The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Schizophrenia is a mental disorder which has underlying neurological deficits. Schizophrenic patients have low social acceptance as well as a higher death rate. Initiation of schizophrenic symptoms are associated with a wide range of cognitive deficits. Impaired working memory performance is a basic characteristics of understanding schizophrenia. The performance impairment increases significantly...
In today's world where there are energy crises, there is a need to conserve the same. In order to conserve the energy, it is imperative to utilize its available forms as per the requirement that arise from the end user. In this paper, modeling and optimization of a Combined Cooling, Heating and Power (CCHP) plant is done wherein minimization of Exergy Destruction is set as an objective function. Electric...
The advanced process and higher profile works rapidly increasing the load on microprocessor and heat evolving per unit area. The paper involves the steady state heat transfer analysis of aluminium heat sink and the graphite metal heat sink. Both heat sink has put under the same physical condition and temperature profile. Modeling and Analysis has carried out by using the steady state heat transfer...
This paper proposes an encryption of color snapshot making use of reality-preserving fractional discrete cosine transform (RPFrDCT). Color picture encryption scheme proposed is headquartered on RPFrDCT and pertaining to space and disordered mapping. The authentic-valued output, the nonlinear manipulation, the excessive sensitiveness and immoderate robustness to the cipher keys are the main advantages...
Parking in modern world is always a subject of concern and isn't a task to be ignored as it was in old days. With modernization and introduction of digital devices, machines have taken a very important and irreplaceable role in human life. Parking nowadays is also done with the help of much advanced and sophisticated systems. The problem with most of these system is that they need a very high capital...
Synchronization of the power electronics system with the grid system in phase and frequency is the most important concept of distributed power generation system. The synchronization speed and precision of the signals depend on the technical implementation of the phase-looked loop (PLL) system. This technology decides the quality of grid utility power to be delivered and consumed. The disturbance rejection...
This is an exhaustive study on the use of ICT tools in teaching and learning in the public and private universities in Yemen. The purpose of this study was to ascertain the scope of ICT usage among students; and to assess the problems and challenges they have to address in utilizing this facility. The researcher prepared a questionnaire to gather data from a group of 360 students from six private...
Gene selection is becoming one of the major step in analyzing the microarray gene expression data to uncover different disease mechanisms and other biological mysteries. But the microarray gene expression data are incomplete and imprecise which leads to untrustworthy gene selection. The effectiveness of the gene selection techniques can be increased by applying some preprocessing algorithm which can...
Breast Cancer is highly predominant in women in today's world. It can start in the breast and can spread to other areas of the body in the course of time. Breast cancer is the second largest disease leading to the death of women. The disease is curable if detected early enough. A lot of research is being done to detect the cancer at the earliest. Early detection at the microcalcification stage can...
The biggest concern of Network is security. Intro find the tricks and tools of the Attackers. Data Mining techniques automatically learn the pattern of the tuples and Intelligent decision are made. Supervised learning methods finds the attack based on previous knowledge and unknown attacks are detected by using Unsupervised learning. Dos, Probe and Normal data are correctly detected by maximum Data...
During the last decade, there has been an increasing application of Flexible AC transmission system (FACTS) devices in power system due to its numerous advantages. However, to derive maximum benefits their location and rating should be optimal. This paper presents two heuristic optimization techniques, namely Particle Swarm Optimization (PSO) and Teaching Learning Based Optimization (TLBO), to ascertain...
Iris recognition is very difficult to perform as it requires an environment that is highly controlled for better image acquisition. As compared to other biometric technologies, iris recognition is prone to poor image quality. Specially, images captured from a distance introduce noises such as blur, off axis, specular reflections and occlusions. For proper recognition good quality of captured image...
Water supply distribution network is suffering from different types of control and management issues leading to loss of water in terms of leakages and thefts. Further involvement of human workers in managing the water supply has made it difficult and uncontrollable issue. This review with exhaustive literature review in this area. Total 132 research papers published during year 2006 to 2015 has been...
This paper presents comparative performance analysis of Automatic generation control with two recently developed meta-heuristic nature inspired algorithms called Backtracking search algorithm/Wind driven optimization algorithm. An attempt has been made to show the superiority of Wind driven optimization algorithm over Backtracking search algorithm to improve the transient performance of automatic...
Tele-operation is a kind of semi-autonomous system, with the objective of allowing human to control a device in remote location. This paper proposes such a system implemented with Omni Bundle haptic device and Q-Bot 2 Mobile Robot platforms connected in a master-slave configuration respectively. The paper also provides modelling, trajectory tracking controller for both robots and communication algorithm...
Protect the network from external attacks have become the big challenge which facing networks nowadays. so, monitoring and analysis all the events over network or computer system are known as intrusion detection system. This paper proposed two approaches to addressing intrusion detection system problems. One of this approach is known as Principal Component Analysis (PCA) for feature extraction and...
The paper presents a novel way of using fuzzy c means clustering in supervised manner for outlier detection in surface acoustic wave sensor array based electronic nose. The method is trained through the set of known class labels samples taken as train set combined with the test set samples, which may contain outlier class and/or true data samples. Fuzzy c means clustering is implemented with equating...
Brain Tumor which is also known as Intracranial Neoplasm is a vital brain disease. This is caused when abnormal cells are formed within the brain. The two essential types of tumor are Malignant or Cancerous tumor and Brain tumor. The patient does not recover when the growth of the abnormal cells is more than the 50% mark of the brain. The describes two different algorithms of image processing. The...
Water bodies have seen a rise in chemical pollutants in recent years. Therefore quality testing has become an essential part of treatment. Currently in India, monitoring of water quality is done by physically going to water bodies and collecting samples which are then sent to be tested in laboratories. This is time consuming and inefficient method. To automate this process, water quality monitoring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.