SEARCH

Found 2744 related files. Current in page 1

diagrama de sensor de oxigeno corsa 2007

Enhance Sensor Data Fusion Based on Time Slot Voting  Mechanism

A Virtual Sensor estimates product objective or process conditions using mathematical models rather than and sometimes in conjunction with physical sensors. These mathematical models use other physical sensor readings to calculate the estimated property or condition. Virtual sensor may provide flexibility, cost effective solutions, promote diversity, ensure security and increase manageability.

Improving the Performance of Energy Attack Detection  in Wireless Sensor Networks by Secure forward

Wireless ad-hoc sensor networks and routing data in them is a significant research area. The objective of this paper is to examine resource depletion attacks at the routing protocol layer, which attempts to permanently disable network nodes by quickly draining their battery power. This type of attack is called as vampire attack. Vampire attacks are very difficult to detect because they attack the node only by sending protocol-compliant messages.

Integrated Pest Control of the Eggfruit and Shoot Borer  Leucinodes Orbonalis Guenee on the Garden E

Indiscriminate use of insecticides in the control of the EFSB and other vegetables makes it expedient to seek for safe and eco-friendly measures. In two separate experiments, the first compared the effect of integrating nylon net barrier with weekly cutting of infested shoot, and the other the effect of integrating use of nylon net barrier, weekly clipping of infested shoot with application of 150ltrs/ha of Karate® 5EC. Treatments were arranged in a Randomized complete block design with three replicates each. Integrating nylon net and weekly cutting of infested shoots significantly reduced EFSB infestation by 27.61% in 2006 and 7.87% in 2007 compared to the control. Single application of Karate ® 5EC at 150lts/ha at four weeks interval gave comparatively the same control as more frequent applications.

Awareness in Physiotherapy among High School Students

The demand to the physiotherapy continues to increase, due to the increasing of aging population. The University Grant Commission (UGC) has started degree program in physiotherapy to address this demand in 2007, by providing high school level science students to enter this program based on the grade achieved from the advanced level exam. The aim of this study was to assess the level of awareness about physiotherapy among advanced level science students in the Kandy educational zone and to assess the sources form which they could obtain information regarding physiotherapy.

Benefits of Automated Soldering Machine for Small scale Manufacturing Business

LEISTO is an Industrial and Trading integrated company located in China, founded in 2007. We manufacture soldering tips and trade electronic tools to the factories around the world.We provide not only goods, but also service; we are more than happy to help you to resolve problems within our ability. Contact our sales representative or service representative for help.

Acute Respiratory Infection among Children and Health  Seeking Behaviour in India

The paper an attempt has been made to analysis the status of acute respiratory tract infection among children in india. The efforts has been also made to analyze the influence of socioeconomic status of parent where children suffereing from acute respiratory infection. Data has been extracted from National Family Health Survey (2005-06) and District Level Health Survey (2007-8). Cross tabulation and binary logistic regression techniques have been computed to fulfill the requirement of the objectives of the present paper with the help SPSS software. In addition, thematic mapping has been also done with the help of Arc GIS technique. The study reveals that wealth index is a significant factor and it has a positive impact on the treatment seeking behavior of parents. But less educated mother is not significant. In addition, religion, caste and tribes are also significant factors. Sex of child and age of the mother is also important factors to determine health treatment.

Event Identification for Wireless Sensor Network

Wireless sensor networks consist of sensor nodes with radio, processor, memory, battery and sensor hardware. With widespread deployment of these devices one can precisely monitor the environment. Sensor nodes are resource constrained in terms of radio range, processor speed, memory and power. WSNs are mostly unguarded and the wireless medium is broadcast. This makes them more vulnerable to attacks. Without proper security measures, an enemy can launch various kinds of attacks in hostile environments. These attacks can disrupt the normal working of WSNs and can defeat the purpose of their deployment. Therefore security is an important aspect of these networks. WSNs are often deployed to monitor important emergency events, such as forest fire and battlefield monitoring. System Monitoring Modules (SMM) should be integrated with Intrusion Detection Modules (IDM).

American Sign Language Detection
by ijsrporg 0 Comments favorite 13 Viewed Download 0 Times

Sign language: a natural, linguistically complete and a primary medium for the humans to interact. Nowadays, this language is prevalent amongst the deaf, dumb or blind individuals. However, with the conventional sign language not known to the signers, it adversely affects their interpersonal relationships in the society. There is a need of much more sophisticated method than communication through interpreters or writing. Our aim is to design a system in which sensor glove is used to capture the signs of the American Sign Language (ASL) and translate them to English displayed on a LCD.

Clustering Based Routing Protocols for Wireless Sensor  Networks: A Survey

Due to the wide range of application of Wireless Sensor Networks (WSN)[1] the past few years have witnessed the potential use of it and also become a hot research area now a days. One the main degradation of WSN is that sensor nodes are battery powered and deployed in harsh environment so it is not possible to recharge or replace the batteries all the time the node fails or dead. WSN are used in various applications like environment monitoring, health care, military, industrial control units and in various other environments. Routing protocols developed for various other adhoc networks such as MANET, VANET etc can’t apply directly in WSN due to energy constrains of nodes. It is proved that sensor nodes require much energy to transmit data rather than sensing thus routing protocol developed for WSN should be efficient so that the network lifetime can be prolonged. In this paper, a survey on various Clustering routing protocols has been done indicating their merits

2006 VW Caddy 1.9 L TDI Engine Oil & Filter Change Procedure

VW Caddy Type 2KN Engine Oil & Filter Change Procedure. September 24, 2007 . 1. VW Caddy Type 2KN with. 1.9 L TDI Engine & DSG. Engine Oil & Filter ...

« previous  123456789