- Distributed Control Multi-Agent Systems
- Coding theory and cryptography
- Neural Networks Stability and Synchronization
- Cryptography and Residue Arithmetic
- Adaptive Control of Nonlinear Systems
- Chaos-based Image/Signal Encryption
- Guidance and Control Systems
- Nonlinear Dynamics and Pattern Formation
- Cryptography and Data Security
- Cryptographic Implementations and Security
- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Extremum Seeking Control Systems
- Security in Wireless Sensor Networks
- graph theory and CDMA systems
- Energy Efficient Wireless Sensor Networks
- Gene Regulatory Network Analysis
- Radioactive element chemistry and processing
- Algorithms and Data Compression
- Layered Double Hydroxides Synthesis and Applications
- Control and Dynamics of Mobile Robots
- Wireless Body Area Networks
- Smart Parking Systems Research
- Algebraic Geometry and Number Theory
- Vehicular Ad Hoc Networks (VANETs)
Indian Institute of Technology Kharagpur
2012-2024
Central Mechanical Engineering Research Institute
2013-2021
University of Engineering & Management
2017
Danfoss (Denmark)
2013
Dantherm Power (Denmark)
2013
Danfoss (United States)
2013
Robotics Research (United States)
2008-2012
The University of Texas at Arlington
2008-2011
Indian Institute of Technology Indore
2011
Indian Institute of Science Bangalore
1999
This technical note studies synchronization of identical general linear systems on a digraph containing spanning tree. A leader node or command generator is considered, which generates the desired tracking trajectory. framework for cooperative control proposed, including full state feedback control, observer design and dynamic output control. The classical system theory notion duality extended to networked systems. It shown that unbounded regions achieve arbitrary digraphs tree can be...
For a quadrotor, one can identify the two well-known inherent rotorcraft characteristics: underactuation and strong coupling in pitch-yaw-roll. To confront these problems design station-keeping tracking controller, dynamic inversion is used. Typical applications of require selection output control variables to render internal dynamics stable. This means that many cases, perfect cannot be guaranteed for actual desired outputs. Instead, feedback linearised system stabilised using robust term....
Abstract This paper studies synchronization to a desired trajectory for multi‐agent systems with second‐order integrator dynamics and unknown nonlinearities disturbances. The agents can have different the treatment is directed graphs fixed communication topologies. command generator or leader node also nonlinear unknown. Cooperative tracking adaptive controllers are designed based on each maintaining neural network parametric approximator suitably tuning it guarantee stability performance. A...
Emerging technologies such as Bluetooth are expected to become a ubiquitous solution for providing short range, low power, cost, pico-cellular wireless connectivity. is master driven time division duplex (TDD) system that supports an asynchronous channel data traffic well synchronous channels voice traffic. Data applications running over http, ftp and real audio will need transport layer protocols TCP UDP send packets the links. In this paper we study several schemes designed improve...
This device includes a pair of glasses and an obstacle detection module fitted in it the center, processing unit, output i.e. beeping component, power supply. The Obstacle is connected to unit. supply used central basically consists ultrasonic sensor, unit consist control buzzer. controls sensors get information present front man processes sends through buzzer accordingly. These Ultrasonic Smart Glasses for Blind people portable device, easy use, light weight, user friendly cheap price....
This paper proposes a new block cipher called HARPOCRATES, which is different from traditional SPN, Feistel, or ARX designs. The design structure that we use the substitution convolution network. novelty of approach lies in function does not fixed S-boxes. Instead, it uses key-driven lookup table storing permutation all 8-bit values. If sufficiently randomly shuffled, round sub-operations achieve good confusion and diffusion to cipher. While designing cipher, security, cost, performances are...
For a typical quadrotor model, one can identify the two well known inherent rotorcraft characteristics; under-actuation and strong coupling in pitch-yaw-roll. To confront these problems design station-keeping tracking controller, dynamic inversion is used here. Typical applications of require selection output control variables to render internal dynamics stable. This means that many cases not be guaranteed for actual desired outputs. Instead, here, feedback linearized system stabilized with...
A novel audio watermarking algorithm is proposed in this paper for copyright protection. The method based on cepstrum domain transform. This embeds the watermark data into original signal using mean quantization of coefficients. Experimental results shows that our scheme not only imperceptible, but also robust against various common processing attacks such as noise adding, re-sampling, low-pass filtering, re-quantization, MP3 compression and cropping. In addition, can extract without help...