The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wind energy is one of the most widely adopted renewable energy harnessing methods around the world. Accordingly, wind turbine blades are gradually undergoing changes in design and geometry to make them more efficient. Tropical wind turbines require a different design structure due to the fact that wind speeds are low and turbine rotors cannot increase in size infinitely which would cause inertial...
With the growing popularity of sensors and the advent of Internet of Things (IoT), there is exponential growth in data. Sensors are collecting data for various domains like traffic, predictive maintenance, equipment health, meteorology etc. Mostly, data collected by IoT devices or sensors is of heterogeneous format which is difficult to interpret and integrate. With the rise in applications of sensors...
The wireless sensor network is deployed to sense environmental conditions like temperature, pressure and so forth. It consists a set of small devices which known as sensor nodes. The energy consumption is one of the big issue of wireless sensor network. In this paper, other algorithm is used for analyzing energy hole problem in wireless sensor network. Divide and conquer methodology is used for consuming...
Air pollution is an important issue to ruminate about in current environmental situation it has major impact on human health and on nature's own environment balance system. In current scenario various technologies are available which can monitor the quality of air. Objective is to present a system model which can facilitate the assessment of health impacts caused due to indoor air pollutant as well...
In the mobile Ad-hoc networks, there exists various challenges in packet data delivery mechanism. Therefore transferring data from one node to other node is challenging. One of such attack is the black hole (BH) attack in a network. We are proposing a mechanism for the detection and prevention of BH attack in the mobile ad hoc network. The routing protocol that we are using is Ad hoc on-demand distance...
Men is a social animal and he needs to communicate to the people around him. There is a great demand of information sharing which uses wired and wireless mediums to transmit information from one point to another. Wireless transmission is getting more and more attention and is the most popular method of information sharing. When a signal travels through the wireless medium it is affected by various...
In this paper we have analyze power efficiency of advanced modulation formats over Additive White Gaussian Noise (AWGN) channel. The advanced modulation formats are polarization division multiplexing quadrature phase shift keying (PDM-QPSK), polarization switched quadrature phase shift keying (PS-QPSK) and six polarization quadrature phase shift keying (6P-QPSK) and these modulation formats are investigated...
Cognitive radio (CR) is a radio technique that aims to utilize radio spectrum more efficiently by intelligently exploiting licensed spectrum. In this paper first will detect presence of primary user in spectrum band all this is done by periodically frequency band sensing. Secondly role of CR is to perform spectrum sharing where it assigns unused spectrum to secondary user (SU). Technique used to find...
Technology is spreading its root in all aspects of engineering. Collaboration of different techniques and disciplines of engineering and technology can produce effective systems which have the ability to prove very useful in day to day life to and make life easy & simple. With the advancement in time and technology, Bio-Medical services have improved a lot, for example, Portable Diabetes checking...
Restoring the actual colors in images also called color constancy technique is still an open area of research in digital image processing. Many techniques has been proposed so far in order to improve the accuracy of the color constancy techniques further. This paper has presented a comparison between some well known latest color constancy techniques. The review has clearly shown that each technique...
In vehicular adhoc networks abbreviated as VANETS vehicles are furnished with radio devices which qualify them to interchange traffic information without the requirement of any kind of infrastructure [3-6]. However the understanding of vehicle headway distribution is crucial for evaluating the probable range of connectivity in these vehicle ad hoc networks. Several studies on dissemination of vehicles...
WMSNs are extensively used in various fields such as environmental monitoring, survellience, national security and health care. Wireless networks are composed of sensor nodes having capability of sensing environmental conditions, sink node and connected via internet to remote controller. Maximun coverage is one of the basic objective of WMSNs. So the current document presents review as well as comparision...
With the shrinking technology, new systems are designed that are miniature in size and perform faster operations. Adder is a basic circuit used for the purpose of addition. In a cascade design, the output of one circuit acts as an input for the other, so delay in the propagation of the carry generated while addition is major issue in the design of adders. When the circuit is designed with any other...
One of the challenging tasks in wireless sensor network is to route data efficiently from source to destination. Sensors collect data from the sensor network area and pass on the aggregated data to the base station. Three techniques have been proposed in the literature: namely, direct, hierarchal and hybrid to fulfil this data transmission task. Sending data on a single path multiple times results...
Mobile agents are smart codes which can transport itself from one machine to another in order to accomplish its task. As mobility is one of the most vital features of the mobile agent but it openly challenges the issue of reliability such as fault tolerance. This proposed approach deals with server crash and does not violates the exactly once property. Clone of actual agent is created which monitors...
In this paper, we propose a new face image restoration method based on the features extracted from the noisy images given by the principal components of the noise covariance matrix. This technique deliberate the additive normal scattered degradation classic and use of a code shrinkage technique to remove noise from the images. The proposed work have been a large number of artificial neural networks...
The grid computing offers powerful and dynamic framework, with the numerous resources, distributed CPU loads, along with the extent of idle memory continually altering. Efficient schedulers are required to schedule jobs in such dynamic environment. This paper presents comparative study of various well-known grid computing based scheduling techniques by taking into account the implementation environment...
By every new day alternative technologies are being developed which in turn are helping to increase the speed of trains. Indian Railways aims to increase the speed of its passenger trains to 140 -- 180 km/h on conventional tracks. Thus it can be seen from the trending aspects of railways that they are primarily focusing on increasing the speed rather than the SAFETY of the passengers. The primary...
Authentication of nodes in a wireless communication system is very essential due to its openness for various security threats. In this paper, we proposed an authentication technique based on an authentication tag and then the data is scrambled before transmission in order to maintain the authenticity and confidentiality of data. Proposed technique vigorous against various security attacks
An energy efficient routing protocol is the major concern in Wireless Sensor Networks (WSNs). In this paper, we describe LEACH routing protocol and some of its new versions. After that we propose an energy efficient hierarchical routing protocol, developed from LEACH. The basic concept involved in increasing energy efficiency and hence lifetime is to keep radio communication distance as minimum as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.