The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The article presents the design and implementation of a multi-loop FID controller for a pilot plant distillation column, based on the Multi-Scale Control (MSC) technique. Designing an effective multi-loop PID controller is challenging because of the interactions and dead time. The main feature of this multi-scale control scheme is its communicative structure, which enables communication among all...
Data sharing is a significant functionality in cloud storage. These cloud storage provider are answerable for keeping the data obtainable and available in addition to the physical environment protected and running. Here we can securely, efficiently, and flexibly share data with others in cloud storage. A new public-key cryptosystems is planned which create constant-size cipher texts such that efficient...
Information retrieval is the method of retrieving the knowledge relevant to an issue of curiosity. It locates the relevant documents, on the premise of user's question which includes keywords or example files. Probably the most acquainted application of information retrieval system is search engine corresponding to Web search, Desktop search, Federated search, Mobile search, Enterprise search and...
This study deals with the development of vision for vehicle and driver to prevent problems for both vehicle and driver while driving. Wireless communication in car is the booming field of Network communication. An Head-up-Display is developed for calculating the car strategies which help in maintenance and life time of the car to analyze the system with the help of CAN (Controller Area Network) used...
Computerized analysis of microscopic cross sectional images of plant parts is useful for authentication and quality assessment of plant materials. The analysis involves segmentation of cells in the cross section, extraction of cell features and classification of cells. The segmentation of individual cells plays a major role in realistic estimation of cell parameters for identification and classification...
Identification of proper medicinal plants is quite challenging and it is the time to protect medicinal plants since several plant species are becoming extinct. Leaves are the key components of a plant. Here we have proposed a method for the extraction of shape, color and texture features from leaf images and training an artificial neural network (ANN) classifier to identify the exact leaf class. The...
At present the detection of surface defects on hot rolled steel sheets is most trivial problem facing by the steel Industry. There are few methods available for detection of surface defects and the most popular method is texture analysis. In this paper, we highlighted the extraction of the texture features using a three level 2-D Haar wavelet transform, and training the Artificial Neural Network (ANN)...
In recent days, elderly people living alone at home are steadily increasing throughout the world. This situation drives to develop a health care system for monitoring the health parameters of elderly people and help them to lead ahealthy independent life. This paper presents a system that uses wireless sensors for monitoring the health parameters without disturbing the normal activities of elderly...
As we know that, the process of hiding information behind any one of the multimedia elements is called steganography. It is used in many areas where the security risk is very high. The normal encryption and decryption mechanisms will improve the security but anyone can break the security by analyzing the secret information. Where in steganography the hacker may not know whether the information is...
Existing methodologies in WDM networks, generally uses either lightpath distance or network congestion to identify optimal and backup lightpaths. In our paper, we have designed an efficient alternate RWA protocol (EARP) which considers both congestion and route distance so as to improve the network performance. On arrival of a request the source node sends control signals through all the paths to...
All metro cities in our country are flooded with population. Though two wheelers and four wheelers are more common, the usage of bus is the single largest mode of land transport next to Indian Railways in modern India. We can see people thronging in queues in all bus stops and groping in the dark without knowing when their expected bus will arrive at their respective bus stops. To facilitate this,...
In this paper, we have designed a distributed dynamic survivable RWA protocol based on automatic updation (ADDR). The updation mechanism involves calculation of number of free wavelengths and shortest distance at the source node to identify the optimal and backup lightpath to reduce the congestion and delay in the network. As soon as the request approaches the node, it is served with the best lightpath...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.