88 research outputs found

    Router 1X3 – RTL Design and Verification

    No full text
    <p>Routing is the process of moving a packet of data from source to destination and enables messages to pass from one computer to another and eventually reach the target machine. A router is a networking device that forwards data packets between computer networks. It is connected to two or more data lines from different networks (as opposed to a network switch, which connects data lines from one single network). This paper, mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top module</p

    Content Based Video Retrieval Using Integrated Feature Extraction and Personalization of Results

    No full text
    <p>Traditional video retrieval methods fail to meet technical challenges due to large and rapid growth of multimedia data, demanding effective retrieval systems. In the last decade Content Based Video Retrieval (CBVR) has become more and more popular. The amount of lecture video data on the Worldwide Web (WWW) is growing rapidly. Therefore, a more efficient method for video retrieval in WWW or within large lecture video archives is urgently needed. This paper presents an implementation of automated video indexing and video search in large videodatabase. First of all, we apply automatic video segmentation and key-frame detection to extract the frames from video. At next, we extract textual keywords by applying on video i.e. Optical Character Recognition (OCR) technology on key-frames and Automatic Speech Recognition (ASR) on audio tracks of that video. At next, we also extractingcolour, texture and edge detector features from different method. At last, we integrate all the keywords and features which has extracted from above techniques for searching purpose.Finallysearch similarity measure is applied to retrieve the best matchingcorresponding videos are presented as output from database. Additionally we are providing Re-ranking of results as per users interest in original result.</p

    Reducing Corrosion Rate by Welding Design

    No full text
    <p>The paper addresses the importance of welding design to prevent corrosion at steel. Welding is used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The problems happened associated with welding are common issues in these fields, especially corrosion. Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good welding design. In the research, it can be found that reducing residual stress on the welding can be solved in corrosion rate reduction problem. Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76% lost. Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is 0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%- 0,71% lost.</p

    Application of Buckley-Leverett Equation in Modeling the Radius of Invasion in a Reservoir Undergoing Microbial Enhanced Oil Recovery

    No full text
    <p>A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding. Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading edge of water during the flooding process, but also gives a clearer understanding of the applicability of microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic gases, bio acids etc.</p

    Experimental Study of Material Removal Efficiency in EDM Using Various Types of Dielectric Oil

    No full text
    <p>The machining process in electrical discharge machining (EDM) consists of a melting process and a removal process. A region of the workpiece surface heated by the discharge plasma is melted and a portion of the melted region is removed from the workpiece body. The rest of the melted region remains on the workpiece surface and re-solidified as a white layer. In previous research, to evaluate the removal ability, a ratio of the removal volume to the melted volume is defined as the material removal efficiency.</p

    Role of Coating in Improving High Temperature Oxidation of Steel

    No full text
    <p>Oxidation is the major degradation mechanism of failure for various components operating at high temperature. Protective coatings are used to improve the oxidation resistance of such component. In the present investigation, Al2O3 and Ni-20Cr coatings have been deposited on SAE431 boiler steel by Detonation Gun Spraying Method. The oxidation performance of Al2O3 and Ni-20Cr coated as well as uncoated SAE-431 steel has been evaluated in air under cyclic conditions at an elevated temperatures of 8000C. Al2O3 coating on SAE431 boiler steel has shown approximately 26% improvement in the oxidation resistance of SAE431 steel whereas Ni-20Cr coating on SAE431 boiler steel has indicated about 21% improvement in the oxidation resistance as compared to the uncoated SAE431 boiler steel.</p

    Gesture Gaming on the World Wide Web Using an Ordinary Web Camera

    No full text
    <p>Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam with the help of open source technologies. Emphasis in human activity recognition is given on the pose estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to the user on how to play a particular game using gestures and what are the various kinds of gestures that can be performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by instructing the user to place his component in a red box in about 10 seconds after the short documentary before the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a place where the user is to perform only gestures to start playing the game. At any point of time the user can call off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could also be achieved thus resulting in a disruptive growth to the advertising firms</p

    Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standards

    No full text
    <p>This Research work was done to find out the impact of AMS 4928 standard heat treatment on Selective Laser Melted (SLM) Ti-6Al-4V Grade 23 alloy. Ti-6Al-4V Grade 23 is an Extra Low Interstitial version of Ti alloy with lower impurities and is α+β type alloy at room temperature. SLM is one type of method in Additive Manufacturing based on Powder bed system. Each powder layer of few microns is coated and a laser beam is scanned to melt the metal powder according to the specification of the part and subsequently moved downwards layer by layer. The test coupons were first heat treated according to the above mentioned standard. The tensile testing and the microstructural analysis were done to compare the results with that of mentioned in the AMS 4928.The yield stress andPercentage elongation in the test coupons achieved are better than the minimum requirement by AMS 4928 standard. Coarse lamellar grain structures were obtained with no continuous network of alpha at prior beta grain boundaries</p

    Moon-bounce: A Boon for VHF Dxing

    No full text
    <p>Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME (Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF) operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location, visibility of Moon at both the stations and other vital data to acquire real time position of moon.</p

    Secure Image Transmission for Cloud Storage System Using Hybrid Scheme

    No full text
    <p>Data over the cloud is transferred or transmitted between servers and users. Privacy of that data is very important as it belongs to personal information. If data get hacked by the hacker, can be used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient transmission, encryption is used for security purposes and blurring is used by providing additional layers of security. These algorithms are hybridized for having a robust and efficient security and transmission over cloud storage system.</p
    • …
    corecore