Papers by shylaja V karatangi
Lecture notes in electrical engineering, 2023
2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Mar 4, 2021
Design and Implementation of gesture based human computer interface using microcontroller, image ... more Design and Implementation of gesture based human computer interface using microcontroller, image processing and standers computer system is presented. The purpose of design system is to solve real time problem of any disable persons using hand movement and performs basic task by recognition of static and dynamic gesture of hand. The propose system work with the classification of hand gesture with many sensors mounted at wearable gloves. The practical implementation is in the form of glove equipped with Accelerometer sensors for sensing hand movement and transmitter receiver module that assists the disable persons to communicate with world in natural way where user can transmit and receive the original data without need any other mode of communication. The main purpose of this paper is interaction of human with computer interface (HCI) that connects man and machine. The combined static and dynamic human gesture can be recognized with set of rules and regulation based on permutation and computation for an input signal of microcontrollers. All this instruction will be encrypted by the help of Advance Microcontroller. Basically this hand gesture recognition is based on three main phases-detection, tracking and recognition. This paper provides existing interaction related to gesture recognition system for human computer interaction and try to implement it in prototype.
cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bit... more cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key. Block ciphers are important elementary components in the design of many cryptographic protocols, and are widely used to implement encryption of bulk data. A block cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than applying it to one bit at a time. The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks. A recent promising low-cost alternative of advanced encryption standard (AES) on reconfigurable platforms called the SIMON. It has been implemented as the construction of the round function and the key generation of SIMON, that enables bit-s...
In today’s world, we cannot get real time status of available shops in our nearby market or marke... more In today’s world, we cannot get real time status of available shops in our nearby market or market at distance, which leads to waste of time, money and resources. Therefore, we have introduced a novel idea of smart market infrastructures with reference to local market scenario of Indian subcontinent. The idea is about using available technologies efficiently which will help us in solving real life problems which are very much local to these countries. The problems included such as “where is particular type of shop in my vicinity? Is it functional still or they have closed down their business? Is it open right now? What are their working hours? Do they have a particular item that I need?” In reality, the problem is not one-sided. The business owner too need information on customers such as “What are best suitable timings for my work place to keep open? When do most of the customers visit?”. These are some basic questions we may think of, but there may be several more. An upgraded sma...
this paper presents the design and implementation of a visual aid. It comprises of a radar unit, ... more this paper presents the design and implementation of a visual aid. It comprises of a radar unit, computer vision unit and a processing unit. The designed unit initially uses an implication graph on received data to form Implication Nodes (IN). These nodes are further used to form a Directed Acyclic Graph (DAG). The IN and DAG data is further fed to an optimization engine or Machine Learning Pipeline (MLP) for segregation and formation of the three dimensional environment. This environment is analysed by the processing unit and requisite voice commands are dictated to the user. Furthermore, this reinforced learning method ensures user specific learning and hence best performance results.
Algorithms for Intelligent Systems
The most burning problem nowadays in our society is crime against women and children, which is sp... more The most burning problem nowadays in our society is crime against women and children, which is spreading like a virus with upcoming generations. This paper aims at designing an electronic device which simulates his sensory nerves and motor nerves, which causes strong involuntary muscle contractions. This resists their movements for a certain span of time. Keeping in mind the situation of women in the society the device can only be operated by the one who owns, as it includes biometric touch sensors. The device produces extremely high voltage pulses in the range of 3 kV, with a rate of 5–10 pulses per second using boost convertor and voltage multiplier [1]. The high voltage zap causes pain in the body, numbness and loss of balance, this helps victim to escape to a safe place. No permanent injury is noticed from its use. The device uses a Bluetooth module to transmit data to mobile and it shares the location to registered contacts, whenever it is being used.
Proceedings of International Joint Conference on Computational Intelligence, 2020
In this paper, the CMOS Instrumentation amplifier using a three-stage operational Amplifier is pr... more In this paper, the CMOS Instrumentation amplifier using a three-stage operational Amplifier is presented for low power applications, whose operating power supply is 3 V. The power supply is reduced to decrease the power consumption of the whole circuit. The passive-resistive loads are replaced by active load, i.e. by NMOS (in linear region behaves as a resistor) which reduces the overall chip area and contributes to lesser power dissipation. Active load, in turn, produces higher resistance values compared to passive loads thus results in higher values of power gain. Its large gain can amplify even very small signals ranging from 10−6 Vs to 10−3 Vs. In the previous studies of two-stage Op-amp when operated with resistive load at the output, the overall gain of the circuit is reduced. Also, another problem with two-stage Op-Amp is the trade-off, when we reduce the channel length for increasing speed of Op-Amp then the gain is reduced. Thus, the three-stage Op-amp is presented which can have high gain, high operating speed also when operated at the lesser supply voltage. The proposed Operational amplifier is simulated in H-spice at Level-2 (i.e. 180 nm CMOS technology) and AC analysis results of Avanwaves are shown.
Journal of Physics: Conference Series
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of ... more In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key. Block ciphers are important elementary components in the design of many cryptographic protocols, and are widely used to implement encryption of bulk data. A block cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than applying it to one bit at a time. The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks. A recent promising low-cost alternative of advanced encryption standard (AES) on reconfigurable platforms called the SIMON. It has been implemented as the construction of the round function and the key generation of SIMON, that enables bit-serial hardware architectures which can significantly reduce the cost. Encryption and decryption can be done using the same hardware and also propose the hardware architecture of the smallest block cipher ever published on field-programmable gate arrays (FPGAs) at 128-bit level of security.
books by shylaja V karatangi
teaching documents by shylaja V karatangi
Uploads
Papers by shylaja V karatangi
books by shylaja V karatangi
teaching documents by shylaja V karatangi