Browsing by Author "Chaya, Ravindra"
Now showing 1 - 9 of 9
Results Per Page
Sort Options
Item Automated blood cells segmentation and counting(AIKTC, 2015-05) Chaya, Ravindra; Siddique, Sufiyan; Haidery, Waqar; Shaikh, Waqas; Sayyed, Mohammed RizwanBlood cell segmentation and identification are centered on the pre-processing of the image, segmentation of the Regions of Interest (ROI) and identification or classification of the cells. Recent studies have suggested different method for segmentation and identification of blood cells. Counting of blood cells (rbc or wbc) in blood cell images is very important to detect as well as to follow the process of treatment of many diseases like anaemia, leukaemia, lung nodule etc. However, locating, identifying and counting of blood cells manually are tedious and time consuming that could be simplified by means of automatic analysis, in which segmentation is a crucial step. We present an approach to automatic segmentation and counting of blood cells in microscopic blood cell images using Hough Transform. Morphological is a very powerful tool in image processing, and it is been used to segment and extract the blood cells (rbc or wbc) from the background and other cells. The algorithm used features such as shape of desired blood cells for counting process. The result presented here is based on images with normal blood cells. The process is initiated by image acquisition and image enhancement process. Noise removal from the blood smear image is the first step. This removes the unwanted pixels from the image. Further the edges are preserved and binarization of the image is performed, separating the region of interest from the background. Further the edges are preserved and binarization of the image is performed. Then the task is to differentiate red blood cells from the various other components in the blood by the segmentation process. Morphological operations are applied on the blood image followed by RBC counting using Hough transform which is an efficient image segmentation technique. The primary goal of the proposed system is to detect and count all the RBC including the overlapping ones in the blood smear image.Item Design algorithm for WSNs with mixed traffic using RPL(AIKTC, 2017-05) Chaya, Ravindra; Ustad, Reshma (14DET66); Qazi, Sarim (14DET100); Obaid, Md. Umar (14DET93)Nowadays, Internet of Things (IoT) becomes a potential future scenario of the applicability and impact of technology in human life. The benefits of connecting both WSN and other IoT elements go beyond remote access, as heterogeneous information systems can be able to collaborate and provide common services Our work is a combination of Scilab and its implementation on a Conkiti OS with Cooja simulator and using IOT which can provide us with number of parameters and applications. The specification of the Ipv6 Routing Protocol for Low-power and Lossy Networks was specified inside RFC 6550 [1]. Scilab is used for the design the RPL algorithm. To create the topology of WSN RPL algorithm we used one sink node and many remaining node.Item Fingerprint based driving license management system(AIKTC, 2016-05) Chaya, RavindraThe general trend of human nature always longing for security Physically, Mentally and Socially. Fingerprint based security access control and identity systems are used for all kinds of office and service sector operations in the day today environment. Fingerprint System based access control is more secured as compared to the conventional swipe card or ID cards because of the exclusive fingerprint for every entity. Fingerprint Systems have fascinated people for centuries. They have been used as a method of personal identification since ancient times. The two key aspects of most of the Fingerprint System biometric solutions are Finger Print identification and authentication. The process of identification tells you who an individual is, or in the negative sense tells you who they are not. Fingerprints Security is examined using two different sets of criteria. One way of looking at Fingerprint Security System is using their "Class Characteristics". Finger Print Security Systems can be used to get rid of so many issues such as Physical Access Control, Health care Biometrics, Fingerprint and Biometrics Locks, Biometric Sensors and Detectors, RFID Tags, RFID Readers, Road Barriers, RFID Smart Card, CCTV, Metal Detectors, LED Search Lights, Fire Alarm, Finger Print Movement Control, Physical Access Control, Optical Fingerprint Scanners, Optical Sensors, Card Locks Card Access Control Systems, Fingerprint Technology, Digital Fingerprint, USB Fingerprint Reader etc.Item Metastatic cancer detection using machine learning(AIKTC, 2020-05) Chaya, Ravindra; Chevula, Srinivasulu (16ET13); Khan, Akbar Aslam (16ET19); Shaikh, Anwari Jahan (17DET35); Ansari, Fahim Ahemd (16ET09)We propose a model for digital pathology segmentation, based on the observation that histopathology images are inherently symmetric under rotation and reflection. Utilizing recent findings on rotation equivariant CNNs, the proposed model leverages these symmetries in a principled manner. We present a visual analysis showing improved stability on predictions, and demonstrate that exploiting rotation equivariance significantly improves tumor detection performance on a challenging lymph node metastases dataset. We further present a novel derived dataset to enable principled comparison of machine learning models. We want to achieve 97% accuracy by using CCN algorithm in machine learning.Item Open Source, Real-Time Temperature Monitoring & Control using Scilab & Arduino(AIKTC, 2016-05) Chaya, Ravindra; Shetty, Avinash (12ET58); Ansari, Farheen (12ET01); Fadnis, Moiz (12ET19); Quraishi, Shoeb (13ET65)Our project is a working model which incorporates temperature sensors to measure temperature. “Temperature Monitoring System”, is a system that can be used in an industrial like factory or inside the main distribution frame room for industries. Here we are using two open source platforms Arduino and Scilab for temperature monitoring. The Arduino and Scilab communicated with the help of serial port connection “USB-UART”. The main issues in a temperature monitoring system are how the system communicates with the user, if the temperature is beyond the stable temperature defined by the user. It is a system that is applied to detect temperature and display the value of temperature on the monitor, as well as it will be displayed on the LDC screen. The graph of the temperature variation with respect to time will be displayed on the monitor, which will give the value of temperature every second. While the monitoring system uses a computer system to monitoring the temperature data.Item Operation and maintanance alcatel 3G technology(AIKTC, 2016-05) Chaya, Ravindra; Idrisi, Tabrez (11ET18); Noormohd, Iqbal (11ET60); Khanvilkar, Yogesh (12ET34); Khan, Javed (12ET28)Operation and Maintenance System(OMS) has being an integral part of the Radio Access Network (RAN) pertaining to 3G telecommunication standard plays a vital role in managing the network. The systematic approach helps to uncover several defects related to system software release upgrade & back out, abnormal process terminations, shared memory violation and unusual process size growth. These diagnosis results have been evaluated through simulation studies and are compared with defined benchmarks of the field trial data in order to ensure overall performance stability, high quality and robustness of the OMS system.Item Performance evaluation of different routing protocol(AIKTC, 2017-05) Chaya, Ravindra; Pathan, Raza (13ET37); Siddiqui, Siraj Ali (13ET59)In this project, we are creating mobile-adhoc network(MANET) in which there are nodes which are moving in a particular speed through which we are selecting the shortest path which will decide to reach the destination from source. Here, we are using NS-2 SIMULATOR where we create 20 Nodes in this we are send the packet which is set of 1&0’s from source to destination with the help of shortest path by using different routing protocol such as DSDV, DSR and AODV. We measure how much packet is received by destination, how much energy consume by intermediate nodes, how much data packet is drop during sending, how much time it take to reach the destination.Item Scilab Textbook Companion for Electrical And Electronic Principles And Technology by J. Bird(National Mission on Education through ICT, 2013-11-29) Chaya, Ravindra; Siddique, SufiyanFunded by a grant from the National Mission on Education through ICT, http://spoken-tutorial.org/NMEICT-Intro. This Textbook Companion and Scilab codes written in it can be downloaded from the "Textbook Companion Project" section at the website http://scilab.inItem TRANSMISSION OF DATA USING POWER LINE CARRIER COMMUNICATION SYSTEM(International Journal of Electronics Communication and Computer Technology (IJECCT), 2012) Fakih, Awab; Khatik, Ramzan; Shaikh, Afzal; Chaya, RavindraThis paper serves as a general and technical reference to transmission of data using a power line carrier communication system which is a preferred choice over Wireless or other Home Networking technologies due to the ease of installation, availability of AC outlets, higher throughput, low cost, reliability and security. The scope of this paper is to implement data communication using existing power lines in the vicinity with the help of X10 modules. Keywords- Interoperability; Home Automation, Throughput, X10 protocol, CEPC.