The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Major Prerequisite to overcome the problem due to the insulation breakdown in High Voltage (HV) power apparatus is the efficient diagnosis of partial discharge (PD). Many different methods have been proposed by researchers for detection and measurement of PDs in past, based on different outcomes of PD such as Chemical, Acoustic, Electrical, Optical and Electromagnetic (EM) wave radiation. Among these,...
Measurement of Partial Discharge (PD) in High Voltage (HV) power apparatus has become an emerging issue. It helps to provide prior warning before sudden failure of the apparatus. The measurement of PD in HV power apparatus and in any electrical systems helps to reduce the down time including saving of money. For large and complex apparatus apart from PD measurement, it is also mandatory to find out...
High Voltage (HV) power apparatus are usually, the most critical and costly component in any power system. Sudden failure of such component leads to unwanted interruptions and catastrophic losses. Partial Discharges (PD) are reported as main reason for degradation of insulation system in any HV power apparatus. A successive occurrence of such discharges eventually leads to complete failure of the...
This paper presents a new approach for determination of nonlinearity and Effective Number of Bits (ENOB) of an Analog to Digital Converter (ADC) for application input. Many times the input to ADC in an application is other than standard signals such as sine wave or triangular wave. Parameters of ADC determined using dynamic testing with standard signals are not useful if input signals are different...
Medical facilities are vital ingredients which can make or break lives. In such critical matters, proper management of Private Health Information (PHI) of each individual is very necessary. In many foreign countries, Information Technology has made a revolutionary impact in the medical sector too, providing with absolute paperless hospitals. Several emergency facilities are available, and doctors...
A novel Secure Multi-party Computation protocol for statistical computations has been proposed and implemented in this work. The described protocol is an enhanced version of our previous proposal of virtual party protocol. Here the system is implemented using a Token Ring Network. Secure Multi-party Computation is classically defined as a system in which computation which involves data from a number...
In this paper, we have proposed a novel architecture for SMC (Secure Multi-party Computations). This is an advanced version of our earlier Virtual Party Protocol. The system is based on tri-TTP (Trusted Third Party) architecture. The classical SMC problem is a computation which involves data from multiple parties. The key is to keep the data hidden from other parties. The protocol also find its applications...
Mobile ad hoc Networks refers to the infrastructure less, resource poor wireless networks whose interaction is unplanned in such a way that location of participating nodes and parties can not be identifiable. The mobile devices are used by people to access services in various environments. Before two or more mobile networks ready to interact, they must trust that each will satisfy the security and...
Traditionally image is retrieved with the help of the associated tag which is added to the image while storing it in the database. This text based image retrieval is time consuming, laborious and expensive. In order to overcome these flaws content based image retrieval is proposed which avoid the use of textual description and retrieve the image based on their visual similarity. To achieve this images...
The growth of the Internet has prompted tremendous opportunities for cooperative computation, where people are jointly conducting computation tasks based on the private inputs they each supplies. These computations can occur between mutually untrusted parties, or even between competitors. For example, customers might send to a remote database queries that contain private information, two competing...
In this Paper, we propose a new framework for secure multi-party computation that uses ambiguous user’s identity. A huge amount of a potentially sensitive data exists in large a organization that needs to be mined. This raises concerns for people involved in the increased usage of data mining tools in both the public and private sectors. The utility to be gained from widespread data mining seems to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.