SEARCH

Found 3608 related files. Current in page 1

sample reaction paper apa format

Grid Optimization & Smart Module White Paper

This document contains valuable trade secrets and confidential information belonging to iWire365, LLC. and its suppliers. The aforementioned shall not be disclosed to any person, organization, or entity, unless such disclosure is subject to the provisions of a written non-disclosure and proprietary rights agreement, or intellectual property license agreement, approved by iWire365, LLC. The distribution of this document does not grant any license or rights, in whole or in part, to its content, the product(s), the technology(ies), or intellectual property, described herein.

Festival City Retail Mall Noida Expressway

Features of Festival City Noida: • Strategically located at main exit on Noida Expressway, sector-143 B • Ground+ 2 Format with 1500 Shops • Located closer to proposed metro station & FNG Expressway • Walking Distance from Ultra Premium Residential Community • 6 major Golf Courses in the vicinity • Around 20-25 Big Corporate Houses in the immediate locality • Adjoining 25 lacs sq. ft. of office spec spread over 25 floors with over 45,000 works • Over 150 large multinational offices operational within 15 minute drive-time • Between 20-25 large corporate houses in the immediate vicinity • Retail Shops placement across different courts Just across the road from JP Wish Town a 1200 acres township with over 25,000 families.

Review on Cluster-head Election Mechanisms for  Clustering Based Routing in Mobile Ad-hoc Network

Wireless Ad hoc network is a set of wireless devices which move randomly and communicate with other node via radio signal. Ad-hoc networks may be logically represented as a set of clusters by grouping together nodes on the basis of different criteria such as 1-hop and k-hop that are in close boundary with one another. Clusters are formed by diffusing node identities along the wireless links. Different heuristics employ different policies to elect cluster heads. Several of these policies are biased in favour of some nodes. As a result, these nodes should greater responsibility and may deplete their energy faster, causing them to drop out of the network. Therefore, there is a need for load-balancing among cluster-heads to allow all nodes the opportunity to serve as a cluster-head. In this paper, different cluster head election mechanism are discussed in the one hop clustering approach.

Design and Development of Seat Belt Alert System with  Ignition Interlocking in Four Wheeler

This paper clearly explains about the safety and control systems in the car . Most of the accidents are occurred because of violation of rules . Result of this major accidents happened .In our day-to-day life we are careless in our safety while driving in vehicles for this we have to introduce some techniques to do these precautions compulsory . Such a new technique is explained in this paper.While driving car wearing seat belt is important that can safe our life during accident periods .But most of us are careless to wear seatbelt .

Ky Fan’s Best Approximation Theorem in Hilbert space

The aim of this paper is to prove a fixed point theorem using semicontractive mapping a well-known result of Ky Fan in Hilbert space.

Designing and developing a model for converting image  formats using Java API for comparative study

Image is one of the most important techniques to represent data very efficiently and effectively utilized since ancient times. But to represent data in image format has number of problems. One of the major issues among all these problems is size of image. The size of image varies from equipment to equipment i.e. change in the camera and lens puts tremendous effect on the size of image.

An Effective Algorithm for XML Tree Pattern MatchingA Holistic Approach

XML is a self-describing data representation format with a flexible structure. Since hundreds of XML-based languages have been developed, XML is widely accepted as a standard for data representation and information exchange over the internet. The major advantage of using XML is that it allows the users to create their own tags.

A Case Study on Analysis of Face Recognition Techniques

This paper aims to propose a methodology for face recognition using artificial neural networks in dynamic background. The dynamic background is chosen for comparing the important information sequences, characteristic. This paper analysis four different techniques using artificial neural networks for face recognition.

This  paper  present  a  system  which  can  efficiently  detect  fire after  the  image  of the  ar

A Research Design is the arrangement of conditions for collection and analysis of data in a manner that aims to combine relevance to the research purpose with economy procedure. Research Design is needed because it facilitates the smooth sailing of the various research operations. Tools for data collection method, to give the result and testing hypothesis, my paper deals with the steps involve in Research Design, Need of Research Design, and Characteristic of Research Design, Features of Research Design, and the tools and techniques of data collection method. Report writing is a presentation of facts and findings. After collecting and analyzing the data, the researcher has to accomplish the task drawing Interference followed by report writing. This has do very carefully, otherwise misleading conclusion may be drown and the whole purpose of doing research may be violated. In this paper I had clearly sketch the outline of report writing from title to end page and also

Smoke and Fire Detection
by ijsrporg 0 Comments favorite 12 Viewed Download 0 Times

This paper present a system which can efficiently detect fire after the image of the area has been captured by a camera. Fire has destructive properties which cannot be tolerated in any work areas. Fire is the rapid oxidation of a material in the exothermic chemical process of combustion, releasing heat and light. The light parameter and color of flame helps in detecting fire. The system first detects smoke and then fire. When smoke is present in the area it displays a message on the Security terminal. When a fire breaks in the area under consideration, the corresponding fire region in the input video frame will be segmented which covers the fire. If the area of the flame increases in the subsequent frames then an alarm is sounded.

« previous  123456789