The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Privacy preserving data mining is an active area of research. In today's world, with the growth of technology, huge amounts of data are continuously being gathered and kept in databases. Indeed, temporal associations and correlations among items in large transactional database that help in many business decision-making processes. The main aim of privacy preserving data mining is concerned with developing...
Power quality is one of the major concerns in the present era. With power quality problems utility distribution networks, industrial loads, sensitive loads etc. are suffered. One of the major problems dealt here is the power sag. This paper presents the simulation of an "Asymmetrical seven level Cascaded H-bridge (CHB) multilevel inverter" test system using MATLAB. The work focus on showing...
This paper presents a poly phase semi z source inverter with maximum power point tracking for photovoltaic application. This proposed system utilizes a boost converter as DC-DC converter to implement the the MPPT algorithm for tracking maximum power from the PV array. In single phase semi z source inverter the duty ratio is limited in the region (0 to 0.666). In poly phase semi z source inverter the...
Web mining involve activities such as document clustering, community mining etc., to be performed on web. Such tasks need measuring semantic similarity between word. This helps in performing web mining activities easily in many applications. The accurate measures of semantic similarity between any two words is the difficult task. A new approach to measure similarity between words is based on text...
Considering a multithreaded code there is a possibility of getting deadlocks while running it which cannot provide the necessary output from the required program. It is necessary to eliminate the deadlock to get the process to be successful. In this proposed system which actively eliminates the dependencies that are removable. This can cause potential deadlock localization. It is done in an iterative...
This paper contains a high voltage gain non isolated dc-dc converter having coupled inductor and diode-capacitor techniques. The converter have large voltage conversion ratio with appropriate duty cycle. The energy present in leakage inductance of coupled inductor is recycled to the output efficiently. The voltage stress on the switch is reduced. This paper proposes simulation and hardware implementation...
Cognitive Radio is the best technology to improve spectrum utilization of wireless communications by exploiting under-utilized licensed spectrum. The core concept of cognitive radio is designed to address the problems faced in allocating spectrum efficiency and it provides wireless users to adapt their spectrum (band of frequencies) operating factors and sharing spectrum with the help of information...
In this paper we introduce a robust image-adaptive data hiding in wavelet domain that hide data in images whileimposing minimal perceptual degradation in original image. As it is well accepted, data embedding in the low and midfrequency parts of an image have better robustness undercompression attacks than high frequency parts. So our methodembeds more data in low frequency coefficients than highfrequency...
We are very much familiar with WSNs (Wireless Sensory Networks) that are spatially distributed Independent sensors that cooperatively supervises some physical or environmental situations (temperature, sound, vibration, pressure, motion, etc.). Legion researchers attention have been extracted by the WSNs great potential to make able many important applications. By using the rewards of CC, mobile CC...
Processing of images plays a very important role in communication systems. So this paper describes the edge detection algorithm in image processing. The main aim behind this is to process the image and extract accurate edge line to reduce the size acquired by the original image. The image is converted in black and white color to reduce the memory that it will acquire. The image of 512∗512 pixels is...
Paper industries are using manual chemical control methods to apply the chemicals to the digester. The main objective of the project is to increase the quality of the paper by increasing the brightness of the pulp. The brightness of the pulp is inversely proportional to the pH value. Hence, the pH value should be maintained in the range of (2–4) to achieve the maximum brightness range 85%. Initially,...
The proposed forensic algorithm to discriminate between original and forged regions in JPEG images, under the hypothesis that the tampered image presents a double JPEG compression, either aligned (A-DJPG) or nonaligned (NA-DJPG). Unlike previous approaches, the proposed algorithm does not need to manually select a suspect region in order to test the presence or the absence of double compression artifacts...
The data storage management is the biggest problem in the cloud computing environment. To reduce the storing space and save the bandwidth share the data with others in cloud storage using public-key cryptosystems that produce constant-size cipher texts such that the active delegation of decoding rights for any set of cipher texts but it lead to many privacy problems. To avoid this problem the private...
The 21st century is moving with advanced and aggressive technologies in the world. Even mankind found great technologies to help in life sciences industries. There are some great challenges that arise in the life sciences and medicines industries. The great way to deal with this challenge is to interface the engineering technologies with the life science and medicines. The adaptation of engineering...
Convolution is an algorithm widely used in image and video processing. Although its computation is simple, its implementation requires a high computational power and an intensive use of memory. This paper presents a direct method of reducing convolution processing time using hardware computing and implementations of discrete linear convolution of two finite length sequences. This implementation method...
This paper promotes monitoring the electrical home appliances using cloud computing. Here, the solar power is the source of electricity. Monitoring and management system collects the data through the internet and controls the power supply to the electrical and electronic home appliances via mobile phones. The wastage of electricity in one home can be rented to another user, who is in need of. Rental...
Recently, in all image processing systems, image restoration plays a major role and it forms the major part of image processing systems. Medical images such as brain MRI images, Ultrasound images of liver and kidney and retinal images are often affected by various types of noises such as Gaussian noise and salt and pepper noise. All image restoration techniques attempts to remove various types of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.