Power engineering, also called power systems engineering, is a subfield of energy engineering that deals with the generation, transmission and distribution of electric power as well as the electrical devices connected to such systems including generators, motors and transformers. Although much of the field is concerned with the problems of three-phase AC power - the standard for large-scale power transmission and distribution across the modern world - a significant fraction of the field is concerned with the conversion between AC and DC power as well as the development of specialized power systems such as those used in aircraft or for electric railway networks. It was a subfield of electrical engineering before the emergence of energy engineering.
- Page(s): 01-03
- Date of Publication: 30 November 2012
- Manju DhakaVictoria University Melbourne, Australia.
References
[1]. "Pioneers in Electricity and Magnetism: William Gilbert". National High Magnetic Field Laboratory. Retrieved 2008-05-25. [2]. "The History Of The Light Bulb". Net Guides Publishing, Inc.. 2004. Retrieved 2007-05-02. [3]. Greenslade, Thomas. "The Voltaic Pile". Kenyon College. Retrieved 2008-03-31. [4]. "Faraday Page". The Royal Institute. Retrieved 2008-03-31. [5]. "Godalming Power Station". Engineering Timelines. Retrieved 2009-05-03. [6]. Williams, Jasmin (2007-11-30). "Edison Lights The City". New York Post. Retrieved 2008-03-31. [7]. Grant, Casey. "The Birth of NFPA". National Fire Protection Association. Retrieved 2008-03-31. [8]. "Bulk Electricity Grid Beginnings" (Press release). New York Independent System Operator. Retrieved 2008-05-25.
Manju Dhaka "Power Engineering" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.1 issue 9, pp.01-03 2012
Power system protection is the process of making the production, transmission, and consumption of electrical energy as safe as possible from the effects of failures and events that place the power system at risk. It is cost prohibitive to make power systems 100 percent safe or 100 percent reliable. Risk assessments are necessary for determining acceptable levels of danger from injury or cost resulting from damage. Protective relays are electronic or electromechanical devices that are designed to protect equipment and limit injury caused by electrical failures. Unless otherwise noted, the generic term relay will be synonymous with the term protective relay throughout this text. Relays are only one part of power system protection, because protection must be designed into all aspects of power system facilities. Protective relays cannot prevent faults; they can only limit the damage caused by faults. A fault is any condition that causes abnormal operation for the power system or equipment serving the power system. Faults include but are not limited to: short- or low-impedance circuits, open circuits, power swings, over voltages, elevated temperature, off-nominal frequency operation, and failure to operate. Power system protection must determine from measurements of currents and/or voltages whether the power system is operating correctly. Three elements are critical for protective relays to be effective: measurements, data processing, and control.. This example system contains a single source that is connected to bus S through a step-up transformer, two transmission lines that connect bus S to bus R, and a load that is connected to bus R through a step-down transformer.
- Page(s): 04-06
- Date of Publication: 30 November 2012
- Pankaj DanodiaVisvesvaraya National Institute of Technology Nagpur (NIT) ,India
- Dayavanti SisodiaVisvesvaraya National Institute of Technology Nagpur (NIT) ,India
References
[1]. Mason, C. Russell. "The Art and Science of Protective Relaying". General Electric. Retrieved 2009-01-26. [2]. "Coordinated Power Systems Protection". Army Corps of Engineers. 1991-02-25. Archived from the original on 2008-01-13. Retrieved 2009-01-26. [3]. "How Do Protection Relays Work?". Littelfuse. Retrieved 2011-12-31. [4]. "What is SCADA?". Rose India Technologies. Retrieved 2011-12-31. [5]. "Introduction to Practical Power System Protection". University of Idaho. Retrieved 2011-12-31.
Pankaj Danodia, Dayavanti Sisodia "Power System Protection" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.1 issue 9, pp.04-06 2012
In this report, an overview of video summarization has been presented. Video summarization as the name implies generates the video summary. A video summary can be generated both manually and automatically, but due to the huge volumes of video data and limited manpower, it’s getting more and more important to develop fully automated video analysis. According to proposed method multiple features, obtained from video frames, are combined to describe the frame difference between consecutive frames. It is observed that certain frame difference features have more influence in generating a representative frame difference measure. Moreover, some features are more relevant than others in different video genres. We used three different low level features color histogram, correlation and edge orientation histogram and generate feature vector. Fuzzy C-means and K-means have been effectively used to generate meaningful, enjoyable video summary using generated feature vector.
- Page(s): 07-14
- Date of Publication: 30 November 2012
- Gautam Patel
- Bijal Joshi
References
[1]. Jung Hwah Oh, Quan Wen, Sae Hwang, Jeongkyu Lee, “Video Abstraction”. Video Abstraction, 14, pp. 321-343, 2005. [2]. Li Y, Zhang T, Tretter D, “An overview of video abstraction techniques”. Proceedings of Tech. Rep., HP-2001-191, HP Laboratory, 2000. [3]. Naveed Ejaz and Sung Wook Baik,” Weighting low level frame difference features for key frame extraction using Fuzzy Comprehensive Evaluation and indirect feedback relevance mechanism”, Proceedings of IJPS., vol.6(14) , pp. 3377-3388,July-2011. [4]. Ngo, C.W., Pong, T.C., & Zhang, H.J., “On clustering and retrieval of video shots”, Proceedings of ACM Multimedia, Ottawa, Canada, vol. 1, pp. 51-60, October-2001. [5]. Girgensohn, A., & Boreczky, J.,“Time-constrained key frame selection technique”, Multimedia Tools and Applications, vol. 11(3), pp. 347-358, 2000. [6]. Hanjalic, A., & Zhang, H., “An integrated scheme for automated video abstraction based on unsupervised cluster-validity analysis”. IEEE Transaction on Circuit and Systems for Video Technology, vol. 9(8), pp. 1280-1289, 1999. [7]. Dufaux, F.,”Key frame selection to represent a video”. Proceedings of IEEE 2000 International Conference on Image Processing, vol. 1, pp. 275-278, 2000. [8]. Wolf, W.,” Key frame selection by motion analysis”. Proceedings of IEEE International. Conference on Acoustics, Speech, and Signal Processing, pp. 1228-1231, 1996. [9]. Fatih Poriliki “Multi-Camera Surveillance: Object-Based Summarization Approach” Proc. of Mitsubishi Electrical Research Laboratory, 201 Broadway, Cambridge, Massachusetts 02139, 2004. [10]. Gunsel B, Tekalp AM, “Content-based video abstraction”. Proceedings of IEEE International Conference of Image Processing, Chicago, USA, pp. 128–132, 1998. [11]. DeMenthon, D., Kobla, V., & Doermann, D., “Video summarization by curve simplification”. Proceedings of ACM Multimedia, vol. 3 pp. 211-218, 1998. [12]. Ramer, U. “An iterative procedure for the polygonal approximation of plane curves”. Computer Graphics and Image Processing, vol. 1, pp. 244-256, 1972. [13]. Ciocca G, Schettini R., “Innovative Algorithm for Key Frame Extraction in Video Summarization”. J. Real Time Image Process, vol. 1(1), pp. 69-88, 2006. [14]. Dim P. Papadopoulos, Savvas A. Chatzichristofis, and Nikos Papamarkos,” Video Summarization Using a Self-Growing and Self-Organized Neural Gas Network”. Proc of Springer-Verlag Berlin Heidelberg, Vol.1 (2), pp.216-226, 2011. [15]. Tomy Chheng “Video Summarization using Clustering”, Proc. of journal of information and Data Management, Vol. 1(2), Pages 293-304, June 2010. [16]. Chen, Tsung, Lee, “Object and color based video Representation for Automated model Free News summarization”. Proc. IEEE International Conference on Multimedia and Expo, vol. 3, pp. 209-218, 2003. [17]. Dian, Yi-ping, Binh Pham, “Sports video summarization using Highlights and play breaks”. Proc. of MIR, vol. 30(4), pp. 643-658, 2003. [18]. Bezdec, J.C.,” Pattern Recognition with Fuzzy Objective Function Algorithms”, Proc of Plenum Press, New York, 1981. [19]. Silvia Corchs, Gianluigi Ciocca, Raimondo Schettini.,” Video Summarization using a Neurodynamical Model of Visual Attention”, Proceedings of IEEE 2004 International Conference on Image Processing, vol. 1, pp. 305-309., 2004. [20]. Ajay Divakaran, Kadir A. Peker,, Huifang Sun,” Video Summarization Using Motion Descriptor”. Proc. of Mitsubishi Electrical Research Laboratory,Murry Hill,NJ07974,USA pp. 1-6, 2004.
Gautam Patel, Bijal Joshi "Video Summarization Using Low Level Features" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.1 issue 9, pp.07-14 2012
Wireless grids, a new type of resource-sharing network, connect sensors, mobile phones, and other edge devices with each other and with wired grids. Ad hoc distributed resource sharing allows these devices to offer new resources and locations of use for grid computing. This article places wireless grids in context, explains their basic requirements, and provides an example implementation that uses a wireless grid for distributed audio recording. Finally, it introduces articles in this special issue on wireless grid architectures and applications. Wireless grids emerged from a combination of the proliferation of new spectrum market business models, innovative technologies deployed in diverse wireless networks, and three related computing paradigms: grid computing, P2P computing, and Web services. Wired grids are typically aggregations of fixed resources between known institutions, be they academic or corporate, in high-trust and relatively static environments.
- Page(s): 15-20
- Date of Publication: 30 November 2012
- Nitin Padriya
- Hardik Patel
- Nitin Pandya
[1].Sanjay P. Ahuja, Jack R. Myers,” A Survey on Wireless Grid Computing”, The Journal of Supercomputing, 37, 321, 2006 [2].Heba Kurdi, Maozhen Li, and Hamed Al-Raweshidy, ”A Classification of Emerging and Traditional Grid Systems”, IEEE Distributed Systems Online, vol. 9, no. 3, 2008, art. no. 0803-3001 [3].J. yang, H, Chen, S. Hariri and M. Parashar, “Self-optimizing of large scale wild-fire simulations”, Proc. Of 5th intl. conference on Computational Sciences (ICCS 2005), Atlanta, GA, USA, Springer-Verlag, May 2005 [4].Manish Parashar,”Autonomic Grid Computing: Concepts, Infrastructure and Applications”, eScience 2007, IISc, Bangalore . [5].S. S. Manvi*, Member, IACSIT and M. N. Birje, “A Review on Wireless Grid Computing”, International Journal of Computer and Electrical Engineering, Vol. 2, No. 3, June, 20101793-8163 [6]. Attewell, J. (2005), “Mobile technologies and learning: A technology update and m-learning project summary”, Retrieved November 8, 2006 [7].Millard, D., Woukeu, A., Tao, F. B., & Davis,H. (2005),” Experiences with Writing Grid Clients for Mobile devices. In Proceedings of 1st International ELeGI Conference on Advanced Technology for Enhanced Learning BCS”, Electronic Workshops in Computing(eWiC), Vico Equense, (Napoli), Italy. [8].1HSIN-I CHANG, 2CHIH-YAO LO ,”Application of Grid based Mobile learning”, International Journal of Reviews in Computing, E-ISSN: 2076-3336 [9]. L.W. McKnight and J. Howison, ”Towards a Sharing Protocol for Wireless Grids”, Proc. Int‘l Conf. Computer Comm. and Control Technologies, Int‘l Inst. of Informatics and Systemics, Orlando, Fla., vol. 000648, 2003 [10].Lee W. McKnight and James Howison Syracuse University,Scott Bradner Harvard University,”Wireless Grids Distributed Resource Sharing by Mobile, Nomadic, and Fixed Devices”, Published by the IEEE Computer Society 1089-7801/04/, IEEE INTERNET COMPUTING JULY • AUGUST 2004 [11].S. S. Manvi*, Member, IACSIT and M. N. Birje, A Review on Wireless Grid Computing”, International Journal of Computer and Electrical Engineering, Vol. 2, No. 3, June, 2010 1793-8163 [12]. I. Foster, C. Kesselman, and S. Tuecke, “The Anatomy of the Grid: Enabling Scalable Virtual Organizations”, Proc. Euro-Par 2001 Parallel Processing, LCNS 2150, Springer-Verlag,2001, pp. 1–4 [13].S. Kurkovsky, Bhagyavati, and A. Ray,” A collaborative problem solving framework for mobile devices”. [14].Ling Huang, Minos Garofalakis,Joseph Hellerstein, Anthony Joseph, Nina Taft, “Toward Sophisticated Detection With Distributed Triggers”, SIGCOMM06 Workshops , Pisa, Italy, September 11-15, 2006 [15].Huang, L., Garofalakis, M., Joseph, A. and Taft, N., ”Communication efficient tracking of distributed triggers”, Tech. rep., February 2006 [16].W. Ye, J. Heidemann, and D. Estrin., “An energy efficient mac protocol for wireless sensor networks”, Proceedings of 21st International Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002) , pp. 1567-1576. New York, June 2002 [17].Joe Polastre, Jason Hill, and David Culler, “Versatile low power media access for Wireless sensor networks”, Proceedings of Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004) ,pp. 95-107, Baltimore, November 3-5, 2004 [18].D. C. Marinescuand Gabriela M. Marinescuand, Yongchang Ji, L.Boloni, and H. J. Siegel,”Ad hoc grids: Communication and computing in a power constrained environment”, Workshop on Energy-Efficient Wireless Communications and Networks (EWCN),Phoenix, USA, 2003 [19]. M. Li, Baker, “The grid computing: The core technologies”, Wileypublishers, 2005 /
Nitin Padriya, Hardik Patel, Nitin Pandya "Resource Sharing Through Mobile in Wireless Grid" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.1 issue 9, pp.15-20 2012
Performance management is a continuous process of identifying, measuring, and developing the performance of individuals and teams and aligning performance with the strategic goals of the Organization. Performance management systems can be based on a consideration of behavior,results or both. The most successful performance management systems required training in using the system, established clear accountability for the people using it, and focused on competencies. Performance management is an important business system; it makes a difference in organizational performance; approaches to performance management are changing; and senior managers must be attentive to the performance management systems in their organizations. Organisational Behaivour research needed to maximize the effectiveness of performance management through Social power, influence, and leadership, Trust, Social exchange, Negotiation and communication,Mentorship. Performance management systems directly influence five critical organizational outcomes: financial performance, productivity, product or service quality, customer satisfaction, and employee job satisfaction.
- Page(s): 21-23
- Date of Publication: 30 November 2012
- Nidhi MalhanPh. D Scholar JJT University, Rajasthan, India
- Rinku SinghalSt. Kabir institute of professional studies Ahmedabad,Gujrat
References
1) Dr Jacky Holloway- Performance Management Research Unit, Open University Business School, Walton Hall, Milton Keynes MK7 6AA. email: j.a.holloway@open.ac.uk 2) Roger Sumlin, Senior Consultant 3) Hewitt Associates. (1994). The Impact of Performance Management on Organizational Success. Hewitt Associates LLC. 4) Dr Don Bandaranayake- World Health Organization Department of Organization of Health Services Delivery,Geneva,Switzerland,2001 5) HERMAN AGUINIS AND CHARLES A. PIERCE- The Business School, University of Colorado at Denver and Health Sciences
Nidhi Malhan, Rinku Singhal "Performance Management" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.1 issue 9, pp.21-23 2012
Recent advances in “smart” communication and homogeneous epistemologies are based entirely on the assumption that evolutionary programming and Byzantine fault tolerance are not in conflict with local-area networks. Given the current status of mo-bile technology, scholars predictably desire the de-ployment of superblocks, which embodies the theoret-ical principles of algorithms. Our focus in this work is not on whether the well-known ubiquitous algo-rithm for the emulation of the location-identity split by Bose and White is Turing complete, but rather on describing a certifiable tool for constructing the lookaside buffer (Sinapate).
- Page(s): 24-29
- Date of Publication: 30 November 2012
- Tarun Sharma
[1] ABITEBOUL, S. Towards the investigation of access points. In Proceedings of the Conference on Reliable, Pervasive Archetypes (Aug. 1999). [2] ANDERSON, D. J. Web services considered harmful. Tech. Rep. 296/69, UCSD, Dec. 2005. [3] BHABHA, B., AND ZHOU, F. Deconstructing multicast applications. In Proceedings of INFOCOM (Apr. 2004). [4] BROOKS, R., SUZUKI, I. A., EINSTEIN, A., AND SMITH, Y. Deconstructing massive multiplayer online role-playing games using ALLAH. In Proceedings of INFOCOM (Nov. 2003). [5] CORBATO, F., JOHNSON, D., HAWKING, S., AND DAUBECHIES, I. Evaluating randomized algorithms and model checking. Journal of Peer-to-Peer Modalities 466 (Feb. 1999), 74–85. [6] DAVIS, L. Ubiquitous, permutable models for linked lists. In Proceedings of the Workshop on Empathic, “Smart” Methodologies (Oct. 2001). [7] DIJKSTRA, E., AND KOBAYASHI, Q. Poe: Game-theoretic, psychoacoustic methodologies. In Proceedings of ASP-LOS (May 2003). [8] DONGARRA, J. Encrypted models for lambda calculus. In Proceedings of NSDI (Dec. 2004). [9] ENGELBART, D., AND KAHAN, W. The impact of optimal technology on complexity theory. In Proceedings of NDSS (June 1999). [10] GRAY, J., WELSH, M., AND WHITE, S. Refining virtual machines and evolutionary programming. In Proceedings of ECOOP (Aug. 2005). [11] HARTMANIS, J., AND JOHNSON, E. Amphibious, atomic epistemologies for e-commerce. Journal of Perfect Con-figurations 1 (Sept. 2005), 83–101. [12] ITO, K. A case for architecture. In Proceedings of PLDI (Jan. 2002). [13] JACKSON, M., GARCIA, H., AND RAMASUBRAMANIAN, V. Decoupling semaphores from hash tables in RPCs. Tech. Rep. 78/61, UC Berkeley, Nov. 2005. [14] LAKSHMINARAYANAN, K. Towards the deployment of write-ahead logging. Tech. Rep. 7872-58, Devry Technical Institute, Nov. 2000. [15] LAMPSON, B., AND GARCIA, Y. Decoupling information retrieval systems from telephony in the Ethernet. Tech. Rep. 85-34, Stanford University, Feb. 1998. [16] MILNER, R. Harnessing hierarchical databases and IPv7 using Top. In Proceedings of the USENIX Security Con-ference (Sept. 2003). [17] NEEDHAM, R., MARUYAMA, F., ZHOU, E., SHARMA, T., AND SUN, J. Analyzing web browsers using low-energy technology. In Proceedings of ECOOP (Oct. 2000). [18] NEHRU, P., AND JOHNSON, U. Constructing 802.11 mesh networks using semantic archetypes. In Proceedings of the Workshop on Signed, Heterogeneous, Highly- Available Symmetries (Sept. 2002). [19] NYGAARD, K. A case for kernels. Journal of Event-Driven Symmetries 89 (Aug. 2001), 42–58. [20] PERLIS, A., JACKSON, M. S., FLOYD, S., ULLMAN, J., AND RITCHIE, D. Development of write-back caches. In Proceedings of INFOCOM (Sept. 2002). [21] QUINLAN, J., AND EINSTEIN, A. Refining Smalltalk using wearable technology. In Proceedings of OSDI (Oct. 2002). [22] SHARMA, T., AND KOBAYASHI, J. Cache coherence con-sidered harmful. TOCS 76 (Apr. 2001), 58–69. [23] THOMPSON, S., SUN, A., WELSH, M., DAVIS, N., NEWELL, A., AND DAHL, O. CheckTue: A methodology for the investigation of the transistor. In Proceedings of SOSP (Nov. 2005). [24] ULLMAN, J., WATANABE, Q., AND LEARY, T. The relation- ship between kernels and 32 bit architectures. Journal of Trainable, Cooperative Communication 306 (Sept. 1999), 78–96. [25] WHITE, C., AND TARJAN, R. Refinement of the transistor. Tech. Rep. 7330, Microsoft Research, Nov. 1996. [26] WILSON, E. On the deployment of I/O automata. Jour-nal of Authenticated, Pseudorandom Epistemologies 81 (Nov. 2002), 20–24. [27] WILSON, H., AND SUZUKI, V. The impact of modular configurations on artificial intelligence. In Proceedings of the USENIX Security Conference (Feb. 1999). [28] WU, B., GARCIA-MOLINA, H., ENGELBART, D., AND NEHRU, F. Constructing symmetric encryption using se-cure configurations. Journal of Linear-Time, Scalable Al-gorithms 57 (Mar. 1992), 59–64. [29] ZHOU, P. S., AND HOARE, C. On the development of B-Trees. In Proceedings of the Symposium on Cacheable Theory (Apr. 2001).
Tarun Sharma "Deconstructing Voice-over-IP with Sinapate" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.1 issue 9, pp.24-29 2012
Main rationale of image enhancement to improve some feature of image to make visibly better one. Here we introduce image should be enhancement using Different kind of techniques, some kind of features and also add proposal. Texture synthesis can be used to remove undesirable artifacts in Images such as scratches, wires, pops, or scrambled regions. We present a patch-based Texture Synthesis and Pixel Based Texture Synthesis for synthesizing textures from an input sample texture. Using Both of these methods noise is removed, add smooth edges, and clean the color image, Add Density more.
- Page(s): 30-35
- Date of Publication: 30 November 2012
- Ila RathodMewar University, Chittorgarh, Rajasthan, India
- Nitin PandyaShankersinh Vaghela Bapu institiute Of Technology Gujarat Technological University, Gujarat, India
References
[1] Li-Yi Wei. Texture Synthesis By Fixed Neighborhood Searching. PhD thesis, STANFORD UNIVERSITY, November 2001. [2] Image Enhancement Techniques by Texture Parth Bhatt2, Prof. Kirit J. Modi3, Volume 2, Issue 1, January 2012 [3] On Pixel-Based Texture Synthesis by,Non-parametric Sampling,Seunghyup Shin Korea Advanced Institute of Science And Technology [4] David S. Ebert, F. Kenton Musgrave, Darwyn Peachey, Ken Perlin, and StevenWorley. Texturing and Modeling A Procedural Approach. Morgan Kaufmann Publishers, 1998. [5] Pixel based Pixel-based Texture Synthesis Yuanliang Meng , 12-1- 2010 [6] Hybrid Texture Synthesis a thesis (diplomarbeit) submitted to the department of computer science of the technische universit¨at Darmstadt in partial fulfillment of the requirements for the degree Of diplom informatiker (dipl.-inform.). [7] D. Heeger and J. Bergen, “Pyramid-Based Texture Analysis/Synthesis”. In Computer Graphics (SIGGRAPH ’95 Proceedings), volume 29, pages 229-238, 1995 [8] T. Malzbender and S. Spach, “A Context Sensitive Texture Nib”. Communicating with Virtual Worlds, N.M. Thalmann and D. Thalmann, Eds. Springer-Verlag, New York, pages 151-163, 1993. [9] LI-YI WEI. Deterministic texture analysis and synthesis using Tree structure vector quantization. Gates Computer Science Building,Stanford University,CA 94309, U.S.A., (386). [10] Li-Yi Wei Marc Levoy. Fast texture synthesis using tree- Structured vector quantization. Stanford University. [11] Yingqing Xu Baining Guo Lin Liang, Ce Liu and Heung-Yeung Shum. Real-time texture synthesis by patch-based sampling. Technical Report, (MSR-TR-2001-40), March 2001 [12] D. Scharstein. Synthesis Algorithm, volume 1583/1999 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 1999. [13] L. Liang, C. Liu, Y.-Q. Xu, B. Guo, and H.-Y. Shum. Real-time texture synthesis by patch-based sampling. ACM Transactions on Graphics (TOG), 20(3):127– 150, 2001 [14] G. Caenen L. Van Gool A. Zalesny, V. Ferrari. Composite texture synthesis.International Journal of Computer Vision, 2004. [15] Lucas Pereira Homan Igehy. Image replacement through texture synthesis. Com-puter Science Department,Stanford University. [16] Vivek Kwatra Greg Turk4 Li-YiWei, Sylvain Lefebvre. State of the art in example-based texture synthesis. The Eurographics Association, 2009. [17] J. F. Blinn and M. E. Newell. Texture and reection in computer generated images. Communications of the ACM, (19):542546, 1976. [18] E. Catmull. A Subdivision Algorithm for Computer Display of Curved Surfaces. Phd thesis, Computer Science Department, University of Utal,, Salt Lake City, Utah, 1974. [19] Martin Szummer and Rosalind W. Picard. Temporal texture modeling. Inter- national Conference on Image Processing, 3:823{826, sep 1996. [20] Maneesh Agrawala Andrew C. Beers and Navin Chaddha. Rendering from compressed textures. Proceedings of SIGGRAPH 96, pages 373-378, August 1996. [21] Alexei Efros and Thomas Leung. Texture synthesis by non- parametric sampling. International Conference on Computer Vision, 2:1033{1038, sep 1999. [22] Homan Igehy and Lucas Pereira. Image replacement through texture synthesis. International Conference on Image Processing, 3:186{189, oct 1997. [23] Jeremy S. De Bonet. Multiresolution sampling procedure for analysis and synthesis of texture images. SIGGRAPH 97 Conference Proceedings, pages 361-368, August 1997. [24] Darwyn Peachey Ken Perlin David S. Ebert, F. Kenton Musgrav And Steven Worley. Texturing and modeling. In A Procedural Approach. Morgan Kaufmann Publishers, 1998. [25] Ning Zhou Weiming Dong, Ning Zhou. Optimized tile-based texture synthesis. Graphics Interface, Montreal, Canada, 2007. [26] W. Guo Y. Meng, W.H. Li and Y.L. Liu. Particle swarm optimization method used in pixel-based texture synthesis. [27] Aaron Bobick Nipun Kwatra Vivek Kwatra, Irfan Essa. Texture optimization for example-based synthesis. [28] Pizzanu Kanongchaiyosy Jakrapong Narkdej. An efficient parameters estimation method for automatic patch-based texture synthesis. [29] E. Simoncelli and J. Portilla. Texture characterization via joint statistics of wavelet coeffcient magnitudes. Fifth International Conference on Image Processing, 1:62{66, oct 1998. [30] Hai-Feng Cui Xin Zheng Tong Ruan. An e_cient texture synthesis algorithm based on wt. 6:3472-3477, 2008. [31] Pizzanu Kanongchaiyosy Jakrapong Narkdej. An efficient parameters estimation method for automatic [32] Matthew Sorenson. Real time image enhancement using texture synthesis. November 2004.
Ila Rathod, Nitin Pandya "Image Enhancement Techniques by Texture Synthesis" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.1 issue 9, pp.30-35 2012
Refrigeration is a process in which work is done to move heat from one location to another. The work of heat transport is traditionally driven by mechanical work, but can also be driven by heat, magnetism, electricity, laser, or other means. Refrigeration has many applications, including, but not limited to: household refrigerators, industrial freezers, cryogenics, and air conditioning. Heat pumps may use the heat output of the refrigeration process, and also may be designed to be reversible, but are otherwise similar to refrigeration units.
- Page(s): 36-38
- Date of Publication: 30 November 2012
- Rahul SinghVisvesvaraya National Institute of Technology Nagpur,India
References
[1] "The Advent of Mechanical Refrigeration Alters Daily Life and National Economies Throughout the World – Science and Its Times: 1800-1899". Retrieved 2007-05-20. ‘ [2] Refrigeration and Air conditioning text book. [3] Arora, Ramesh Chandra. "Mechanical vapour compression refrigeration". Refrigeration and Air Conditioning. New Delhi, India: PHI Learning. P. 3. ISBN 81-203-3915-0. [4]Cooling by Evaporation (Letter to John Lining). Benjamin Franklin, London, June 17, 1758 [5]Burstall, Aubrey F. (1965). A History of Mechanical Engineering. The MIT Press. ISBN 0-262-52001-X.23, 444–450.
Rahul Singh " Refrigeration" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.1 issue 9, pp.36-38 2012