Reena Sonkusare | Mumbai University (original) (raw)
Papers by Reena Sonkusare
2022 4th International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA)
2022 2nd International Conference on Intelligent Technologies (CONIT)
Proceedings of Third International Conference on Communication, Computing and Electronics Systems, 2022
2017 International Conference on Intelligent Computing and Control (I2C2), 2017
This paper focuses on design of simple rectangular microstrip patch antenna (RMSA) and gap couple... more This paper focuses on design of simple rectangular microstrip patch antenna (RMSA) and gap coupled RMSA. A simple rectangular microstrip antenna is simulated initially with length 25.5mm and width 25.5mm of the patch. The length of the ground plane is 30mm and the width of the ground plane is 30mm. Four resonating frequency for simple RMSA are 5.21Ghz, 5.78Ghz, 7.09Ghz and 8.78Ghz with return loss −13.25dB, −19.80dB, −10.5dB and −14.79dB respectively. The length and width of both the patch in gap coupled RMSA is 25.5mm and 25.5mm respectively. The length and width of the ground plane is 30mm and 60mm respectively. Three resonating frequency for gap coupled RMSA is 5.42Ghz, 7.46Ghz and 8.73Ghz with return loss −15dB, −26.23dB and −14.6dB. Gain for simple RMSA at 5.21Ghz, 5.78Ghz, 7.09Ghz and 8.78Ghz is 1.9dBi, −0.56dBi, −0.84dBi and 1.37dBi respectively. Substrate used is flame retardant (FR-4). Gain of gap coupled RMSA at 5.42Ghz, 7.46Ghz and 8.73Ghz is 4.22dBi, 4.39dBi and 5.73dBi ...
2020 IEEE International Conference for Innovation in Technology (INOCON), 2020
There is a growing need for smart surveillance systems in public and private places to logically ... more There is a growing need for smart surveillance systems in public and private places to logically differentiate between normal and abnormal behaviour. This is not just important for the convenience of the people but also for their security. Understanding a video footage and classifying an activity as normal or suspicious especially in densely packed regions is possible and has been demonstrated in this paper. The proposed system makes use of the YOLOv3 algorithm for object detection. The COCO dataset, which is a large-scale object detection, segmentation and captioning dataset, has been used for training this model. The whole framework is made up of two parts. First the features are computed from the image. Then based on the detected features, the classifier makes a prediction. Depending on the object detected, the algorithm classifies a frame as suspicious or normal. Crowd density has been calculated by detecting the number of people in a frame and suspicion detection has been performed by analysing a frame for suspicious objects like isolated bags, knives and guns.
2022 IEEE 7th International conference for Convergence in Technology (I2CT)
Journal of Computer Sciences and Applications, 2013
In recent time, there has been high level of impersonation experienced on a daily basis in both p... more In recent time, there has been high level of impersonation experienced on a daily basis in both private and public sectors, the ghost worker syndrome which has become a menace across all tiers of government, employers concerns over the levels of employee absence in their workforce and the difficulty in managing student attendance during lecture periods. Fingerprints are a form of biometric identification which is unique and does not change in one's entire lifetime. This paper presents the attendance management system using fingerprint technology in a university environment. It consists of two processes namely; enrolment and authentication. During enrolment, the fingerprint of the user is captured and its unique features extracted and stored in a database along with the users identity as a template for the subject. The unique features called minutiae points were extracted using the Crossing Number (CN) method which extracts the ridge endings and bifurcations from the skeleton image by examining the local neighborhoods of each ridge pixel using a 3 x 3 window. During authentication, the fingerprint of the user is captured again and the extracted features compared with the template in the database to determine a match before attendance is made. The fingerprint-based attendance management system was implemented with Microsoft's C# on the. NET framework and Microsoft's Structured Query Language (SQL) Server 2005 as the backend. The experimental result shows that the developed system is highly efficient in the verification of users fingerprint with an accuracy level of 97.4%. The average execution time for the developed system was 4.29 seconds as against 18.48 seconds for the existing system. Moreover, the result shows a well secured and reliable system capable of preventing impersonation.
A new low profile and broadband monopolar patch antenna is proposed. Generally monopolar patch an... more A new low profile and broadband monopolar patch antenna is proposed. Generally monopolar patch antennas are built using circular or square patches to obtain the required radiation pattern but these antennas have low gain in the horizontal plane. Rectangular patch antennas have been designed for high gain but they have broadside radiation pattern. We propose a low profile patch antenna with wide bandwidth, high gain and monopole like radiation pattern. The proposed antenna has a bandwidth of 13.38% and gain of 4.48 dBi with monopole like radiation pattern.
2020 International Conference on Smart Electronics and Communication (ICOSEC), 2020
This paper presents an application of optical character recognition(OCR) which can extract inform... more This paper presents an application of optical character recognition(OCR) which can extract information from images of bills and receipts; store it as machine-processable text; in an organized manner for ease of access. It can do this efficiently even in the presence of watermarks on the bills or any shadows in the images of the bills. In developing this application, OpenCV has been used for the processing of the images and the Tesseract OCR engine has been used for optical character recognition and text extraction. The image is first processed using OpenCV for the removal of any shadows or watermarks present in it. For longer invoices, by employing the image bifurcation process, the data can be easily extracted which was not possible earlier. Furthermore, the processed image is passed on to the Tesseract OCR engine for the retrieving of text present in it. The text is then searched for important information, such as the total amount spent and the date on the receipt, using string pr...
2021 6th International Conference for Convergence in Technology (I2CT), 2021
Weeds are a problem as they compete with desirable crops and use up water, nutrients, and space. ... more Weeds are a problem as they compete with desirable crops and use up water, nutrients, and space. Some weeds also get entangled in machinery and prevent efficient harvesting. Hence weed removal systems are a necessity. Development of a successful weed removal system involves correct identification of the unwanted vegetation. The paper proposes a Real-time weed detection system that uses machine learning to identify weeds in crops and stereo-vision for 3D crop reconstruction. Structure from motion technique is utilized on a video of a farm to generate a 3D point cloud. The machine learning model is trained on two manually created datasets of cucumber and Onion crop. Convolutional Neural Networks (CNN) and ResNet-50 algorithms are used to train the machine learning models. It is seen that the ResNet-50 model outperforms the Convolution Neural Networks model. ResNet-50 model gives an overall accuracy of 84.6% for the cucumber dataset while it gives an accuracy of 90% for the Onion crop ...
2021 6th International Conference for Convergence in Technology (I2CT), 2021
There is a tremendous demand for Cloud Computing in organizations, educational institutions, etc.... more There is a tremendous demand for Cloud Computing in organizations, educational institutions, etc. Cloud Services reduce the cost of setting up an office space. The users are only required to have a laptop. The maintenance of applications, servers, and storage are all taken care of by the Cloud Service Provider. As cloud services are gaining popularity, the volume of malware attacks on cloud services has doubled in 2019, according to the 2020 TrustWave Global Security Report. When the user clicks on the link or attachments, malware gets executed in the cloud environment. These provide a source for cybercriminals to gain unauthorized access to the machines. These, in turn, makes the system run very slow, thus consuming the CPU, memory, and network bandwidth of the machine. Thus, the dataset is split into CPU, memory, and network parameters and fed as an input to Deep Learning models. CNN is used for deep learning. This method helps in obtaining an accuracy of more than 95% using the 2...
Memristor is a novel device which act as forth fundamental circuit element envisioned by Prof. Ch... more Memristor is a novel device which act as forth fundamental circuit element envisioned by Prof. Chua in 1971. Memristor devices has great interest in research ranging from memory and logic to neuromorphic systems due to its several advantages: nonvolatality, good scalability, compatibility with CMOS technology. We study the ongoing models of memristor and compare them with known device specifications In the process of Memristor modelling using finite element, there is initial innovative approach is to implement basic model of it with the help of device modeling and simulation tool Comsol multiphysics 4.4. The successful modeling and simulation of Memristor will further lead to use for SPICE based circuit design. KeywordsComsol multiphysics 4.4, SPICE, Memristor
With the limited frequency spectrum and increasing demand for cellular communication services, th... more With the limited frequency spectrum and increasing demand for cellular communication services, the problem of channel assignment becomes increasingly important. The three main constraints impeding the efficient usage of frequency spectrum are cochannel constraint (CCC), the adjacent channel constraint (ACC) and the co-site constraint (CSC). The objective is to obtain a conflict-free channel allocation scheme using modified immune genetic algorithm which satisfies both the electromagnetic compatibility (EMC) constraint and traffic demand requirement. The minimum separation encoding scheme is introduced to meet the co-site constraint. The genetic operators, viz. crossover and mutation are proposed to ensure the traffic demand through the iterative process. To increase the efficiency and velocity of convergence, immune operators are given, such as immune clone, vaccination, immune selection etc
The Generalized Scattering Matrix (GSM) method is commonly used for analyzing different RF struct... more The Generalized Scattering Matrix (GSM) method is commonly used for analyzing different RF structures and waveguide discontinuities. The method is extended here to model optical structures. The basic GSM formulation is benchmarked using the High Frequency Structure Simulator (HFSS) simulations in the RF domain. A similar analysis is employed for optical devices and can be used to determine the electromagnetic fields and the Poynting vector at every point of structure. The GSM is used to analyze Off-axis excitation in multimode fibers. This can be used to reduce inter-modal dispersion in multimode fiber and lower the modal noise. The scattering matrix treatment can also be used to analyze dielectric discontinuities in the form of a periodic structure, known as fiber Bragg Grating (FBG). The analysis can be extended for the construction of Band-Stop filter by varying the periodicity of the FBG structure.
2019 Global Conference for Advancement in Technology (GCAT), 2019
Image Enhancement is a method that converts a poor quality image into a image of superior quality... more Image Enhancement is a method that converts a poor quality image into a image of superior quality. This paper basically intends to enhance the quality of a image using the Histogram Equalization technique on MATLAB (R2014a) software and the outcome of the image parameters before and after applying Histogram Equalization are discussed. The statistical parameters of the image histogram such as mean and median can be used analyse and show an image of improvised image quality. The method is used to improve the image quality of an X-Ray image of a human bone. This paper also discusses the modern and enhanced techniques of Histogram Equalization and their merits over the traditional Histogram Equalization technique.
The Micro strip Antenna for microwave life detection system is used for the search and rescue of ... more The Micro strip Antenna for microwave life detection system is used for the search and rescue of victims trapped under the rubble of collapsed building during the earthquake or other disasters. The performance and advantages of microstrip antennas such as low Weight, low profile, and low cost made them the perfect choice for microwave life detection system. They have the capability to integrate with microwave circuits and therefore they are very well suited for applications such as microwave life detectors, navigation systems, cell devices, WLAN applications, navigation systems and many others. In this Paper the design of a single element microstrip patch antenna and microstrip patch antenna with slots for a microwave life detection system are compared using IE3D software. Also the directivity of the simulated Microstrip patch and microstrip patch antenna with slots is compared using simulation software.
This paper presents the result of a comparative study between different methodologies for tuning ... more This paper presents the result of a comparative study between different methodologies for tuning an acoustic guitar. In order to tune a guitar, determining the fundamental frequency of the note being played is crucial. Various digital signal processing techniques have been employed to analyse the sounds of musical instruments such as guitar, piano, etc. With the number of techniques already available, it becomes imperative to determine the optimal technique. In this study, the sounds of guitar strings are recorded and stored as WAV files, that act as input to the tuning program, implemented on Python and MATLAB. Fast Fourier Transform and Spectral Density Estimation are the two techniques that have been compared. The tuning process by both the methods has been explained in detail and the results of both the methods have been presented in a tabular format for comparing the accuracy of each method. The method with the results closer to the real values of the fundamental frequency is r...
Image Processing is a vital tool when one is dealing with several images and wishes to perform se... more Image Processing is a vital tool when one is dealing with several images and wishes to perform several complex actions on the same. With advances in technologies, one can now compress, manipulate, extract required information, etc. from any image one wants to. One such application of Image processing is detecting handwritten text and converting it to a digital text format. The main objective is to bridge the gap between the actual bit of paper and the digital world and in doing so, one can operate on the digital data much faster as compared to the actual data. Hence, in this paper, we aim to implement the detection of handwritten text via Optical Character Recognition (OCR). The entire paper will be implemented on TensorFlow. This research work has also analyzed various results and taken appropriate dataset to train the model. Further, the importance of this paper lies in the fact that it can facilitate and open various unexplored avenues. The key novelty of the paper lies in the fa...
The total ionising dose (TID) effects on different gate oxide used in silicon on insulator (SOI) ... more The total ionising dose (TID) effects on different gate oxide used in silicon on insulator (SOI) FinFET are investigated in this paper. The device structure under consideration shows a three-dimensional (3-D) architecture of Silicon on Insulator (SOI) 30nm n-channel FinFET with a high-k hafnium oxide (HfO2) and aluminum oxide (Al2O3) as gate electrode. To test the influence of TID on the FinFET device the 3-D simulations were performed in Visual TCAD using radiation dedicated code for different gate oxides. The TID effects modify the electrical properties leading to deterioration of the device and failure of the systems associated with them. The influence of dose rate on the build-up of fixed charge in the gate oxide region and the interface charge at the oxidesemiconductor interface was analyzed and observed its impact was observed on the device characteristics. It has been found that oxide trapped charge density is higher than interface trapped charge density. As a result of TID, ...
2022 4th International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA)
2022 2nd International Conference on Intelligent Technologies (CONIT)
Proceedings of Third International Conference on Communication, Computing and Electronics Systems, 2022
2017 International Conference on Intelligent Computing and Control (I2C2), 2017
This paper focuses on design of simple rectangular microstrip patch antenna (RMSA) and gap couple... more This paper focuses on design of simple rectangular microstrip patch antenna (RMSA) and gap coupled RMSA. A simple rectangular microstrip antenna is simulated initially with length 25.5mm and width 25.5mm of the patch. The length of the ground plane is 30mm and the width of the ground plane is 30mm. Four resonating frequency for simple RMSA are 5.21Ghz, 5.78Ghz, 7.09Ghz and 8.78Ghz with return loss −13.25dB, −19.80dB, −10.5dB and −14.79dB respectively. The length and width of both the patch in gap coupled RMSA is 25.5mm and 25.5mm respectively. The length and width of the ground plane is 30mm and 60mm respectively. Three resonating frequency for gap coupled RMSA is 5.42Ghz, 7.46Ghz and 8.73Ghz with return loss −15dB, −26.23dB and −14.6dB. Gain for simple RMSA at 5.21Ghz, 5.78Ghz, 7.09Ghz and 8.78Ghz is 1.9dBi, −0.56dBi, −0.84dBi and 1.37dBi respectively. Substrate used is flame retardant (FR-4). Gain of gap coupled RMSA at 5.42Ghz, 7.46Ghz and 8.73Ghz is 4.22dBi, 4.39dBi and 5.73dBi ...
2020 IEEE International Conference for Innovation in Technology (INOCON), 2020
There is a growing need for smart surveillance systems in public and private places to logically ... more There is a growing need for smart surveillance systems in public and private places to logically differentiate between normal and abnormal behaviour. This is not just important for the convenience of the people but also for their security. Understanding a video footage and classifying an activity as normal or suspicious especially in densely packed regions is possible and has been demonstrated in this paper. The proposed system makes use of the YOLOv3 algorithm for object detection. The COCO dataset, which is a large-scale object detection, segmentation and captioning dataset, has been used for training this model. The whole framework is made up of two parts. First the features are computed from the image. Then based on the detected features, the classifier makes a prediction. Depending on the object detected, the algorithm classifies a frame as suspicious or normal. Crowd density has been calculated by detecting the number of people in a frame and suspicion detection has been performed by analysing a frame for suspicious objects like isolated bags, knives and guns.
2022 IEEE 7th International conference for Convergence in Technology (I2CT)
Journal of Computer Sciences and Applications, 2013
In recent time, there has been high level of impersonation experienced on a daily basis in both p... more In recent time, there has been high level of impersonation experienced on a daily basis in both private and public sectors, the ghost worker syndrome which has become a menace across all tiers of government, employers concerns over the levels of employee absence in their workforce and the difficulty in managing student attendance during lecture periods. Fingerprints are a form of biometric identification which is unique and does not change in one's entire lifetime. This paper presents the attendance management system using fingerprint technology in a university environment. It consists of two processes namely; enrolment and authentication. During enrolment, the fingerprint of the user is captured and its unique features extracted and stored in a database along with the users identity as a template for the subject. The unique features called minutiae points were extracted using the Crossing Number (CN) method which extracts the ridge endings and bifurcations from the skeleton image by examining the local neighborhoods of each ridge pixel using a 3 x 3 window. During authentication, the fingerprint of the user is captured again and the extracted features compared with the template in the database to determine a match before attendance is made. The fingerprint-based attendance management system was implemented with Microsoft's C# on the. NET framework and Microsoft's Structured Query Language (SQL) Server 2005 as the backend. The experimental result shows that the developed system is highly efficient in the verification of users fingerprint with an accuracy level of 97.4%. The average execution time for the developed system was 4.29 seconds as against 18.48 seconds for the existing system. Moreover, the result shows a well secured and reliable system capable of preventing impersonation.
A new low profile and broadband monopolar patch antenna is proposed. Generally monopolar patch an... more A new low profile and broadband monopolar patch antenna is proposed. Generally monopolar patch antennas are built using circular or square patches to obtain the required radiation pattern but these antennas have low gain in the horizontal plane. Rectangular patch antennas have been designed for high gain but they have broadside radiation pattern. We propose a low profile patch antenna with wide bandwidth, high gain and monopole like radiation pattern. The proposed antenna has a bandwidth of 13.38% and gain of 4.48 dBi with monopole like radiation pattern.
2020 International Conference on Smart Electronics and Communication (ICOSEC), 2020
This paper presents an application of optical character recognition(OCR) which can extract inform... more This paper presents an application of optical character recognition(OCR) which can extract information from images of bills and receipts; store it as machine-processable text; in an organized manner for ease of access. It can do this efficiently even in the presence of watermarks on the bills or any shadows in the images of the bills. In developing this application, OpenCV has been used for the processing of the images and the Tesseract OCR engine has been used for optical character recognition and text extraction. The image is first processed using OpenCV for the removal of any shadows or watermarks present in it. For longer invoices, by employing the image bifurcation process, the data can be easily extracted which was not possible earlier. Furthermore, the processed image is passed on to the Tesseract OCR engine for the retrieving of text present in it. The text is then searched for important information, such as the total amount spent and the date on the receipt, using string pr...
2021 6th International Conference for Convergence in Technology (I2CT), 2021
Weeds are a problem as they compete with desirable crops and use up water, nutrients, and space. ... more Weeds are a problem as they compete with desirable crops and use up water, nutrients, and space. Some weeds also get entangled in machinery and prevent efficient harvesting. Hence weed removal systems are a necessity. Development of a successful weed removal system involves correct identification of the unwanted vegetation. The paper proposes a Real-time weed detection system that uses machine learning to identify weeds in crops and stereo-vision for 3D crop reconstruction. Structure from motion technique is utilized on a video of a farm to generate a 3D point cloud. The machine learning model is trained on two manually created datasets of cucumber and Onion crop. Convolutional Neural Networks (CNN) and ResNet-50 algorithms are used to train the machine learning models. It is seen that the ResNet-50 model outperforms the Convolution Neural Networks model. ResNet-50 model gives an overall accuracy of 84.6% for the cucumber dataset while it gives an accuracy of 90% for the Onion crop ...
2021 6th International Conference for Convergence in Technology (I2CT), 2021
There is a tremendous demand for Cloud Computing in organizations, educational institutions, etc.... more There is a tremendous demand for Cloud Computing in organizations, educational institutions, etc. Cloud Services reduce the cost of setting up an office space. The users are only required to have a laptop. The maintenance of applications, servers, and storage are all taken care of by the Cloud Service Provider. As cloud services are gaining popularity, the volume of malware attacks on cloud services has doubled in 2019, according to the 2020 TrustWave Global Security Report. When the user clicks on the link or attachments, malware gets executed in the cloud environment. These provide a source for cybercriminals to gain unauthorized access to the machines. These, in turn, makes the system run very slow, thus consuming the CPU, memory, and network bandwidth of the machine. Thus, the dataset is split into CPU, memory, and network parameters and fed as an input to Deep Learning models. CNN is used for deep learning. This method helps in obtaining an accuracy of more than 95% using the 2...
Memristor is a novel device which act as forth fundamental circuit element envisioned by Prof. Ch... more Memristor is a novel device which act as forth fundamental circuit element envisioned by Prof. Chua in 1971. Memristor devices has great interest in research ranging from memory and logic to neuromorphic systems due to its several advantages: nonvolatality, good scalability, compatibility with CMOS technology. We study the ongoing models of memristor and compare them with known device specifications In the process of Memristor modelling using finite element, there is initial innovative approach is to implement basic model of it with the help of device modeling and simulation tool Comsol multiphysics 4.4. The successful modeling and simulation of Memristor will further lead to use for SPICE based circuit design. KeywordsComsol multiphysics 4.4, SPICE, Memristor
With the limited frequency spectrum and increasing demand for cellular communication services, th... more With the limited frequency spectrum and increasing demand for cellular communication services, the problem of channel assignment becomes increasingly important. The three main constraints impeding the efficient usage of frequency spectrum are cochannel constraint (CCC), the adjacent channel constraint (ACC) and the co-site constraint (CSC). The objective is to obtain a conflict-free channel allocation scheme using modified immune genetic algorithm which satisfies both the electromagnetic compatibility (EMC) constraint and traffic demand requirement. The minimum separation encoding scheme is introduced to meet the co-site constraint. The genetic operators, viz. crossover and mutation are proposed to ensure the traffic demand through the iterative process. To increase the efficiency and velocity of convergence, immune operators are given, such as immune clone, vaccination, immune selection etc
The Generalized Scattering Matrix (GSM) method is commonly used for analyzing different RF struct... more The Generalized Scattering Matrix (GSM) method is commonly used for analyzing different RF structures and waveguide discontinuities. The method is extended here to model optical structures. The basic GSM formulation is benchmarked using the High Frequency Structure Simulator (HFSS) simulations in the RF domain. A similar analysis is employed for optical devices and can be used to determine the electromagnetic fields and the Poynting vector at every point of structure. The GSM is used to analyze Off-axis excitation in multimode fibers. This can be used to reduce inter-modal dispersion in multimode fiber and lower the modal noise. The scattering matrix treatment can also be used to analyze dielectric discontinuities in the form of a periodic structure, known as fiber Bragg Grating (FBG). The analysis can be extended for the construction of Band-Stop filter by varying the periodicity of the FBG structure.
2019 Global Conference for Advancement in Technology (GCAT), 2019
Image Enhancement is a method that converts a poor quality image into a image of superior quality... more Image Enhancement is a method that converts a poor quality image into a image of superior quality. This paper basically intends to enhance the quality of a image using the Histogram Equalization technique on MATLAB (R2014a) software and the outcome of the image parameters before and after applying Histogram Equalization are discussed. The statistical parameters of the image histogram such as mean and median can be used analyse and show an image of improvised image quality. The method is used to improve the image quality of an X-Ray image of a human bone. This paper also discusses the modern and enhanced techniques of Histogram Equalization and their merits over the traditional Histogram Equalization technique.
The Micro strip Antenna for microwave life detection system is used for the search and rescue of ... more The Micro strip Antenna for microwave life detection system is used for the search and rescue of victims trapped under the rubble of collapsed building during the earthquake or other disasters. The performance and advantages of microstrip antennas such as low Weight, low profile, and low cost made them the perfect choice for microwave life detection system. They have the capability to integrate with microwave circuits and therefore they are very well suited for applications such as microwave life detectors, navigation systems, cell devices, WLAN applications, navigation systems and many others. In this Paper the design of a single element microstrip patch antenna and microstrip patch antenna with slots for a microwave life detection system are compared using IE3D software. Also the directivity of the simulated Microstrip patch and microstrip patch antenna with slots is compared using simulation software.
This paper presents the result of a comparative study between different methodologies for tuning ... more This paper presents the result of a comparative study between different methodologies for tuning an acoustic guitar. In order to tune a guitar, determining the fundamental frequency of the note being played is crucial. Various digital signal processing techniques have been employed to analyse the sounds of musical instruments such as guitar, piano, etc. With the number of techniques already available, it becomes imperative to determine the optimal technique. In this study, the sounds of guitar strings are recorded and stored as WAV files, that act as input to the tuning program, implemented on Python and MATLAB. Fast Fourier Transform and Spectral Density Estimation are the two techniques that have been compared. The tuning process by both the methods has been explained in detail and the results of both the methods have been presented in a tabular format for comparing the accuracy of each method. The method with the results closer to the real values of the fundamental frequency is r...
Image Processing is a vital tool when one is dealing with several images and wishes to perform se... more Image Processing is a vital tool when one is dealing with several images and wishes to perform several complex actions on the same. With advances in technologies, one can now compress, manipulate, extract required information, etc. from any image one wants to. One such application of Image processing is detecting handwritten text and converting it to a digital text format. The main objective is to bridge the gap between the actual bit of paper and the digital world and in doing so, one can operate on the digital data much faster as compared to the actual data. Hence, in this paper, we aim to implement the detection of handwritten text via Optical Character Recognition (OCR). The entire paper will be implemented on TensorFlow. This research work has also analyzed various results and taken appropriate dataset to train the model. Further, the importance of this paper lies in the fact that it can facilitate and open various unexplored avenues. The key novelty of the paper lies in the fa...
The total ionising dose (TID) effects on different gate oxide used in silicon on insulator (SOI) ... more The total ionising dose (TID) effects on different gate oxide used in silicon on insulator (SOI) FinFET are investigated in this paper. The device structure under consideration shows a three-dimensional (3-D) architecture of Silicon on Insulator (SOI) 30nm n-channel FinFET with a high-k hafnium oxide (HfO2) and aluminum oxide (Al2O3) as gate electrode. To test the influence of TID on the FinFET device the 3-D simulations were performed in Visual TCAD using radiation dedicated code for different gate oxides. The TID effects modify the electrical properties leading to deterioration of the device and failure of the systems associated with them. The influence of dose rate on the build-up of fixed charge in the gate oxide region and the interface charge at the oxidesemiconductor interface was analyzed and observed its impact was observed on the device characteristics. It has been found that oxide trapped charge density is higher than interface trapped charge density. As a result of TID, ...