The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a data-mining approach, a model for estimation of aerosol optical depth (AOD) from satellite observations is learned using collocated satellite and ground-based observations. For accurate learning of such a spatio-temporal model, it is important to collect ground-based data from a large number of sites. The objective of this project is to determine appropriate locations for the next set of ground-based...
The discarding of electronics is a growing problem around the world. This paper first analyzes the possible limitations in current electronics recycling models and methods through the review of the literature, and this paper then presents a study of the complete electronics recycling process based on electronics features. The five main stages in the recycling process are described: collection, product...
This paper reports the mechanism of sentence level emotion identification based on emotion tagged word level constituents acquired by an automatic classifier applied on the SemEval 2007 Affect Sensing corpus. Basic set of six emotion types, namely, happy, sad, anger, disgust, fear and surprise have been selected for reliable and semi-automatic word level annotation. WordNet Affect lists have been...
In this paper, we study the reverse link (RL) capacity of a co-channel macrocell-femtocell network, where the macrocell and femtocell networks share the same carrier. The analysis is done based on an outage probability criterion, and we use this analysis further to compare the capacities of different practical multi-carrier macrocell-femtocell deployment strategies.
This paper explores the trade-offs of different levels of access control in a mixed femtocell-macrocell deployment with focus on reverse link (uplink) outage analysis. The aim is to identify and evaluate criteria that will help operators to assess the impact of allowing different degrees of access for macrocell users onto femtocells, and suggest some schemes that will be useful in this regard.
The paper presents the structure and overview of Indian power system. The development of transmission technology has also been discussed in brief. The paper reviews the philosophy of transmission tariff in Indian scenario. The changing structure of the electricity supply industry is bringing transmission charging mechanism in to new focus. Of course, charging scheme is a complex task and it becomes...
Web is one of the most popular internet services in today's world. In today's world, web servers and web based applications are the popular corporate applications and become the targets of the attackers. A Large number of Web applications, especially those deployed for companies to e-business operation involve high reliability, efficiency and confidentiality. Such applications are written in script...
In restructured power systems, load following is considered to be one among the many ancillary services necessary to support the transmission of electric power. This paper investigates the performance of a load following controller on each generator involved in bilateral contracts. A suitable control strategy is also proposed for the generators taking part in load following to share a portion of the...
IEEE 802.16m amendment is being drafted to meet the 4G network requirements as an extension to 802.16e-2005. In 802.16e, a Subscriber Station (SS) can have multiple connections to a Base Station (BS) for supporting different services simultaneously. SS negotiates sleep-mode with BS by exchange of management information for one or more connections per active Power Saving Class Identifier (PSC_ID) belonging...
Recently clustering methods have gained importance in addressing network security issues, including network intrusion detection. In clustering, unsupervised anomaly detection has great utility within the context of intrusion detection system. Such a system can work without the need for massive sets of pre-labeled training data. Intrusion detection system (IDS) aims to identify attacks with a high...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.