9 research outputs found

    Real Time Face Detection and Recognition: Overview and Suggested Approach

    Get PDF
    This paper presents the detailed analysis of the existing state-of-the-art real time face detection and recognition approaches and a possible solution to the identified problems. The analysis covers the face detection, pattern recognition and measurement of facial part. The analysis of the Viola-Jones is followed by a possible model approach. This approach is based on a combination of techniques and algorithms working on Viola–Jones object detection platform

    Heartbeat and Temperature Monitoring System for Remote Patients using Arduino

    Full text link
    This paper describes the working of a wireless heartbeat and temperature monitoring system based on a microcontroller ATmega328 (arduino uno). Most monitoring systems that are in use in today\u27s world works in offline mode but our system is designed such that a patient can be monitored remotely in real time. The proposed approach consists of sensors which measures heartbeat and body temperature of a patient which is controlled by the microcontroller. Both the readings are displayed in LCD monitor. Wireless system is used to transmit the measured data from the remote location. The heartbeat sensor counts the heartbeat for specific interval of time and estimates Beats per Minute while the temperature sensor measures the temperature and both the data are sent to the microcontroller for transmission to receiving end. Finally, the data are displayed at the receiving end. This system could be made available at a reasonable cost with great effect

    Image Analysis and Image Mining Techniques: A Review

    Get PDF
    This paper presents the analysis of existing literature which is relevant to mining and the mechanisms associated with weighted substructure. Though, the literature consists of a lot many research contributions, but, here, we have analysed around thirty-five research and review papers. The existing approaches are categorized based on the basic concepts involved in the mechanisms. The emphasis is on the concept used by the concerned authors, the database used for experimentations and the performance evaluation parameters. Their claims are also highlighted. Our findings from the exhaustive literature review are mentioned along with the identified problems. This paper is useful for comparative study of various approaches which is prerequisite for solving image mining problem

    Operational Analysis of Infrared Gas Sensor

    No full text
    In this paper, we developed a NDIR device modules employing a non-dispersive infrared gas device and optical path with form of rectangular parallelepiped. The check board was equipped with a designed NDIR gas device and a chemical process device from a Japanese company. The check was administrated with commonplace alkane series gases of seven completely different concentrations. once common place alkane series gases square measure injected to sensors, voltage and concentration of the sensors through expected rule square measure measured on liquid crystal display in real time. The gas leak detector used the projected rule is verified that accuracy is improved

    IOT Based Communication Technology for High Voltage Transmission System

    No full text
    This paper presents a threestratified network construction of web of Things (IOT) communication technique for high-voltage conductor that involves the wireless self-organized sensing element network (WSN), fiber composite overhead ground wire (OPGW), general packet radio service (GPRS) and therefore the Beidou (COMPASS) navigation satellite system (CNSS). The operate of every layer of network, application preparation and management of energy consumption area unit studied. the tactic will meet the requirements of interconnection between the observance center and terminals, cut back the terminals’ GPRS and CNSS configuration and OPGW optical access points, and make sure the on-line observance knowledge transmission time period and reliable below things of remote region, extreme weather and alternative environmental conditions

    Resilient Designs of Control Systems: Analysis and Review

    No full text
    Since digital management systems were introduced to the market quite thirty years past, the operational potency and stability gained through their use have fueled our migration and supreme dependence on them for the observance and management of important infrastructure. Whereas these systems are designed for practicality and responsibility, a hostile cyber setting and uncertainties in advanced networks and human interactions have placed further parameters on the expectations for management systems

    Industrial Control System Cyber Security: Review & Recommendations

    No full text
    Through this paper, the need of utilization of hybrid modeling for the development and sustenance of technologies for cyber threats on Industrial Control Systems (ICS) is indicated. In this paper, the review of the existing security systems and the challenges faced by them is portrayed; followed by the recommendations addressing those issues is provided. Later, the description of Virtual Control System Environments (VCSE) is provided which Sandia has implemented

    Control System Security: An Issue

    No full text
    Through this paper we have an inclination to apprehend 2 questions: (1) Why ought to we have a tendency to have an interest within the security of control systems? And (2) What are the new and essentially totally different necessities and issues for the protection of control systems? We have a tendency to additionally propose a novel mathematical framework to investigate attacks against control systems. At times, this framework has a tendency to formulate specific analysis issues to (1) find attacks, and (2) survive attacks.

    Fuzzy Logic based Controller for Power Transformer Protection

    No full text
    Power transformers are imperative elements of power system. So it is substantial to evade any mal-operation of required protective system. For many years, differential protection has been used as the primary protection of power systems. It comprises the differential relay, which operate for all internal fault types of power transformer and block due to inrush current. The major disadvantage of the branch of differential protection relays, its potential malfunction resulting from transient inrush current that flows when the transformer is energized. This paper presents a novel technique of relaying algorithm which enhances the fault detection methodology of the orthodox techniques by using fuzzy logic. The proposed relaying technique depends on the principle of harmonic-current restraint. In this method the magnetizing-inrush current is categorized by large 2nd harmonic contents.
    corecore