This paper presents a survey report of hydro power plant in India. There are various renewable energy resources like sun, wind, water, ocean, tidal etc. Among all the source, hydro plant are emerging in the developing In...
Basic aim of a biometric system is automatically discriminate between subjects as well as protect data. It also protects resources access from unauthorized users. We develop a biometric identification system that r...
Maintaining power system security is one of the challenging tasks for the power system engineers. The security assessment is an essential task as it gives the knowledge about the system state in the event of a contingenc...
The study mainly focuses to investigate the thermal response of defects such as delaminations and disbonds, and develop mathematical models using numerical results to obtain the optimum heat requirement and time to...
Cloud computing has been envisioned as the next-generation architecture of IT Enterprise. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a sha...
Potential of Hydro Power Plant in India and its Impact on Environment
This paper presents a survey report of hydro power plant in India. There are various renewable energy resources like sun, wind, water, ocean, tidal etc. Among all the source, hydro plant are emerging in the developing In...
A Multimodal Biometric Recognition System based on Fusion of Palmprint and Fingerprint
Basic aim of a biometric system is automatically discriminate between subjects as well as protect data. It also protects resources access from unauthorized users. We develop a biometric identification system that r...
Contingency Ranking and Analysis Using Mipower
Maintaining power system security is one of the challenging tasks for the power system engineers. The security assessment is an essential task as it gives the knowledge about the system state in the event of a contingenc...
Numerical Analysis of Defects in FML using Through-Transmission Mode of Active Thermography
The study mainly focuses to investigate the thermal response of defects such as delaminations and disbonds, and develop mathematical models using numerical results to obtain the optimum heat requirement and time to...
Public Auditing and Data Dynamics for Storage Security in Cloud Computing
Cloud computing has been envisioned as the next-generation architecture of IT Enterprise. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a sha...