Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009570
P. Banerjee, Q. Hao, A. Biswas, A. Bhattacharjee, A. Acharyya
Influences of magnetic field on the noise performance of double-drift region (DDR) impact avalanche transit time (IMPATT) device based on Si designed to operate within W-band (75–110 GHz) have been studied in this paper. The reverse biased DDR IMPATT structure under transverse magnetic field can be regarded as magnetic field tunable avalanche transit time (MAGTATT) device. The simulation results show that both the noise spectral density and noise measure of the device increase significantly while the device is kept in transverse magnetic field. This degradation of the noise performance of the device enhances when the magnitude of the magnetic field is increased. Therefore, in order to achieve the magnetic field tuning of the RF properties of DDR IMPATTs as reported earlier by the authors, the noise performance of the source has to be sacrificed in fair extent.
{"title":"Avalanche noise in magnetic field tunable avalanche transit time device","authors":"P. Banerjee, Q. Hao, A. Biswas, A. Bhattacharjee, A. Acharyya","doi":"10.1109/ICCECE.2016.8009570","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009570","url":null,"abstract":"Influences of magnetic field on the noise performance of double-drift region (DDR) impact avalanche transit time (IMPATT) device based on Si designed to operate within W-band (75–110 GHz) have been studied in this paper. The reverse biased DDR IMPATT structure under transverse magnetic field can be regarded as magnetic field tunable avalanche transit time (MAGTATT) device. The simulation results show that both the noise spectral density and noise measure of the device increase significantly while the device is kept in transverse magnetic field. This degradation of the noise performance of the device enhances when the magnitude of the magnetic field is increased. Therefore, in order to achieve the magnetic field tuning of the RF properties of DDR IMPATTs as reported earlier by the authors, the noise performance of the source has to be sacrificed in fair extent.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"44 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132039326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009567
P. Singh, Supratim Das, R. Sarkar, M. Nasipuri
Recognition of handwritten Roman characters and numerals has been extensively studied in the last few decades and its accuracy reached to a satisfactory state. But the same cannot be said while talking about the Devanagari script which is one of most popular script in India. This paper proposes an efficient digit recognition system for handwritten Devanagari script. The system uses a novel 196-element Mask Oriented Directional (MOD) features for the recognition purpose. The methodology is tested using five conventional classifiers on 6000 handwritten digit samples. On applying 3-fold cross-validation scheme, the proposed system yields the highest recognition accuracy of 95.02% using Support Vector Machine (SVM) classifier.
{"title":"Recognition of offline handwriten Devanagari numerals using regional weighted run length features","authors":"P. Singh, Supratim Das, R. Sarkar, M. Nasipuri","doi":"10.1109/ICCECE.2016.8009567","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009567","url":null,"abstract":"Recognition of handwritten Roman characters and numerals has been extensively studied in the last few decades and its accuracy reached to a satisfactory state. But the same cannot be said while talking about the Devanagari script which is one of most popular script in India. This paper proposes an efficient digit recognition system for handwritten Devanagari script. The system uses a novel 196-element Mask Oriented Directional (MOD) features for the recognition purpose. The methodology is tested using five conventional classifiers on 6000 handwritten digit samples. On applying 3-fold cross-validation scheme, the proposed system yields the highest recognition accuracy of 95.02% using Support Vector Machine (SVM) classifier.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128820164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009547
Subhajyoti Barman, Hiran Nandy, S. Biswas
Secret Sharing is a technique of decomposing a secret into number of shares in such a manner that reconstruction of the secret is only possible by a subset of shares that has at least a specific minimum size. Adi Shamir and George Blackley individually proposed the idea of Secret Sharing for the first time, but high computational complexity and noise like shares are the main issues of these schemes. However, using current state of the art schemes it is possible to perform this task in linear time without producing noise like shares. Providing special privilege to a subset of shares is not supported by the existing schemes. It would be a novel concept if it is possible to assign special priority to a set of shares during decomposition of secrets. Hence a linear time bounded scheme is being proposed which decomposes any secret into N number of shares among which M (M≤N) of them are specially privileged. During reconstruction of the actual secret, a subset of shares with a minimum size K (M≤K≤N) which essentially contains all the specially privileged shares or mandatory shares is required.
{"title":"A novel linearly bounded secret sharing scheme that supports prioritization of shares","authors":"Subhajyoti Barman, Hiran Nandy, S. Biswas","doi":"10.1109/ICCECE.2016.8009547","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009547","url":null,"abstract":"Secret Sharing is a technique of decomposing a secret into number of shares in such a manner that reconstruction of the secret is only possible by a subset of shares that has at least a specific minimum size. Adi Shamir and George Blackley individually proposed the idea of Secret Sharing for the first time, but high computational complexity and noise like shares are the main issues of these schemes. However, using current state of the art schemes it is possible to perform this task in linear time without producing noise like shares. Providing special privilege to a subset of shares is not supported by the existing schemes. It would be a novel concept if it is possible to assign special priority to a set of shares during decomposition of secrets. Hence a linear time bounded scheme is being proposed which decomposes any secret into N number of shares among which M (M≤N) of them are specially privileged. During reconstruction of the actual secret, a subset of shares with a minimum size K (M≤K≤N) which essentially contains all the specially privileged shares or mandatory shares is required.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128250344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009538
P. Sarkar, Saradindu Panda, B. Maji, A. Mukhopadhyay
Recently, plasmonics gives very much interest and closely involves in the main domains of nanophotonics that can control of optical fields at the nanoscale level. Its remarkable property is to concentrate and enhance the electromagnetic field on the nanometres scale especially in solar cell. In plasmonic field, Nobel metals used as nanoparticle where density of electron gas which oscillates at surface Plasmon frequency at the same time also improves absorption by scattering. So the use of plasmonic in solar cell gives better opportunity to enhance efficiency by absorption as the optical spectrum loss are main part of total loss in solar cell. So we investigate the induction of surface Plasmon theory for enhancement of extinction in terms of absorption and scattering. In this paper, we also studied finite-difference time domain based proposed model and find various plasmonic field component of Eigen value and characterized optical improvement in plasmonic thin film solar cell.
{"title":"Enhancement of optical absorption in Plasmonic thin film solar cell","authors":"P. Sarkar, Saradindu Panda, B. Maji, A. Mukhopadhyay","doi":"10.1109/ICCECE.2016.8009538","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009538","url":null,"abstract":"Recently, plasmonics gives very much interest and closely involves in the main domains of nanophotonics that can control of optical fields at the nanoscale level. Its remarkable property is to concentrate and enhance the electromagnetic field on the nanometres scale especially in solar cell. In plasmonic field, Nobel metals used as nanoparticle where density of electron gas which oscillates at surface Plasmon frequency at the same time also improves absorption by scattering. So the use of plasmonic in solar cell gives better opportunity to enhance efficiency by absorption as the optical spectrum loss are main part of total loss in solar cell. So we investigate the induction of surface Plasmon theory for enhancement of extinction in terms of absorption and scattering. In this paper, we also studied finite-difference time domain based proposed model and find various plasmonic field component of Eigen value and characterized optical improvement in plasmonic thin film solar cell.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116595142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009584
Souvik Singha, Mainak Sen
Encryption helps us to store valuable information and send it across insecure networks so that it cannot be read by anyone except the intended recipient. Encryption is a process in which the sender encrypts or scrambles the message in such a way that only the recipient will be able to decrypt the message with the knowledge of the proper key. With the growth of internet, the need for secure data transmission become more essential and important, as security is a major concern in the internet world. So the plain text should be codified by the process of encryption. Different types of data have their own features, thus different techniques should be used to protect confidential data from unauthorized access. We propose in this paper bit level encryption and decryption algorithm based on number of keys which can encrypt the 8 bit binary no to its corresponding 8 bit cipher text and a decryption algorithm which can convert that 8 bit cipher text to its corresponding 8 bit original no. It can also be extended to 16, 32 bit binary number.
{"title":"Encoding algorithm using bit level encryption and decryption technique","authors":"Souvik Singha, Mainak Sen","doi":"10.1109/ICCECE.2016.8009584","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009584","url":null,"abstract":"Encryption helps us to store valuable information and send it across insecure networks so that it cannot be read by anyone except the intended recipient. Encryption is a process in which the sender encrypts or scrambles the message in such a way that only the recipient will be able to decrypt the message with the knowledge of the proper key. With the growth of internet, the need for secure data transmission become more essential and important, as security is a major concern in the internet world. So the plain text should be codified by the process of encryption. Different types of data have their own features, thus different techniques should be used to protect confidential data from unauthorized access. We propose in this paper bit level encryption and decryption algorithm based on number of keys which can encrypt the 8 bit binary no to its corresponding 8 bit cipher text and a decryption algorithm which can convert that 8 bit cipher text to its corresponding 8 bit original no. It can also be extended to 16, 32 bit binary number.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123848342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009543
Seema Das, R. Jha
Any realistic model will have high complexity, In other words it will require many state variables to be adequately described. The resulting complexity, i.e. number of first-order differential equations, is such that a simplification or model reduction will be needed in order to perform a simulation in an amount of time which is acceptable for the application at hand, or for the design of a low order controller which achieves desired objectives. Thus in all these cases reduced-order models are needed. The motivation for appropriate MOR is to obtain an accurate model of smaller order which can be easily simulated and implemented in hard ware with ease saving effort, cost and time. This paper proposes a numerically efficient model order reduction method using evolutionary technique, Particle Swarm Optimisation (PSO). PSO method is based on the minimization of the Integral Squared Error (ISE) between the transient responses of original higher order and the reduced order model pertaining to a unit step input. This ISE is very useful in performance evaluation. The simulation result shows the effectiveness of the proposed scheme to obtain the stable second order reduced stable model from a stable seventh and fifth order original system with minimum error bound.
{"title":"Model order reduction of high order LTI system using particle swarm optimisation","authors":"Seema Das, R. Jha","doi":"10.1109/ICCECE.2016.8009543","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009543","url":null,"abstract":"Any realistic model will have high complexity, In other words it will require many state variables to be adequately described. The resulting complexity, i.e. number of first-order differential equations, is such that a simplification or model reduction will be needed in order to perform a simulation in an amount of time which is acceptable for the application at hand, or for the design of a low order controller which achieves desired objectives. Thus in all these cases reduced-order models are needed. The motivation for appropriate MOR is to obtain an accurate model of smaller order which can be easily simulated and implemented in hard ware with ease saving effort, cost and time. This paper proposes a numerically efficient model order reduction method using evolutionary technique, Particle Swarm Optimisation (PSO). PSO method is based on the minimization of the Integral Squared Error (ISE) between the transient responses of original higher order and the reduced order model pertaining to a unit step input. This ISE is very useful in performance evaluation. The simulation result shows the effectiveness of the proposed scheme to obtain the stable second order reduced stable model from a stable seventh and fifth order original system with minimum error bound.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122652596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Breast cancer is one of the leading cause of death for women today and it is the most common cancer in developed countries. The cause and degree of the breast cancer are very much associated with the malfunctions of its tissues and cells. It is very hard and rigorous task for the doctors to observe the clinical records for many affected patients and regulate the therapy manually. Therefore, it is very much necessary to properly process the bulk amount of clinical records (containing cell details) automatically and come with the best possible treatment for the affected patients. In this work we have proposed a decision support system with the help of two data mining techniques; namely, decision tree learning and association rules mining. Clinical data have been studied, pre-processed and analyzed with the help of a data mining tool (e.g., WEKA). Finally, as an outcome we come with the decision support tool for practical purpose.
{"title":"Towards a decision support system by the study of cell malfunctions for breast cancer","authors":"Sampurna Mandal, Supratim Bhattacharya, Jayanta Poray","doi":"10.1109/ICCECE.2016.8009583","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009583","url":null,"abstract":"Breast cancer is one of the leading cause of death for women today and it is the most common cancer in developed countries. The cause and degree of the breast cancer are very much associated with the malfunctions of its tissues and cells. It is very hard and rigorous task for the doctors to observe the clinical records for many affected patients and regulate the therapy manually. Therefore, it is very much necessary to properly process the bulk amount of clinical records (containing cell details) automatically and come with the best possible treatment for the affected patients. In this work we have proposed a decision support system with the help of two data mining techniques; namely, decision tree learning and association rules mining. Clinical data have been studied, pre-processed and analyzed with the help of a data mining tool (e.g., WEKA). Finally, as an outcome we come with the decision support tool for practical purpose.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131471463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009575
N. Sairam, S. Mandal
In nuclear power plants, sensor health condition monitoring is necessary to ensure the correctness of measurements. Out-of-calibration sensor data can direct to take inappropriate action of system monitoring and controlling application. Continuous sensor status monitoring is desirable to assure smooth running of the plant and reduce maintenance costs associated with unnecessary manual sensor calibrations. In this paper, an online sensor fault detection technique is proposed using Auto-Associative Kernel Regression (AAKR) and Generalized Likelihood Ratio Test. The AAKR method is used to approximate the data and the GLRT is applied as a metric to detect the faulty sensor on the residual space, the deviation of approximated data from the original. This paper claims that the AAKR-GLRT based fault detection method is better than the PCA-Q-statistic. The method is validated by the real data from the Fast Breeder Test Reactor (FBTR).
{"title":"Thermocouple sensor fault detection using Auto-Associative Kernel Regression and Generalized Likelihood Ratio Test","authors":"N. Sairam, S. Mandal","doi":"10.1109/ICCECE.2016.8009575","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009575","url":null,"abstract":"In nuclear power plants, sensor health condition monitoring is necessary to ensure the correctness of measurements. Out-of-calibration sensor data can direct to take inappropriate action of system monitoring and controlling application. Continuous sensor status monitoring is desirable to assure smooth running of the plant and reduce maintenance costs associated with unnecessary manual sensor calibrations. In this paper, an online sensor fault detection technique is proposed using Auto-Associative Kernel Regression (AAKR) and Generalized Likelihood Ratio Test. The AAKR method is used to approximate the data and the GLRT is applied as a metric to detect the faulty sensor on the residual space, the deviation of approximated data from the original. This paper claims that the AAKR-GLRT based fault detection method is better than the PCA-Q-statistic. The method is validated by the real data from the Fast Breeder Test Reactor (FBTR).","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126243219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009569
P. Dhara, P. Gayen, R. Garai
This paper presents modeling and control of quasi Z-source inverter (qZSl) for a particular amount of dc to ac power conversion to supply isolated electrical load. Necessary analysis and design of qZSI is included in this paper. This qZSI is capable of supplying three phase, 50 Hz, 400 V, 50 KW power load. In this context voltage boosting (DC: 273V to AC: 400Vrms) and DC to AC power (50 KW) conversion are simultaneously done in one step. Hence suitable pulse width modulation (PWM) control signals are generated to control three-phase qZSI for applying into particular load mentioned above. Thus, this paper emphasizes on power handling capability of qZSI along with its voltage boosting action. This concept is validated by appropriate simulation study using MATLAB-SIMULINK 2014b software and PWM signals are also realized in hardware platform.
{"title":"Study on modeling & control of three phase quasi Z-source inverter for power conversion","authors":"P. Dhara, P. Gayen, R. Garai","doi":"10.1109/ICCECE.2016.8009569","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009569","url":null,"abstract":"This paper presents modeling and control of quasi Z-source inverter (qZSl) for a particular amount of dc to ac power conversion to supply isolated electrical load. Necessary analysis and design of qZSI is included in this paper. This qZSI is capable of supplying three phase, 50 Hz, 400 V, 50 KW power load. In this context voltage boosting (DC: 273V to AC: 400Vrms) and DC to AC power (50 KW) conversion are simultaneously done in one step. Hence suitable pulse width modulation (PWM) control signals are generated to control three-phase qZSI for applying into particular load mentioned above. Thus, this paper emphasizes on power handling capability of qZSI along with its voltage boosting action. This concept is validated by appropriate simulation study using MATLAB-SIMULINK 2014b software and PWM signals are also realized in hardware platform.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126461290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICCECE.2016.8009535
B. Mahanty, S. Mondal, U. Sahu, S. Patra, D. Mandal
Detection of pulse in a human body plays an important role for Health Monitoring and treatment of diseases. In this work we have streamlined our efforts towards obtaining a solution for long-term heart rate monitoring system that can be used at home as well as medical establishments. We have made a comparative study here of the microfibers of the materials poly vinylidene fluoride (PVDF) and lead zirconate titanate (PZT) with the help of COMSOL to understand the suitability of these materials in capturing pulse signals. PZT shows higher electric potential of 21.8 V compared to PVDF which shows 11.6 V for a single microfiber. Therefore here we use a PZT disc sensor in conjunction with Arduino UNO and Arduino IDE to detect the pulse signal and count them. The main objective of this paper is to provide a simple and non-invasive device which while eliminating human errors also allows remote monitoring of patients and at the same time reduces the average time required by the doctor to analyze the patient's health condition.
{"title":"Human health monitoring system based on piezoelectric smart sensor","authors":"B. Mahanty, S. Mondal, U. Sahu, S. Patra, D. Mandal","doi":"10.1109/ICCECE.2016.8009535","DOIUrl":"https://doi.org/10.1109/ICCECE.2016.8009535","url":null,"abstract":"Detection of pulse in a human body plays an important role for Health Monitoring and treatment of diseases. In this work we have streamlined our efforts towards obtaining a solution for long-term heart rate monitoring system that can be used at home as well as medical establishments. We have made a comparative study here of the microfibers of the materials poly vinylidene fluoride (PVDF) and lead zirconate titanate (PZT) with the help of COMSOL to understand the suitability of these materials in capturing pulse signals. PZT shows higher electric potential of 21.8 V compared to PVDF which shows 11.6 V for a single microfiber. Therefore here we use a PZT disc sensor in conjunction with Arduino UNO and Arduino IDE to detect the pulse signal and count them. The main objective of this paper is to provide a simple and non-invasive device which while eliminating human errors also allows remote monitoring of patients and at the same time reduces the average time required by the doctor to analyze the patient's health condition.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126734290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}