The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the coal mining industry there are various types of Earth moving vehicles and Equipments being used for different purposes. The major material Handling equipments in an open cast mine is Dumper. The dumper carries coal from quallary to the bunker for storage and transportation. The output of any quallary is greatly influenced on the effective conveying of the coal. In this paper an open cast coal...
Layered manufacturing (LM) processes were initially used for rapid prototyping to help the designer verify part geometry, but are now increasingly used to make moulds for castings. They also have significant potential for the manufacture of one-off and small batch production parts. They may also have inferior material properties when compared with objects manufactured by other means. Poor surface...
Computer-assisted vertebra segmentation in X-ray images is a challenging problem. Inter-subject variability and the generally poor contrast of digitized radiograph images contribute to the segmentation difficulty. In this paper, a semi-automated live wire approach is investigated for vertebrae segmentation. The live wire approach integrates initially selected user points with dynamic programming to...
This paper presents a framework for product life cycle cost modelling. The proposed framework is aimed at developing a life cycle cost (LCC) model within the perspective of reliability and maintainability (R & M). To develop the model, all the products/systems are classified as repairable and non-repairable. The reliability of repairable systems is characterized by mean time between failures (MTBF)...
Stability of Biped walking has been an area of interest for researchers since decades. In this work an optimum hip trajectory is generated, taking its swinging foot trajectory that is a B-Spline path and physical parameters of the robot as input parameters. The objective is to minimize the deviation of zero moment point (ZMP) from the geometrical centre of supporting foot area. Genetic algorithm (GA)...
The following topics are dealt with: image processing; computer vision; audio and video signal processing; wireless network; optimization; evolutionary based algorithm; microelectronics; ASIC; system-on-chip; database system; data warehousing; data mining; artificial neural network; fuzzy system; human computer interaction; computer network security; protocol; field programmable gate array; information...
Internet has entered in our lives in a big way, from sending mails, reading the news, to the booking of tickets on-line, it has a special role in every onepsilas life. There is a great need in the near future to take the Internet to the remote places in our country, where network infrastructure is not in place. Many efforts are made in this direction and one of the technologies enabling this is the...
The paper compares the performance of 4 x 4 block based discrete cosine transforms(DCT) with conventional 8 x 8 DCT .The small size DCT is suitable for mobile applications using low power devices as fast computation speed is required for real time applications. The comparison is done on the basis of computation time and objective quality, based on PSNR (peak signal to noise ratio).
Traffic Validation Architecture (TVA) is a capability based network architecture that tries to limit Distributed Denial of Service Attacks (DDoS). It considers only the victimpsilas approval in the capability granting process. We propose an extension to the approach by involving two new parameters, the bottleneck linkpsilas status and message type, in the capability granting mechanism. Both these...
This paper introduces the network intrusion detection system (NIDS), which uses a suite of data mining techniques to automatically detect attacks against computer networks and systems. This paper focuses on two specific contributions: (i) an unsupervised anomaly detection technique that assigns a score to each network connection that reflects how anomalous the connection is, and (ii) an association...
The goal of IDS is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS). Detecting intrusion in distributed network from outside network segment as well as from inside is a difficult problem. Intrusion...
Audio watermarking method presented in this paper embeds the watermark data in the wavelet domain and performs the blind detection of the watermark. To embed the watermark the additive watermark embedding approach is used in which scaling parameter is computed based on the SNR (signal to noise ratio). The technique is implemented in DWT domain. 32 times 32 binary image is used as the watermark data...
On-chip communication architecture plays an important role in determining the overall performance of the system-on-chip (SoC) design. In the recourse sharing mechanism of SoC, the communication architecture should be flexible to offer high performance over a wide range of traffic. Conventional SoC architecture typically employ priority or time division multiple access (TDMA) based communication architecture...
The paper covers a simple RTL implementation of a command processor with its associated macroinstructions implemented on FPGA device to drive an external peripherals having processor like bus interface. Soft processor is used inside FPGA device to handle the tasks of software driver for peripheral controller. The paper discusses an approach to mimic a simple soft processor to handle the task at core...
This paper addresses the comparative characteristic deflection and serviceability analysis in limit state of deflection of beam designed for given action in four different ways. The displacement samples for each beam for given loadings conditions, spans, are generated by simulation technique. Obtained samples are modeled with lognormal probability distributions. With the means and standard deviations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.