The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Evolution of technology has always been endeavored with making daily life simple. With a fast paced life everybody today is harnessing the benefits of technology except some parts of the society. One of them is the visually impaired who have to rely on others for travelling and other activities. This paper aims at providing one such theoretical model which incorporates the latest technologies to provide...
In this era of automobile, in manufacturing point of view, every Original Equipment Manufacturer (OEM) has to consider various parameters while manufacturing a vehicle. Emission is one of the important parameter. As emission is harmful to the surrounding, Indian government has set some emission norms to control it. OEM has to manufacture a vehicle by keeping these emission norms into consideration...
The need of non-traditional producing has been making small options and irregular contours like within the producing of holes and surfaces with sharp corners and contours for die and moulds creating. within the recent years one in every of the foremost vital technologies in non-ancient producing is micro-EDM (Electric discharge machining). micro-EDM may be a method for getting burr free small options...
This paper relates to the case study of evaluation of vendors considering both quantitative as well as qualitative factors. This case study involves ranking and evaluation of air conditioner manufacturing firm. The paper uses MADM technique TOPSIS (Technique for Order of Prioritization by Similarity to Ideal Solution) for this evaluation. The system allowed on multi-attributes criteria like Cost of...
The most effective mathematical model to characterize tire behavior is the Magic formula. Current study presents a brief review of existing tire models namely Dugoff and modified Dugoff models and its comparison with Magic formula tire model. The mathematical equations represents these models were understood and the tire behavior is predicted for various normal load conditions and a comparative study...
Interchange of information through cell phones, Tabs and PDAs (Personal Digital Assistant) is the new trend in the era of digitization. In day-to-day activities, sensitive information through mobile phones is exchanged among the users. This sensitive information can be in the form of text messages, images, location, etc. The research on Android mobile applications was done at the MIT, and found that...
The efficient use of satellite images for practical purposes depends upon the ability to combine them for the purposes of analysis. However, this process involves many computationally intensive computer vision algorithms. Assembling large images usually requires costly hardware with a large amount of memory. This paper addresses this problem by proposing a system that implements algorithms required...
Improvement in gain as well as bandwidth of microstrip antenna using reactive impedance surface and Fabry Perot cavity resonator is proposed. Suspended microstrip antenna (MSA) is designed on reactive impedance surface (RIS) backed FR4 substrate. RIS improves bandwidth, gain and efficiency of antenna due to reduced coupling between MSA and ground plane. This MSA backed RIS is placed in a FPC resonator...
The security of video data is necessary in video transmission for military purpose and other applications hence cryptography is technique to make video data secure and unreadable to unauthorized user. In this paper the selective encryption is applied for security of video information. Hence main aim is to improve data transfer i.e. to increase robustness of video.
In this paper, different methods of text to speech synthesizer techniques are discussed to produce intelligible and natural output and a vowel synthesizer using cascade formant technique is implemented. A text to speech output is based on generating corresponding sound output when the text is inputted. Wide range of applications use text to speech technique in medicals, telecommunications fields,...
The Database Management system (DBMS) and other system software are used to store and retrieve large amounts of data in a structured way. The modern applications are generally data intensive and involve frequent storage of data and rapid access to them. To drive such applications and to support highly dynamic user load, the database system needs to be tuned systematically. To tune the database system,...
Most of the UWB antennas developed work in the frequency band of 3.1–10.6 GHz. In this paper, a circular monopole fractal antenna with triangular slots that covers the UWB band from 2.8–12.0 GHz is proposed. The fractal antenna with three iterations was developed. The triangular slot in a circular monopole antenna increases the effective current path and therefore decreases the lower resonant frequency...
Microelectromechanical systems (MEMS) are unified micro devices or systems combining both electrical and mechanical components. Microcantilevers are the most simplified device of MEMS. Moreover, in the last few years the technology has been developed for the fabrication of microcantilever as a sensing device. The sensitivity of the microcantilever depends upon its geometry as well as the material...
The security issues similarly as computing tie square measure two necessary factors for data technology applications, such as ATM, Smart cards and web. The elliptic curve algorithmic program contain cluster of the elliptic curve points forms associate degree Abelian group. This is an acceptable choice for constructing the Elliptic curve distinct log problems. The Abelian group led to form cipher system...
In today's modern era a theoretical based approach is followed to determine the amount of chlorophyll present in leaves of plants. But in this paper a practical based approach is followed to generate an architecture of simple, low cost Chlorophyll estimator using Field Programmable Gate Array(FPGA). Color of leaf can give an indication for assessing plant health and nutrient. Performance analysis...
This study is based on advancement in Bio-Medical engineering. Computer Aided Design (CAD) and Finite Element Analysis (FEA) in prosthesis design for bone is a critical application of mechanical engineering. Different materials with varying mechanical properties are used; deformations and stresses for different loading conditions are calculated and finally optimized to have maximum effective life...
In this project we address the problems faced at toll plaza & also introduce identification system for vehicles against which stolen and accident cases are registered using RFID. The owner has to create an account through mobile application & register his RFID tag. When vehicle passes through Toll Collection Unit (TCU) it is classified as passenger or goods carrying vehicle based on its Unique...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.