Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (5)
DIFFERENTIAL DRIVE ROBOTIC ROVER
no vote
A robot obstacle detection system comprising: A Robot housing which navigates with respect to a surface; a sensor subsystem having a defined relationship with respect to the housing and aimed at the surface for detecting the surface. The sensor subsystem including: An optical emitter which emits a directed beam having a defined field of emission, and a photon detector having a defined field of view which intersects the field of emission of the emitter at a finite region; and a circuit in communication with the detector for redirecting the robot when the surface does not occupy the region to avoid obstacles.  
guru111246
2016-08-23
0
1
DIGITAL PARKING SYSTEM
no vote
This project aims to design a three tier parking system. The project will keep  track of the duration for which cars are parked. The lowest tier will have those cars parked for short interval (few mins).The middle tier will contain cars which will remain for 1-3 hrs. Cars which will remain in the lot for more than 3hrs will be in upper  tier. It is based on the technology which takes a pictu
guru111246
2016-08-23
0
1
the PEMFC and SOFC Models
no vote
The SOFC model has 9 inputs and two main outputs, as listed in table a.1.
guru111246
2016-08-23
1
1
Digital Invisible Ink Data Hiding Based on Spread-
no vote
A novel data-hiding methodology, denoted as digital invisible ink (DII), is proposed to implement secure steganography systems. Like the real-world invisible ink, secret messages will be correctly revealed only after the marked works undergo certain prenegotiated manipulations, such as lossy compression and processing. Different from conventional data-hiding schemes where content processing or compression operations are undesirable, distortions caused by prenegotiated manipulations in DII-based schemes are indispensable steps for revealing genuine secrets. The proposed scheme is carried out based on two important data-hiding schemes: spread-spectrum watermarking and frequency- domain quantization watermarking. In some application scenarios, the DII-based steganography system can provide plausible deniability and enhance the secrecy by taking cover with other
guru111246
2016-08-23
0
1
Simulation of Doubly-Fed Induction Generator in a
4.0
In order to meet power needs, taking into  account economical and environmental factors, wind  energy conversion is gradually gaining interests as a suitable source of renewable energy. In a country like  mine where there is not a single kW installed wind  energy, the question is, How to simulate and explore the transients of these variable speed devices? This  paper deals with simulation of a Wind Turbine based  on a doubly-fed induction machine used in generating mode to produce electrical energy on a 
guru111246
2016-08-23
1
1
No more~