This paper gives a study of the major risk factors which lead to preterm delivery in women. Preterm birth is the leading cause of perinatal morbidity and mortality worldwide. For the prediction of preterm delivery, in...
详细信息
An alternative source is growing in popularity with increasing global energy use and perceivable environmental degradation everywhere in the universe. The growth of wind farms necessitates system stability analysis, w...
An alternative source is growing in popularity with increasing global energy use and perceivable environmental degradation everywhere in the universe. The growth of wind farms necessitates system stability analysis, which incorporates dynamical distributed generation models. Doubly fed induction machines are widely used in the context of turbines of power higher than 1MW. However, direct-drive wind turbines that use synchronous generator principles have gained significant market penetration. This investigation implements a synchronous generator model using a frequency-based matrix converter with the assistance of an SVPWM method, which measures stator as grid voltage/current and analyses total THD. Converting the fluctuating voltages to something like a stable value using a frequency-based method is done with a matrix converter.
作者:
G. KrishnaveniK. Ganesan1Department of Mathematics
Faculty of Engineering and Technology SRM Institute of Science & Technology Kattankulathur Chennai - 603203 India. 2Department of Mathematics
Faculty of Engineering and Technology SRM Institute of Science & Technology Kattankulathur Chennai - 603203 India.
Fractional linear programming models are widely used in real life complications. The fractional transportation problem (FTP) in particular is wide spread where the goal is the optimization of the ratio between 2 cost ...
Fractional linear programming models are widely used in real life complications. The fractional transportation problem (FTP) in particular is wide spread where the goal is the optimization of the ratio between 2 cost functions or damage functions or demand functions. But in view of the uncertainty involved in the parameters, fuzzy techniques become more essential. In the paper, we discuss a solution for a fully fuzzy multi objective FTP with the use of triangular fuzzy numbers without transforming it to a crisp equivalent to the existing model. The algorithm is explained with a numerical example with a better solution.
The Internet of Things (IoT) healthcare has been suggested as a talented way of importantly increasing patient productivity also satisfaction. In IoT, medical instruments calculate the critical symptoms of the patient...
The Internet of Things (IoT) healthcare has been suggested as a talented way of importantly increasing patient productivity also satisfaction. In IoT, medical instruments calculate the critical symptoms of the patients and add them onto medical databases that are processed and retrieved by healthcare personnel in the cloud. Encryption is usually used to maintain authentication by trusted parties to medical data while avoiding unauthorized access to them to protect patient privacy. The prompt access to patient files in emergency cases is important in healthcare. In this article we suggest a scheme that facilitates the access to protected medical data, attribute-based access and broken glass access, which is a compact blow access control (LiBAC). Under normal cases an attribute-set medical worker can decode and view the data that complies with the access policy of the medical file. The break-glass entry system circumvents the patient file access regulation, allowing emergency medical services or rescue personnel to access the records in good time. As the instruments in the IoT healthcare network conduct very few calculations and storage in addition communication overheads are minimal, LiBAC is light-weight. LiBAC in the standard model has been officially proven stable, and comprehensive studies are carried out to illustrate its efficacy.
Air contamination is today the world's toughest problem for the environment and public health. Air contamination has a detrimental effect on the wellbeing of humans, the atmosphere and the biodiversity. Factory ai...
Air contamination is today the world's toughest problem for the environment and public health. Air contamination has a detrimental effect on the wellbeing of humans, the atmosphere and the biodiversity. Factory air pollution continues caused by leaked toxic gases, vehicle waste and increasing accumulation of unhealthy gases and particulate matter. Particular materials are among the principal parameters of elevated air emissions, including real-time air quality monitoring to be monitored and analysed to determine correctly in a prompt manner. A standalone air quality control system with many parameters in operation in real-time is introduced in this article: CO2, temperature, humidity, air quality PM 2.5 and carbon monoxide. In reality, in every sector, the Internet of Things is commonly used and is also a key factor in air quality management. The Internet of Things Cloud Computing is a new way of improving the data processing of multiple sensors obtained and transmitted by the low-cost Raspberry pi ARM minicomputer.
High penetration of renewable energies in the electrical grids require forecasting information for their proper integration. This necessitates the robust forecasting techniques in terms of faster speed and high accura...
详细信息
The evolution of technology have made Robotics as an inevitable tool in the world of automation and have a huge influence in surveillance activities, material handling and military purposes too. Developing the mechani...
The evolution of technology have made Robotics as an inevitable tool in the world of automation and have a huge influence in surveillance activities, material handling and military purposes too. Developing the mechanism for climbing the staircase and moving in bumpy region are meticulous task. The installation of gyroscope and sensors to maintain the stability of the system under inclined and stepped area incurs high cost and increases the weight of the system. A CaterBOT is a bio-inspired robotic mechanism constructed with two pair of ribbed belt drive, which has the motion similar to Caterpillar. The primary drive mechanism, which acts as basement of the robot, provides the translator motion. The secondary ribbed belt drive is an extended flipper arm, which enables the robot to climb the obstacles and staircase as well. The wireless control of drives enables ease operation of CaterBOT on bumpy region. The worm wheel driven flipper arm offers enough grip and maintains stability of the vehicle on jagged and steep surfaces. The CaterBOT facilitated with camera, IR sensor and temperature sensor in favour of making to use in observation and military purposes.
作者:
M. S. Bennet PrabaJ S Femilda JosephinAssistant Professor
Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India. Associate Professor
Department of Software Engineering SRM Institute of Science and Technology Kattankulathur Chennai – 603 203 India.
Connected cars are comfortable to drivers. But it also threat to humans. Connected vehicles share data like street safety, traffic analysis, road administration information like café, hospital, etc utilizing intr...
Connected cars are comfortable to drivers. But it also threat to humans. Connected vehicles share data like street safety, traffic analysis, road administration information like café, hospital, etc utilizing intruded on web availability and it is time delicate. Connected vehicles allow drivers and passengers to connect to the outside world while on the road. Security is the primary challenge for automakers and other stakeholders, because connected vehicles rely on wireless and cellular communication interfaces. Information should be protected from intruders. The communications between connected vehicles should be a trusted one. Safety is the primary focus of connected cars and the intruders should be identified and the intruders and falsified nodes can be identified by authentication schemes. In VANET vehicles react as indicated by the data got from the opposite end, so it is very vital that the data spreading in the framework is valid and produced by a genuine client. But there are many pitfalls in various authentication schemes. Privacy of the connected vehicles should be while sharing information and also information shared between connected vehicles should be an authenticated one. So still it a major challenge in connected vehicles due to the special characteristics like mobility, time sensitive, etc. This survey discussed the various authentication schemes and the various attacks related to that. Based on the survey, future directions of the secured trusted communications of connected vehicles have been discussed. The aim of this survey is to identify secured authentication techniques for a trusted communication.
暂无评论