The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is difficult to identify the track obstacles from a running train and even on identification it is impossible to stop the train suddenly. The paper deals with reducing the locomotive accidents by creating a continuous monitoring and Warning System which detects the obstacle even before encountering it and collects all the related information about it. It also specifies about the hybrid technology...
The main aim of this paper is to implement a Artificial Neural Network to recognize and predict Handwritten digits from 0 to 9. A dataset comprises 5000 samples of number digits with different strokes are taken for our work. The dataset was trained using gradient descent Back-propagation algorithm and further tested using the Feed-forward algorithm. The system performance is observed by varying regularization...
Smart environment and Pervasive Computing has deeply influenced the present power system. The present smart grid is capable of determining and handling the load anywhere, anytime due to the Wireless communication. The Smart Meter (SM) is enabled with communication module, potential transformer and current transformer to measure the amount of power being used. A Zigbee communication enabled SM is designed...
In this paper, the probe position effects on efficiency of mode excitation, radiation pattern and null steering has been studied. The radiation patterns for different combinations of the mode have been obtained here. It has been observed that the radiation patterns has two nulls which can be steered independently and is required in many applications such as antijamming antennas. The radiation pattern...
Recently with the rising population and energy demands, we should get an option of renewable energy source and that energy source should not cause pollution and other natural hazards. For this condition the Solar Energy is the best alternaive for us. A Solar Power Tree is the best innovative way, which requires very less place to produce energy efficiently. We can also use the “SPIRALLING PHYLLATAXY”...
Human identification can be performed in various ways. Now a days biological verification method used to identify the human physical character and behaviroal characteristics. The finger print method, iris verification methods are popularly used in physical verification. But Signature verification method appreciated for behaviroal characteristics verification system. Many algorithms are selected to...
Due to rapid increase of mobile user's, demands occur for mobile communication. Mobile users need more features on their mobile phones such as high date rate, efficient communication, reduced traffic, comfort to use various applications etc. Service providers are in need to satisfy the needs of mobile users which can be done with help of 5G technology. 5G technology provides very high bandwidth, reduced...
In deregulated environment, knowledge of available transfer capability computation helps in various important aspect in order to operate the power system safely and to minimize load encroachment at any specific transmission line. The basic aim of this paper is to remove the congestion in restructured system occurs due to line outage contingency. ATC computation under normal and contingency condition...
Electricity is very important part in our daily life. It is required in our daily routine for many application like home appliances, industrial purpose also for conversion of one energy to another form of energy. That is why it is used properly in our daily life. So it is important to measure it and monitor it. Not only monitor and measure but also distribution of electric bill according to user use...
Microgrids are gaining considerable attention due to the installation of renewable power generation resources in areas that are closer to the load centers. The multivariable droop idea, acknowledges active power sharing by concurrent drooping of both voltage and frequency, in resistance as well as weak grids. To develop a multivariable-droop synchronous current converter control strategy for current...
Data security is a primary concern for every communication system. Communication becomes an essential tool for any business, education, defense services etc. It is essential to transfer data safe and secure. At present, various cryptography algorithms have been proposed and implemented. Those algorithms are classified into symmetric and asymmetric algorithms based on the number of keys used. Even...
Zinc oxide nanoparticles were tested for increasing the dielectric strength of transformer oils for high voltage applications, but the results of other comparable nanoparticles proved to be more technically feasible as the relation between increase in breakdown strength and nanoparticles concentration was significantly better. This paper discusses a theory that describes a plausible linear relation...
Beltweigher is an instrument used to measure and control the solid flow rate in industries. It allows the continuous weighing of materials as they are transported through the conveyor. It usually form a part of the conveyor equipment where it replaces a particular section of the conveyor belt. There are various factors such as belt tension, belt stiffness, location and alignment which affect the accuracy...
This paper proposes a congestion control technique for intermittent networks (ICNs), it is a class of mobile ad hoc networks where there does not exist a complete end-to-end path between source and destination. The routing algorithm used is Self Adaptive Utility based Routing Protocol (SAURP) that makes the network self adaptable to the network behavior. Nodes often get congested with too many messages...
This paper deals with the design of the SEPIC converter is connected to permanent magnet Brushless Direct Current motor through VSI (voltage source inverter). The SEPIC converter values has been designed based upon the transfer function and the input is get from the Renewable Energy Source as Solar PV cells. The Maximum power should be extracting by using perturb and observe technique. The ripples...
In this paper, a novel Micro Electro Mechanical System (MEMS) based cantilever beam of cross section (400×150×1)μm is presented for the detection of Metronidazole (MZN) which can be used in food processing industry to detect its toxicity level in meat. MZN is a drug that is proven to be carcinogenic if used as feed addictive for cattle breeding or aquafarming. Molecular imprinted Gold cantilever beam...
In this paper, Theory of Characteristic Mode (TCM) has been exploited to enhance the performance of MIMO antenna. Characteristic modes of Chassis has been analyzed, it has been observed that only one mode is resonating around 1GHz. To enable more than one characteristic mode to resonate around 1GHz, Two metal strips are attached along the length of the chassis with the help of shorting pins. A new...
When we work in a large scale network, number of problems arises, the total time required to deal with these type of problems depends on how severe the problem is? As system takes more time to recover from failures, maintenance cost goes on increasing, it also causes loss of processing cycles. To deal with such type of loss, the information at various nodes in network is collected and verification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.