449 research outputs found

    Smart mobile service that helps users to access the applications faster

    Get PDF
    Our target, today’s generation, we are targeting the root of today’s generation i.e. Mobile phones (Smart phone). Our intent is to engineer a service that will be running on operating system to access the application

    Review on Automatic Car Parking Indicator System

    Get PDF
    Parking is costly and limited in almost every major city in the world. An Automatic car parking systems for meeting near term parking demand are needed. There is need to develop a vacant parking slot detection and tracking system. Around view monitor (AVM) image sequence makes it possible with 360-degree scene Bird’s eye view camera. Around view monitor (AVM) captures the image sequence and on combining of each images empty slot is detected. The Ultrasonic sensor is useful to determine the adjacent vehicle. Hierarchical tree structure based parking slot marking method is used to recognize the parking slot marking. After combining sequentially detected parking slot, empty parking slot is recognized and the driver has to select one of the empty parking slots and drive into it. DOI: 10.17762/ijritcc2321-8169.16048

    The Detrimental Effect of Rainfall on Performance and Stability Characteristics of Aircrafts-A Comprehensive Review

    Get PDF
    The rapidly growing global market demands faster transit of human beings and goods even in unfavorable weather conditions of rainfall. The paper gives an overview of rain research methodologies, mathematical models to track raindrops in the flow field. The paper depicts the havoc rainfall causes on performance characteristics for various phases of flight in terms of evaluation of CL and CD and dynamic performance parameters such as short period mode. The knowledge obtained by this review paper could help designers to modify the design of aircraft such that it has better performance, stability, and control characteristics for all weather conditions

    Havoc awake & Notification System via Android app

    Get PDF
    Since history started, human activities becomes responsible for many natural disasters. Countries or areas which are near to oceans or situated nearer to oceans are most delicate to natural disasters, due to change in climate and geographic position. Still some developing countries are unable to construct efficient disaster preparedness systems to handle natural disasters. Providing warnings and guidelines can save lives of peoples of such disaster prone areas. System is implemented on Android phones as Android phones become extensively famous. Proposed system administer warnings and evacuation process delivery to tourist and blind peoples who can face troubles in searching shelter in new or unknown area. Our system delivers track of closer safe place using Google map. Google map is proven very competent as compared to OpenStreetMap (OSM) and other mapping techniques. Google map delivers faster updates of maps and other interfaces. The experimental result proves the effectiveness of our system. DOI: 10.17762/ijritcc2321-8169.15068

    K-mean Clustering for Segmentation of Irregular Shape Fruit Images under Various Illumination

    Get PDF
    Segmentation is the first step in analyzing or interpreting an image automatically. In particular applications, like image compression or image recognition, entire image can�t be processed directly. Hence many segmentation techniques are proposed to segment an image before processing it. This made it possible to develop many techniques which are currently using in different industries and agriculture field. They are either applied for grading or inspecting quality of food products and Fruits. These developed techniques use thresholding and clustering approach to get proper segmented output. In this paper an image segmentation approach is developed based on k-means adaptive clustering. This approach segments the various shape fruit images particularly which are non-circular (like banana, mango, and pineapple) and captured in various illumination such as low, Medium and high intensity. Earlier segmentation methods were not apposite for fruit images captured in natural light; as they were responsive to various colour intensity predisposed by the sunlight illumination. Natural illumination tempts an uneven amount of light intensity on the surface of the object, resulting in poor quality image segmentation. This approach will deal with problem of light effect. K-means clustering is renowned method for image segmentation. This method is more efficient, robust than the others. It provides best result when dataset is well separated and distinct. Different shape fruit images are segmented properly along with grey scale. The analytical results are the evidence for the accurate segmentation of banana, mango pineapple using new approach developed here

    A New Cryptographic Encryption Approach for Cloud Environment

    Get PDF
    Cloud security and trust management are an important issue in the cloud environment. Cloud computing is the result of the evolution of virtualization, service-oriented design, and the widespread adoption of involuntary and utility computing. Today, cloud computing is the fastest growing technical term and captures a global service-oriented market, so cloud computing service providers and cloud computing consumers need to maintain trust between them. In cloud security, if you discuss the security procedures of traditional IT information systems, designing security into cloud software during the software development life cycle can greatly reduce the cloud attack surface. With cloud computing providing Security as a Service (SAAS), security software is an important issue. From a cloud customer perspective, the use of security services in the cloud reduces the need for security software development. The requirements for security software development are transferred to the cloud provider. This work proposes a new cloud environment security and trust management algorithm, which uses the cryptosystem method to improve the single alphabet based on the concept of multi-letter cipher. Encryption and decryption is applied to plain text to encrypt text and cipher text for plain text conversion. In this work, the algorithm's power consumption, encryption and decryption throughput, and security analysis are also presented

    METHOD AND SYSTEM FOR FACILITATING AUTHENTICATION OF SECONDARY ACCOUNT HOLDER DEVICE FOR TRANSACTIONS ORIGINATED AGAINST PRIMARY CARDHOLDER’S ACCOUNT

    Get PDF
    The present disclosure provides a method and system to facilitate authentication of secondary account holder device 104 for transactions originated against primary cardholder’s account. The present disclosure facilitates primary card holder to update issuer system 210 with valid secondary account holder device 104, which to be approved. Also, the present disclosure facilitates a process through which transaction processing through merchant portal is taken care when second factor authentication is provided by secondary account holder device 104. Therefore, the present disclosure avoids repeated transactions through primary account holder device 102, and hence improved overall Pre-settlement Risk (PSR) rate. A secondary account holder device 104 will initiate and complete the transaction with authentication without depending on the actual card holder to share the One Time Password (OTP)

    Forensic Document Analysis using Apriori Algorithm

    Get PDF
    Today, we find a tremendous increase in crimes like ethical hacking, rackets on different domain packets, unauthorized entrance, in the digital world. So, we need to track such unauthorized access. Our forensic document analysis using apriori algorithm provides an approach which is used to find the evidence by analyzing such massive set of documents. In forensic analysis frequently we examine hundreds of thousands of file which is huge amount of data. Here, we group the retrieved documents into the meaningful categories list which is the most central process by using the k-representative algorithm. Hence we are specifying an approach for forensic analysis using document clustering algorithm helpful in police investigation

    Performance Analysis of Induction Motor Using PI And FUZZY Controller

    Get PDF
    This paper represents the better speed regulation of induction motor by the help of indirect vector control technique and also by using other controlling techniques. Here speed of induction motor is regulated or controlled by using PI controller and fuzzy logic controller, by using PI controller it provides good regulation of speed but due to some drawback in it like high overshoot, oscillation of speed and torque at variation or change in load or due to external disturbances occur during running performance of induction motor drive that controller is replaced by fuzzy logic controller which provides more better running performance to the induction motor by regulating its speed in better way and tracking the actual running speed response easily and fast as compare to PI controller. The benefits of squirrel-cage induction motors are high robustness and low maintenance which make it widely used through various industrial modem processes, with growing economical and demands. In conventional FOC, PI controller is used to control the speed response of the induction motor drive. The use of PI controller induces many problems due to sudden changes in load and external disturbances. This behavior of the controller causes disturbance in drive running performance. To overcome this disadvantages an intelligent controller based on fuzzy logic is employed in the place of the conventional PI controller. DOI: 10.17762/ijritcc2321-8169.15061

    Study Of Wind Energy Conversion System Connected To Grid Using Doubly Fed Induction Generator

    Get PDF
    From past few years, wind mills has become one of the most significant and valuable sources of renewable energy, in which better transmission capability and improved system reliability is needed. Also there has been a significant growth in the wind energy scenario. The World Wind Energy Association has told in World Wind Energy Report that, “The around the world [wind] capacity reached 318,137 MW, out of which 35,467 MW were added more”. The wind system here is a variable speed wind generation system working principle based on Doubly Fed Induction Generator (DFIG).The Doubly fed induction generator brings the additional feature of utilizing the turns ratio of the machine, so the power converter need not to be rated for the machine’s full rated power. The rotor side converter (RSC) generally provides active power and reactive power control of the machine while the grid-side converter (GSC) retains the voltage of the DC-link constant. The added feature of generation of the reactive power by the grid-side converter is generally not used because of the fact that it is more desirable to generate reactive power by using the Rotor side convertor. Though, within the usable current capacity the grid side converter can be controlled to participate in generation of reactive power in steady state and during low voltage durations as well. The Grid side convertor can contribute the necessary reactive current very quickly while the RSC passes the current through the machine appearing in a difficulty. The pair of converters can be overburdened for a short time, so the DFIG is able to give an ample contribution to grid voltage support at the time of short circuits. This abstract deals with the introduction of wind turbines, DFIG, power converter control and for study of Grid Connected Wind Energy system with DFIG and corresponding results. DOI: 10.17762/ijritcc2321-8169.15066
    • …
    corecore