The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper deals with design of various controllers such as Proportional Integral Derivative (PID) controller, Internal Model Controller(IMC) and transfer function controller by using Genetic Algorithm(GA) for a non-linear liquid conical tank system. Level control of a conical tank is a complex issue because of the nonlinear nature of the tank. For each stable operating point, a First Order Process...
The concept of voice transferring from one mobile to another mobile using Bluetooth/ WIFI connectivity is discussed in this paper. Bluetooth is the connection which can be used as a link to share data among devices within a Personal Area Network. Now-a-days mobile phones come with Bluetooth facilities. Wi-Fi is a WLAN standard which is used to share data over the transmission range larger than Bluetooth...
In this paper, design of autotransformer based 24 Step AC-DC converter fed vector controlled Induction motor drive is presented and its Matlab/Simulink model is given. Also these results are compared with 12-pulse AC-DC converter fed vector controlled Induction motor drive. This paper deals with various multipulse AC-DC converters for improving the power quality in vector-controlled induction motor...
Computer Forensic process consists of Preparation, Acquisition, Preservation, Examination and Analysis, and Reporting. With the booming of the virtualization technology and the popularity of virtual machines for end users to deal with daily works, the probability of using virtual machines for malicious purposes keeps increasing. In this paper we propose a methodology by using virtual forensics for...
In this paper we proposed a new image segmentation method that incorporates Dual tree complex wavelet transform (DT-CWT), Improved watershed algorithm and modified level set method. The watershed algorithm has been extensively employed for image segmentation problem. It is used to segment the target object from complex background. But for noisy images it leads to over- segmentation and under-segmentation...
Image fusion refers to the process of combining the relevant information from two or more images into a single highly informative image. The resulting fused image contains more information than the input images. In this paper, an algorithm for fusing two different modality medical images based on the Multi-Wavelet Transform (MWT) and Curvelet transform using different fusion techniques was implemented...
Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable computing resources. The first offered cloud service is moving data into the cloud. data owners let cloud service providers host their data on cloud servers and data consumers can access the data from the cloud servers. This new paradigm of data storage service also...
Delay tolerant Network (DTN) is new challenging network where end to end delay is more as no end-to-end connectivity. This network is emerged from Mobile Adhoc network. In Internet, data transmission is possible only between those nodes, where TCP/UDP can able to establish connection. This is impossible in DTN where TCP and UDP protocol cant used due no end-to-end connectivity. This makes DTN interesting...
Context based Meaning Extraction is a process of finding the correct sense of a word from the sentence. Word Sense Disambiguation (WSD) algorithm is used to remove ambiguity of words and correct domain of a word to be displayed using Word Net Domain. In this paper, conventional methods of WSD such as dictionary and knowledge base, supervised, semi-supervised and unsupervised methods are compared....
The study of Quality of Service (QoS) and the extent of resource utilization are the two major components of Cloud Computing. The accurate modelling and simulation of flow of processes in cloud environment is an essential part of service level architecture. In this paper, an analytical model has been developed for identifying the pattern of inter-arrival processes and the service of processes. Empirical...
Biometrics deals with automated method of identifying a person or verifying the identity of a person based on the physiological or behavioural characteristic, and so is used for authentication in many of the online transactions. The biometric that has been chosen for implementation is fingerprint, since fingerprint biometric is easily available and highly reliable compared to many other biometrics...
Every enterprise wants to protect their data from both the internal and external attackers. In this initiative firewall, encryption, and authentication serve as the first line of defense. And Intrusion Detection serves as the second line of defense. IDS may use either anomaly based approach or misuse based approach. Traditional IDS were making use of misuse based approach. The drawback of misuse based...
An automaton is a simple model of computer. There are various automata each with its formal definition. Generally an automaton has some form of input, some form of output, internal states may or may not have some form of storage, hardwired not programmable. In this paper we have discussed about Pushdown Automata, Quantum Pushdown Automata by taking some interesting examples. Then the classical Pushdown...
Traditionally, real-time systems managed data in application dependent structures. As real-time systems evolved, applications became more complex and required access to more data which are being provided by data base management systems. Currently, there has been interest in merging database and real-time technology. The resulting integrated system, which provides database related operations with real-time...
The focus of Agile software development has been on methods and practices. How to take the methods effectively in use has received less attention. Especially in large organization it is not trivial to take agile methods in use. Based on the experiences, a life cycle model that describes phases in a software process improvement project deploying an agile method to an individual project was developed...
Weather prediction is an ever challenging area of investigation for scientists. In this paper the application of artificial neural networks to predict the weather of Bhopal city has been proposed. The weather parameters like maximum temperature, minimum temperature and relative humidity etc. has been predicted. When performing predictive modeling the key criteria is always accuracy. We are trying...
Today's Environment, Web contributes greatly to the creation of an ever-increasing global information database. Web is a collection of billions of web pages. Web 2.0 is purely based on keyword based searching. Because of using keyword based search engine, people may get relevant or irrelevant information. The amount of time spent to search data from web is enormous. To avoid these difficulties a meaning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.