The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Testing is necessary for software to know the quality and performance of the system. Testing phase initially starts from the generation of test cases. There are many ways to generate test cases but the critical task is to identify valid test cases at maintenance phase. Existing approach uses TestFilter method to reduce the size of test cases by satisfying the constraint. In this paper, TestFilter...
. In this work, friction welding of AISI 52100 grade carbon steel rods of 12mm diameter was investigated with an aim to analyze the sensitivity of Tensile strength for the process parameter. Welds are made with various process parameter combinations using ANOVA design matrix which were subjected to tensile tests. The Ultimate tensile strength of the welded joints has been reported. A microstructure...
This paper proposes a new approach to solve the problem of real-time vision-based hand gesture recognition with the combination of hand posture and hand gesture analyses. The main objective of this is to divide the recognition problem into two levels according to the hierarchical property of hand gestures. This approach implements the posture detection with a statistical method based on Haar-like...
Authentication and data privacy is an important aspect in Cloud computing. In this research work to ensure authentication and data privacy a Group Key Authentication (GKA) protocol is proposed and implemented. This defined protocol provides authentication and data privacy with reasonable authentication time and data reduce data traffic in the Cloud computing and simultaneously increases the Quality...
The problem of vision-based sign language recognition, which is used to translate signs to English sentence, is addressed in this paper. A fully automatic system to recognize signs that starts with breaking up signs into manageable subunits is proposed. A framework for segmenting and tracking skin objects from signing videos is described. A boosting algorithm to learn a subset of weak classifiers...
For efficient management the early detection and control on any damage which occurs in the gas pipeline such as crack or leakage is essential in many gas industries. The wireless temperature & pressure transmitters have been commonly used to collect the information in supervision consistency of the gas pipeline. The most common sensors used in finding the abnormality in the pipe line are pressure...
In developing countries, a large growth in power demand necessitates the efficient distribution of available power. Whenever power demand is more than the power generation load shedding is carried out. Under the current scheme, load shedding is done by disconnecting an entire feeder, employing ‘Round robin’ technique. In most cases, this method fails to shed exact amount of load resulting in either...
To rise above the limitation of the Traditional load forecasting method using data warehousing system, a new load forecasting system basing on Radial Basis Gaussian kernel Function (RBF) neural network is proposed in this project. Genetic algorithm adopting the actual coding, crossover and mutation probability was applied to optimize the parameters of the neural network, and a faster growing rate...
In developing countries like India there is a huge gap between power generation and demand where load shedding becomes necessary to sustain system stability. Conventional load shedding methods follow “round robin” technique wherein it is almost impossible to shed exact amount of load. And also shedding is carried out regardless of the type of loads connected to a feeder as a result of which available...
In this research paper, the problem of vision-based sign language recognition which is used to translate signs to native or foreign language is addressed. This paper aims in designing a framework for segmenting and tracking skin objects from continuous signing videos and developing a fully automatic system to recognize signs that starts with breaking up signs into manageable subunits. A variety of...
The authentication is one of the important problems in Cloud computing environment. In this paper, a new Group Key Authentication (GKA) protocol is proposed. This protocol reduces the authentication time and data traffic in the Cloud computing and simultaneously increases the Quality of Service (QoS). Two additional aspects need to be addressed in cloud computing environment are load balancing and...
Wireless Sensor Networks (WSNs) is an emerging and powerful technique for today's real world applications with interactive environments. The application of wireless sensor network starts from environment, household monitoring and ranging up to critical military applications. As their application involving in transmitting critical information, which require challenging methods to provide security for...
Many activities are planned by an organization; however there are some constraints that must be considered. Therefore, the selection of the best activities is important to maximize the achievement of the organization's goals. Zero-One Goal Programming (ZOGP) model is used to select the best activities to be done throughout the year by considering the selected constraints. This method takes into account...
The rapid proliferation of wireless ad-hoc networks and mobile computing applications has changed the landscape of network security. In this paper, we use hybrid approach that have both misuse and anomaly intrusion detection system using cross feature analysis for obtaining the trained data and test data from the trace file and to model the intrusion detection pattern. Apart from detection based on...
Nowadays smart way of doing the work is very familiar among every business oriented enterprise applications. In this paper we propose an enhanced smart multi-banking integrated using service oriented composition model by which using single username and password the user can able to access multiple bank accounts. Every user can have more than one bank accounts and each bank provides different username...
The dominating effect of Wavelength Division multiplexed system is Four Wave Mixing (FWM). Channel crosstalk and performance degradation of the system can be induced in the multi channel systems by FWM. In this paper, the FWM affecting the original Dense Wavelength Division Multiplexed (DWDM) signal power is studied and suppression of FWM is achieved by placing the Optical Phase Conjugator (OPC) in...
In this paper, the Fracture behavior of Al6061 alloy, discontinuously reinforced with fine particles(25μm) of silicon carbide are presented and discussed. The discontinuously reinforced aluminium (DRA) alloy composites with 10% and 15% volume fraction of particulates were produced by the stir casting method and using them test specimens were prepared as per ASTM standard. Heat treatment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.