The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Light measurement with accuracy is essential in creating desired outcomes in practical daily applications such as poultry industry, traffic lighting system, gardening or farming, at emergency exits, etc. Hence, light measurement and scrutiny is an important step to ensue the efficiency as well as safety. Normally the growth of plants depends on light intensity falls on top of canopy. In this paper...
The present title discloses novel concept for high speed computing using essentials of Ancient Indian Vedic Mathematics, modified and implemented using VLSI-FPGA architecture for best performance. The proposed architecture aims to define highly optimized multiplier unit which allows the highly intensive units of Signal Processing, Image Processing, Data Encryption/ Decryption and most other techniques...
This paper provides mechanism and apparatus for safety using inflated cloths. These inflated cloths are internally associated with airbag along with some computer readable history which is used to start filling the bags and to detect the fall. In this paper, the mechanism of smart cloths is proposed with internally sense the fall and smart circuitry will fill the bags to save the sport person. The...
Digital image watermarking (DIW) is one of the ways that is resilient to numerous attacks on image based digital media where information authentication is complete through embedding a watermark in image characteristics. This work incorporates a novel approach for DIW using five level discrete wavelet transform (5DWT)-singular value decomposition (SVD) and stream cipher (SP) encryption with different...
Camera plays a vital role in intelligent embedded image processing systems. But unlike human eyes, it creates distortions in the image captured, most commonly called as lens distortion. The uneven magnification over the lens surface is responsible for lens distortion. Distortion conveys incorrect information about the coordinates in the image frame with respect to real world coordinates and thus decreases...
In this study, a new algorithm for Content Based Image Retrieval (CBIR) using bi-cubic interpolation (BCI)with color coding (CC) and different level of discrete wavelet transform (DWT). In this paper the techniques of CBIR are discussed, analyzed and compared. BCI is used to scale the query image and database images. CC is used for color feature extraction. Apply DWT on each level plane of an image...
The Dramatic increase in the traffic flow raises demand on innovative technologies that can improve safety and efficiency of transportation systems. Road safety can be substantially enhanced by the deployment of wireless communication technologies for vehicular networks, which enable new services such as collision detection traffic management, and further communication facilities between moving vehicles...
This paper presents planar modified circular slot antenna with asymmetric Y-shaped feeding technique. The CPW asymmetric Y-shaped feeding structure is electromagnetically coupled to the modified circular shaped radiating patch. The proposed antenna is made circularly polarized by innovative Y-shaped asymmetric arm feeding structure. The antenna covers the impedance bandwidth of 2.04GHz–4.38GHz with...
In mines the security of workers is the major concern thats why it is necessary to know the environmental condition inside the mine and control them. This system used to make remote controlled robot to increase the life safety of mine workers. This robot equipped with sensors, camera, wireless transmitter and receiver is used to analyze mine area. Previously sensor node is based on microcontroller...
With the scope of electronics increasing day by day, the need for utilizing these advanced technologies to make human lives simpler is becoming more and more necessary. This advancement in technology has lead to emergence of many new areas of research and one of the new areas of research is biomedical engineering. Biomedical engineering is the application of engineering principles and design concepts...
Now a days different Junction less Transistor(JLT) structures proposed which includes silicon on insulator(SOI) JLT, Double gate (DGLJT) JLT, Bulk planar JLT, Gate all around(GAA) JLT etc. to improve performance parameters such as sub threshold slope(SS), off state leakage current, drain induced barrier lowering(DIBL) etc. In this paper, JLTs with dual spacer structures shows better improvement as...
The MIMO (Multiple Input Multiple Output) CPW (Coplanar Wave Guide) feed monopole antenna design with circular polarization is presented. The electrical length of the antenna is made larger by corrugating funnel shaped radiating structures. The corrugated nature of radiating patch elements and slot defected common ground plane helps to resonate both the monopoles at lower operating frequency of 2...
This paper presents an optically transparent equilateral triangular shaped microstrip patch antenna made of transparent ITO (Indium Tin Oxide) film. The transparent triangular microstrip antenna comprises a thin sheet of soda lime glass substrate with conductive ITO film coating radiating patch and ground plane and is feed through a CPW feeding technique. The inverted L-shape slot in the ground is...
This paper proposes a new technique for classification of faults on transmission line in power system. The power system network considered in this study is “IEEE 14 BUS SYSTEM” simulated in PSCAD. Voltage and current signals are processed using S-transform technique. The multiresolution S-transform is based on a variable width window, which changes with frequency. Energy levels on the basis of parseval's...
A Speech enhancement which is the growth of communication system enhancement means improvement in value of quality of something. This paper explains harmonic noise model (HNM) and MMSE algorithm based speech improvement. There are many types of advantages like provides high quality speech synthesis, speech coding for flexible and effective decomposition of speech. So we use this method for speech...
Epilepsy is a chronic neurological disorder which occurs due to the recurring evoking of seizure which results due to the abnormal rhythmic discharge of electrical activities of the brain. This fluctuation in the electrical activities of the brain can be analyzed using EEG signal which provides valuable information about the physiological states of the brain. In this paper we propose an efficient...
Now a days internet in mainly used for web searching. In the case of the mobile search engine, the problems are limiting factors of mobile devices such as a tiny keypad, small screen. So due to that user need to give small & hence ambiguous queries to the mobile search engine as compared to the generic web search engine, and still relevant results are expected by the user. So, personalization...
Cancer is one of the most commonly affected diseases in the progressing countries. Early diagnosis of cancer plays a significant role in curing cancer patients. In early stage cancer may be detected if related checkups are taken care as a part of routine checkups.
The internet is growing rapidly and interconnected different wired and wireless networks with each other. By using a client server architecture computing devices which are located at different geographical locations all around the world connect to the World Wide Web. Client can access information from the web server through the web browser. Web server fetches data from the database server. Malicious...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.