Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A novel and faster method for cancellation of random valued impulse noise is proposed in this paper. Our proposed algorithm works in two stages. In stage one, the noisy pixels are located and eliminated and in second stage, these noisy pixels are used for edge restoration. The results thus obtained are quite better and comparable to previously proposed algorithms and methods even at the noise levels...
Over the last few decades, security of data exchanged over the network has become a major concern. Two major techniques have existed to achieve the same, namely cryptography and steganography. Cryptography alters the structure of the text itself whereas steganography hides the text behind some other digitally representative media, thus transmitting it unsuspectingly. But with the increase in networks...
Data mining is the process of analyzing data from different viewpoints and summarizing it into useful information. Clustering is the process of grouping of similar objects together. The group of the objects is called the cluster which contains similar objects compared to objects of the other cluster. Different clustering algorithm can be used according to the behavior of data. Farthest first algorithm...
With fast intensification of existing multimedia documents and mounting demand for information indexing and retrieval, much effort has been done on extracting the text from images and videos. Extracting the text from video is demanding due to complex background, varying font size, different style, high blurring, lower resolution, different position, viewing angle and so on. In this paper, implementation...
The estimation of effort involved in developing a software product plays an important role in determining the success or failure of the product. Project managers require a reliable approach for software effort estimation. It is especially important during the early stage of the software development life cycle. An accurate software effort estimation is a major concern in current industries. In this...
Electronic library is the collection of digital information related to an individual domain and in turn to all domains. A focused crawler traverses the Web looking for the pages most relevant to a domain and at the same time discarding the irrelevant pages and hence is helpful for generating the-e contents for digital library related to a particular domain. In this paper a focused crawling technique...
In recent years, there are development of robotics and communication on a large scale. Here we are using both the technologies together. Our robot is controlled by cell phone by DTMF technology through this we can make robot move in desire direction by touchpad. This robot can be make more useful by adding applications to it here we are using some sensor which can detect object and we are adding a...
This paper presents a unique control scheme for achieving power balancing in a recently proposed multilevel inverter topology. Moreover, this strategy can be extended to any type of topology and to any number of output levels of multilevel inverter (MLI). A comparison is made between the power delivered by sources with and without applying proposed strategy.
The analysis of the lossy interaction structure for Ka-band Gyro-TWT has been carried out and discussed. In this paper, dispersion and interaction impedance characteristics of the interaction structure have been determined using 3-D simulator CST-MWS. The beam-wave interaction analysis has been carried out using particle-in-cell (PIC) code MAGIC. The simulated result shows that the interaction structure...
This paper presents a unique control scheme for achieving power balancing in recently proposed multilevel inverter topologies. Moreover, this strategy can be extended to any type of topology and to any number of output levels of multilevel inverter (MLI).Comparisons have been made between the power delivered by sources in two different topologies with and without applying the proposed control schemes...
Loosely coupled inductive power transfer (LCIPT) systems are designed to deliver power efficiently from a stationary primary source to one or more movable secondary loads over relatively large air gaps via magnetic coupling. This paper presents the variation of deviation factor and cost factor with respect to the number of turns in Primary and Secondary coil (NP and NS) for a Series-Series (SS) topology...
The probability of correct operation of the system during a given lifetime is called the reliability. The reliability of a complete satellite communications system depends on the reliability of its two principal constituents — the satellite and the ground stations. The availability of a complete satellite communications system depends not only on the reliability of the constituents of the system but...
It is said that Fuzzy bring human approach in device functioning wherever it apply. Emotional Mobile concept captures facial expression and does user-centric setting accordingly i.e. setting screen color, displaying famous personality, changing ring tone, caller tune and many others. Hence, for purpose of determining mood/emotion, pattern recognition can be used. By analyzing the captured image/pattern...
Genetic algorithms have been successfully applied in the area of software testing. The demand for automation of test case generation in object oriented software testing is increasing. Extensive tests can only be achieved through a test automation process. The benefits achieved through test automation include lowering the cost of tests and consequently, the cost of whole process of software development...
In a heterogeneous networking environment vertical handover decision plays a very crucial role in the overall handover process. Many parameters and techniques have been proposed in the literature for selecting a best network available at a particular instance of time. Since user satisfaction is one of the ultimate aim of vertical handover process and different users can have different preferences...
In this paper, beam-wave interaction analysis in a Ka-band periodically ceramic loaded gyrotron traveling-wave tube (gyro-TWT) amplifier is investigated using particle-in-cell (PIC) simulation. The simulations predict that the interaction structure can produce more than 80-kW output power, 50-dB saturated gain, and 3-dB bandwidth is 2.56 GHz for 65 kV and 5-A electron beam with velocity ratio ...
Image steganography is a technique of masking secret information (e.g. text, image, audio, video etc.) in a cover image in order to protect the information from being modified or destroyed. Owing to its simplicity and hiding capacity, Least Significant-Bit (LSB) insertion in spatial domain techniques is a very popular approach of hiding information in a cover image. This paper presents a new algorithm...
Often Multi Criteria Decision Making (MCDM) techniques are used to assist in deciding a best choice, or alternative, in many different types of environment. Analytic Hierarchy Process (AHP) is one of the most popular MCDM technique used in variety of domains. It not only generates numerical order of alternatives that indicates an order of preference among them but also reflect there intensity or cardinal...
This paper presents cable sizing procedure and effect of the cable length on induction motor dynamic performance. Motor and cable selection, to accommodate competing motor starting requirements, are the classical challenges facing EPC contractors and motor designers during the planning and designing stages of new Industrial facilities. The cable size & length has impact on both starting current...
Cloud computing is not a new technology, it is a new way of delivering computing resources. Elastic cloud computing enables services to be deployed and accessed globally on demand with little maintenance by providing QoS as per service level agreement (SLA) of customer. The Cloud-based DDoS attacks or outside DDoS attacks can make ostensibly legitimate requests for a service to generate an economic...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.