The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper attempts to design a fuzzy controller, with a view to enhance the overall power quality of an ac-ac converter and regulate the load voltage. Besides it envisages investigating the performance of three firing strategies for the power switches in an AC-AC Converter. The algorithm is articulated in order that the input current vector is allowed to closely follow the source voltage wave such...
The majority of healthcare workers in hospitals continue to record, access and update important patient information using paper charts. Disparate patient data (clinical information, laboratory results and medical imagery) is entered by different caregivers and stored at different locations around the hospital. This is a cumbersome, time consuming process that can result in critical medical errors...
The future of optical-disks is the HVD (Holographic versatile disk). It's an ultimate capacity is 3.9 Terabytes. Holography is a method of recording patterns of light (hologram) to produce a three-dimensional object. A hologram is created by using a laser beam. It uses red (650nm) and green (532nm) laser. To write on HVD, the information is decoded into binary data(ones & zero's) to be stored...
Mobile ad hoc networks proved their efficiency in the deployment for different fields, but highly vulnerable to security attacks. It seems to be more challenging of in wireless networks. Existing research carried out provides authentication, confidentiality, availability, secure routing and intrusion detection in ad hoc networks. Ad hoc network characteristics should be taken into consideration to...
Computer usage has dramatically increased in past few years which in result brought immense technology enhancement in every field possible. Technology has reached to its heights but thirst of knowledge is still in race and will always be till end of the world. Communication has vital role in today's life which was once quite exotic and now wireless technology has become a milestone in communication...
Technology finds a place in almost every aspect of human life. It simplifies life and paves way to achieve targets that our fore fathers dreamt of achieving. It ignites young minds and undoubtedly makes the future their sole possession.
For implementing nanotechnology in VLSI, the replacement of silicon dioxide (SiO2) in gate dielectric becomes a challenging issue. Our innovation is to use Zirconium Silicate (ZrSiO4) as the replacement of SiO2 in gate dielectric, while companies like AMD, IBM and Intel have announced plans to replace the gate dielectric with Hafnium Silicate (HfSiO4). The implementation of ZrSiO4 is one of several...
In this paper, we investigate the use of brain activity for person authentication and person identification. Until now, the most widely used forms of biometric identification have been fingerprints, facial recognition and voice recognition, all of which can be faked but the brain-wave pattern cannot be faked. We know that the brain-wave pattern of every individual is unique and that the electroencephalogram...
The work presented in this paper goals to develop a system for automatic translation of static as well as dynamic gestures of Indian Sign Language. Image processing features such as skin tone detection spatial filter velocimetry and temporal tracing features are utilized for obtaining the motion print which is nothing but the power spectrum representation of the gestures that is unique for each gesture...
This paper presents an improved method for capacitor placement in radial distribution feeders to reduce the real power loss and to improve the voltage profile. The location of the nodes where the capacitors should be placed is decided by a set of rules given by the fuzzy expert system. The sizing of the capacitors is modeled by the objective function to obtain maximum savings using Differential Evolution...
The human hand is a complex system, with a large number of degrees of freedom (DoFs), sensors embedded in its structure, actuators and tendons, and a complex hierarchical control. Despite this complexity, the efforts required to the user to carry out the different movements are quite small. On the contrary, prosthetic hands are just a pale replication of the natural hand, with significantly reduced...
This paper presents User Interface Test Automation of Silverlight and Moonlight web applications. Silverlight is a new technology in Dot Net 3.5 framework developed by Microsoft. Moonlight is an equivalent technology for Linux operating system. Now a day most of the interactive and attractive web pages are developed using Silverlight and Moonlight. So in is paper we initially concentrating on user...
Data mining an non-trivial extraction of novel, implicit, and actionable knowledge from large data sets is an evolving technology which is a direct result of the increasing use of computer databases in order to store and retrieve information effectively. It is also known as Knowledge Discovery in Databases (KDD) and enables data exploration, data analysis, and data visualization of huge databases...
Wireless sensor network is a special form of wireless networks dedicated to surveillance and monitoring applications. Reliability in wireless sensor network is application specific. That is the specific form of reliability might change from application to application. Our idea is to generate a reliability based transport protocol that is customizable to meet the needs of emerging reliable data applications...
The aim of Pervasive Computing is for computing available wherever it is needed. It spreads intelligence and connectivity to more or less everything. Cars seem to become more and more sophisticated, in terms of mechanics and electronics. This paper reviews the state-of-art pervasive computing utilized in modern car technology. Microprocessors can be found in almost any subsystem of a car, and the...
Image registration is an essential step in many image processing applications that involve multiple images for comparison, integration or analysis such as image fusion, image mosaics, image or scene change detection, and medical imaging. Image registration methods can be categorized into two major groups: the feature-based approach and the area-based approach. In area-based approach LPT was introduced...
The design and simulation of two microwave antennas of fractal geometry are proposed in this paper. The patch and micro strip type antennas occupying same volume have been simulated and investigated. The simulation results report that the patch fractal antenna resonates at two frequencies whereas micro strip type fractal antenna possesses a good size reduction ability while providing a single resonant...
A mobile ad hoc network (MANET) consists of a group of mobile nodes (MNs) that communicate with each other without the presence of infrastructure. The wireless mobile hosts communicate in a multihop fashion. In multi-hop wireless ad-hoc networks, designing energy-efficient routing protocols is critical since nodes have very limited energy, computing power and communication capabilities. For such protocols...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.