West Bengal University Of Technology
Electronics and Communication Engineering
This paper proposes the technique of storing of image data in the FPGA memory and subsequent processing of the stored image data using MicroBlaze processor core of the Xilinx FPGA device. Though related research work exists in processing... more
The Internet of Things (IoT) is one of the major technological trends which is utilized to monitor natural and human made resources to help in predicting and detecting exigence events like flood, fire, gas and water leak that can pose an... more
Biometrics has become important in security applications. In comparison with many other biometric features, iris recognition has very high recognition accuracy because it depends on iris which is located in a place that still stable... more
- by gautam kumar
In this paper we propose a design using both a microprocessor and light sensors for automatic room light detection and control. Our design, the HLCM (Home Light Control Module) which will be installed in every light fixture of a family,... more
A new type of brain tumor identification system is proposed and analyzed in this paper by detecting Infected Region using a combination of Region Growing Algorithm, Cryptography and Digital Watermarking. The information related to... more
Willingness-To-Pay (WTP) is the most a person is willing to pay for a good or service. Conversely, Willingness-To-Accept (WTA) is the minimum amount a person is willing to accept for giving up a good or service. People often attribute a... more
Conversational agents have transcended into multiple industries with increased ability for user engagement in intelligent conversation. Conversations with chatbots are different from interpersonal communication in terms of turntaking,... more
Individual concerns about account takeover and subversion are well-documented. Surveys indicate that concerns for the privacy and security of online accounts are widely shared. Adopting Two-Factor Authentication (2FA) is an action that... more
A large proportion of email messages in an average Internet user's inbox are unwanted commercial messages from mailing lists, bots, and so on. Although such messages often include instructions to unsubscribe, people still struggle with... more
The purpose of this study is to understand the privacy concerns and behavior of non-WEIRD populations in online messaging platforms. Analysis of surveys (n = 674) of WhatsApp users in Saudi Arabia and India revealed that Saudis had... more
Technology is uniquely positioned to help us analyze large amounts of information to provide valuable insight during widespread public health concerns, like the ongoing COVID-19 pandemic. In fact, information technology companies like... more
The IETF Manufacturer Usage Description (MUD) standard was designed to protect IoT devices through network micro-segmentation. In practice, this is implemented using per-device access control that is defined by the manufacturer. This... more
The behaviour of nonlinear turbo codes that use nonlinear finite state sequential machines (FSSMs), designed over the finite field GF(4), as constituent encoders is studied. These FSSMs show a nonzero output for the all-zero input case.... more
- by moni ghosh
Graphical elements: particularly tables and figures contain a visual summary of the most valuable information contained in a document. Therefore, localization of such graphical objects in the document images is the initial step to... more
- by Ranajit Saha
In this conference proceeding, a novel intensity profile measuring systems is presented that is controlled by gesture recognition principles. This low-cost device works much faster and can be used to measure profiles of wide variety of... more
The extraction of blood vessels by morphological segmentation and the detection of the severity of diabetic retinopathy are proposed in this paper. The proposed algorithm extracts the finest vessels in the retina within a remarkably... more
Fingerprint recognition, one of the important biometric verification tools plays an important role in maintaining good security in any sort of systems. The fingerprint recognition in this paper deals with the extraction of features... more
Diabetic Retinopathy, one of the most common diseases occurring in diabetic patients results in partial or complete vision loss. So, its early detection is needed and needs to be taken care of. The paper deals with the filter based... more