Paper Type |
:: |
Research Paper |
Title |
:: |
Self Recharging Perpetual Paper Batteries |
Country |
:: |
India |
Authors |
:: |
B. Ravi Sankar ||, S. Alamelu Mangai |
Page No. |
:: |
01-03 |
:: |
0.4/3021-05110103 | |
3021-0501-0103 |
In this paper we describe about a paper battery whose electrodes are made up of different metals. This battery is connected to the primary coil of a transformer. The secondary coil of the transformer is connected to full wave rectifier whose output is either connected to a super capacitor or a rechargeable battery. The whole of the setup is referred as Self Recharging Perpetual Paper Battery.
Keywords: - Paper Battery , Perpetual Battery, Self Recharging Battery.
Online Learning enables to deliver both learning and information dynamically. It allows tapping the knowledge of experts and non-experts and catapulting those messages beyond classroom walls and into the workplace but it is more difficult to assess a learner's motivation. In traditional classroom learning, when a student shows signs of de-motivation, teachers know how to motivate their students and how to optimize their instruction. But in On-line learning it is difficult to measure their disengaged level. By tracing the disengaged learners in online learning, will help us to motivate the learners at proper time. Thus making an online learning to be a successful one. Thus we propose a new framework called Quasi Framework, which is trying to measure the significant relationship between disengagement level and their academic achievement. In this paper we compare our proposed framework with ihelp, a web based learning system.
Keywords: Disengagement Detection, Online Learning, EDM, Log File Analysis.
The X-bee data transmission and reception module is basically used for wireless transmission and reception of data . The module use ASK technique in the transmission and reception of data. This paper focuses on using the X-bee module as a means of remote control. Therefore, it would be suitable to use this module as a tool of remote control. Here, the X-bee is used to serve as a remote control for a cold store . The remote control system consists of two X-bee modules , two microcontrollers connected to each module , a personal computer (PC) , a cold store, and a designed circuit. The (PC) is used to develop a program in order to download it in the microcontroller . One X-bee module serves as a remote control, while the other is used to receive commands from the first one. When a command is received the microcontroller in the reception site decodes the command. The decoded command is used to control the operations in the cold store . This remote control system can be used for any electronic or electrical device to operate it from anywhere using the X-bee technology.
Keywords: control system, remote control ,PC , X-bee , ASK , cold store.
This paper studies two stochastic bulk demand (S, s) inventory models A and B both with k1 phases PH demand occurrence and k2 phases PH lead time distributions respectively. In the models the maximum storing capacity of the inventory is S units and the order for filling up the inventory is placed when the inventory level falls to s or below. The demands occur when the absorption occurs in the demand arrival PH process. Its size is random and is bounded above with distribution function depending on the phase from which the absorption occurs. Lead time for an order realization has phase type distribution with the supply size ≥ S and is bounded above with bounds depending on the phase from which the absorption occurs in the PH lead time distribution. When the inventory has no stock, demands wait for supply forming a queue. Only after clearing the waiting demands, the inventory is filled up. When an order is placed only after its realization, the next order can be placed. When the inventory is filled up due to an order realization, units received in excess are returned. In model A, the maximum of the maximum demand sizes in the k1 phases is greater than the maximum of the k2supply sizes. In model B the maximum of the maximum demand sizes in the k1phases is less than the maximum of the k2supply sizes. Matrix partitioning method is used to study the inventory systems. The stationary probabilities of the inventory stock size, the probability of the waiting demand length, its expected values, its variances and probabilities of empty levels are derived for the two models using the iterated rate matrix. Numerical examples are presented for illustration.
Keywords: Block Partition, Bulk Demand, Matrix Geometric Method, Phase Type Distribution, Supply after Lead Time.
The stability of an interconnected power system is its ability to return to normal or stable operation after having been subjected to some form of disturbance. With interconnected systems continually growing in size and extending over vast geographical regions, it is becoming increasingly more difficult to maintain synchronism between various parts of the power system. Modern power systems have many interconnected generating stations, each with several generators and many loads. So our study is focused on multi-machine stability .
Keywords: – Stability, Swing Equation, Transient Stability, Synchronous machine, Numerical Methods
For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially massive problem .The requirements of information security within an organization have undergone major changes in the last several decades .With the introduction of computer the need for automated tools for protecting files and other information stored on the computer became an evident .This is especially the case for a shared system, such as time sharing system and the need is even more acute for systems that can be accessed by any user . This paper deals with building a secured algorithm to ensure data security in the computer network.
Keywords: encryption, data, algorithm, computer network,
this paper examines the performance of Minimum-Mean-Square-Error (MMSE) adaptive algorithm
as a reception algorithm for the 6th derivative Ultra-wideband (UWB) Gaussian pulse shape signals compared
to the performance of conventional Ultra-Wideband (UWB) Rake receiver with different number of Rake
fingers. MMSE adaptive algorithm is more efficient and powerful because of its ability and features of
adaptation to the substantial changes in the UWB multipath wireless communication channel model proposed
by the IEEE 802.15.3a working group based on modified (S-V) channel model because it is the most realistic
and practical channel model due to the nature of multipath wireless environment. The paper demonstrates the
performance of two commonly used transmission schemes in UWB communications which are Direct-
Sequence (DS-UWB) and Time-Hopping (TH-UWB) to compare between their performances over the
previously mentioned UWB multipath channel model using also two reception techniques which are the UWB
Rake receiver (with different number of Rake fingers) and the MMSE adaptive algorithm receiver to show the
latter efficiency due to its distinctive adaptability. Moreover, the performance comparison between the two
reception techniques presented in this paper is assumed to be performed in the presence of both; narrowband
interference coming from other networks (e.g. IEEE 802.11a WLAN), and also the presence of Multiple-
Access-Interference (MAI) coming from other UWB users in the proximity of the desired UWB user.
Index Terms: - Ultra-Wideband (UWB), Multiple-Access-Interference (MAI), Federal-Communication- Committee (FCC), Bit-Error-Rate (BER), Signal-to-Noise Ratio (SNR), Signal-to-Interference-Noise Ratio (SINR), Power-Spectral-Density (PSD), Minimum-Mean-Square-Error (MMSE), Channel-Model (CM).
Information brokering systems (IBSs) are planned to connect many data sources via a brokering edge, that the brokers route their decisions to direct client queries to the requested data servers. Most of the prevailing brokering systems like global organization agency shares data through brokers and conjointly assumes that brokers square measure sure so exclusively agree server-side access control for information privacy. However, privacy of information location and client data can still be collected from information modified among the IBS. In this paper, we propose an approach to preserve privacy of multiple stakeholders involved at intervals in the data brokering system by using Personal Health Records as the case study. In the proposed system an encryption scheme known as Jasypt to provide the strong encryption and also providing the Load Balancing algorithm to avoid data loss and finally a new technique known as Proxy Re-Encryption to provide the double Encryption for the Sensitive data
© 2019 All Rights Reserved | Design by iosrjen