1–20 von 1,506 Ergebnissen
|

    Comparison of ABWS and MDS MPPT technique with conventional MPPT technique

    Sondge, Sanket / Jape, V. M. / Virulkar, V. B. | IEEE | 2017
    time that of required by P&O technique and the overall power loss is also reduced. ...

    Automatic web information extraction and alignment using CTVS technique

    Pandarge, Sangmesh S. / Chakkarwar, V. A. | IEEE | 2017
    data values in database table. The proposed technique is suitable for both contiguous and non-contiguous data regions because of result page ...

    LWT-SVD secure image watermarking technique

    Ben Ftima, Siraa / Talbi, Mourad / Ezzedine, Tahar | IEEE | 2017
    . The obtained results from the application of the proposed technique on a number of images show clearly that this technique is secure and both ...

    Interpretation of sweep frequency response data (SFRA) using graphical and statistical technique

    Gite, Priti / Sindekar, A. S. | IEEE | 2017
    of fault inside the transformer using graphical consists three comparison method and statistical technique. ...

    Cluster-based technique for detection and prevention of black-hole attack in MANETs

    Saurabh, Vidya Kumari / Sharma, Roopesh / Itare, Ravikant et al. | IEEE | 2017
    mobility, frequent topology changes, insecure operational environment, and confined availability of resources. Due to low configuration and quick ...

    Heart disease diagnosis using data mining technique

    Babu, Sarath / Vivek, E M / Famina, K P et al. | IEEE | 2017
    Data mining is an advanced technology, which is the process of discovering actionable information from large set of data, which is used to ...

    Performance analysis of underwater wireless communication networks

    Gupta, Shikha / Dongre, Manoj M. | IEEE | 2017
    collect more interference because of the slow-fading of signal, due to this, a higher outage probability and high energy consumption occurs ...

    Frequency and polarization reconfigurable antenna for wireless communication

    Dhanade, Yuvraj Baburao / Choukiker, Yogesh Kumar | IEEE | 2017
    consists of a Wilkinson Power Divider and Schiffman 90° phase shifter. The simulated results agree reasonably well. ...

    Position control of brushless DC motor using harmony search algorithm optimization technique

    Kumar, Mahendra / Chaursiya, Kiran | IEEE | 2017
    to control position of BLDC motor. This controller has three parameters Kp, Ki and Kd needs to tune for ...

    Heuristic investigation on two step model order reduction technique

    Jha, S. K. / Sharma, Aditya Kumar | IEEE | 2017
    between the responses of reduced models T1, T2 and the response of the original system, T. The comparison of the responses is illustrated with an ...

    Modeling technology of virtual assembly system based on UML

    Yu, Xinping / Gu, Peng / Liu, Xia et al. | IEEE | 2017
    and deployment diagram is completed on the system, provides a concise, clear, feasible technical scheme for the realization of the system ...

    Machine learning regression technique for cotton leaf disease detection and controlling using IoT

    Sarangdhar, Adhao Asmita / Pawar, V. R. | IEEE | 2017
    . This paper presents a system for detection and controlling of diseases on cotton leaf along with soil quality monitoring. The work proposes a ...

    Implementation of BIST technology for fault detection and repair of the multiported memory using FPGA

    Patil, S. R. / Musle, D. B. | IEEE | 2017
    The problem of faults is growing exponentially due to embedded memory area on-chip is increasing and memory density is growing. There are ...

    Citrus leaf unhealthy region detection by using image processing technique

    Shaikh, Rukaiyya P. / Dhole, S. A. | IEEE | 2017
    attack on plant affects various parts like stem, leaves and fruit. This research explain about implementation of image processing to determiner ...

    Secure low-storage clone detection technique for wireless sensor networks

    Lal, Ashvini / Selvakumar, J. | IEEE | 2017
    transferred between the nodes. One such kind of attack is the clone attack in which the attacker might physically capture the nodes and replicate it ...

    A modified AODV protocol to detect and prevent the wormhole usingh using hybrid technique

    Chouhan, Amar Singh / Sharma, Vikrant / Singh, Upendra et al. | IEEE | 2017
    longer survival of the network with fast response is needed. In this paper, the technique of dynamic wormhole detection and prevention AODVWWP ...

    A novel way to deal with harmonic elimination in multi level CHB inverter using without filtering technique

    Ayyappa, P. N. V. S. / Srinivas, Ch. / Singh, T. Rushi Santhosh | IEEE | 2017
    five level's CHB inverter, specifically break even with step strategy and other is selective harmonic elimination. The oddity of comic ...

    Li-Fi: An infallible standard for future indoor communication

    Soudgar, Abrar I. / Kulkarni, Aditya U. / Surve, A. R. | IEEE | 2017
    and how it can improve indoor data transfers and communication. The whole concept originated with the advent of the VLC i.e Visible Light ...

    A compact planar antenna for low frequency mobile communication

    Haldankar, Siddhesh V. / Kulkami, Dipak P. / Mishra, Saurabh M. | IEEE | 2017
    ∗32mm2 of system circuit board for its placement over No-Ground portion. And ground-plane requires area of 45∗90mm2. Basically ...