The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Another approach for generating reduced order discrete time system using composite method is being proposed. The proposed method is validated by considering a Linear Time Invariant Discrete System (LTIDS) having single input single output(SISO) of higher order being represented in frequency domain. Eigen Spectrum Analysis and Least Squares moment matching methods form the proposed composite method...
Earth Station Power controller can be designed by several methods by using different processors and programming codes. For coding we can use different languages as per different processor or hardware, embedded C, Hardware description language (HDL), etc. Power controller design is nothing but a design of algorithm where multiple solutions are provided for power failure condition and power consumption...
Chronic disease are the leading cause of increase in mortality rate globally, In this study we cosidered hypertension as case study. Diagnosis and screening of hypertension plays a significant role in the prevention and reduction of the onset of cardiovascular diseases as well as the improvement of quality of life. It is of extraordinary worth to make sense of hypertension-related risk factors and...
Learning in data streams has practical significance in today's knowledge intensive era. Unlike static data mining, data stream mining requires handling with the critical issues related to the unbounded memory, one-scan nature, data with high arrival rate and few labels. In real nonstationary environments enormous data come with very high-speed and label scarcity. Manual labeling of such data is impractical...
Steganography assumes extremely significant part in the field of data covering up for mystery correspondence. It is a secret correspondence to conceal mystery information in spread media (e.g. content, sound, video, picture and so on). Steganography works in Spatial and Transform domain. Spatial domain achieves better capacity but low robustness while Transform domain achieves robustness along with...
Advancement of technology, has furnished several terabytes of data for companies which can be effectively summed under Data Mining. Finding useful pieces of information from such huge data has been the need of the hour. A term called Anomaly Detection [8] is used in the pretext to refer to data objects which do not confer to a notion of normal data objects. There are various density based clustering...
A compact model in MATLAB environment of amorphous silicon and polycrystalline silicon based thin film transistor is essential to all Active Matrix Organic LED (AMOLED) designers to assessing and envisaging the performance of AMOLED's. This model explains the three regions of thin film transistor operation, i.e. leakage region, sub threshold region and above threshold region. The proposed model shows...
Wireless Sensor Network is a network consisting thousands of small nodes which provides conviction communication for sensor(data), have ability to activate device that have only control conditions like switches and others and it is monitoring the physical and environmental condition of the networks. Basically wireless sensor network is part of Ad-hoc network. It is very laborious to recharge or change...
This paper makes an endeavor to plan and build up a Remote Fuel Monitoring System (RFMS) with a 8-Bit Microchip Microcontroller. The configuration of this model gives an entrance of ongoing operational parameters, for example, Diesel/Petrol Fuel Levels, Temperature, Oil Levels and Voltages Generated and a correlation with their separate basic edge limits. The RFMS ceaselessly screens these parameters...
An enterprise that uses a private addressing scheme can connect to an Infrastructure as a Service (IaaS) cloud to enhance its server capacity for a limited period. The IaaS cloud service provider partitions a portion of its public cloud to realize a private cloud for the enterprise. The private cloud is reachable as an extension to the servers of a business computing environment through an appropriate...
This paper deals with the design of new cruise control systems that can help in safe maneuver in traffic condition. It consists of two Raspberry Pi's, one act as slave and other controller as a master. Slave consists of different sensor network like accelerometer, ultrasonic sensor and humidity sensor. It consist RPM meter to gauge the recurrence of revolution of vehicle's wheel and GPS module to...
Now a days, most of our data is travelled over internet so the security of that data is most important. Visual cryptography plays a very crucial role for security of image based secret. Visual cryptography encrypts the image in to shares and in decryption process all shares are stacked together to reveal the secret image. Here we are proposing a new scheme for color share generation. In this scheme...
Forests are one of the most important natural resources on this earth and they offer huge potential share in our GDP by producing many consumables. This paper deals with the detection of fire smoke plume in forests using Unmanned Aerial Vehicle (UAV) and then sending immediate information to EFS&T inorder to protect our forests. Because it prevents the spreading of fire in forest and also gives...
Fall is an unusual activity and it is a serious problem among the elderly people. In the proposed system, we present an automatic approach for detecting and recognizing falls of elderly people in the home environments using video based technology. The focus is on the protection and assistance to the elderly people. Fall causes a very high risk of the elderly's life that may cause death. The fall incident...
In the past years modern arithmetical methods for image investigation have led to a rebellion in many fields, from computer vision to scientific imaging. Though, some recently developed image processing techniques successfully oppressed by other sections have been infrequently, if ever, experimented on celestial observations. Here we present a new idea of super resolution of Astronomical objects using...
An image is an array, or a matrix, of square pixels organized in columns and rows. A picture is wealth a thousand words. Pictures concisely deliver information about positions, sizes and inter-relationships between objects. Image metrics are very useful to analysing the raw images for further quality image processing. Nowadays all the digital images are having noise problems during image acquisition...
With every passing year since the mid 1970s, we see a large increase in the data rates in the core networks. That is mainly driven by the improved techniques to carry data in the optical fibers. The speed of communication or the data rates in the fiber kept on increasing for almost 40 years. That trend of increase in data rates is commonly known as Keck's law. Like Moore's law, fiber data rates have...
The implementable decoders and large collection of data transmission and storage channels can be admitted at the same time using low density parity check (LDPC) group of Linear block codes. We will review some of the LDPC construction techniques and encoding problem for LDPC codes. Also certain special classes of LDPC codes which will resolve encoding problems will be introduced. Performance analysis...
Most of the current approaches are to secure confidential data hosted in cloud based on the attribute based encryption. Under such approaches, data owners are in charge of encrypting the data before uploading them and whenever user authorizations policies changes re-encrypting the data would performed. Thus the communication and computation cost at owner side is high. While assuring data confidentiality...
Wireless Sensor Network technologies have become a latest research area in health care industries due to rapid maturity in improving the quality of life of a patient. Wireless Sensor Networks when work in medical field provide continuous monitoring of vital health parameters which over a long period of time provide doctors much needed help to make accurate diagnosis and giving better treatment. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.