Loading...
Thumbnail Image

Govind Ballabh Pant University of Agriculture and Technology, Pantnagar

After independence, development of the rural sector was considered the primary concern of the Government of India. In 1949, with the appointment of the Radhakrishnan University Education Commission, imparting of agricultural education through the setting up of rural universities became the focal point. Later, in 1954 an Indo-American team led by Dr. K.R. Damle, the Vice-President of ICAR, was constituted that arrived at the idea of establishing a Rural University on the land-grant pattern of USA. As a consequence a contract between the Government of India, the Technical Cooperation Mission and some land-grant universities of USA, was signed to promote agricultural education in the country. The US universities included the universities of Tennessee, the Ohio State University, the Kansas State University, The University of Illinois, the Pennsylvania State University and the University of Missouri. The task of assisting Uttar Pradesh in establishing an agricultural university was assigned to the University of Illinois which signed a contract in 1959 to establish an agricultural University in the State. Dean, H.W. Hannah, of the University of Illinois prepared a blueprint for a Rural University to be set up at the Tarai State Farm in the district Nainital, UP. In the initial stage the University of Illinois also offered the services of its scientists and teachers. Thus, in 1960, the first agricultural university of India, UP Agricultural University, came into being by an Act of legislation, UP Act XI-V of 1958. The Act was later amended under UP Universities Re-enactment and Amendment Act 1972 and the University was rechristened as Govind Ballabh Pant University of Agriculture and Technology keeping in view the contributions of Pt. Govind Ballabh Pant, the then Chief Minister of UP. The University was dedicated to the Nation by the first Prime Minister of India Pt Jawaharlal Nehru on 17 November 1960. The G.B. Pant University is a symbol of successful partnership between India and the United States. The establishment of this university brought about a revolution in agricultural education, research and extension. It paved the way for setting up of 31 other agricultural universities in the country.

Browse

Search Results

Now showing 1 - 9 of 31
  • ThesisItemOpen Access
    Kidney stone detection from ultrasound images using masking techniques
    (G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand), 2021-12) Chaudhary, Harshita; Pandey, Binay Kumar
    Here we are using masking techniques for stone detection that are present in the kidney. As we know Masking techniques are conspicuous approaches in contrast enhancement. For this firstly, the image is converted into grey and after that contrast of the image is enhanced. The process of contrast enhancement is done with the help of Optimum Wavelet-Based Masking (OWBM) using the Enhanced Cuckoo Search Algorith (ECSA). Afterward image segmentation and image masking have been done to detect stone from the image. The cuckoo search algorithm is used for global optimization of contrast enhancement. With the help of the Cuckoo search algorithm approximation of the coefficient has been optimized. The objective of this project is to design and implement a method to detect the presence of stone from the ultrasound image of a kidney. Here we are making are system our more intelligent.
  • ThesisItemOpen Access
    IoT based surveillance system using DNN
    (G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand), 2021-12) Rawat, Rahul; Srivastava, Ratnesh Prasad
    Localization, Visibility, Proximity, Detection, Recognition has always been a challenge for surveillance system. These challenges can be felt in the industries where surveillance systems are used like armed forces, technical-agriculture and other such fields. A way to get the ease of mind would be installing a security camera. Most of the smart system available are just for the surveillance of human intervention but there is a need for a system which can be used for animals as well because with the outburst of human population and symbiotic relationship with wild animals results in life loss and damage to agriculture. There are many electrical equipment’s available for home which can do the monitoring from a remote area all at a time. In this paper we are designing to overcome these above-mentioned challenges for human and animal-based surveillance system in real time application. The system setup is done on a Raspberry pi integrated with deep-learning models which performs the classification of objects on the frames, then the classified objects is given to a face detection model for further processing. The detected face is relayed to the back-end for feature mapping with the saved log files with containing features of familiar face IDs. Four models were tested for face detection out of which the DNN model performed the best giving an accuracy of 87.88%. The system is also able to send alerts to the admin if any threat is detected with the help of a communication module.
  • ThesisItemOpen Access
    Detection of Ransomware using machine learning
    (G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand), 2021-02) Pujari, Shivam Kumar; Mandoria, H.L.
    Today’s world depends on the cyber world, since it is very useful for collecting information, data and transporting them. Since anyone can use it, for security purpose of data a technique called encryption is made. Unfortunately, this strong technique of encryption for security is also useful for hackers to lock any file or system by encryption by infecting malware. This type of malware which encrypt data is called Ransomware. In the digital world there are various types of attacks for a different aspect of motive such as economic benefits, personal issues, religious issues, political benefits, or special propaganda, etc. Ransomware attacks are for financial benefits and most popular in today's world. We purpose a method in which we can classify and detect ransomware and some other malware also
  • ThesisItemOpen Access
    A comparative study of edge detection techniques on different images using Scilab
    (G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand), 2021-01) Rajshree Kumari; Ashok Kumar
    In the field of image processing, edge detection plays a significant role in recent years to detect images more accurately, for this purpose it is important to choose the edge detection techniques wisely and correctly based on their properties. Therefore this work aims to give a comparative study of different edge detection technique using some parameters to check which techniques gives more accurate result with some parameters. The aim of this research is to study different edge detection to detect edges under different circumstances. In this research we have proposed a comparative study between the three-edge detection techniques Canny, Sobel, and Prewitt, using different types of images under different parameters for analysis. The software tool that we have used here is Scilab which is an open source tool and an alternative to MATLAB. This study is tested by conducting experiments on the WANG image dataset and benchmark standard images. The results of this comparative studyz suggest that Prewitt works better than other edge detections with greater accuracy under certain parameters and in different image types.
  • ThesisItemOpen Access
    Deep learning based approach for vehicle license plate recognition
    (G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand), 2020-11) Gupta, Shally; Singh, Rajesh S.
    In the field of Number Plate Recognition System Artificial Intelligence and Deep Learning have played a crucial role in recent years. Therefore this work aims to establish a model of plate detection with the aid of Deep Learning. It gives us an idea of the method of object detection which gives the utmost precision. The aim of this research is to extract accurate precise and optimize the number plate image recognition as compared to the previous research work done. It is therefore necessary to implement the ANPR system model based on an effective Deep Learning algorithms. An effective License Plate Recognition System is needed to ensure the successful functioning of intelligent transportation system. During the last few years, several methods of image processing such as OpenCV have been developed. These have not been exploited in the previous researches on number plate detection. Our study is based on Image Segmentation using object detection algorithm through YOLO (You Only Look Once) object detection technique in darkflow framework and character recognition based on Convolutional Neural Network (CNN). YOLO and CNN have proved to be the most productive techniques for several supervised and unsupervised learning tasks. In this research, we study deep learning algorithms and compare their performance. We have used custom dataset to for image segmentation and character recognition. Different categories of models for object detection is classified by performing segmentation using annotated images for detecting license plates by YOLO. Further, for recognizing characters, single character recognition using CNN is used and also trained a model as a base learners. Finally, compared the performance of the model by previous research for plate detection and have drawn useful conclusions. The result shows that Deep Learning algorithms outperform with high accuracy as compared to other image processing techniques.
  • ThesisItemOpen Access
    A novel approach to improve the Z-SEP protocol in WSNs
    (G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand), 2019-08) Dhek, Ankita; Mandoria, H.L.
    The eminence of Wireless Sensor Networks (WSNs) has grown massively in the past years because WSN has the possibility to associate the physical world with the virtual world by framing a system of various sensor nodes by deploying it in a network. Here, sensor nodes are typically battery-driven gadgets, and consequently energy consumption of sensor nodes is a noteworthy design issue. To handle this issue Cluster based routing is most popular routing technique in Wireless Sensor Networks(WSNs). Due to various need of WSN applications, efficient energy utilization in routing protocols is still a potential area of research. The proposed work tried to overcome the problem of energy contraint in Z-SEP protocol in such a way that energy consumption of every node in the wireless sensor networks is minimized with the help of improving the stability period, instability period ,network lifetime and throughput. This thesis solves the problem by proposing a clustering based single-sink routing protocol for heterogeneous wireless sensor networks in which 3 types of nodes are introduced. The idea of multi-hop communication and distance factor is considered.Using the MATLAB simulation the result is compared with the Z-SEP protocol and the result shows that the proposed protocol outperforms the Z-SEP protocol.
  • ThesisItemOpen Access
    Intrusion detection using ensemble methods and deep learning
    (G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand), 2019-08) Rai, Mahima; Mandoria, H.L.
    In recent years Machine Learning and Deep Learning have played a crucial role in the field of cyber security. This research therefore intends to design IDS with a good mix of various ML and DL classifiers. It gives us an idea about which classifier gives the highest accuracy. The aim of this research is to classify whether the packet is a normal data packet or attacked data packet. Therefore the model of IDS should be implemented based on effective and significant ML and DL algorithms. To ensure network security, an effective intrusion detection system is required. Several ensemble methods like XG-Boost and LGBM have been developed in the past 4-5 years. These have not been exploited in the previous researches on anomaly detection. Our study will make use of these novel Gradient Boosting Decision Tree algorithms. XG-Boost and LGBM have proved to be the most productive techniques for several supervised and unsupervised learning tasks. In this research, we study several machine learning and deep learning classifiers and compare their performance. We have used the NSL KDD dataset to predict the probability of occurrence of 21 different classes of attacks on a network and three different categories of models - Linear Models including Logistic Regression and Stochastic Gradient Descent (SGD) classifier; Gradient Boosting Decision Tree ensembles including LightGBM (LGBM) and XG-Boost; and a Deep Neural Network (DNN) classifier and also trained a stacked model consisting of all these models as base learners. Finally, compared the performances of all the models for Network Intrusion Detection using the NSL-KDD dataset and have drawn useful conclusions. The simulation result shows that Light GBM, XGBoost, and stacked classifiers outperform with high accuracy as compared to Logistic regression, Stochastic Gradient Descent Classifier and Deep Neural network. All of these are predictive analysis techniques.
  • ThesisItemOpen Access
    Analysis of Satellite Images using Support Vector Machine (SVM)
    (G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand), 2018-08) Arya, Diksha; Singh, Rajesh
    Satellite captured images are eyes in the sky that contain information from around the globe. The information derived from the Satellite Images is helpful in Remote Sensing Applications, Research and Analysis, Organizations or Government bodies in monitoring space, Civil defence operations, etc. Satellites captures huge collection of images at a regular interval of time and analyzing those images manually is very difficult and time consuming. Therefore, an ideal picture classifier system is required to be located that intend to classify the images captured from the satellites so that the images of interest can be easily retrieved. Thus, in our research we aimed to propose a Satellite Image Classification system that can automatically classify the category of physical scene present in an image. For achieving our objective we have utilized Support Vector Machine (SVM), a supervised machine learning algorithm for performing classification; two widely used techniques for extracting Features which are Grey Level Co-occurrence Matrix (GLCM) and Gabor Filter; and Fuzzy C Means for Image Segmentation. We have performed Satellite Image Classification for five physical categories namely Desert, Mountain, Residential, River and Forest. We measured our classification system accuracy using confusion metrics and calculated the precision, sensitivity, specificity and F1 Score. Our classification system achieved overall accuracy of 91.66%.
  • ThesisItemOpen Access
    A novel chaotic based keyless encryption technique for secured transmission of images
    (G.B. Pant University of Agriculture and Technology, Pantnagar - 263145 (Uttarakhand), 2018-08) Singh, Chetana; Pandey, Binay Kumar
    These days secured data storage and transmission have become an important issue in this digital world due to increased use of internet for communication purpose. Information security is becoming more important as the amount of sensitivity data being exchanged on the Internet increases. The service like confidentiality and data integrity are required to protect data against unauthorized usage and modification. In these years several image encryption methods are introduced by various researches to secure multimedia information while transmit via public networks. A novel Keyless Image encryption method based on chaotic map is suggested in this research work. Each component of image is encrypted by shuffling pixels and this shuffling is decided by the modified cat map. To transmit data whole image is convert into linear form then modulate the linear data using modulation technique OQPSK. The results confirm that the proposed method resist the statistical analysis. Also attains acceptable correlation coefficient value and has a robust performance against attacks. The simulation of the above algorithm is done on Matlab.