The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we inspect support vector regression (SVR) based fault position in a TCSC (thyristor controlled series capacitor) based long transmission line. This technique uses 1 cycle post faulty current signal from the transmission line and decomposed by wavelet packet transform. From the decomposed signal entropy and energy are extracted and fed to the forward feature selection method to eliminate...
This work undertaken, aims to develop pulsed-OFD transmission system, which is used in wide area of wireless communications. It is noteworthy to mention that the system is baseband transmission by excluding the RF (radio frequency) part. Pulsed-OFDM enhances the OFDM that endeavors prominent performance parameters with lesser complexity in implementation. This is possible by pulsating the OFDM symbols...
It's Big Data era. In this epoch, the terabytes of data are a dime a dozen as well as large metadata size. The large scale metadata size becomes a barrier in the era of exascale computation. However, a fine-tuning, and a well designing of metadata can enhance the performance of a file system. Therefore, the large scale metadata server (MDS) design becomes key research point now-a-days. The designing...
Cloud computing is an emerging computing tool in which resources accessed as a service over Internet on pay for use basis. Most of the organization are changing their storage server to cloud server without any botheration. It is a great challenge for the cloud service provider to attract the customers to store their sensitive data/file in the cloud storage. Service provisioning with respect to privacy...
Wireless ad-hoc network is a resource constrained network applied in many applications. Clustering is considered to be most competent technique in order to attain firm performance and improved utilization of energy. Traditional clustering tactics elect a cluster coordinator commonly known as cluster heads so as to manage the whole cluster in terms of data collection, data fusion and transmission of...
Analysis of time series data is important. Association rule mining algorithms like Apriori Tid can be implemented over time series to find out the frequent item sets. In this paper, a modified version of Apriori Tid is proposed. Both the association rule mining algorithms Apriori Tid and modified Apriori Tid are implemented over time series data. Rainfall data related to North Eastern India has been...
Data mining is an emerging field of research in Information Technology as well as in agriculture. The present study focus on the applications of data mining techniques in tea plantations in the face of climatic change to help the farmer in taking decision for farming and achieving the expected economic return. This paper presents an analysis using data mining techniques for estimating the future yield...
Trademark retrieval systems have been a well researched field however majority of these researches have been done on device trademarks and do not consider the presence of text embedded within trademark images as in case of composite marks. In this work a unified retrieval system has been proposed and implemented for composite trademarks. The technique is invariant to font size, font style and orientations,...
Each and every company are interested to know about the status of performance in their business. Bankruptcy prediction is an important issue and it plays a vital role in creating decisions in the field of corporate and financial organization. It has its influence on both economic as well as social factors, e.g., investors, creditors, government, managers, employees, etc. So, it is important and useful...
Hybrid technique is implemented in this paper to identify the fault location in a 20 KV, 5 km underground cable line with 7.5 MW inductive loads at the delivery end. The projected fault location technique implements properly sampled values of singlecycle post faulty voltage and current signal as of the relayingtermination of the underground cable. Thereafter signaldecomposition has been carried out...
Text categorization entails making a decision on whether a document belongs to a set of pre-specified classes of other documents. This can be in a supervised way in classification tasks or unsupervised reminiscent of clustering related tasks. Categorization can be a challenging task especially when the discriminating words are large. K-Nearest Neighbor is an instance based learning algorithm that...
Financial transactions in an organization, for example payments to suppliers and employee salaries, are generated from Enterprise Resource Planning (ERP) applications and require secure transmission to bank. The payment models have been evolving over the years which confronted transformations from the usage of manual payment methods, cheque, cards, Electronic Fund Transfer (EFT) to Automatic Clearing...
The ever increasing need to provide a suitable derivative of a term governed by context where derivative can either stemmed word or hypernym of a word has spurred a lot of research activities in information retrieval communities. In this paper, we are concerned with providing context centric derivatives of a term which can be useful in any search engine for obtaining better search results. Personalized...
Large amount of data is created and stored in electronic media. Agriculture is no exception. Large unprocessed text are available on the various Government and other websites. Despite of large volume and availability, this data is underutilized. This data should be converted to an effective form so as to facilitate better information dissemination. Ontology is an efficient medium to carry out this...
Quantum key distribution is a sub topic under quantumcryptography where two parties distribute a shared random bit stringknown only to them and which can be used as a key to encrypt anddecrypt messages. This paper proposes a novel method of QKD todistribute the secret key. The basic concept of QKD remains the samebut the process by which the key is exchanged between the twoparties is different and...
This article reports a novel algorithm inspired byscalar premier determination considering reduced cameraactivation while contributing enhanced coverage of the occurringevent zone. The proposed scheme chooses the scalar premiers in ahexagonal fashion, which operate as representatives of the scalarswithin whose sensing ranges the scalar premiers are located. Theselection of the scalar premiers is accomplished...
Due to the rapid technological advancements, the Grid computing has emerged as a new field, distinguished from conventional distributed computing. The load balancing is considered to be very important in Grid systems. In this paper, we propose a new dynamic and distributed load balancing method called "Enhanced GridSim with Load Balancing based on Cost Estimation" (EGCE) for computational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.