Papers by NISHAD TN
Support Vector Machine(SVM) is a classifier algorithm widely used in signal,image,data clustering... more Support Vector Machine(SVM) is a classifier algorithm widely used in signal,image,data clustering operations. This paper gives brief idea about SVM in MATLAB
Energy saving is of important concern in case of both domestic and industrial buildings. There ar... more Energy saving is of important concern in case of both domestic and industrial buildings. There are various automated systems for power control and energy saving. Most of those methods are based on Wireless Sensor Networks (WSNs). These systems has drawback of high false alarms since they are depending on sensor values for generating output. This paper explains a vision based system which works on video surveillances now widely used in buildings. The system will continuously check whether any human is present in the room, if not it will automatically switch off the electrical appliances in the room. The entire project consists of two units. DSP unit for human presence detection via head tracking, Embedded unit for controlling the appliances.
In this letter, it is proposed that g2
m/ID, which has
been used as the figure of merit (FoM) of ... more In this letter, it is proposed that g2
m/ID, which has
been used as the figure of merit (FoM) of MOSFETs for analog
amplifiers, can also be used as the RF MOSFET FoM for optimizing
low-noise amplifier (LNA) performance.

Super-resolution is a widely applied technique that improves the resolution of input images by so... more Super-resolution is a widely applied technique that improves the resolution of input images by software methods. Most conventional reconstruction-based super-resolution algorithms assume accurate dense optical flow fields between the input frames, and their performance degrades rapidly when the motion estimation result is not accurate enough. However, optical flow estimation is usually difficult, particularly when complicated motion is presented in real-world videos. In this paper, we explore a new way to solve this problem by using sparse feature point correspondences between the input images. The feature point correspondences, which are obtained by matching a set of feature points, are usually precise and much more robust than dense optical flow fields. This is because the feature points represent well-selected significant locations in the image, and performing matching on the feature point set is usually very accurate. In order to utilize the sparse correspondences in conventional super-resolution, we extract an adaptive support region with a reliable local flow field from each corresponding feature point pair. The normalized prior is also proposed to increase the visual consistency of the reconstructed result. Extensive experiments on real data were carried out, and results show that the proposed algorithm produces high-resolution images with better quality, particularly in the presence of large-scale or complicated motion fields.

Detection of salient motion in a video involves determining which motion is attended to by the hu... more Detection of salient motion in a video involves determining which motion is attended to by the human visual system in the presence of background motion that consists of complex visuals that are constantly changing. Salient motion is marked by its predictability compared to the more complex unpredictable motion of the background such as fluttering of leaves, ripples in water, dispersion of smoke, and others. We introduce a novel approach to detect salient motion based on the concept of "observability" from the output pixels, when the video sequence is represented as a linear dynamical system. The group of output pixels with maximum saliency is further used to model the holistic dynamics of the salient region. The pixel saliency map is bolstered by two region-based saliency maps, which are computed based on the similarity of dynamics of the different spatiotemporal patches in the video with the salient region dynamics, in a global as well as a local sense. The resulting algorithm is tested on a set of challenging sequences and compared to state-of-the-art methods to showcase its superior performance on grounds of its computational efficiency and ability to detect salient motion.

This paper proposes a new data-hiding method based on pixel pair matching (PPM). The basic idea o... more This paper proposes a new data-hiding method based on pixel pair matching (PPM). The basic idea of PPM is to use the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. The pixel pair is then replaced by the searched coordinate to conceal the digit. Exploiting modification direction (EMD) and diamond encoding (DE) are two data-hiding methods proposed recently based on PPM. The maximum capacity of EMD is 1.161 bpp and DE extends the payload of EMD by embedding digits in a larger notational system. The proposed method offers lower distortion than DE by providing more compact neighborhood sets and allowing embedded digits in any notational system. Compared with the optimal pixel adjustment process (OPAP) method, the proposed method always has lower distortion for various payloads. Experimental results reveal that the proposed method not only provides better performance than those of OPAP and DE, but also is secure under the detection of some well-known steganalysis techniques.
RFID tags are devices of very limited computational capabilities, which only have 250-3K logic ga... more RFID tags are devices of very limited computational capabilities, which only have 250-3K logic gates that can be devoted to securityrelated tasks. Many proposals have recently appeared, but all of them are based on RFID tags using classical cryptographic primitives such as PRNGs, hash functions, block ciphers, etc. We believe this assumption to be fairly unrealistic, as classical cryptographic constructions lie well beyond the computational reach of very low-cost RFID tags. A new approach is necessary to tackle this problem, so we propose an extremely efficient lightweight mutual-authentication protocol that offers an adequate security level for certain applications and can be implemented even in the most limited low-cost RFID tags, as it only needs around 150 gates.
Teaching Documents by NISHAD TN
The WDT is similar to the Master Clear External Reset as it will hold a PIC® MCU in reset when ac... more The WDT is similar to the Master Clear External Reset as it will hold a PIC® MCU in reset when activated and place the Program Counter back to the beginning of the program software (org 0). The WDT is activated when its time-out period is exceeded. It is a free running timer independent of the main system clock. If the operation of the code in the device is affected by an external source that causes the software to deviate from its expected path, the WDT may be able to reset the device automatically depending how the reset is used in the design. The software designer can place instructions to clear the WDT counter and prevent a WDT reset from occurring. It's when those instructions are not executed, such as when an external interference affects the proper operation, that the WDT will engage and reset the device.
User guide and sample programs for beaglebone black...
Uploads
Papers by NISHAD TN
m/ID, which has
been used as the figure of merit (FoM) of MOSFETs for analog
amplifiers, can also be used as the RF MOSFET FoM for optimizing
low-noise amplifier (LNA) performance.
Teaching Documents by NISHAD TN
m/ID, which has
been used as the figure of merit (FoM) of MOSFETs for analog
amplifiers, can also be used as the RF MOSFET FoM for optimizing
low-noise amplifier (LNA) performance.