Teaching Documents by Sanjay Singh
Papers by Sanjay Singh
Multicarrier transmission system such as Orthogonal Frequency Division Multiplexing (OFDM) is a p... more Multicarrier transmission system such as Orthogonal Frequency Division Multiplexing (OFDM) is a promising technique for high bit rate transmission in wireless communication systems. OFDM is a spectrally efficient modulation technique that can achieve high speed data transmission over multipath fading channels without the need for powerful equalization techniques. A major drawback of OFDM is the high Peak-to-Average Power Ratio (PAPR) of the transmit signal which can significantly impact the performance of the power amplifier. In this paper we have compared the PAPR reduction performance of Golay and Reed-Muller coded OFDM signal. From our simulation it has been found that the PAPR reduction performance of Golay coded OFDM is better than the Reed-Muller coded OFDM signal. Moreover, for the optimum PAPR reduction performance, code configuration for Golay and Reed-Muller codes has been identified.
Multicarrier transmission system such as Orthogonal Frequency Division Multiplexing (OFDM) is a p... more Multicarrier transmission system such as Orthogonal Frequency Division Multiplexing (OFDM) is a promising technique for high bit rate transmission in wireless communication system. OFDM is a spectrally efficient modulation technique that can achieve high speed data transmission over multipath fading channels without the need for powerful equalization techniques. However the price paid for this high spectral efficiency and less intensive equalization is low power efficiency. OFDM signals are very sensitive to nonlinear effects due to the high Peak-to-Average Power Ratio (PAPR), which leads to the power inefficiency in the RF section of the transmitter. This paper investigates the effect of PAPR reduction on the performance parameter of multicarrier communication system. Performance parameters considered are power consumption of Power Amplifier (PA) and Digital-to-Analog Converter (DAC), power amplifier efficiency, SNR of DAC and BER performance of the system. From our analysis it is ...
2018 International Conference on Computer, Communication, and Signal Processing (ICCCSP), 2018
With the social media boom in today's world, we see people constantly uploading photos of the... more With the social media boom in today's world, we see people constantly uploading photos of themselves along with their friends and family on various social media platforms such as Facebook, Instagram, Twitter, Google+, etc. What if they want to see all the photos in a categorized form such as photos with a particular person. In this paper, we extend the concept of Multiview Face Detection using Convolution Neural Networks (CNN) used by Farfade et al. by providing a tagging system for the detected faces. For the face detection, we use Deep Dense Face Detector, which uses a single model based on deep convolutional neural networks. All the detected faces are recognized using Local Binary Patterns Histograms (LBPH) method. Precision, recall, and F-measure are the parameters used to measure the performance of the algorithm. An accuracy of 85% is achieved for tagging the faces which are successfully detected.
2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2018
The chroot system call implemented in Unix-like (or *nix) OSes changes a view of the file structu... more The chroot system call implemented in Unix-like (or *nix) OSes changes a view of the file structure for the calling process and its children by changing the root directory for them. It was intended as an administrative tool and not a security one and the Linux implementation follows the Portable Operating System Interface (POSIX) standards. However, it is used as a security tool extensively. Difference in intended use and actual use of chroot in Linux implementation has resulted in labeling of some features as security vulnerabilities. Vulnerabilities could allow malicious users to completely circumvent the security aspect of chroot. The methods used in this paper removes the cause of those vulnerabilities which results in a more secure construct. Some of those are: not changing of the Current Working Directory (CWD), not closing file descriptors and allowing mounting of file systems inside the newly created environment. In this paper we try to address these specific issues by modifying the system calls in the system call table and more generally, present a solution with a good design. The proposed solutions aims to improve the design of chroot when used as a security construct.
2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017
A quadrotor Micro Aerial Vehicle (MAV) is designed to navigate a track using neural network appro... more A quadrotor Micro Aerial Vehicle (MAV) is designed to navigate a track using neural network approach to identify the direction of the path from a stream of monocular images received from a downward-facing camera mounted on the vehicle. Current autonomous MAVs mainly employ computer vision techniques based on image processing and feature tracking for vision-based navigation tasks. It requires expensive onboard computation and can create latency in the real-time system when working with low-powered computers. By using a supervised image classifier, we shift the costly computational task of training a neural network to classify the direction of the track to an offboard computer. We make use of the learned weights obtained after training to perform simple mathematical operations to predict the class of the image on the onboard computer. We compare the computer vision based tracking approach with the proposed approach to navigate a track using a quadrotor and show that the processing rat...
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), 2016
Finding regions of interest is a challenge when traveling in an unfamiliar area. Users traveling ... more Finding regions of interest is a challenge when traveling in an unfamiliar area. Users traveling in an unfamiliar region may like to travel in a direction which includes places that are interesting to them. In this paper we propose a method of finding nearby regions for potential Points of Interest (POI) (e.g., sightseeing places and commercial centers) while traveling in an undefined path. A continuous algorithm is proposed to address these challenges. Conceptually, the algorithm searches for nearby spatial objects(POIs or geo-tagged tweets). Distance and density are the two factors used to progress as well as stop the search. The search space is constrained using density and distance threshold along with an adjustment factor to adjust the importance of the two domains. The performance of the continuous algorithm is measured based on experiments conducted on spatial data. The experimental results has shown to retrieve all the POIs on a unfamiliar path in the real time.
2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017
In Artificial Intelligence, games are the most challenging and exploited field. A language game i... more In Artificial Intelligence, games are the most challenging and exploited field. A language game is one such type of open-world game in which the word or phrase meaning plays an important role. Playing and solving such type of game is based on the player's ability to find the solution which depends on the richness of the player's cultural background for answering the question by understanding the question very well. This paper presents a challenging game which tells about Indian mythology in the form of games and requires knowledge covering a broad range of sources to be stored, which provides the knowledge background for getting the candidate solutions. The primary motivation is to create a system that processes the query and the clues provided, by finding the hidden association between the query and the clues within the knowledge repository and generates a list of multiple candidate solutions. For retrieving the unique solution, the multiple candidate solutions must be rank...
2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), 2018
Drivers of vehicles encounter various risks both external and internal during their course of ope... more Drivers of vehicles encounter various risks both external and internal during their course of operation of a vehicle on the road. One such risk is the proximity of vehicle with respect to another vehicle or an obstacle. This IoT based project examines a solution which directs/assists the driver to maintain a specified safe distance between vehicles on roads to and avoid unsafe conditions leading to accidents. In the event of lack of attention on behalf of the driver or temporary distraction, the system is designed to alert him to the required focus on the road. The project will attempt to examine the possible risk factors both qualitatively and quantitatively in order to incorporate data-based features into the system. Evaluation of the risk factors will be done through the study of published causes of road accidents in India. The results shall be in the form of a sensor graph which can be used to design the system and offer a standalone solution. The sensor data in the form of sens...
2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017
Face recognition has gained a great importance in recent years due to the increasing demands of t... more Face recognition has gained a great importance in recent years due to the increasing demands of the real-world applications. The modality-independent face recognition also known as heterogeneous face recognition is useful in many applications. Here modality refers to different lighting scenarios in which the picture of the subject is taken. Modality-independent face recognition addresses the issues of low illumination, discrepancies based on the modalities that is recognition of one image from the other image captured from two different sources for the same subject. To address this issue we have made use of mutual information concept. The mutual information between input and gallery images has been used to find the appropriate match between multi-modal images. The idea here is to find the appropriate match between a sketch and a photograph of the same subject. The proposed methodology is useful in crime investigation, law enforcement and for surveillance purposes.
2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017
In Non cooperative Game Theory, Nash Equilibrium can be computed by finding the best response str... more In Non cooperative Game Theory, Nash Equilibrium can be computed by finding the best response strategy for each player. However this problem cannot be solved deterministically in polynomial time. For some finite games, there might be more than one pure strategy Game Equilibrium. In such cases, the most optimal set of solutions give the Game Equilibria. Evolutionary Algorithms and specifically Genetic Algorithms, based on Pareto dominance used in multi-objective optimization do not incorporate the Nash dominance and the extent of dominance in finding the equilibria. Many pairs of solutions do not dominate each other based on the generative relation of Pareto dominance and Nash Ascendancy. In this paper a fitness function based on the generative relation of Nash Ascendancy has been proposed to enhance the comparison of two individuals in a population. It assigns a better fitness value to pair of individuals that do not dominate each other.
WSEAS TRANSACTIONS on COMMUNICATIONS archive, 2012
Now a days almost everybody is having a portable communication device, be it a laptop, a tablet o... more Now a days almost everybody is having a portable communication device, be it a laptop, a tablet or smart phones. The user would like to have all the services at his fingertips and access them through the portable device he owns. The user would exchange data with the other user or the service provider or control the smart appliances at his home. The interactions between the user’s device and the service provider must be secure enough regardless of the type of device used to access or utilize the services. In this paper we propose a ”Three Way Authentication (TWA)” technique intended to preserve the user privacy and to accomplish ownership authentication in order to securely deliver the services to the user devices. This technique will also help the users or the service providers to check whether the device is compromised or not with the help of the encrypted pass-phrases that are being exchanged. The users use the devices to store most of the valuable information and will prove risky...
Uploads
Teaching Documents by Sanjay Singh
Papers by Sanjay Singh
rapidly. A special class of service among them is the Location Based Service(LBS) which depends on the
geographical position of the user to provide services to the end users. However, a mobile device is still
resource constrained, and some applications usually demand more resources than a mobile device can a
ord. To alleviate this, a mobile device should get resources from an external source. One of such sources is
cloud computing platforms. We can predict that the mobile area will take on a boom with the advent of this
new concept. The aim of this paper is to exchange messages between user and location service provider in
mobile device accessing the cloud by minimizing cost, data storage and processing power. Our main goal
is to provide dynamic location-based service and increase the information retrieve accuracy especially on
the limited mobile screen by accessing cloud application. In this paper we present location based
restaurant information retrieval system and we have developed our application in Android.