Nowaday’s demand for power generation is increasing. Therefore control system requirements are also increasing. In this paper boiler is operated using many control strategies so that resultant operation will be practically implemented for industrial purpose. In this experiment the electrically heated boiler and pipe in...
Introduction The 21st will bring about an all-embracing convergence of computing, communication, information and knowledge. This will radically change the way we live, work and think. The growth of high speed network, coupled with the falling cost of computing power, is making possible application undreamed...
Abstract Quality assurance or QA is the systematic and continuous monitoring and evaluation of the different aspects of a project, service or facility. It required maximizing the probability that minimum standards of quality are being attained by the production process. Quality Assurance is an important...
An electronic flight instrument system (EFIS) is a flight deck instrument display system located at the flight cockpit in the lower deck after the windshield. It is powered electronically and produce digital output. The electronic display unit system consists of 3 different display units, the...
Fixtures are the production tools which make the standard machine tool, more adaptive to work as specialized machine tools. Manufacturing industries have brought lot of revolutions in manufacturing technology, as a consequence of which several developments like CNC lathes, CNC machine center, robotics etc. have...
Abstract It was aimed to classify emotion for feature extraction in discrete approach method and emotion recognition based on empirical mode decomposition (EMD).By using EMD, EEG signals are decomposed into Intrinsic Mode Functions (IMFs) automatically. Multidimensional information of IMF is utilized as features, the first...
The data mining of social media activity is now commonplace in business intelligence circles. Over the courseof the last 18 months, this stream of BI has experienced a startling rate of growth and reached lofty levels ofsophistication. Just a few short years ago, consumer-oriented businesses...
“In the early 1990s, Howard Dresner, then an analyst at the Gartner Group, coined the term business intelligence due to the growing need for applications designed to support decision making based on data collected. Nowadays, business leaders and top management have access to more data...
Abstract User get bulk of data whenever he/she search for a particular topic on internet which is not useful for user due to this lots of time is wasted of user. This application which will provide an optimized result for search query according to the...
Abstract The Suspicious activity detection system aims to serve a reliable online examination system which is based on strict online security and true candidate authentication. The main aim of the project is to detect the human who is cheating during the examination. Human face and...
Cyber Security
Get a personalized essay in under 3 hours!
Expert-written essays crafted with your exact needs in mind
Abstract Electrocardiography (ECG or EKG) is a widely employed non invasive technique to determine the condition of human heart and detect any abnormal cardiac behavior. Computer systems for ECG analysis can aid physicians in prompt detection of dangerous events such as ventricular fibrillation in patients...
Heat pipes are heat transfer devices that enhances large amount of heat which works on the principle of evaporation and condensation of a working fluid. Inspite of wide application of heat pipe in microelectronics cooling system the trend of the chips performance and power utilization...
In recent years, the use of Nano-technology (Nano-particles, Nano-material and Nano-additives) has attracted attention of scholars, engineers, and scientists in all scientific fields such as chemistry, medicine, material, agriculture, electric, and etc. The use of Nano-technology has also become widespread in the refractories products (which...
My personal inspiration, Elon Musk once said, “If something is important enough, you should try, even if the probable outcome is failure.” Films have been a passion of mine ever since I saw The Lord of the Rings when I was three years old. My...
As of 2015, 2.7 billion people were live on the Internet; and we saw an increase of 60 times largely from the Asia Pacific. The Internet user growth in India is up by 40% in 2017. Do we still need a reason to digitize our...
Abstract k Nearest Neighbor (KNN) strategy is a notable classification strategy in data mining and estimations in light of its direct execution and colossal arrangement execution. In any case, it is outlandish for ordinary KNN strategies to select settled k esteem to all tests. Past...
Technology has continued to advance exponentially and has transformed many businesses. By the use of technology now businesses can get a lot of their work done in short amount of time frame. From surveys to closing, the present mobile, social, big data and cloud technologies...
Introduction: Our topic for a rebate is “Is the threat of Artificial Intelligence technology real?” Artificial intelligence may attempt to copy our own intelligence. Nowadays Computers can communicate and calculate data quicker than the average human. However, research in artificial intelligent is advancing quickly. In...
Abstract Software Testing are major source of Testing which make our software efficient in working .It is even impossible some time to declare that whether the Testing phase in complete or not. The Black Box Testing is external Testing . Black Box Testing select test...