The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
WSN-Wireless sensor networks are greatly in focus for the researchers. The use of WSN is foreseen for bringing massive changes in data gathering, processing and broadcasting. One of the most central design concerns in WSN is energy consumption. Hierarchical routing protocols are best acknowledged in respect to energy efficiency. Mobility based clustering (MBC) provides fruitful packet delivery rate,...
This paper proposes an innovative approach to traffic density estimation. It defines a method that focuses on reducing computational time and complexity by extracting row, column and diagonal mean feature vectors from the image. Then these feature vectors are used to train classifiers and the images are classified as low, moderate or high traffic situations. The system works in 2 phases: Training...
An efficient three phase interleaved DC-DC converter is proposed with inductor current and voltage control. The use of multiple sensors for each phase current is eliminated using current reconstruction. This reduces the number of current sensors and improves the reliability. The inductor current control is achieved using single current sensor which measures DC-link current. The proposed converter...
Human characteristics forms a base for various biometric traits. Authenticating a human by making the use of his biometric trait for various identification and access control processes provides increased security. Individuals in a group are identified by using biometrics. Biometric identifiers are used to measure and identify human traits. Identifiers can be classified in two types physiological versus...
Computer applications require interaction between humans and computers. This interaction has to be lucid and is a challenging task for the traditional devices such as keyboard, optical pen, mouse etc. Hand gestures are more natural, compared with actions associated with the traditional devices. Use of hand gestures to operate machine would make interaction very interesting and easy. Gesture recognition...
The power amplifier's performance in a selective level mapping (SLM) STBC-OFDM is drastically degraded due to the presence of nonlinearities. Further the back off to be applied to the system is a function of the peak to average power of the system.A high merit factor phase sequence set achieves improved PAPR reduction compared to conventional Hadamard sequence set. In this paper, we determine the...
This Cognitive radio (CR) technology is a promising way to improve the bandwidth efficiency of radio spectrum. For practical CR systems have limited a priori knowledge of the primary users signal characteristics , spectrum sensing have three type energy detection, match filter and cyclostationary feature base detection. One of the main benefits of the cyclostationary beam forming algorithms is their...
This paper exhibits an evaluation between three textile antennas at 2.45 GHz such as linearly polarized rectangular patch antenna (LPRMSA), circularly polarized corner cut square antenna (CPCCSMSA) with coaxial feed and rectangular slot antenna (CPRSA) with coplanar waveguide feed. Need of compact size antennas due to handy wireless communication devices. The most appropriate antenna for wireless...
Circulators are indispensable in high power microwave systems to protect the vacuum source from high VSWR. The development of such high power circulator is often complicated by the fact that its design is governed by several interdependent factors such as RF, Thermal, Fluid flow, Magnetics and electronics. The ferrites in the circulator often witness a rise in their temperature due to the incident...
Wireless Sensor Network is a rising technology that guarantees ample amount of applications in various domains. The creations of WSNs completely rely on existence of various hardware and software and WSN developed with limited battery life. Many WSN routing protocols are designed so that it makes use of fewer resources and improve the performance and lifetime of network. Energy consumption is one...
In the current period of time there is tremendous increase in the video data which encourages for more exploration on video summarization. Video summarization means main content, scenes are extracted from the video. For video summarization, key frames extraction is very essential. The crucial contents are presented by the key frame. Abstract form of video is very useful in video processing. This paper...
Multiplication is an important fundamental function in arithmetic operations. Multiplication based operations such as Multiply and Accumulate unit (MAC), convolution, Fast Fourier Transform (FFT), filtering are widely used in signal processing applications. As, multiplication dominates the execution time of DSP systems, we need to develop high speed multipliers. Ancient Vedic mathematics facilitates...
In the current era of Information technology, almost every device and application requires Internet connectivity. Security and access to data has become a major area of concern. Since each and every algorithm which use different transformation method are better at some place and same time has some limitation. So enhanced approach can implement the hybrid method to achieve the more accuracy and inherit...
Digital images can be secured by using methods of scrambling/encryption. A number of techniques have been proposed to encrypt the digital images. One such technique, which secures the content of the digital image by making it unreadable to the spying eyes, has been proposed in this paper. This paper proposes an image scrambling technique, using transforms for assorted color spaces. A comparison of...
Surveillance has a great importance at all times whether a war time or peace time. The aim of our paper is to make a convertible robot which will work in all the three media's (i.e., air, water, land).During flight mode, it will detach itself from rest of the body to reduce its weight during flight to make it easy for the flight. A camera will be mounted on it to capture images. The image can also...
Biometric systems perform recognition of individuals on the basis of their physical and/or behavioral traits. Some commonly used traits are fingerprint, face, iris, retina, palm print, voice pattern, signature, gait, etc. Fusion of Biometric traits improves the system performance and accurarcy. Fingerprint are detailed, unique, difficult to alter and durable over a lifetime. Features are extracted...
Importance of Content Based Image Classification is increasing in the field of Image Processing. Images are classified appropriately in their particular category using its features. This paper proposes LBG vector quantization approach for Image Classification with Function, Rule and Tree families of data mining classifiers. Here Experimentation is done using 7 codebook sizes and 11 data mining classifier...
The Wireless Sensor networks (WSNs) consist of sensor nodes which are deployed in environment where the exhausted batteries of nodes are difficult to charge or replace. Main problem in WSNs is Energy consumption which is caused due to overhearing, idle listening, redundant transmission and collisions. To improve the energy efficiency of WSNs different protocols are designed. Efficient Multi-hop Broadcast...
Distributed generation (DG) devices can be strategically placed in power systems for grid reinforcement, minimizing real power losses, improving bus voltages and efficiency of distribution system. The optimal DG placement (OPDG) method is used to provide the best locations and sizes of DGs to optimize electrical distribution network operation taking into account DG capacity and voltage constraints...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.