• No results found

18 results with keyword: 'pi semiactive control using mr dampers'

PI semiactive control using MR dampers

The proportional and integral gains of the controller are calculated so that the controller guarantees stability, minimization of the closed loop response and robustness

Protected

N/A

18
0
0
2021
E GAS SEVA USING SMARTPHONE

ONLINE BANKING AUTHENTICATION USING MOBILE PHONES was developed by X.Fang and J.Zhan and was published at Future Information Technology, 5 th Conference on 21- 23

Protected

N/A

11
0
0
2020
Trends in High Performance Operation of Electro Absorption Integrated Laser Modulators in Advanced Optical Switching Transmission Networks

(6, 7) have demonstrated that modulator output power increases with increasing both operating optical signal wavelength and applied bias voltage while decreasing

Protected

N/A

7
0
0
2020
Web Application for Disease Awareness Region Wise in the Scope of Health Analysis Development

Awareness Region Wise in the scope of Health Analysis Development ” is based?. on analyzing the health records of

Protected

N/A

8
0
0
2020
Web usage mining: Review on preprocessing of web log file

In order to discover usage patterns from the available data, it is necessary to perform: Pre processing, Pattern Discovery, and Pattern Analysis.. Web servers record and

Protected

N/A

5
0
0
2020
Web usage mining: Review on preprocessing of web log file

In order to discover usage patterns from the available data, it is necessary to perform: Pre processing, Pattern Discovery, and Pattern Analysis.. Web servers record and

Protected

N/A

5
0
0
2021
FRACTAL IMAGE COMPRESSION:   the new saga of compression

Step 6: Again block processing of the transformed image done, using the compression method so that high compression is achieved.. The results thus obtained are

Protected

N/A

10
0
0
2020
Studying the Effect of Some Variables on the economic Growth Using Latent Roots Method

is a multicollinearity detection method, if the value of one of the latent values is equal to zero this indicates the presence of complete multicollinearity which indicates

Protected

N/A

10
0
0
2020
Development of Human Tracking ,Control and Obstacle Avoiding Marathoner Bot

Obstacle avoiding algorithm for a Bot that moves at a human running speed should consider the motion of the Bot and the objects in the environment [19],[20] .Therefore,

Protected

N/A

6
0
0
2020
Effect of Feature Reduction in Sentiment analysis of online reviews

So, our focus in this work is to make an intensive study of the effectiveness of reduced features using Principal Component Analysis (PCA) for sentiment

Protected

N/A

8
0
0
2020
Data security on Android OS Against Malware

In traditional desktop and server environments, many processes often share the same group or even user ID (namely the user ID of the user who started a pro-gram). As a

Protected

N/A

5
0
0
2020
A Survey on Frequent Web Page Mining with Improving Data Quality of Log Cleane

employer which makes it difficult to find the “right” or “interesting” information [1]. Web Log are generally noisy and ambiguous. Web applications are increasing at

Protected

N/A

5
0
0
2020
JOINT SOURCE CHANNEL CODING WITH SPACE TIME TRELLIS CODE MODULATION

We estimate source coding , channel coding performance over wireless channels using Huffman code as a source code and space time trellis code as a channel code.. Huffman

Protected

N/A

5
0
0
2020
Application of Web Service for Large file transfer

Many different techniques are used for sending binary files as an attachment to SOAP messages.The W3C recommendation MTOM(Message Transmission Optimization

Protected

N/A

6
0
0
2020
Audio based Classification of Video Genre Using Multivariate Adaptive Regression Splines

The MFCC, zero crossing rate, short time energy, spectral flux, spectral centroid, spectral rolloff, noise frame ratio and silence ratio are used as the base audio

Protected

N/A

5
0
0
2020
SURVEY PAPER ON BRAIN TUMOR SEGMENTATION TECHNIQUES

After performing a survey on different Segmentation techniques we have come to a conclusion that K-means clustering and SVM, Cellular Automata based Fuzzy C- means,

Protected

N/A

9
0
0
2020
A WEIGHT BASED APPROACH TO EXTRACT TOP K LIST FROM THE WEB

This links are unfiltered links, meaning that they may contain the relevant answers and also there exists a possibility of having false positives. The Title

Protected

N/A

6
0
0
2020
Performance Comparison of alCNRZ and nCRZ Modulation Format for WDM/DWDM System

comparing the results from the previous model of alCNRZ and nCRZ modulation format, it can be concluded that the signal strength can increase as well as improve if higher

Protected

N/A

7
0
0
2020

Upload more documents and download any material studies right away!