The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Accurate estimation of phasor is essential for wide area monitoring and control of power systems. The accuracy requirements of phasor estimation for various class of applications are outlined by the IEEE Std. C37.118. This paper presents a frequency domain interpolation approach for phasor estimation at off-nominal frequencies. The proposed approach involves quadratic interpolation of complex DFT...
OCR is technical approach to analyze the handwritten text and turn it into a structure which the process the system more effectively for searching, re-storing, retrieval and indexing purpose. Many innovations are discovered in the field of OCR, but still many challengers are waiting for the solutions such as the recognition of document-backside-layered characters along with front side layer characters...
This paper proposes an optimised design approach for Multi-Modular (M-M), single-phase UPS inverters system. The Voltage Source Inverters (VSIs) have low output impedance for good voltage regulation, which conflict with the requirement of high impedance in the parallel configuration to restrain Inter-Modular (I-M) circulating currents. Conventional dual-loop approach of Proportional-Resonant (PR)...
Design and implementation of active headrest are having challenges as the performance of noise reduction at the ear reduces due to head movement. In this paper, an active headrest is implemented using two secondary loudspeakers and two error microphones using a multi-channel active noise control (ANC) algorithm running on a dSpace dS1104 platform. The performance of an active headrest was studied...
The redesigned Fuzzy C Strange points clustering algorithm uses the membership function to find the strange points and also to establish the degree of likeness of elements to different clusters as opposed to the traditional fuzzy c strange points clustering algorithm which uses the Euclidean distance to find the strange points and membership function only to group the points into clusters. The redesigned...
Precise tracking of frequency is essential for accurate phasor estimation at off nominal frequencies. In this paper, a simple approach for real time frequency estimation involving interpolation of DFT coefficients corresponding to fundamental and two adjacent bins is presented. In particular, quadratic interpolation method is adopted to estimate the frequency. The quadratic interpolation formulation...
It this paper approximation of fractional-order systems into 2nd order integer-order state-space models is presented. The operation is performed it two steps, in first step integer order approximation of fractional order system is done using oustaloup's approximation algorithm and then, the approximated system is realized in a state-space form using MATLAB and dimension of the resulting integer-order...
In this work, systematic investigation of DGTFET have been made by varying different device parameter such as dielectric constant, doping concentration, work function, temperature, and channel length with their variation impact on threshold voltage (Vth). It is also analyzed that while decreasing the value of work function, energy band overlap increases, whichcauses decrease in tunneling width. Hence...
Electrical drives are hefty tool have major contribution in most of the industrial and nonindustrial motion control applications. The electrical drive connected through a flexible shaft with a load can be modeled as a two inertia motor system. The proposed work deals with an easy-to-tune controller design strategy for two inertia motor system based on coefficient diagram method. Three speed control...
Recent research on web spam detection has shown promising results, and many new and efficient detection algorithms have been developed. While most research focuses on developing algorithms, our investigation shows that the features used in the algorithms are in fact very important, and different features can lead to very different results. This paper investigates three types of web spam, content-based,...
Synchronization problem can be solved by object-oriented programming language in the field of computer science. Till now we have been developing software using Object oriented programming (OOP). This OOP methodology helps in modularizing the problems. But this technique does not do well in when it comes to separation of concerns. Implementation of OOP may also lead to the code tangling and code scattering...
The Land use and land cover classification is one of the important areas of remote sensing and satellite image interpretation. There are several techniques are implemented for the land use and land cover classification in different land use and land cover. The all techniques for land use and land cover classification are divided in supervised and unsupervised classification. So, here in this paper...
Attacks on the internet keep on increasing and it causes harm to our security system. In order to minimize this threat, it is necessary to have a security system that has the ability to detect zero-day attacks and block them. “Honeypot is the proactive defense technology, in which resources placed in a network with the aim to observe and capture new attacks”. This paper proposes a honeypot-based model...
As the technology advances more and more information are getting accumulated in the form of web sites in the internet. Web mining is a technique of extracting information from the internet which helps the users in finding quality pages. The main problem is that search engines are not capable enough to provide the relevant data. They fail to index all the information available on the web. Web mining...
The term “Quality of Speech” in Speech Enhancement techniques is associated with Clarity and Intelligibility. Till now due to the variable nature and characteristics of noise with time and process to process, Speech Enhancement is a difficult problem in Noisy environment. In this paper, we proposed a method to improve the quality of speech based on combination of Digital Audio Effects with Improved...
Recently, use of automatic speech recognition system is demanded for various applications such as security, word to text conversion etc. During the speech signal acquisition, other unwanted signals from various sources are added to the original signal which degrades the performance of ASR system. These unwanted signals are called as noise or mixing of sources which are caused due to multi-user recording,...
Virtual Machine (VM) migration has recently received significant attention to address the issue of load balancing, system maintenance, intelligent energy management of the data center. However, the migration trust and security concerns still exist real in the placement of VM. In To resolve these challenging problems, we use the existing authentication schemes and also we propose an authentication...
Network security management is a big challenge for network administrators due to increasing vulnerabilities. Vulnerabilities are the weakness of the network and allow malicious attackers access to resources controlled by an organization. To keep networks secure network administrators should be aware of all vulnerabilities through which an attacker can gain access. In this paper, we have considered...
Cluster analysis is a principal method in analytics domain of data mining. The algorithm used for clustering directly influences the results obtained from applying the clustering algorithm (clusters). Data clustering is done in order to identify the patterns and trends not identifiable from just looking at the data. Clustering may be supervised (if the machine training data set is available) or unsupervised...
OCR is the most active, interesting evaluation invention of text cum character processing recognition and pattern based image recognition. In present life OCR has been successfully using in finance, legal, banking, health care and home need appliances. The OCR consists the different levels of processing methods like as Image Pre Acquisition, Classification, Post-Acquisition, Pre-Level processing,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.