The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Communication skills are an integral part of the development of undergraduate students as emerging professionals in rapidly changing, multi-disciplinary engineering fields. However, many engineering educators and industry employers continue to express concerns about the quality of these skills in engineering graduates. Many universities and institutions have enhanced engineering education curriculum,...
We introduce PyRTL, a Python embedded hardware design language that helps concisely and precisely describe digital hardware structures. Rather than attempt to infer a good design via HLS, PyRTL provides a wrapper over a well-defined "core" set of primitives in a way that empowers digital hardware design teaching and research. The proposed system takes advantage of the programming language...
In this paper, design and development of a wideband passive beamforming network for 1.7–2.7 GHz band base station antenna is presented. The proposed design is based on 4×4 butler matrix implemented in a multi-layer technology and hence the crossovers are eliminated. The butler matrix consists of a multi-layer 3 dB hybrid coupler which provides constant 90° phase difference and a phase shifter that...
Haptic interfaces compatible with functional magnetic resonance imaging (Haptic fMRI) promise to enable rich motor neuroscience experiments that study how humans perform complex manipulation tasks. Here, we present a large-scale study (176 scans runs, 33 scan sessions) that characterizes the reliability and performance of one such electromagnetically actuated device, Haptic fMRI Interface 3 (HFI-3)...
In the view of developing technology, changing lifestyles and busy schedules, people often tend to neglect their health. This has led to an outcry about health related issues among all age groups. The youngsters are the major victims of health problem as their uneven schedule makes it difficult to keep the track of nutritional value of their meal intake and maintaining daily health record manually...
With the evolution of computing from using personal computers to use of online Internet of Things (IoT) services and applications, security risks have also evolved as a major concern. The use of Fog computing enhances reliability and availability of the online services due to enhanced heterogeneity and increased number of computing servers. However, security remains an open challenge. Various trust...
Free Space Optics (FSO) link offers a wide bandwidth with license free bands worldwide. But the link capacity and availability is always a major concern in the different atmospheric conditions. Thus the reliability of the link is highly dependent on weather which attenuates the signal strength under adverse weather. This paper primarily describes the effects of bad weather conditions on FSO link within...
The complexity of integrated circuits is continuously increasing, leading to a growing demand for methodologies that offer comprehensive mixed-signal verification concepts. However, compared to the highly automated verification methodologies in the digital domain, pre-silicon verification in the analog domain usually implies a substantial amount of manual work and computational effort. In order to...
This paper is intended to give a brief overview on design optimization of micro_cantilever based MEMS binary inverter. This brief includes the design and optimization scheme for reduction of key parameters of inverter. Sensor integration with active electronics is one of the key issues in Sensor system on Chip (SSoC) and this work essentially reduces the need of CMOS-MEMS integration. The integration...
Over the years Internet of Things-like environments have been gaining popularity. Increasingly, security and privacy issues have emerged as a major challenge to the wide-scale adoption of Internet of Things-like technologies. In this paper, we propose a basic model for managing governance and evaluate some considerations of Internet of Things-like environments.
Despite the increased interest from educators to make science, technology, engineering, and mathematics (STEM) education more connected and integrated, there is little research on how to best do it. Although some studies suggest that integrated STEM education can have a positive impact on student learning outcomes, the studies contain some gaps and inconsistencies that make it challenging to implement...
More or less every chemical industrial process suffers from some amount of inherent time delay which is highly undesirable. The presence of this dead time term makes the transfer function model irrational. In the present work, a 2x2 transfer function model of an industrial boiler turbine process with dead time is considered, which after decoupling has been rationalized using Padé approximation. The...
In the current scenario one of the major causes of road accidents in the world is the fact that after driving hundreds of kilometers at a stretch, the driver feels drowsy and eventually dozes off while driving or they are not aware of the environment they might just be entering. They might also be unaware of any defect in their cars. There is an alarming increase in hit and run cases caused by drivers...
Machine learning is a branch of Artificial Intelligence that deals with making a machine Intelligent. Machine learning is being broadly used in the areas of Computer vision, Speech Recognition and Natural language Processing. Deep Learning is that area of Machine learning research which specifically deals with training Artificial Neural Networks having deep architectures. In this paper we provide...
Wireless Image Compression is embedding scheme for reducing size of image so that image can be store in less disk space and faster attachment possible in communication. Research issues in Image Compression are to increase efficiency in term of the image quality of decompressed image on higher compression ratio and robustness against visual attacks. Discrete Wavelet transform domain based Image Compression...
This paper reports the design and characterization results of a broadband, compact 140–170 GHz Double Side-Band (DSB) receiver fabricated in a 90nm SiGe process. The design is based on a balanced Gilbert cell, with on-chip integrated LO and RF baluns and an IF Variable Gain Amplifier (VGA). The receiver exhibits up to 7dB conversion gain with an RF bandwidth extending beyond the frequency range of...
Smart grid and smart buildings are seamlessly interacting together to improve energy usage. Smart buildings accept excess of energy during periods when renewable energy generation is cheap and overflowing. Then, the electric energy is kept for future use and returned to the smart grid when needed. Many advantages exist for smart cities which are focused on the incorporation of smart buildings. The...
Segmentation of manually written record photos into content material traces and words is a crucial undertaking for optical character acknowledgment. However, for the reason that elements of written by hand record are abnormal and various depending at the character, so far it is considered as a challenging issue. A good way to deal with the hassle, we formulate the word segmentation problem as a binary...
The concern for security increases due to the advances in the falsification technology. Biometrics is the only authentication method which truly identifies an individual when compared to other methods like PINs and passwords. Even though there are numerous biometric approaches, these are not robust. In this paper, we aimed at building a protocol which focuses on Electrocardiogram (ECG) being used...
Security is one of the basic needs of a system. New methods of providing security need to be found. To overcome all the security issues in current protocol, a new protocol is defined. The protocol makes use of visual cryptography technique by which images can be used as password. Here, we use the visual secret sharing scheme to protect the data that cannot afford getting hacked. Authentication is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.