Around 4% of world oil and gas production, a non- renewable resource is used as feedstock for plastics and further 3 to 4% is expended to provide energy for their manufactures. A major portion of plastic produced each year is used to make disposable items of packaging or other short lived products that are discarded within a year of manufacture . These two observations alone indicate that our current use of plastics is not sustainable. As a result; these research works will investigate mechanical properties of recycled high density polyethylene (HDPE) that are generated from BruhTesfa Irrigation and Water Technology PLC with some proportion of virgin HDPE; in order to use it again and minimize foreign expense.
13 Read more
Abstract—Polyurethane matrix were modified with microcapsules which enable it to become a self healing material. The paper studies the effects of different catalyst which could act as cheap substitutes in self-healing technology. Transition metal compounds with excellent predetermined catalytic properties like Chromium trichloride and manganese chloride are chosen for the study instead of Grubb’s catalyst, which is a ruthenium chloride, transition metal complex for the crosslinking of liquid resin after crack formation. A much simpler version of catalyst was tried in the work to study the healing characteristics. Manganese has diagonal similarity with ruthenium from the periodic table location, hence selected. Urea-formaldehyde microcapsules were prepared using in-situ polymerization technique, and embedded into the polymer matrix, such that the mixture is about 10 weight percentage of the entire polymer matrix. Characterization tests like optical microscopy, SEM and FTIR are done to analyze the matrix for the incorporation. These tests show the presence of the microcapsules containing the self-healing agent. The amount of healing agent present in the microcapsules, the composition of the microcapsules and the structure of the microcapsules is also determined using the above mentioned tests.
4)Wisdom: The comprehensible understanding and insight of the data gained by the knowledge can be then modified into intelligence with background knowledge to utilize the full capacity of IoT and create end-to-end solutions. Wisdom for IoT technology would refer to its capability to remember and analyze what is information and how to use it always, it signifies the device‟s capability to remember and update its functioning and tackle any situation with intelligence.
High data rate and strong reliability in wireless communication systems are becoming the dominant factors for a successful exploitation of commercial networks. MIMO-OFDM, a new wireless broadband technology, has gained great popularity for its capability of high rate transmission and its robustness against multipath fading and other channel impairments. In an OFDM framework, the transmitter modulates the message bit stream into PSK/QAM images, performs IFFT on the images to change over them into time area signals, and sends them out through a wireless channel. The received signal is generally contorted by the channel qualities. In order to recover the transmitted bits, the channel effect must be estimated and compensated in the receiver.
Abstract: It is the era of paperless money, and 24X7 processing by the help of internet and information technology. The money transfer and its gross settlement is possible in just few seconds. The internet technologies have been used and new concepts based on previous experiences are now coming into research and discussion. The lot of research paper for wallet creation and internal process are available. Specially, wallet process through different approaches like BC Wallet, RBI Wallet, Domestic Pay Service Wallet are main consideration in this research work.The transaction process faces many issues, these issues affect the issuer, bank,customerin terms of lossing business. At the same time customer is also not satisfy and unable to do complete wallet process. The main objective of this research is to solve the problem during the wallet transaction between issuer system to banking system. The involvement of NPCI(National Payment Corporation of India) system result the proper response to the issuer system and customer as well. So the successful transaction is achieved through a scheduling mechanism, which is an intelligent approach to solve problem in critical time and give customer satisfaction. The results are calculated on real life example and presented which shows the impact of intelligent approach.
This paper displays the historic timelines of development of speech synthesis model in initial hundred years. It takes us through the journey of a century – from human imagination to becoming a reality ultimately. Various digital models were thereafter developed like Pulse Code Modulation, Differential Pulse Code Modulation, different Vocoders, Residual Excited Linear Predictor coder and Analysis-by-Synthesis coders like Code Excited Linear Predictor. These become the stepping stone for development of Adaptive Multi Rate codec for 2G/3G and Enhanced Voice Service codec for 4G technology. This field still has immense potential for improvement and development.
11 Read more
Xiaomi was founded in 2010 by serial entrepreneur Lei Jun, who believes that high-quality technology doesn't need to cost a fortune. We create remarkable hardware, software, and internet services for and with the help of our Mi fans. We incorporate their feedback into our product range, which currently includes the Mi Note Pro, Mi Note, Mi 4, Redmi 2, Mi TV, Mi Band and other accessories. With more than 61 million handsets sold in 2014, and products launched in Taiwan, Hong Kong, Singapore, Malaysia, Philippines, India, Indonesia and Brazil, Xiaomi is expanding its footprint across the world to become a global brand. "Just for fans" – that's our belief. Our hardcore Mi fans lead every step of the way. In fact, many Xiaomi employees were first Mi fans before joining the team. As a team, we share the same relentless pursuit of perfection, constantly refining and enhancing our products to create the best user experience possible. We are also fearless in testing new ideas and pushing our own boundaries. Our dedication and belief in innovation, together with the support of Mi fans, are the driving forces behind our unique Mi products.
In this paper, drone detection system is very viable to detect small drones or unmanned aerial vehicle (UAV) or unmanned combat aerial vehicle (UCAV) which cannot be reasonably detected by radar which restricted to detect civil aircrafts, fighter airplanes, etc. as effective cross section (ECS) of drones are very less as compared to normal transport or military aircrafts. This paper describes different system comprises powerful 3D 360 degrees tracking antenna, jammer, command centre, spectrum analyser & intelligent software suit which gives capability to detect all drone types even micro & mini drones from long distance and also one can view the intruder drone type along with its position. The system described here can control the intruder drone if possess threat & can disable communication between intruder pilot & its controlling drone by using jammer which is connected to command centre constituting control software suit thereby commanding which sector to jam for intruder drone & then jamming particular sector only to catch or mitigate the problems of enemy’s drone threat which can become a severe problem for someone if that drone carries ordnance materials to destroy someone’s targeted field and can perform surveillance & reconnaissance activities which can reveals all important data with respect to international borders or restricted political locations like parliament or government councils, courts, etc. None of the drone from any part of the world can make this system fool (even if it uses frequency hopping technology) and get rid of this detection system till now. Most importantly this whole setup of system is absolutely portable or vehicle mounted.
As CMOS technology continues to scale, both supply voltage and device threshold voltage must scale down together to achieve the required performance. Lowering the supply voltage effectively reduces dynamic energy consumption but is accompanied by a dramatic increase in leakage energy due to the lower device threshold voltage needed to maintain performance. As a result, for low-energy applications, the leakage energy that the system can tolerate ultimately limits the minimum device threshold voltage. Speed therefore, beneﬁts little from technology scaling. The continued scaling of transistor feature sizes leads to an increase in integration density, which brings about a corresponding increase in compute density.
Detection of chemical and biological agents by e-noses is a possibility that may present a method for detecting WMDs (weapons of mass destruction). “According to a prominent US intelligence chief, terrorist use of chemical weapons is the most serious threat facing the United States. With the passage of the Homeland Security Act of 2002, there is a keen interest in identifying new technologies to protect the USA against all types of terrorist attack, including chemical warfare” (IBM 2003). Current applications have focused on the early detection of chemical warfare agents and explosives (ND Engineering 2004).
[Some memoirs-data are possible to be (pre)viewed at “On the International Consortium ‗Generosity_Creativity_Solidarity‘‖. It is a study pointing on this International Consortium during more than 10 years of (re)searching for original and more efficient forms of the representation, solving global societal problems - including the „complex decision making ‟ , functionally (re)adapting, and structurally (re)structuring the middle and large scale entities [i.e. systems (synergic, non-entropic, ephemeral dynamically featured entities), non/a/meta-systems (entities within their failure of at least one of the synergic, non-entropic, ephemeral dynamically features) and/or other types of Rational Subject‘s aggregates within and beyond our (non-)observable and (non-)theoretized objective/subjective world] (self- )generating and/or containing complex global societal problems – aiming to the transit to a (still possible) CONSCIOUSNESS SOCIETY].
27 Read more
 Xia, X., & Rekab, K. (2019, July). Second-Order Efficiency of Bayes Risk for Estimating Reliability of k Components Series Systems. International Journal of Emerging Technology and Advanced Engineering, 9(7), 22-27.
 Bolme, D. S., & Strout, M. (2007). FacePerf: Benchmarks for Face Recognition Algorithms. 10th International Symposium on Workload Characterization (pp. 2-7). Boston, MA, USA: IEEE.  Sakarkaya, Mutlu, Fahrettin Yanbol, and Zeyneb Kurt. "Comparison
As the provision of the Internet services has become more sophisticated, the complexity of the Internet protocols has increased. Changes to the Internet can be a major undertaking and have a big impact for all the millions of users connected to the network around the world. Thus, new protocols to be added to the architecture must supplement it but not replace it. In order to achieve this goal, the new protocols may have to be more complex. Therefore, protocol engineering techniques may be required to design high-quality protocols. The service specification describes the service that is provided to the user. The aim of this paper is to propose a service specification by performing service abstraction. The abstraction consists in taking the protocol specification and identifying the service required RSVP will be modeled using CPNs. CPNs allow the creation of models at different levels of abstraction. Thus, the aim of this paper is to model RSVP at a level of abstraction that captures the functional properties which need to be proved and allows analysis tools to be used, given the limitations on computer resources and the complexity of the protocol. RSVP can operate on either unicast or multicast networks. However, only a unicast network is considered. Also, the network includes a sender and a receiver host and a router, which connects them as shown in Figure 1.