Papers by Vikramsingh Parihar
This paper presents an image segmentation technique using discreet tools from graph theory. The i... more This paper presents an image segmentation technique using discreet tools from graph theory. The image segmentation incorporating graph theoretic methods make the formulation of the problem suppler and the computation more ingenious. In our proposed method, the problem is modeled by partitioning a graph into several sub-graphs; in such a way that each of the subgraphs represents an eloquent region of the image. The segmentation is performed in a spatially discrete space by the efficient tools from graph theory. After the brief literature review, we have formulated the problem using graph representation of image and the threshold function. The borders between the different regions in an image are identified as per the segmentation criteria and, later, the partitioned regions are branded with random colors. In our approach, in order to make the segmentation fast, the image is preprocessed by DWT and coherence filter before performing the segmentation. We have carried out the experiments on numerous natural images available from Berkeley Image Database as well as synthetic images taken from online resources. The images are preprocessed using the wavelets of Haar, DB2, DB4, DB6 and DB8. In order to evaluate and compare the results, we have used the performance evaluation parameters like Performance Ratio, execution time, PSNR, Precision and Recall and found that the obtained results are promising.
The protection of double circuit transmission lines could be a difficult task. This paper present... more The protection of double circuit transmission lines could be a difficult task. This paper presents a protection technique supported the high-frequency transients generated by the fault to hide nearly the entire length of double circuit transmission lines. For this purpose, befittingly designed line traps area unit put in at terminals of the protected line, and therefore the Artificial Neural Network with appropriate range of Neurons is employed to classify the faults supported the frequency spectrum of the RMS current and RMS voltage signals. In depth simulation studies indicate that the projected approach is well capable of discriminating differing types of faults and provides a really quick, secure, and reliable protection technique The simulation model done in MATLAB Simulink for system analysis. In this model 300 km, 25 KV, 50Hz transmission line power system model design with three zone bus bar system. One end bus bar data measurement utilized for three phase RMS voltage and current measurement. Also Neural Network training done for designed power system model using MATLAB Simulink.
In the recent years, medical image analysis has turned to be the center of attention for the rese... more In the recent years, medical image analysis has turned to be the center of attention for the researchers and practitioners all over the world as it provides high-fidelity and minimally-invasive means for diagnosis, prognosis, therapy and follow-up procedures. Medical image processing techniques in the literature are concentrated vastly on the important processes of filtering, enhancement and object detection, and a variety of methods proposed to improve the image quality for both visual perception and feature detection where the image segmentation is indeed one of the most attractive yet complicated techniques. In this article, a brief updating on computational advances applied to medical image segmentation is provided along with the discussion of some popular methodologies for related medical image processing techniques.
Power transformers are imperative elements of power system. So it is substantial to evade any mal... more Power transformers are imperative elements of power system. So it is substantial to evade any mal-operation of required protective system. For many years, differential protection has been used as the primary protection of power systems. It comprises the differential relay, which operate for all internal fault types of power transformer and block due to inrush current. The major disadvantage of the branch of differential protection relays, its potential malfunction resulting from transient inrush current that flows when the transformer is energized. This paper presents a novel technique of relaying algorithm which enhances the fault detection methodology of the orthodox techniques by using fuzzy logic. The proposed relaying technique depends on the principle of harmonic-current restraint. In this method the magnetizing-inrush current is categorized by large 2 nd harmonic contents.
This project describes the development of a wireless heartbeat and temperature monitoring system ... more This project describes the development of a wireless heartbeat and temperature monitoring system based on microcontroller ATmega 328 (Arduino uno) at a reasonable cost with great effect. Most monitoring systems that are in use in today's world works in offline mode but it is of a great need that a system must be designed so that patient can be monitored remotely in real time. The project consists of sensors which measures heartbeat and body temperature of a patient which is controlled by the microcontroller. Both the readings are displayed on the LCD monitor. Wireless system is used to transmit the measured data to a remote location. The heartbeat sensor counts the heartbeat for a specific interval of time and estimates Beats per Minute while the temperature sensor measures the temperature. Both these data are sent to the microcontroller for transmitting to the receiving end. Finally, the data is displayed on the LCD at the receiving end.
Journal of instrumentation and innovation sciences, Jan 15, 2018
In this paper, we developed a NDIR device modules employing a non-dispersive infrared gas device ... more In this paper, we developed a NDIR device modules employing a non-dispersive infrared gas device and optical path with form of rectangular parallelepiped. The check board was equipped with a designed NDIR gas device and a chemical process device from a Japanese company. The check was administrated with commonplace alkane series gases of seven completely different concentrations. once common place alkane series gases square measure injected to sensors, voltage and concentration of the sensors through expected rule square measure measured on liquid crystal display in real time. The gas leak detector used the projected rule is verified that accuracy is improved.
International advanced research journal in science, engineering and technology, Sep 30, 2018
In this research work the modification of stationary diesel engine for producing power using turb... more In this research work the modification of stationary diesel engine for producing power using turbine. Nowadays in automobile field many new innovating concepts are being developed. We are using the power from vehicle exhaust to generate the electricity which can be stored in battery for the later consumption. In this project, we are demonstrating a concept of generating power in a stationary single cylinder diesel engine by the usage of turbines. Here we are placing a turbine in the path of exhaust in the silencer. An engine is also placed in the chassis of the vehicle. The turbine is connected to a dynamo, which is used to generate power. Depending upon the airflow the turbine will start rotating, and then the dynamo will also start to rotate. A dynamo is a device which is used to convert the kinetic energy into electrical energy. The generated power is stored to the battery. It can be stored in the battery after rectification. The rectified voltage can be inverted and can be used in various forms of utilities.
This paper presents the analysis and comparison of existing literature relevant to various image ... more This paper presents the analysis and comparison of existing literature relevant to various image mining process and the mechanisms associated with it. Though, the literature consists of a lot many research contributions, but, here, we have critically and exhaustively analyzed around forty research and review papers. Based on the basic concepts used in their mechanisms, the existing approaches are categorized into three types, image analysis and pattern recognition related work, image mining through various approaches, and graph theory based related work in image mining. The emphasis is on the concept used by the concerned authors, the database used for experimentations and the performance evaluation parameters. The claims of the researchers are also highlighted. Our findings from the exhaustive literature review are mentioned along with the identified problems. This paper is very important for the comparative study of various image mining approaches which is prerequisite for solving image mining problem.
Today, the medical industry, astronomy, physics, chemistry, forensics, remote sensing, manufactur... more Today, the medical industry, astronomy, physics, chemistry, forensics, remote sensing, manufacturing, and defense are just some of the many fields that rely upon images to store, display, and provide information about the world around us. The challenge to scientists, engineers and business people is to quickly extract valuable information from raw image data. This is the primary purpose of image processing - converting images to information. The main aim of image segmentation is to identify meaningful objects from a given image. For example, a boy of just four years can see/detect/locate a pen on a table, as he is naturally equipped with image segmentation power. However, robots cannot do it, until they use image segmentation algorithms. To perform an image segmentation task, several techniques have been developed. The simplest and flexible techniques are discussed in this book from basics. This book explains how to segment images using state-of-the-art methods and recent innovations incorporating Deep Learning. Also, image segmentation is usually the first step towards various image processing applications like medical imaging, object detection, machine vision, recognition, image mining, image restoration, image enhancement, etc. and thus, is a critical topic to study. In this book, each chapter introduces image segmentation topics and includes information regarding when one method may be preferred over another to obtain specific image features. Numerous step-by-step examples illustrate the processing and analysis routines, allowing you to quickly understand how to get the desired results when working with your own image data. This book is not intended to be a complete source for image processing knowledge, an advanced image processing manual or an image processing reference guide. This book is designed to teach people how to segment images effectively and does not assume that they are already experts in the field of image processing.
Today, the medical industry, astronomy, physics, chemistry, forensics, remote sensing, manufactur... more Today, the medical industry, astronomy, physics, chemistry, forensics, remote sensing, manufacturing, and defense are just some of the many fields that rely upon images to store, display, and provide information about the world around us. The challenge to scientists, engineers and business people is to quickly extract valuable information from raw image data. This is the primary purpose of image processing - converting images to information. The main aim of image segmentation is to identify meaningful objects from a given image. For example, a boy of just four years can see/detect/locate a pen on a table, as he is naturally equipped with image segmentation power. However, robots cannot do it, until they use image segmentation algorithms. To perform an image segmentation task, several techniques have been developed. The simplest and flexible techniques are discussed in this book from basics. This book explains how to segment images using state-of-the-art methods and recent innovations incorporating Deep Learning. Also, image segmentation is usually the first step towards various image processing applications like medical imaging, object detection, machine vision, recognition, image mining, image restoration, image enhancement, etc. and thus, is a critical topic to study. In this book, each chapter introduces image segmentation topics and includes information regarding when one method may be preferred over another to obtain specific image features. Numerous step-by-step examples illustrate the processing and analysis routines, allowing you to quickly understand how to get the desired results when working with your own image data. This book is not intended to be a complete source for image processing knowledge, an advanced image processing manual or an image processing reference guide. This book is designed to teach people how to segment images effectively and does not assume that they are already experts in the field of image processing.
Today, the medical industry, astronomy, physics, chemistry, forensics, remote sensing, manufactur... more Today, the medical industry, astronomy, physics, chemistry, forensics, remote sensing, manufacturing, and defense are just some of the many fields that rely upon images to store, display, and provide information about the world around us. The challenge to scientists, engineers and business people is to quickly extract valuable information from raw image data. This is the primary purpose of image processing - converting images to information. The main aim of image segmentation is to identify meaningful objects from a given image. For example, a boy of just four years can see/detect/locate a pen on a table, as he is naturally equipped with image segmentation power. However, robots cannot do it, until they use image segmentation algorithms. To perform an image segmentation task, several techniques have been developed. The simplest and flexible techniques are discussed in this book from basics. This book explains how to segment images using state-of-the-art methods and recent innovations incorporating Deep Learning. Also, image segmentation is usually the first step towards various image processing applications like medical imaging, object detection, machine vision, recognition, image mining, image restoration, image enhancement, etc. and thus, is a critical topic to study. In this book, each chapter introduces image segmentation topics and includes information regarding when one method may be preferred over another to obtain specific image features. Numerous step-by-step examples illustrate the processing and analysis routines, allowing you to quickly understand how to get the desired results when working with your own image data. This book is not intended to be a complete source for image processing knowledge, an advanced image processing manual or an image processing reference guide. This book is designed to teach people how to segment images effectively and does not assume that they are already experts in the field of image processing. This book will be indexed in the United States National Library of Medicine (NLM), a branch of the National Institutes of Health (NIH), and the partner of PubMed, the worlds most accredited bibliographic database for the biomedical literature. This book will be submitted to be indexed in the SCOPUS, the worlds most accredited bibliographic database.
2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Sep 1, 2017
This paper presents a renewable energy hybrid power system based on photovoltaic (PV) and wind, a... more This paper presents a renewable energy hybrid power system based on photovoltaic (PV) and wind, and equipped with Cuk DC-DC converter, three phase inverter and LC filter. The wind and PV energy are suitable for hybrid system because they are environmental friendly and widely available in India. However, the hybrid power system that solely depends on the intermittent renewable energy sources generates a fluctuating output voltage that leads to damage to the machines operating on a stable supply. The modeling of the hybrid system with Cuk converter, three phase inverter and LC filter are done using MATLAB Simulink. Blocks such as wind model, photovoltaic model, Cuk converter, inverter and LC filter are built separately before combining into a complete DC voltage hybrid system with main grid of power system. Different irradiance value and varying wind speed are the input parameters for the project simulation. The results show that hybrid system has better reliability in terms of output voltage generation as compared to standalone system. In addition, Cuk DC-DC converter, three phase universal bridge based inverter and LC filter that are installed in the hybrid system are able to reduce the fluctuation output voltage.
This paper presents a novel image mining approach based on weighted substructure. The problem is ... more This paper presents a novel image mining approach based on weighted substructure. The problem is modeled in terms of creating a dataset of images and extracting the features of each image. Then graphs are generated for each image based on these features. There are many possible ways to obtain features of images from a graph but one of the most natural ways is to represent a graph is by a set of its substructure. The weight factor is used to measure the actual importance of each different substructure in a given graph dataset. On the basis of weighted substructure graphs the image mining process is done. For image mining, an external query image is provided by user. Its features are extracted and graph is generated. Later the substructure of query image is matched with the substructure of the dataset. The most closely matched substructures of images from the dataset are identified and it can be concluded that the identified images are close to the query image. The experiments are carried out on a dataset of 1000 natural as well as synthetic images from online resources and it is found that the mined images are most closely related to the query image.
Image segmentation is the very first step in almost all the image processing applications where t... more Image segmentation is the very first step in almost all the image processing applications where the properties of objects in images are need to be analyzed. By objects, we mean information of the image like color, texture, shape, edges, boundaries and structure. Various different algorithms have been employed to extract this information from the images. This paper provides a systematic review of image segmentation approaches. Our survey focuses on five key aspects: concept used by the authors, the performance evaluation parameter used by them, the database used, claims by those authors and our findings. Also, the whole analysis is presented by categorizing the different segmentation approaches in five parts; graph based methods, thresholding-based methods, clustering methods, edge based approached and contours/wavelet based methods. The whole idea of the work is to provide a systematic and comparative analysis of the various approaches. Also, relevant databases and the list of performance parameters is also provided.
Power System Engineering, Feb 9, 2018
This paper presents a threestratified network construction of web of Things (IOT) communication t... more This paper presents a threestratified network construction of web of Things (IOT) communication technique for high-voltage conductor that involves the wireless self-organized sensing element network (WSN), fiber composite overhead ground wire (OPGW), general packet radio service (GPRS) and therefore the Beidou (COMPASS) navigation satellite system (CNSS). The operate of every layer of network, application preparation and management of energy consumption area unit studied. the tactic will meet the requirements of interconnection between the observance center and terminals, cut back the terminals’ GPRS and CNSS configuration and OPGW optical access points, and make sure the on-line observance knowledge transmission time period and reliable below things of remote region, extreme weather and alternative environmental conditions.
The demands of android smart phones and its use has increased rapidly. As a result, the need for ... more The demands of android smart phones and its use has increased rapidly. As a result, the need for competent message and file sharing techniques for android phones has increased. Messaging has emerged as one of the most important feature and applications in mobiles. The existing messaging techniques incorporate the use of the internet and SMS service. Various techniques of message passing and file sharing by using Wi-Fi/Internet through QR code for hiding purpose and maintaining its integrity are developed. This paper presents an overview of the existing techniques of secure message passing and file sharing in android phones. The overview is followed by our suggested approach which incorporates the RSA algorithm which can be used to encrypt and decrypt the message and MD5 algorithm can be used to check its integrity. The suggested approach ratifies the concept to reduce the use of mobile data while sharing of text or other file over the internet.
Through this paper, the need of utilization of hybrid modeling for the development and sustenance... more Through this paper, the need of utilization of hybrid modeling for the development and sustenance of technologies for cyber threats on Industrial Control Systems (ICS) is indicated. In this paper, the review of the existing security systems and the challenges faced by them is portrayed; followed by the recommendations addressing those issues is provided. Later, the description of Virtual Control System Environments (VCSE) is provided which Sandia has implemented
Through this paper we have an inclination to apprehend 2 questions: (1) Why ought to we have a te... more Through this paper we have an inclination to apprehend 2 questions: (1) Why ought to we have a tendency to have an interest within the security of control systems? And (2) What are the new and essentially totally different necessities and issues for the protection of control systems? We have a tendency to additionally propose a novel mathematical framework to investigate attacks against control systems. At times, this framework has a tendency to formulate specific analysis issues to (1) find attacks, and (2) survive attacks.
This paper presents the detailed analysis of the existing state-of-the-art real time face detecti... more This paper presents the detailed analysis of the existing state-of-the-art real time face detection and recognition approaches and a possible solution to the identified problems. The analysis covers the face detection, pattern recognition and measurement of facial part. The analysis of the Viola-Jones is followed by a possible model approach. This approach is based on a combination of techniques and algorithms working on Viola–Jones object detection platform
Transmission lines consume a substantial quantity of power. The requirement of power and its depe... more Transmission lines consume a substantial quantity of power. The requirement of power and its dependency has grown exponentially over the years. The void between restricted production and tremendous demand has enlarged the main focus on minimizing power losses. The transmission losses vary from the conjecture factors like physical or environmental losses to severe technical losses. The first factors like reactive power and voltage deviation area unit important in stretched conditions and long vary transmission lines of powers. The topic of power transmission has continually been associated with the interest of researchers. Various ways are developed to maximize the output of the systems. This paper reviews concerning completely different techniques for transmission fault detection. Keywords—Transmission Line Fauts, Fault locations,
Uploads
Papers by Vikramsingh Parihar