Search Results - "Rawat, Sarvesh"
-
1
Multi-sensor data fusion by a hybrid methodology – A comparative study
Published in Computers in industry (01-01-2016)“…•A hybrid architecture for multi-sensor data fusion using soft computing.•Autonomous design of expert system based on rough set (RS) and NN.•RS is used for…”
Get full text
Journal Article -
2
Design and evaluation of a hybrid system for detection and prediction of faults in electrical transformers
Published in International journal of electrical power & energy systems (01-05-2015)“…•A hybrid architecture for fault diagnosis in transformer using soft computing.•Genetic algorithm (GA) used to cluster the fault data into manageable…”
Get full text
Journal Article -
3
Anomaly detection in smart grid using rough set theory and K cross validation
Published in 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014] (01-03-2014)“…The Electrical Grid Monitoring System deals with a number of complex variables and vague data. As a part of the grid monitoring system, various Energy…”
Get full text
Conference Proceeding -
4
Heartbeat rate monitoring system by pulse technique using HB sensor
Published in International Conference on Information Communication and Embedded Systems (ICICES2014) (01-02-2014)“…This paper presents a prototype for the monitoring of Heartbeat rate. A Heart Beat (HB) sensor is being developed for acquainting the input signals using Light…”
Get full text
Conference Proceeding -
5
Design and development of digital voltmeter using different techniques
Published in 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE) (01-03-2014)“…Electrical measurement of quantities plays a crucial role in the real world. Measuring voltage is one of the main tasks for developing large number of…”
Get full text
Conference Proceeding -
6
A drawing robotic hand based on inverse kinematics
Published in International Conference on Information Communication and Embedded Systems (ICICES2014) (01-02-2014)“…The paper aims to create a robotic hand having the capability of self drawing. The application of hand is to artificially evolve drawing patterns using the…”
Get full text
Conference Proceeding -
7
Phishing Detection by Determining Reliability Factor Using Rough Set Theory
Published in 2013 International Conference on Machine Intelligence and Research Advancement (01-12-2013)“…Phishing is a common online weapon, used against users, by Phishers for acquiring a confidential information through deception. Since the inception of…”
Get full text
Conference Proceeding -
8
Multicriteria decision examination in wireless sensor networks
Published in 2014 International Conference on Reliability Optimization and Information Technology (ICROIT) (01-02-2014)“…The role of wireless sensor networks (WSNs) is essential to the present scenario. Numerous independent sensors exist in a WSN that cover the entire terrain and…”
Get full text
Conference Proceeding -
9
A dominance based rough set classification system for fault diagnosis in electrical smart grid environments
Published in The Artificial intelligence review (01-10-2016)“…Nowadays, power grid monitoring systems are shifting towards more disseminating and distributive operations. The diagnosis of faults using knowledge discovery…”
Get full text
Journal Article -
10
Improving Circuit Miniaturization and Its Efficiency Using Rough Set Theory
Published in 2013 International Conference on Machine Intelligence and Research Advancement (01-12-2013)“…High-speed, accuracy, meticulousness and quick responses are the notion of the vital necessities for modern digital world. An efficient electronic circuit…”
Get full text
Conference Proceeding -
11
Multicriteria decision examination for electrical power grid monitoring system
Published in 2013 7th International Conference on Intelligent Systems and Control (ISCO) (01-01-2013)“…Rough Set theory proposed by Z Pawlak is a great help for dealing with uncertain data and dominance based rough set is an extension to the classical rough set…”
Get full text
Conference Proceeding Journal Article -
12
Phishing Detection by determining reliability factor using rough set theory
Published 10-12-2013“…Phishing is a common online weapon, used against users, by Phishers for acquiring a confidential information through deception. Since the inception of…”
Get full text
Journal Article -
13
Improving circuit miniaturization and its efficiency using Rough Set Theory
Published 10-12-2013“…High-speed, accuracy, meticulousness and quick response are notion of the vital necessities for modern digital world. An efficient electronic circuit…”
Get full text
Journal Article