Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7254045
N. P. Kumar, J. Shree, K. Vanithamani
Monocrystalline solar cells are the oldest, most efficient and dependable ways to produce electricity from the Sun, and these cells are temperature sensitive. This paper studies the relatively new method of cooling Monocrystalline solar cell with the arrangement of Thermoelectric cooler (TEC) at the back of the solar cell. The objective of thermoelectric cooler and cold plate arrangement is to maintain the operating temperature of solar cell. The experimental results are quite significant and efficiency enhancement is observed. The steady state thermal analysis of the model is done in ANSYS Fluent 6.3.26
{"title":"Experimental investigation and analysis on solar cell efficiency with thermoelectric cooler","authors":"N. P. Kumar, J. Shree, K. Vanithamani","doi":"10.1109/EESCO.2015.7254045","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7254045","url":null,"abstract":"Monocrystalline solar cells are the oldest, most efficient and dependable ways to produce electricity from the Sun, and these cells are temperature sensitive. This paper studies the relatively new method of cooling Monocrystalline solar cell with the arrangement of Thermoelectric cooler (TEC) at the back of the solar cell. The objective of thermoelectric cooler and cold plate arrangement is to maintain the operating temperature of solar cell. The experimental results are quite significant and efficiency enhancement is observed. The steady state thermal analysis of the model is done in ANSYS Fluent 6.3.26","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123493756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7254027
M. Shah, J. Sutaria, Chirag Chauhan
The bi-directional DC-DC converter has many applications, such as in hybrid vehicles, solar inverters, in power supplies for microprocessors etc. A bi-directional dc-dc converter can be alternately operated as a step down converter in one direction of energy flow and as step up converter in reverse direction of energy flow, which is from source to load and load to source. A high power supply using a single converter is not preferred as it leads to high ripple in output voltage and current, thus requiring large value of inductor and filter capacitor. To overcome these limitations multiphase interleaving technique is used in bi-directional DC-DC converters i.e. connecting the converters in parallel with the switching instants equally distributed among them. This paper presents the simulation and implementation of two phase bi-directional dc-dc converter.
{"title":"Design, simulation and implementation of two phase interleaved bi-directional DC-DC converter","authors":"M. Shah, J. Sutaria, Chirag Chauhan","doi":"10.1109/EESCO.2015.7254027","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7254027","url":null,"abstract":"The bi-directional DC-DC converter has many applications, such as in hybrid vehicles, solar inverters, in power supplies for microprocessors etc. A bi-directional dc-dc converter can be alternately operated as a step down converter in one direction of energy flow and as step up converter in reverse direction of energy flow, which is from source to load and load to source. A high power supply using a single converter is not preferred as it leads to high ripple in output voltage and current, thus requiring large value of inductor and filter capacitor. To overcome these limitations multiphase interleaving technique is used in bi-directional DC-DC converters i.e. connecting the converters in parallel with the switching instants equally distributed among them. This paper presents the simulation and implementation of two phase bi-directional dc-dc converter.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134288394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253695
V. S. Kumar, S. Anuradha
The Filter Bank Multicarrier (FBMC) modulation scheme has recently seen renewed interest and is being considered as a viable alternative to orthogonal frequency division multiplexing (OFDM). FBMC however suffers from the same high peak-to-average power ratio (PAPR) drawback as OFDM systems. Conventional OFDM PAPR reduction techniques cannot be directly applied to FBMC due to the overlapping nature of FBMC symbols. A novel technique is proposed to limit the peak factor of a multicarrier signal based on Sliding Window Tone Reservation. The peak-reducing signal is forced to have the constraints of SW-TR, so that when added to the original signal, the peak factor is reduced without increasing the BER and the out-of-band radiation. The proposed method has low computational complexity requirements and is fastconverging. Simulation results show that, the proposed technique outperforms a conventional FBMC SW-TR method by 1.6 dB in PAPR reduction at a clip probability of 10−3 on the 2nd iteration.
{"title":"Sliding Window Tone Reservation using smart gradient projection method for PAPR reduction of FBMC signals","authors":"V. S. Kumar, S. Anuradha","doi":"10.1109/EESCO.2015.7253695","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253695","url":null,"abstract":"The Filter Bank Multicarrier (FBMC) modulation scheme has recently seen renewed interest and is being considered as a viable alternative to orthogonal frequency division multiplexing (OFDM). FBMC however suffers from the same high peak-to-average power ratio (PAPR) drawback as OFDM systems. Conventional OFDM PAPR reduction techniques cannot be directly applied to FBMC due to the overlapping nature of FBMC symbols. A novel technique is proposed to limit the peak factor of a multicarrier signal based on Sliding Window Tone Reservation. The peak-reducing signal is forced to have the constraints of SW-TR, so that when added to the original signal, the peak factor is reduced without increasing the BER and the out-of-band radiation. The proposed method has low computational complexity requirements and is fastconverging. Simulation results show that, the proposed technique outperforms a conventional FBMC SW-TR method by 1.6 dB in PAPR reduction at a clip probability of 10−3 on the 2nd iteration.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121858852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253971
Sonali Lagnajita, Srinivas Ramavath
Spatial modulation (SM), which uses the spatial dimension to transmit information and removes ICI completely between transmit antennas, is a promising transmission schemes that has been proposed for multi input multi output systems. In this paper a novel scheme called “precoded STBC for Spatial modulation” is proposed, which accumulates the benefits of both the schemes by eradicating its drawbacks. In this proposed scheme DFT codebook based precoding technique is used which intensively decrease the pair wise error probability of STBC code with improving system performance. Hence the combination of precoding STBC with SM employs the transmission of data on antenna indices with high spectral efficiency and with low probability of error by exploiting CSI at transmitter side. The simulation result justifies our theoretical analysis and demonstrates the performance advantages of the proposed precoded STBC-SM over STBC, Precoded STBC and STBC-SM.
{"title":"Precoded space time block code for spatial modulation","authors":"Sonali Lagnajita, Srinivas Ramavath","doi":"10.1109/EESCO.2015.7253971","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253971","url":null,"abstract":"Spatial modulation (SM), which uses the spatial dimension to transmit information and removes ICI completely between transmit antennas, is a promising transmission schemes that has been proposed for multi input multi output systems. In this paper a novel scheme called “precoded STBC for Spatial modulation” is proposed, which accumulates the benefits of both the schemes by eradicating its drawbacks. In this proposed scheme DFT codebook based precoding technique is used which intensively decrease the pair wise error probability of STBC code with improving system performance. Hence the combination of precoding STBC with SM employs the transmission of data on antenna indices with high spectral efficiency and with low probability of error by exploiting CSI at transmitter side. The simulation result justifies our theoretical analysis and demonstrates the performance advantages of the proposed precoded STBC-SM over STBC, Precoded STBC and STBC-SM.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131199292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253642
R. Raja, T. S. Sinha, R. P. Dubey
This paper presents the biometrical authentication process of any subject from side-view of human-face. Relevant geometric features of the human-face have been extracted using genetic-algorithm and connected component method from side-view of the human-face image. The present paper incorporates the frontal face images only for the formation of corpus. But for the biometrical authentication, side-view of the face has been analysed and connected component of face are calculated using neuro-genetic approach. Neuro-genetic means the combination of artificial neural network and genetic algorithm. The work has been carried out in two phases. In the first phase, formation of the FACE_MODEL as a corpus and calculation of connected component using frontal face images of the different subjects have been done. In the second phase, the model or the corpus has been used at the back-end for biometrical authentication using a proposed algorithm called NGBABA (Neuro-Genetic based Approach for Biometrical Authentication) and number of connected component of face is calculated using NGBBFSA (Neuro-Genetic Based Breadth First Search Algorithms). The authentication process has been carried out with the help of an unknown zero-degree (parallel to x-axis) oriented image. Hence relevant geometrical features and connected component with reducing orientation in image from ninety-degree to lower degree with 10-degree change have been matched with the corpus. The classification process of acceptance and rejection has been done after best-fit matching. The proposed algorithm has been tested with 10 subjects of varying age groups. The result has been found very satisfactory with the data sets.
{"title":"Neuro-Genetic and CCM based biometrical authentication through side-view of human-face","authors":"R. Raja, T. S. Sinha, R. P. Dubey","doi":"10.1109/EESCO.2015.7253642","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253642","url":null,"abstract":"This paper presents the biometrical authentication process of any subject from side-view of human-face. Relevant geometric features of the human-face have been extracted using genetic-algorithm and connected component method from side-view of the human-face image. The present paper incorporates the frontal face images only for the formation of corpus. But for the biometrical authentication, side-view of the face has been analysed and connected component of face are calculated using neuro-genetic approach. Neuro-genetic means the combination of artificial neural network and genetic algorithm. The work has been carried out in two phases. In the first phase, formation of the FACE_MODEL as a corpus and calculation of connected component using frontal face images of the different subjects have been done. In the second phase, the model or the corpus has been used at the back-end for biometrical authentication using a proposed algorithm called NGBABA (Neuro-Genetic based Approach for Biometrical Authentication) and number of connected component of face is calculated using NGBBFSA (Neuro-Genetic Based Breadth First Search Algorithms). The authentication process has been carried out with the help of an unknown zero-degree (parallel to x-axis) oriented image. Hence relevant geometrical features and connected component with reducing orientation in image from ninety-degree to lower degree with 10-degree change have been matched with the corpus. The classification process of acceptance and rejection has been done after best-fit matching. The proposed algorithm has been tested with 10 subjects of varying age groups. The result has been found very satisfactory with the data sets.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114787997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253863
R. Tiwari, G. Verma
Today's automatic visual surveillance is prime need for security and this paper presents first step in the direction of automatic visual gun detection. The objective of our paper is to develop a framework for visual gun detection for automatic surveillance. The proposed framework exploits the color based segmentation to eliminate unrelated object from an image using K-mean clustering algorithm. Speeded up robust features (SURF) interest point detector is used to locate the object (gun) in the segmented images. Our framework is robust enough in terms of scale, rotation, affine and occlusion. We have implemented and tested the system over sample images of gun, collected by us. We got promising performance of our system to detect a gun. Further, our system performs very well under different appearance of images. Thus our system is rotation, scale and shape invariant.
{"title":"A computer vision based framework for visual gun detection using SURF","authors":"R. Tiwari, G. Verma","doi":"10.1109/EESCO.2015.7253863","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253863","url":null,"abstract":"Today's automatic visual surveillance is prime need for security and this paper presents first step in the direction of automatic visual gun detection. The objective of our paper is to develop a framework for visual gun detection for automatic surveillance. The proposed framework exploits the color based segmentation to eliminate unrelated object from an image using K-mean clustering algorithm. Speeded up robust features (SURF) interest point detector is used to locate the object (gun) in the segmented images. Our framework is robust enough in terms of scale, rotation, affine and occlusion. We have implemented and tested the system over sample images of gun, collected by us. We got promising performance of our system to detect a gun. Further, our system performs very well under different appearance of images. Thus our system is rotation, scale and shape invariant.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128130671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253908
D. Dobariya, P. Upadhyay
The shunt active power filters (SAPFs) and hybrid active power filter (HAPF) is used for practical solution to solve the electric power quality, (EPQ) issues. The emerging power-electronic devices and the new developments in digital signal processing (DSP), have made possible its practical use. The active power filters can compensate the nonlinear load current of electrical systems: harmonics, reactive power, imbalances, etc. In this paper simulation and comparison between shunt active power filter and hybrid combination of shunt active power filter and shunt passive power filter is presented. FFT (Fast Fourier Transform) analysis and waveforms are presented for both filters. The superior performance of hybrid active power filter is also presented.
{"title":"Simulation and comparison between hybrid active power filter and shunt active power filter","authors":"D. Dobariya, P. Upadhyay","doi":"10.1109/EESCO.2015.7253908","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253908","url":null,"abstract":"The shunt active power filters (SAPFs) and hybrid active power filter (HAPF) is used for practical solution to solve the electric power quality, (EPQ) issues. The emerging power-electronic devices and the new developments in digital signal processing (DSP), have made possible its practical use. The active power filters can compensate the nonlinear load current of electrical systems: harmonics, reactive power, imbalances, etc. In this paper simulation and comparison between shunt active power filter and hybrid combination of shunt active power filter and shunt passive power filter is presented. FFT (Fast Fourier Transform) analysis and waveforms are presented for both filters. The superior performance of hybrid active power filter is also presented.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126234037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253638
Naman S. Khandelwal, Pariza Kamboj
Impersonation is the obvious security risk in an undefended distributed network. An adversary pretends to be a client and can have illicit access to the server. To counter this threat, user authentication is used which is treated as the first line of defense in a networked environment. The most popular and widely used authentication protocol is Kerberos. Kerberos is the de facto standard, used to authenticate users mutually by the use of trusted third party. But this strong protocol is vulnerable to various security attacks. This paper gives an overview of Kerberos protocol and its existing security problems. To enhance security and combat security attacks, it also describes a novel approach of incorporating the features of Visual Cryptography and Digital Envelope into Kerberos. Using Visual cryptography, we have added one more layer of security by considering a secret share as one of the factor of providing mutual authentication. While the session key is securely distributed by using the concept of Digital envelope in which user's private key is considered as another factor of authentication. Thus, our proposed scheme makes the Kerberos protocol highly robust, secure and efficient.
{"title":"Two factor authentication using Visual Cryptography and Digital Envelope in Kerberos","authors":"Naman S. Khandelwal, Pariza Kamboj","doi":"10.1109/EESCO.2015.7253638","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253638","url":null,"abstract":"Impersonation is the obvious security risk in an undefended distributed network. An adversary pretends to be a client and can have illicit access to the server. To counter this threat, user authentication is used which is treated as the first line of defense in a networked environment. The most popular and widely used authentication protocol is Kerberos. Kerberos is the de facto standard, used to authenticate users mutually by the use of trusted third party. But this strong protocol is vulnerable to various security attacks. This paper gives an overview of Kerberos protocol and its existing security problems. To enhance security and combat security attacks, it also describes a novel approach of incorporating the features of Visual Cryptography and Digital Envelope into Kerberos. Using Visual cryptography, we have added one more layer of security by considering a secret share as one of the factor of providing mutual authentication. While the session key is securely distributed by using the concept of Digital envelope in which user's private key is considered as another factor of authentication. Thus, our proposed scheme makes the Kerberos protocol highly robust, secure and efficient.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122278271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7254044
A. Shah, R. Gulati
Growing concerns amongst the competitors for maintaining the privacy of their customer's information has increased in recent years. Multiple parties desire to collaborate to conduct data mining without breaching privacy of each contributing party. Organizations, both public and private, publish sensitive micro data for research and/or trend analysis. The main confront for developing a secured framework is a consideration for privacy as well as efficiency and complications amongst the collaborating parties for generating standardization. The paper surveys various techniques applied for Privacy Preserving Collaborative Data Mining and summarizes the demerits of the same.
{"title":"Contemporary trends in privacy preserving collaborative data mining- A survey","authors":"A. Shah, R. Gulati","doi":"10.1109/EESCO.2015.7254044","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7254044","url":null,"abstract":"Growing concerns amongst the competitors for maintaining the privacy of their customer's information has increased in recent years. Multiple parties desire to collaborate to conduct data mining without breaching privacy of each contributing party. Organizations, both public and private, publish sensitive micro data for research and/or trend analysis. The main confront for developing a secured framework is a consideration for privacy as well as efficiency and complications amongst the collaborating parties for generating standardization. The paper surveys various techniques applied for Privacy Preserving Collaborative Data Mining and summarizes the demerits of the same.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253660
R. Chaurasiya, K. Jain, Shalini Goutam, Manisha
The reliability and efficiency of classification strategies required to segregate between the categories of healthy patients and those suffering from epilepsy is of paramount importance. The erratic occurrence of epileptic seizures has stimulated the automatic seizure detection in EEG recordings. In this work, classification of EEG signals has been carried out using Hilbert Huang Transform (HHT) and Support Vector Machine (SVM). In this approach, the HHT based Time Frequency Representation (TFR) has been considered as Time Frequency Image (TFI). The time frequency image is segmented in accordance with the frequency bands of the rhythms. Also respective histograms of gray scale sub images are represented. Extraction of statistical features such as mean, variance, skewness and kurtosis of pixel intensity in the histogram is implemented. SVM with radial basis function (RBF) kernel has been employed for classification of seizure and non -seizure EEG signals.
{"title":"Epileptic seizure detection using HHT and SVM","authors":"R. Chaurasiya, K. Jain, Shalini Goutam, Manisha","doi":"10.1109/EESCO.2015.7253660","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253660","url":null,"abstract":"The reliability and efficiency of classification strategies required to segregate between the categories of healthy patients and those suffering from epilepsy is of paramount importance. The erratic occurrence of epileptic seizures has stimulated the automatic seizure detection in EEG recordings. In this work, classification of EEG signals has been carried out using Hilbert Huang Transform (HHT) and Support Vector Machine (SVM). In this approach, the HHT based Time Frequency Representation (TFR) has been considered as Time Frequency Image (TFI). The time frequency image is segmented in accordance with the frequency bands of the rhythms. Also respective histograms of gray scale sub images are represented. Extraction of statistical features such as mean, variance, skewness and kurtosis of pixel intensity in the histogram is implemented. SVM with radial basis function (RBF) kernel has been employed for classification of seizure and non -seizure EEG signals.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"59 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120917724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}