications. An unmanned aerial vehicle (UAV) is one of the most logical solutions for collecting data in areas that are difficult to access, such as deserts and oceans.
Indian Journal of Computer Science and Engineering
Indian Journal of Computer Science and Engineering
The emerging area for researchers in the field of power concern embedded system is wireless senso... more The emerging area for researchers in the field of power concern embedded system is wireless sensor network (WSN) to develop a platform capable of analyzing and controlling the power behavior of low power embedded system and achieve high performance in terms of battery life. In recent days, the embedded systems use ultra-low powered hardware components at the node level, yet there is a need to analyze the consumption of power in sensor node and performance of the complete network. This motivates us to provide a power analyzer unit on the wireless sensor node based on stochastic process that can be used to monitor, analyze and control the node energy by switching to low power down modes or turn off other peripherals and improve the lifetime of a node. The mathematical model for power consumption and lifetime is developed to observe the effect of proposed system using stochastic approach. This paper presents simulation results that are evident to improve the battery lifetime of a node ...
This paper presents an overview of two automotive networked communications protocols LIN (Local I... more This paper presents an overview of two automotive networked communications protocols LIN (Local Interconnect Network) and FLEXRAY developed by the FlexRay Consortium and are used to govern on-board automotive computing and communication between the ECUs (Electronic Control Units) and various other components of a car. In today’s highly automated world, with millions of cars crowding the streets and innumerable people asking for automatic features, in-vehicle communication and vehicle to vehicle communication have become a part for the modern evolution of the automotive industry. LIN and CAN protocols have already made their mark on the automotive industry. FLEXRAY however is yet to be fully exploited. As of today, FLEXRAY protocol has been accepted as the future of the automotive industry because of its advantages in performance and flexibility of design as compared to the other protocols. This paper peeks into the two protocols LIN and FLEXRAY and compares them with the CAN (Contro...
Image compression plays a vital role in many important and diverse applications, including video ... more Image compression plays a vital role in many important and diverse applications, including video conferencing, remote sensing etc. To achieve the image compression, DWT is being used for decomposition and the decomposed subband is quantized and encoded. In most of the earlier work compression is obtained using multi-resolution DWT, quantization and encoding. It is observed that hardware implementation enhances speed and can be built as an Application Specific Integrated Circuits (ASIC) for many real time applications. This project performs image compression using DWT for multi-resolution decomposition. Further, in our work the lower frequency sub-band is quantized using DPCM and encoded.
Requantization of pre-compressed multimedia is a popular method for reducing the bit rate of a pr... more Requantization of pre-compressed multimedia is a popular method for reducing the bit rate of a previously compressed data. The need for bit-rate reduction of the data stream, known as transcoding, requires adjustment of the transmission of bit-rate according to the bandwidth of the available channels. This introduces distortion of the reconstructed data. For real time applications the transcoding should be of low computational complexity, while ensuring low distortion. This paper introduces a fast algorithm which aims at reducing both distortion and enhances the speed of constructing the requantized codebook. The requantized codebook can be directly used for transcoding or could be used as an initial codebook instead of a blind or random initial codebook during the codebook reconstruction in an iterative method. Simulation results shows that the proposed codebook when used as an initial codebook requires less number of iterations, reduces distortion and minimizes the local optimizat...
Deep learning has detonated in the public responsiveness, primarily as predictive and analytical ... more Deep learning has detonated in the public responsiveness, primarily as predictive and analytical products pervade our world, in the form of innumerable humancentered smart-world systems, including targeted advertisements, natural language assistants and interpreters, and mock-up self-driving vehicle systems. In contrast, researchers across disciplines have been including into their research to solve various natural language processing issues. In this paper we seek to provide a thorough exploration of Deep learning and its applications like sentimental analysis and natural language processing (NLP). Deep learning has an edge over the traditional machine learning algorithms, like support vector machine (SVM) and Naïve Bayes, for sentiment analysis because of its potential to overcome the challenges faced by sentiment analysis and handle the diversities involved, without the expensive demand for manual feature engineering. Deep learning models promise one thing given sufficient amount ...
The unmanned aerial vehicles or drones are gaining popularity because of increased demand for les... more The unmanned aerial vehicles or drones are gaining popularity because of increased demand for less human intervention in the automotive sector. Customer driven markets are encouraging the unmanned vehicles oriented industries toinnovate towards the average user level. Despite the improvements in the parameters like cost, user friendliness and technological capabilities people hesitate to work with the unmanned vehicle technology and the major reason for this would be the vehicles behavior in the known and unknown environments, the unavoidable obstacles on the path of travel or the doubt on risk factor associated with the collision avoidance system. So this paper presents the various techniques used in the smooth navigation and collision/obstacle avoidance system over past years.
In this paper, the current consumption of microcontroller with varying frequency and voltage has ... more In this paper, the current consumption of microcontroller with varying frequency and voltage has been experimented in an attempt to understand the power consumption of microcontroller. The power consumption of microcontroller, when connected to an active load, is investigated. The microcontroller is experimented in sleep mode and analyzed the current consumption in its deepest sleep mode and active mode. Among the various wake-up sources, we have used an external input pin and watchdog timer method for the experimental setup. Using the obtained values the battery life is estimated.
Present wireless communication offers flexibility and mobility across cellular system. The modern... more Present wireless communication offers flexibility and mobility across cellular system. The modern cellular systems deploy smaller cells to accommodate large number of users. Due to smaller cell size area, probability of Mobile Station (MS) crossing the cell boundary increases. Thus to provide seamless connection across the cell boundary, a process called handoff has to occur i.e. when MS moves from one Base Station (BS) to another, the ongoing calls are transferred to another BS which gives best connectivity to the MS. This paper consists of a Fuzzy logic based Handoff Decision (FHD) approach to predict the correct and efficient handoff decision, thus preventing unnecessary handoffs and therefore ensure the Quality of Service (QoS). The Matlab tool is used for designing the Fuzzy Inference System (FIS) to process the handoff decision metrics and the proposed FHD is implemented on FPGA. A hardware implementation provides faster handoffs decision making compared to a software approach. Also, FPGA implementation offers flexibility, and reduced design time, this device is chosen to implement the Fuzzy Logic Controller (FLC) for handoff decision.
For the resource constrained devices such as Radio Frequency Identification (RFID) tags, smart ca... more For the resource constrained devices such as Radio Frequency Identification (RFID) tags, smart cards and wireless sensor networks, novel ultra lightweight Hummingbird cryptographic algorithm is presented. In this paper an attempt has been made to improve the architectural area as compared to previous hardware implementation on low cost Field Programmable Gate Array (FPGA) devices. Hummingbird provides design security with small block size and it is resistant to the most common attacks. Our results are compared with FPGA implementations of the various cryptographic algorithms. The results show that the work presented in this report gives optimization with respect to area utilization and hence cost effective in comparison to the referred papers. This paper is the reimplementation of the concept described in[1] with optimized programming in VHDL. Index Terms — RFID, Cryptography, Hummingbird, Encryption, Decryption.
Lecture Notes in Networks and Systems
The pomegranate fruit has gained popularity due to its nutritional values and pharmacological pro... more The pomegranate fruit has gained popularity due to its nutritional values and pharmacological properties. India ranks high among growers of pomegranates across the world and hence there is tremendous potential for its export. Here in our work the Bhagwa, a prime Indian pomegranate cultivar was studied. Total soluble solids (TSS) were measured experimentally. Internal images of the fruit were obtained nondestructively using Magnetic Resonance Imaging (MRI). The textural features from image were given as input to the nonlinear autoregressive neural network. The results showed that T1-weighted MR images were sensitive to physical and chemical changes. The R-value for measured TSS and model-predicted TSS for training data was 0.99 and testing data was 0.92. This study shows that MRI has higher potential for nondestructive method of grading pomegranate fruit based on the chemical values which are the basis for determining the maturity of the fruit.
Communications in Computer and Information Science, 2011
In this paper a 4 codebook, Vector Quantization (VQ) core is implemented on FPGA (Field Programma... more In this paper a 4 codebook, Vector Quantization (VQ) core is implemented on FPGA (Field Programmable Gate Array). The proposed design has certain advantages over the earlier architecture in the form of design reuse of VQ core to build a large VQ system. The proposed core aims at increased compressing speed, modular design for design flexibility, easy reconfigurability. Modularity helps
Communications in Computer and Information Science, 2011
Voltage Control Oscillator (VCO) is an integral part of many electronic applications like PLL, cl... more Voltage Control Oscillator (VCO) is an integral part of many electronic applications like PLL, clock generation in microprocessors & carrier synthesis in cellular telephones etc. Such applications require different topologies which gives robust high performance. Consequently, VCO design in CMOS technology continues to pose interesting challenges. This paper presents the design of Voltage Control Ring Oscillator with the oscillation frequency
Procedia Engineering, 2011
2010 2nd International Conference on Electronic Computer Technology, 2010
This paper presents a review and improvement in the architecture of our earlier work presenting t... more This paper presents a review and improvement in the architecture of our earlier work presenting the `k Dimensional 4 codebook encoder'. A new VLSI LUT based “Mean Square distortion error” core is introduced in the VQ Encoder architecture. The paper focuses mainly on the modified technique utilized in our new VQ Encoder architecture which utilizes the repeatability and symmetric property