11 results on '"Vikas, Verma"'
Search Results
2. IOT Assisted Smart Farming using Data Science Techniques
- Author
-
Vikas Verma, null Ramakant, Hemant Mathur, and Neha Agarwal
- Published
- 2022
- Full Text
- View/download PDF
3. Identification of with Face Mask and without Face Mask using Face Recognition Model
- Author
-
Ratnesh Kumar Shukla, Arvind Kumar Tiwari, and Vikas Verma
- Published
- 2021
- Full Text
- View/download PDF
4. Cyber Security: Terms, Laws, Threats and Protection
- Author
-
Manasi Jha, Anand C S, Yogesh Mahawar, Uday Kalyan, and Vikas Verma
- Published
- 2021
- Full Text
- View/download PDF
5. A Review of IOT Based Evaporation Coolers
- Author
-
Vikas Verma, Aditi Pandey, Danish Equbal, Prachi Sengar, and Shivam Tripathi
- Subjects
Cost efficiency ,business.industry ,Computer science ,Storage tank ,Evaporation ,Water cooling ,Smart water ,Water tanks ,Process engineering ,business ,Internet of Things ,Host (network) - Abstract
Water tanks are one of the main components of an evaporation cooling system. The water levels in these tanks needs to be regulated to obtain their optimal performance. This paper reviews the application of Internet of Things (IOT) in hot water tanks with the objective of making the system more cost efficient. In the absence of a monitoring system for a water tank, there is a high possibility of water overflow. The smart water tank solutions provide automatic monitoring of water available in the tank and simultaneously provides the user with real time updates using a host of incorporated sensors. The IOT based system enables the water pump to start automatically when the water level falls below the threshold and switches it off at the instant the tank is full. The cooler’s new technological shift with the use of IOT has improved their performance over conventional coolers’. Furthermore, IoT has enabled incorporation of various other functionalities within the cooler to address other real time issues in cooling. Several scientific techniques that have been employed to improve the performance of the coolers have been reviewed in this work.
- Published
- 2021
- Full Text
- View/download PDF
6. Regulation of DC Bus Voltage for DC MicroGrid Using PSIM
- Author
-
Gaurav Singh, Ahteshamul Haque, Vikas Verma, and Shabana Urooj
- Subjects
Buck converter ,Computer science ,business.industry ,Boost converter ,Photovoltaic system ,Buffer amplifier ,Electrical engineering ,Voltage regulation ,Microgrid ,business ,DC-BUS ,Maximum power point tracking - Abstract
Today the DC Microgrid has achieved popularity due to its easy interconnection with renewable energy resources and high reliability. This paper presents the voltage regulation of DC microgrid using a solar photovoltaic module, Li-ion Battery and AC grid as an input source. The outputs of these three inputs are interconnected with help of buffer circuit and are fed to dc bus. The voltage across DC bus is maintained to a certain desired value, which is being further regulated to four different lower voltages with help of buck converters. Buffer circuits are used to monitor the instantaneous power imbalance between source and load of the entire circuit. The boost converter is connected along the PV module and Li-ion battery respectively to regulate the output voltage of these sources to the desired value which is being fed to dc bus. The Maximum Power Point Tracking is also connected to the PV module which is essential to drive the system to the maximum power point to obtain the much efficiency. The system is modelled and simulated in the PSIM working environment. The dc bus voltage is also regulated to four different voltages levels so that the different dc household loads can be connected through it.
- Published
- 2018
- Full Text
- View/download PDF
7. Twitter Sentiment Analysis of Real-Time Customer Experience Feedback for Predicting Growth of Indian Telecom Companies
- Author
-
Vikas Verma, Sumesh Sood, and Sandeep Ranjan
- Subjects
Customer experience ,Resource (project management) ,Customer base ,Social network ,business.industry ,Sentiment score ,Sentiment analysis ,Collective intelligence ,Competitor analysis ,InformationSystems_MISCELLANEOUS ,business ,Telecommunications - Abstract
Corporations have always desired prompt customer experience feedback about their products for amending current pricing and policies to stay ahead of their competitors. A positive customer experience can be created by analyzing customer sentiments and acting on them promptly. Social networks like Twitter represent collective intelligence and opinion of the general public and hence can be harnessed for real-time feedback. They have evolved as a resource for extracting sentiments for applications in various fields. Sentiment analysis can be used to obtain the overall customer experience of a large customer base on a real time. In this research, a total of 153,651 distinct tweets for Twitter handle of 5 popular telecom brands in India: Aircel, Bharti Airtel, Idea Cellular, Reliance Jio and Vodafone India were extracted for five months to develop a prediction model for telecom subscriber addition using the sentiment score. The results were validated statistically using correlation analysis. Positive customer sentiments about the brand which they prefer is reflected by higher growth rate of new subscribers added with that brand in the study period. The sentiment analysis results can be used by managements to take timely actions for improving the future customer experience and avoiding customer churn.
- Published
- 2018
- Full Text
- View/download PDF
8. A Comparative Analysis of Various Congestion Control Schemes in Wireless Sensor Networks
- Author
-
Vikas Verma, Arun Malik, and Manpreet Kaur
- Subjects
Routing protocol ,business.industry ,Computer science ,Wireless network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Network congestion ,Base station ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Network performance ,business ,Wireless sensor network ,Computer network - Abstract
A Wireless Sensor Network (WSN) is one category of wireless network which plays a crucial role in many application areas like industrial process monitoring, health care monitoring, military supervision etc. WSN basically comprises of base stations and numerous sensor nodes that are placed in the geographical areas. These sensor nodes collect the information from areas and sends to the base station (sink node). When there are large numbers of sensor nodes is busy in transmitting data towards sink node then there is possibility of congestion in the network. Congestion has a significant role in reducing performance of the network or failure in network. So it is necessary to become aware of congestion and manage the congested resources in wireless sensor networks for enhancing the network performance. Thus, particular considerations are compulsory to build up more sophisticated methods to avoid, detect, and resolve congestion. Different approaches have been introduced in the past few years some include routing protocols aided with congestion detection and control mechanism, and devoted congestion control protocols. In conclusion, a comparative analysis of different protocols is made depending upon their performance on various parameters and the paper is concluded.
- Published
- 2018
- Full Text
- View/download PDF
9. A novel approach for encoding and decoding of high storage capacity color QR code
- Author
-
Vikas Verma, Ashwdeep Singh, and Gaurav Raj
- Subjects
Theoretical computer science ,Computer science ,business.industry ,Reading (computer) ,020208 electrical & electronic engineering ,Process (computing) ,02 engineering and technology ,Computer engineering ,Encoding (memory) ,Computer data storage ,0202 electrical engineering, electronic engineering, information engineering ,Code (cryptography) ,business ,Decoding methods - Abstract
With the enhancement in mobile technology, QR (Quick Response) codes became popular. QR codes are widely used in our daily life from social media websites to cashless shopping wallets, ERP(Enterprise Resource Planning) software implementation to display advertising and digital marketing etc. In this paper we have focused upon one major issue with the QR codes. We have focused upon data various techniques used to increase data storage capacity of QR code. This paper is divided into five subparts. In first part we have introduced about basics of QR codes, their versions, creating and scanning process and its various applications. Then in second part we have written about various features of QR codes, due to them QR code became so popular and we have also discussed about its structure to understand its basic functionality. Thereafter we have compared three different kinds of co des-b ar code, quick response code and color quick response code, on the basis of its storage capacity, error resistance, 360° reading and other factors. Then in fourth part we have reviewed the literature and mentioned various techniques used by researcher to in crease data storage capacity of QR codes. In fifth part of this research paper we have proposed encoding and decoding algorithm, which will result into high storage color QR code. And a t the end, we have discussed about our future directions in order to increase storage capacity of QR codes and make stored information more secure and reliable for the end users.
- Published
- 2017
- Full Text
- View/download PDF
10. Design of a lead-lag compensator for position loop control of a gimballed payload
- Author
-
Gaurav Verma, Himanshu Verma, Vikas Verma, and Sumit Jhambhulkar
- Subjects
Automatic control ,Payload ,Computer science ,Control theory ,Frequency domain ,Bandwidth (signal processing) ,Control engineering ,Digital control ,Gimbal ,Robust control ,Lead–lag compensator ,Inertial navigation system - Abstract
In the last few years Digital controllers are widely used because of their excellent qualities of simplicity, effectiveness and they are applicable for broad class of systems. At present their involvement in industrial processes is more than 95%. They generally relate to accuracy, relative stability and speed of the response so as to yield an optimal control system for the given purpose. In this paper, the control of gimbal has been stated for the defence application mounted on the tank. A gimbal is a mechanical arrangement, which is used to isolate the payload from the moving vehicle. This is particularly used in line of stabilization systems and inertial guidance systems [1]. These systems require very fast and accurate control within a particular bandwidth. In the present problem, the digital controller is implemented using frequency domain approach in order to control the rate of motion of platform, meeting the stringent requirements of disturbance attenuation and robust stability.
- Published
- 2015
- Full Text
- View/download PDF
11. An enhanced Least Significant Bit steganography method using midpoint circle approach
- Author
-
Vikas Verma, Poonam, and Rishma Chawla
- Subjects
Steganalysis ,Steganography tools ,Sequence ,Least significant bit ,Theoretical computer science ,Pixel ,Steganography ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Midpoint ,Algorithm ,Image (mathematics) ,Mathematics - Abstract
To increase the security of messages sent over internet steganography is used. Various steganography techniques have been proposed so far. Least Significant Bit steganography is one such technique in which least significant bit of pixels of the image is replaced with data bits. This approach has the advantage that it is simplest one to understand, easy to implement and results in stego-images that contain embedded data as hidden. The disadvantage of Least Significant Bit is that it is vulnerable to steganalysis and is not secure at all. So as to make it more secure, the least significant bit algorithm is modified to work in different way. This proposed approach simply does not pick up least significant bits of pixel in a sequence but is combined with midpoint circle approach to choose which pixels are used to hide message. The goals of this paper are to present theoretic analysis of Least Significant Bit approach and to propose an advanced LSB embedding scheme that exhibits not only the advantages of LSB but also provides additional level of security. The scheme breaks the regular pattern of LSB, resulting in increased difficulty of steganalysis and thereby raising the security level.
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.