The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The main purpose of the present article is to investigate the flow of 2‐D, incompressible, steady, hydro magnetic Williamson hybrid nanofluid with three distinct shape factors namely spherical, cylindrical, and platelet shapes under the influence of thermal radiation and viscous dissipation effects on the flow. The aim of the current work is to investigate the thermal conduction capacity of three...
Extraction of oil from Azadirachta indica generates oil cake (meal) containing proteins and carbohydrates. The proteins in neem oil cake with antimicrobial and antioxidant properties have been made into films and studied for their properties and potential applications. Neem oil cakes are available in large quantities at low cost but are non‐edible and have limited applications. Currently, most of...
Effective Utilization of Resources and throughput computation is an important consideration in using cloud resources. Each resource is allocated by the tasks and each resource has virtual machines to handle the subtasks of use cases. The cost performance analysis is done using the markov model and the Server Allocation Matrix (SAM). Resource allocation in cloud computing System is a new dimension...
Silent Speech Interface(SSI) has given rise the possibility of speech processing, even inthe absence of an acoustic signal and it has been used as an aid for the dumb person or speech handicapped. A Silent Speech Interface is a device that enables the communication to take place when voice is not present. In noisy environments, the SSI holds a promising approach for speech processing. In this project...
Hadoop is an open-source framework developed by Apache software foundation. It works on large datasets, as the data is been stored and processed across cluster in distributed environment. It consist of two components — HDFS and MapReduce. HDFS is used for storing the data and MapReduce is used to process those stored datasets. In current era large amount of data is generated by many websites, the...
The major aspect in today's e-learning is the improvement in the methods of teaching by using technology dependent resourceful products to have a better communication and interaction between the teacher and the student. In favor of this, we have proposed a product which aims to be a virtual marker and also has additional advantage that it has features of a Mouse incorporated into it. The existing...
Regulation of boost converter output voltage under dynamic load variations is of major challenge in industrial applications. This paper presents a technique to address dynamic load variations using peak current mode control in a boost converter. The mathematical modeling and digital implementation of peak current mode control for boost converter operating in continuous conduction mode is discussed...
The renewable energy source interfacing with grid is the major issue in the electric utility side. The various types of grid interfacing converter topology have been proposed by researchers to improve quality of power and efficiency of the system. This paper focuses the shunt active filter interface for the renewable energy source with an efficient modified IcosΦ algorithm for controlling the grid...
Security is emerging as an important concern in embedded system design. Security of an embedded system is compromised when software that can be trusted is resulting in unintended behaviour such as leakage of sensitive data and execution of spiteful code. Several counter measures have been proposed to counteract these sorts of intrusions. The general idea behind most of the methods is to define the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.