About
Feel free to email me at [email protected] to discuss potential collaborations or…
Services
Articles by Gaurav
Contributions
Activity
-
🤝 Let’s Connect and Innovate at Tech Expo Gujarat 2024! 🚀 Discover limitless opportunities for your business with Gurupritsingh Saini the…
🤝 Let’s Connect and Innovate at Tech Expo Gujarat 2024! 🚀 Discover limitless opportunities for your business with Gurupritsingh Saini the…
Liked by Gaurav Mehta
Experience
Education
-
Rajiv Gandhi Prodyogiki Vishwavidyalaya
-
Activities and Societies: - Post Graduated with Honors with Distinction from Rajiv Gandhi Prodyogiki Vishwavidyalaya, Bhopal, Madhya Pradesh (MP). - Participated in National Level Technical Events.
Subject:
Advanced Mathematics
Micro controller system Design
DSP Application
VLSI Design
Data Communication and Computer Networks
System Programming
Modelling & Simulation of Computer
Network Design Technology
Optical Network
Mobile & Satellite Communication
Information Theory & Coding
Optical Instrumentation & Measurement -
-
Activities and Societies: Institution Attended : V.V.P. Engineering College, Rajkot, India. - Participated in National Level Technical Events for various competitions.
Subject:
Data Base Management System
Advance DataBase Management System
Computer Networks
Compiler Design
Operating System
System Analysis And Design
Data Structure And Algorithm
Computer Graphics
Advanced Microprocessor Interfacing and Computing
Computer Oriented Numeric Techniques
Object Oriented Programming
Advance .Net Technology
Artificial Intelligence
Licenses & Certifications
Volunteer Experience
-
Volunteer
BAPS Organization
- Present 8 years 6 months
Social Services
Activities and Societies
-
V.V.P. Engineering College
Management Team Member
- 3 years 9 months
Science and Technology
Supporting different kind of event.
Publications
-
ANALYSIS OF FAST MOTION ESTIMATION ALGORITHM FOR H.264MPEG-4 AVC
National Conference on Advancement of Electronics & Communication Technology and Engineering
This paper presents a fast algorithm for H.264 fractional ME. Motivated by the highly correlation of cost between neighboring fractional pel position, the proposed algorithm efficiently explores the neighborhood position around the minimum one and thus skips other unlikely ones. Thus, the proposed algorithm can complete the search by only examining 8 or 9 search points instead of 17 search points in the search algorithm of reference software. Early termination technique is applied in every…
This paper presents a fast algorithm for H.264 fractional ME. Motivated by the highly correlation of cost between neighboring fractional pel position, the proposed algorithm efficiently explores the neighborhood position around the minimum one and thus skips other unlikely ones. Thus, the proposed algorithm can complete the search by only examining 8 or 9 search points instead of 17 search points in the search algorithm of reference software. Early termination technique is applied in every single search point. The simulation result shows that the proposed algorithm can reduce about 50% of computation complexity compared to that in reference software but only with 0.1-0.2 dB PSNR degradation and less than 2% of bit rate increase.
-
Blue Eyes - Human - Operator Monitoring System
International Journal of Scientific Engineering and Technology
Imagine yourself in a world where humans interact with computers. You are sitting in front of your personal computer that
can listen, talk, or even scream aloud. It has the ability to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presents, and starts interacting with you .You ask the computer to dial to your…Imagine yourself in a world where humans interact with computers. You are sitting in front of your personal computer that
can listen, talk, or even scream aloud. It has the ability to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presents, and starts interacting with you .You ask the computer to dial to your friend at his office. It realizes the urgency of the situation through the mouse, dials your friend at his office, and establishes a connection.
The BLUE EYES technology aims at creating computational machines that have perceptual and sensory ability like those of human beings. It uses non-obtrusive sensing method, employing most modern video cameras and microphones to identify the users actions through the use of imparted sensory abilities. -
Co-Operative Communication using Cross Layer Designing Approach
Inpressco
Exploding demand for a growing number of wireless applications has fueled significant development of wireless network, especially several generations of cellular voice & data networks & more recently ad-hoc data networks for wireless computer, home & personal networking. To overcome the problem of wireless medium like fading and interference MIMO system can be used but due to size, cost or hardware limitations, a wireless node may not be able to support multiple transmit antennas.so the…
Exploding demand for a growing number of wireless applications has fueled significant development of wireless network, especially several generations of cellular voice & data networks & more recently ad-hoc data networks for wireless computer, home & personal networking. To overcome the problem of wireless medium like fading and interference MIMO system can be used but due to size, cost or hardware limitations, a wireless node may not be able to support multiple transmit antennas.so the co-operative communication can be used as an alternative to MIMO. In this paper, we have discussed CO-OPMAC, cross layer protocol used for cooperative communication. Here, comparison between CO-OPMAC & IEEE 802.11 is presented. The CO-OPMAC protocol performs better than its legacy IEEE 802.11 in terms of throughput, delay & achieves higher spatial diversity.
-
Compensation of Reactive power and Fluctuating Voltage by using STATCOM device
IEEE National Conferences - National Conference on Recent Advances in Communication, Control and Computing Technology
My dissertation presents a study on the modeling of a STATCOM used for reactive power compensation a distribution network. The power circuit of the distribution -STATCOM and the distribution network. Models of power circuit and control system have been implemented in t h e same Simulink diagrams. my dissertation investigates the operation of control scheme for Static Synchronous Compensator (STATCOM) based on a new full model comprising a 48-pulse Gate Turn-Off thyristor voltage source…
My dissertation presents a study on the modeling of a STATCOM used for reactive power compensation a distribution network. The power circuit of the distribution -STATCOM and the distribution network. Models of power circuit and control system have been implemented in t h e same Simulink diagrams. my dissertation investigates the operation of control scheme for Static Synchronous Compensator (STATCOM) based on a new full model comprising a 48-pulse Gate Turn-Off thyristor voltage source converter for combined reactive power compensation and voltage stabilization of the electric grid network. The performances of STATCOM connected to the 500-kV grid are evaluated.
-
Digital Image Watermarking: A Review
International Journal of Scientific Engineering and Technology
Digital watermarking of multimedia content has become a very active research area over the last several years. Watermarking is a very important field for copyrights of various electronic documents and media. With images widely available on the Internet, it may sometimes be desirable to use watermarks. Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image, which is overlaid on the host image, and provides a means of protecting the…
Digital watermarking of multimedia content has become a very active research area over the last several years. Watermarking is a very important field for copyrights of various electronic documents and media. With images widely available on the Internet, it may sometimes be desirable to use watermarks. Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image, which is overlaid on the host image, and provides a means of protecting the image. It acts as a digital signature, giving the image a sense of ownership or authenticity. Digital watermarking technique is very impressive for image authentication or protection for attacks. In this paper we aim to present a survey on different types of digital watermarks and methods to do image watermarking. Problems and challenges to produce watermarked images are also analyzed and reported. given in the document for the papers to be published. You can use this document as both an instruction set and as a template into which you can type your own text.
-
Digital Watermarking Technique using Discrete Cosine Transform
International Journal of Engineering Innovation & Research
The proliferation of digitized media due to the rapid growth of networked multimedia systems has created an urgent need for copyright enforcement technologies that can protect copyright ownership of multimedia objects. Digital image watermarking is one such technology that has been developed to protect digital images from illegal manipulations. Different watermarking schemes have been suggested for images. This paper proposes a watermarking algorithm based on image segmentation and discrete…
The proliferation of digitized media due to the rapid growth of networked multimedia systems has created an urgent need for copyright enforcement technologies that can protect copyright ownership of multimedia objects. Digital image watermarking is one such technology that has been developed to protect digital images from illegal manipulations. Different watermarking schemes have been suggested for images. This paper proposes a watermarking algorithm based on image segmentation and discrete cosine transform (DCT). The image is first segmented and then for each segment, the image segment is subdivided into pixels blocks of size 8×8 (64pixels), and zigzag reordered. The DCT of the block is then computed. Then, a pseudorandom sequence of real numbers is embedded in the DCT domain of each image segment. Different experiments are conducted to show the performance of the scheme under different types of attacks. The results show that our proposed watermark scheme is robust to common signal distortions, including geometric manipulations.
-
WIBREE Technology with Bluetooth
International Journal of Engineering Research and Applications
The number of computing and telecommunications devices is increasing and consequently the focus on how to connect them to each other. The usual solution is to connect the devices with a cable or sometimes using infrared light to make file transfer and synchronization possible. The infrared solution eliminates the cable but requires line of sight.
To solve these problems a new technology, Wibree radio technology complements other local connectivity technologies, consuming only a fraction of…The number of computing and telecommunications devices is increasing and consequently the focus on how to connect them to each other. The usual solution is to connect the devices with a cable or sometimes using infrared light to make file transfer and synchronization possible. The infrared solution eliminates the cable but requires line of sight.
To solve these problems a new technology, Wibree radio technology complements other local connectivity technologies, consuming only a fraction of the power compared to other such radio technologies, enabling smaller and less costly implementations and being easy to integrate with Bluetooth solutions to connect a wide range of computing and telecommunications devices easily and simply without the need for connecting cables.
Furthermore it can also be used to enable communication between several units, such as small radio LANs. This results in a multitude of possible future user scenarios. This article focuses on why this technology has got a large attention although it is in development, pro’s and con’s with respect to other technologies and lot’s more. -
ZigBee - Wireless Technology of New Era
International Journal of Emerging Technology and Advanced Engineering
ZigBee is a cheap, secure and wireless mesh networking technology of the next generation. It will connect all kinds of wireless devices at home, office and the business place also. ZigBee is targeted at radio-frequency (RF) applications that require a low data rate, long battery life, and secure networking. This technology is intended to be simpler and less expensive than other WPANs, such as Bluetooth. The low cost allows the technology to be widely deployed in wireless control and monitoring…
ZigBee is a cheap, secure and wireless mesh networking technology of the next generation. It will connect all kinds of wireless devices at home, office and the business place also. ZigBee is targeted at radio-frequency (RF) applications that require a low data rate, long battery life, and secure networking. This technology is intended to be simpler and less expensive than other WPANs, such as Bluetooth. The low cost allows the technology to be widely deployed in wireless control and monitoring applications, the low power-usage allows longer life with smaller batteries, and the mesh networking provides high reliability and larger range. ZigBee is designed to provide highly efficient connectivity between small packet devices. As a result of its simplified operations, which are one to two full orders of magnitude less complex than a comparable Bluetooth device. This new level of communication permits finely-tuned remote monitoring and manipulation. This paper aims at presenting the concept of ZigBee.
Honors & Awards
-
NFL Sunday Ticket (NFLST): Innovation and Problem-Solving Award
AT&T
This award honors the team that showcased remarkable innovation and problem-solving skills in overcoming the unprecedented challenges of this NFL season. Your creative solutions and proactive approach ensured the smooth operation of NFL Sunday Ticket.
-
Exxon Mobile - Excellent Work
-
Gaurav, as a Module Lead, was honored with the Exxon Mobile - Excellent Work award in 2018, recognizing his exceptional contributions and outstanding performance.
Languages
-
English
Professional working proficiency
-
Hindi
Native or bilingual proficiency
-
Gujarati
Native or bilingual proficiency
Recommendations received
9 people have recommended Gaurav
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Gaurav Mehta in United States
74 others named Gaurav Mehta in United States are on LinkedIn
See others named Gaurav Mehta