An overview of ontological paper cutting machine
Overview of existing papers cutting machine and evolution of paper cutting machine has been analyzed and discussed. First, the theoretical and practical operating principles of various types of paper cutting has been analyzed and complete structural analyzes has been made to improvise machine operation. The various types of existing paper cutting machines are manual, semi-automatic, fully automatic hydraulic then, the inherent parts of the paper cutting machines has been illustrated.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Efficient Attendance Management using Multiple Face Recognition
Nowadays, classroom attendance of a student is a very important task and if taken manually wastes a lot of time. There are many automatic methods available for this purpose i.e., biometric attendance. All these methods waste time, waiting in a queue to detect their thumb, palm, face or iris in front of the scanning device. This paper describes the efficient algorithm that automatically marks attendance without any human intervention and waste of time. The algorithm works with images of multiple faces. Firstly, the images are captured by using a camera placed on the top of the blackboard. The captured images are processed for noise removal using a median filter. Then the faces are detected using the detection algorithm. Lastly, the detected face is recognized by comparing the faces in the database and the attendance is marked. A Graphical User Interface (GUI) is designed for calculating the percentage of the match of faces.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Transformation of an Object in Computer Graphics: A Case Study of Mathematical Matrix Theory
Equations of curves or straight lines have reference to certain set of axes. In fact we shall have different equations for the same curve or straight line when referred to different set of co-ordinate axes. This may happen when the origin is shifted to a point keeping the directions of the axes the same or when the axes are rotated through same angle keeping the origin unaltered. Transformation of an object in computer graphics is based on mathematical theory and uses an important concept related to matrix theory. Transformation of an object may be related to 2dimensional or 3 dimensional or more .A transformation which map 3-D objects onto 2-D screen we are going to call it Projection .In general there are two ways to represent the transformation of an object (i) transformation are done by using the rules of co-ordinates axes (ii)transformation are done by representing in the matrix form. In this paper it is tried to study the properties of matrix used to develop transformation of an object related to computer graphics theory. It is tried to study set of non-zero vectors are used to represent a matrix and is helpful to do transformation of an object. Keywords : object ; transformation ; dimensional; matrix;
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A region based an adaptive color texture segmentation using similarity measure of symbolic object approach
Texture segmentation is the process of partitioning an image into regions with different textures containing similar group of pixels. Texture is an important spatial feature, useful for identifying object or region of interest. In texture analysis the foremost task is to extract texture features, which efficiently embody the information about the textural characteristics of the image. This can be used for the segmentation of different textured images. This paper presents a new approach for color texture segmentation using Haralick’s features extracted from color co-occurrence matrices. The originality of this approach is to select the most discriminating color texture features extracted from the color co-occurrence. Symbolic Object Approach is used for achieving texture segmentation.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Cardiovascular pressure monitor using capacitive sensor in medical stent
Capacitive pressure sensor have been fabricated over a titanium diaphragm of 2.5[mm] thickness for sensing pressure in order to prevent the heart failure. This capacitive pressure sensor is implantable in a heart in order to monitor the blood pressure with the help of medical stent
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Comsol multiphysics simulation of micro fluidic system for blood sample analysis
The effective analysis of blood samples is a pressing issue in the modern world. This can be addressed by lab on a chip system. This paper deals with the design of several systems for supplying oxygenated blood (star chip) and to mix blood cells for analysis (lamella mixer).we have used comsol multiphysics(Matthias K.Gobbert, (October,2007)) to simulate these structures and to optimize their design.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Data Mining based Analysis of Stock Market Financial Data of Each Firms in Different Sectors
In this project we applied five data mining algorithms using Weka Tool (Data Mining Program) cases of monthly financial data of firms in the different sectors. These datasets have five years’ experience between2007–2012. After we applied these algorithms at these datasets, we displayed the results and compared the results that found by using these different algorithms.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
IIR digital filter design through genetic algorithm
The Paper presents a simple computer-aided design approach for designing infinite-impulse response (IIR) digital filters. IIR filter is essentially a digital filter with Recursive responses. Since the error surface of digital IIR filters is generally nonlinear and multimodal, global optimization techniques are required in order to avoid local minima. There are many ways for the design of IIR Digital filters. This Paper Presents heuristic way for the designing IIR filters. In this Paper, Genetic Algorithm (GA) base evolutionary is proposed for design of IIR digital filter. GA is a well-known powerful global optimization algorithm, introduced in combinatorial optimization problems. The Simulation results for the employed examples are presented in this paper and can be efficiently used for IIR filter design.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An integration approach of intelligent predictive caching and static prefetching for internet web servers
Web caching and Web prefetching are two important techniques used to reduce the noticeable response time perceived by users. By integrating Web caching and Web prefetching, these two techniques can complement each other since the Web caching technique exploits the temporal locality, whereas Web prefetching technique utilizes the spatial locality of Web objects [30]. In this paper, we develop algorithm Pre-IPGDSF# by integrating Web caching and Web prefetching in Web servers. For caching, we use innovative algorithm Intelligent Predictive Greedy Dual Size Frequency#, IPGDSF#, which is an enhanced version of algorithm GDSF# developed by us [13, 14, 15, 16, 17]. For prefetching, we use a static prefetching method. Using three different Web server logs, we use trace driven analysis to evaluate the effects of different replacement policies on the performance of a Web server. We specifically compare policies like GDSF, GDSF#, and IPGDSF# with the proposed integrated policy Pre-IPGDSF#. Using trace-driven simulations and for various standard cost criteria (hit rate and byte hit rate), we show that our proposed integrated policy outperforms all other algorithms under consideration.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Configuring GRE Over IPSEC VPN With Certificate Authority Using GNS3
There are many protocols which are used to secure the data transfer between the computing devices in a network. Increase in the use of internet is also increase the demand of security and privacy in a communication and communication channels. To secure the networks there are some protocols which will be used for encryption and authentication for all IP packets of a session. In this research paper will include the advantages and all possible solutions of some techniques which are used to increased security of the network like scalability and data confidentiality. This paper analysis of two most widely used tunneling protocols in secured transmission of data the GRE (Generic Routing Encapsulation) and also the IPSEC (IP Security) established the comparison between them and evaluate the capabilities for security or privacy of the web internet network and for increasing and adding more security and privacy we are going to also contain and used CA (Certificate Authority) for increasing the network security. We use GNS3 (Graphical Network Simulator 3) for traffic analyses
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]