The document describes a system that allows users to control their personal computer using a Bluetooth-enabled mobile phone. It discusses how the system operates in different modes like keyboard, mouse, and application modes to emulate mouse and keyboard functions. It also allows viewing the PC desktop on the mobile phone and controlling applications remotely. The document concludes by discussing potential future enhancements like adding multi-word command support and integrating more multimedia applications.
Most Cited Articles in Academia - International Journal of Computer Science a...IJCSES Journal
The AIRCC's International Journal of Computer Science and Engineering Survey (IJCSES) is devoted to fields of Computer Science and Engineering surveys, tutorials and overviews. The IJCSES is a peer-reviewed, open access scientific journal published in electronic form as well as print form. The journal will publish research surveys, tutorials and expository overviews in computer science and engineering. Articles from supplementary fields are welcome, as long as they are relevant to computer science and engineering
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...IJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small
and low-costsensor nodes with capability of sensing various types of physical and environmental
conditions, data processing, and wireless communication. Variety of sensing capabilities results
in profusion of application areas. However, the characteristics of wireless sensor networks
require more effective methods for data forwarding and processing. In WSN, the sensor nodes
have a limited transmission range, and their processing and storage capabilities , as well as their
energy resources, are also limited. Routing protocols for wireless sensor networks are
responsible for maintaining the routes in the network and have to ensure reliable multi-hop
communication under these conditions. In this paper, we give a survey of routing protocols for
Wireless Sensor Network and compare their strengths and limitations.
ABSTRACT : Pervasive computing refers to the embodiment of computing devices into physical objects connected into networks and these devices communicate with each other without any interactions required by the user. It plays a major role in our daily lives and has a vast range of applications in many fields. This paper presents a brief introduction to pervasive computing.
Key Words : pervasive computing, ubiquitous computing, Internet of things
Wireless sensor networks (WSNs) have recently gained a lot of attention by scientific community. Small and inexpensive devices with low energy consumption and limited computing resources are increasingly being adopted in different application scenarios including environmental monitoring, target tracking and biomedical health monitoring. In many such applications, node localization is inherently one of the system parameters.
Most Cited Articles in Academia - International Journal of Computer Science a...IJCSES Journal
The AIRCC's International Journal of Computer Science and Engineering Survey (IJCSES) is devoted to fields of Computer Science and Engineering surveys, tutorials and overviews. The IJCSES is a peer-reviewed, open access scientific journal published in electronic form as well as print form. The journal will publish research surveys, tutorials and expository overviews in computer science and engineering. Articles from supplementary fields are welcome, as long as they are relevant to computer science and engineering
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...IJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small
and low-costsensor nodes with capability of sensing various types of physical and environmental
conditions, data processing, and wireless communication. Variety of sensing capabilities results
in profusion of application areas. However, the characteristics of wireless sensor networks
require more effective methods for data forwarding and processing. In WSN, the sensor nodes
have a limited transmission range, and their processing and storage capabilities , as well as their
energy resources, are also limited. Routing protocols for wireless sensor networks are
responsible for maintaining the routes in the network and have to ensure reliable multi-hop
communication under these conditions. In this paper, we give a survey of routing protocols for
Wireless Sensor Network and compare their strengths and limitations.
ABSTRACT : Pervasive computing refers to the embodiment of computing devices into physical objects connected into networks and these devices communicate with each other without any interactions required by the user. It plays a major role in our daily lives and has a vast range of applications in many fields. This paper presents a brief introduction to pervasive computing.
Key Words : pervasive computing, ubiquitous computing, Internet of things
Wireless sensor networks (WSNs) have recently gained a lot of attention by scientific community. Small and inexpensive devices with low energy consumption and limited computing resources are increasingly being adopted in different application scenarios including environmental monitoring, target tracking and biomedical health monitoring. In many such applications, node localization is inherently one of the system parameters.
Top cited Network Security Articles- Part 1IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
In this presentation, I describe the Context-Aware concept, Context-Aware Computing, and Context-Aware application with some application example of use it
International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Presentation on Ubiqutous Computing. Describes basic aspects of this computing. How it can be deployed in our day-to-day life. applications and advantages.
A novel and innovative method for designing of rf mems deviceseSAT Journals
Abstract
The design complexity of the RF MEMS devices is increasing with fast rate, which require more accurate designing and simulation techniques. With upcoming technologies accurate simulation capability is a necessity for designing smaller chips. When devices are designed at nano scale, it presents a number of unique challenges. As the scale of the individual device decreases and the complexity of the physical structure increases, the nature of the device characteristics depart from those obtained from many of the classically held modeling concepts. Furthermore, the difficulty encountered in performing measurements on these devices means we have to put more emphasis on the results obtained from theoretical characteristics. Modeling also allows new device structures to be rigorously investigated prior to fabrication. This paper reports a novel and innovative method of design and simulation of MEMS based inductor by the method of co-simulation.
Keywords: Micro Electro Mechanical System, Radio Frequency, Co-Simulation, COMSOL Multiphysics, SOLIDWORKS, Computer Aided Design, Integrated Circuit
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal of Computational Science, Information Technology and Co...rinzindorjej
The International Journal of Computational Science, Information Technology and Control Engineering (IJCSITCE) is an open access peer-reviewed journal that publishes quality articles which make innovative contributions in all areas of Computational Science, Mathematical Modeling, Information Technology, Networks, Computer Science, Control and Automation Engineering. IJCSITCE is an abstracted and indexed journal that focuses on all technical and practical aspects of Scientific Computing, Modeling and Simulation, Information Technology, Computer Science, Networks and Communication Engineering, Control Theory and Automation. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced techniques in computational science, information technology, computer science, chaos, control theory and automation, and establishing new collaborations in these areas.
Top cited Network Security Articles- Part 1IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
In this presentation, I describe the Context-Aware concept, Context-Aware Computing, and Context-Aware application with some application example of use it
International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Presentation on Ubiqutous Computing. Describes basic aspects of this computing. How it can be deployed in our day-to-day life. applications and advantages.
A novel and innovative method for designing of rf mems deviceseSAT Journals
Abstract
The design complexity of the RF MEMS devices is increasing with fast rate, which require more accurate designing and simulation techniques. With upcoming technologies accurate simulation capability is a necessity for designing smaller chips. When devices are designed at nano scale, it presents a number of unique challenges. As the scale of the individual device decreases and the complexity of the physical structure increases, the nature of the device characteristics depart from those obtained from many of the classically held modeling concepts. Furthermore, the difficulty encountered in performing measurements on these devices means we have to put more emphasis on the results obtained from theoretical characteristics. Modeling also allows new device structures to be rigorously investigated prior to fabrication. This paper reports a novel and innovative method of design and simulation of MEMS based inductor by the method of co-simulation.
Keywords: Micro Electro Mechanical System, Radio Frequency, Co-Simulation, COMSOL Multiphysics, SOLIDWORKS, Computer Aided Design, Integrated Circuit
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal of Computational Science, Information Technology and Co...rinzindorjej
The International Journal of Computational Science, Information Technology and Control Engineering (IJCSITCE) is an open access peer-reviewed journal that publishes quality articles which make innovative contributions in all areas of Computational Science, Mathematical Modeling, Information Technology, Networks, Computer Science, Control and Automation Engineering. IJCSITCE is an abstracted and indexed journal that focuses on all technical and practical aspects of Scientific Computing, Modeling and Simulation, Information Technology, Computer Science, Networks and Communication Engineering, Control Theory and Automation. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced techniques in computational science, information technology, computer science, chaos, control theory and automation, and establishing new collaborations in these areas.
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
New Research Articles 2020 July Issue International Journal of Software Engin...ijseajournal
The International Journal of Software Engineering & Applications (IJSEA) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Software Engineering & Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts & establishing new collaborations in these areas.
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHijitcs
In the past few years it was clear that mobile cloud computing was established via integrating both mobile computing and cloud computing to be add in both storage space and processing speed. Integrating
healthcare applications and services is one of the vast data approaches that can be adapted to mobile
cloud computing. This work proposes a framework of a global healthcare computing based combining both
mobile computing and cloud computing. This approach leads to integrate all of the required services and overcoming the barriers through facilitating both privacy and security.
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Fundamentals of Electric Drives and its applications.pptx
Conclusion
1. R.V. College of Engineering
Department of Information Science and Engineering Page 28
CHAPTER 7
CONCLUSION
The system emulates the actions of mouse and keyboard with the help of mobile phone. Some
of the PC applications like media player and browsers can also be controlled via the bluetooth
enabled mobile device. The system operates in keyboard, mouse, application and utilities
mode. The keyboard mode allows performing basic functions on text editor and movement of
cursor. The mouse mode provides full support for controlling the mouse movements and
clicks. Also, the computer desktop is generated on the phone. In the application mode,
applications like power point, media players and browsers can be controlled. Utilities mode
enables running command and sending of message to the personal computer.
The Bluetooth technology and J2ME are made use by the system to allow the users to view
and access the desktop screen of the PC on the mobile phones, control applications and
thereby interact with the computer through Bluetooth.
7.1 FUTURE ENHANCEMENT
The system can be extended to support the following functionalities:
Multi-word commands can be executed under the utilities mode.
Integrating more Multimedia applications like downloading image, audio, video etc.
2. R.V. College of Engineering
Department of Information Science and Engineering Page 29
REFERENCES
[1] Keith Cheverst, Alan Dix, Daniel Fitton, Chris Kray, Mark Rouncefield, Corina Sas,
George Saslis-Lagoudakis, Jennifer G. Sheridan,” Exploring Bluetooth based Mobile Phone
Interaction with the Hermes Photo Display” in Department of Computing, Infolab21
Lancaster University,2012
[2] R.S.S.Vishnu Priya , P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad,
P.D.Nageswara Rao ,”Mobile-PC Suite: Using Mobile Phone as Remote to Control PC
Operations” in Dept. of CSE, KLCE Vaddeswaram, India, (IJCSIT) International Journal of
Computer Science and Information Technologies, Vol. 3 (2) , 2012,3355 – 3359,2013
[3] Dr. Khanna, SamratVivekanand, Omprakash ,”Concept of Remote controlling PC with
Smartphone Inputs from remote place with internet”in Information Technology Dept, ISTAR,
Sardar Patel University, VV Nagar, India, 2012
[4] Faisal Baig, Saira Beg and Muhammad Fahad Khan, “Zigbee Based Home Appliances
Controlling Through Spoken Commands Using Hand held Devices” in nternational Journal
of Smart Home Vol. 7, No. 1, January, 2013.
[5]Nokia Corporation(2011),”PC Connectivity over Bluetooth in Java Applications”,Version
1.0,Publication date :December 8,2011.
[6] Ting Zhang, Yuanxin Ouyang , “Case Study of Human Computer Interaction Based on
RFID and Context-Awareness” in Ubiquitous Computing Environments Volume
4555, 2007, pp 264-271.
[7] K. V. S. S. S. S. Sairam, Dr. M. G. R, N. Gunasekaran, S. Rama Reddy, “Bluetooth in
Wireless Communication“ in IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
2008.
[8] N. Golmie, R. E. Van Dyck, and A. Soltanian, “Interference of Bluetooth and IEEE
802.11: Simulation Modeling and Performance Evaluation” in National Institute of Standards
and Technology Gaithersburg, Maryland 20899, 2010.
[9] P. Johansson, R. Kapoor, M. Kazantzidis, and M. Gerla, “Personal Area Networks:
Bluetooth”, in International Journal of Wireless Information Networks, Vol. 9, No. 2, April
2002.
3. R.V. College of Engineering
Department of Information Science and Engineering Page 30
[10] K. V. S. S. S. S. Sairam, University of Madras, Dr. M. G. R. Engineering College N.
Gunasekaran, Anna UniversityS. Rama Reddy, Jerusalem College of Engineering, Dr. M. G.
R. Engineering College,” Bluetooth in Wireless Communication”,2002
[11] Peng Zhou,” HCI-based bluetooth master-slave monitoring system design”, Nat. Key
Lab. of Sci. & Technol. on Communication, Univ. of Electron. Sci. & Technol. of China,
Chengdu, China ; Xiang Ling,2010.
[12] Beg, M.S. ,Fatimah, B. ,Jain, S. ; Muzammil, R.,” Bluetooth based implementations for
realising new consumer systems”, ; Deptt. of Electron. Eng., AMU, Aligarh, India, 2009.
[13]Yabin Liu ; Sch. of Autom; Shouqian Yu ; Weihai Chen ; Wei Li,” Wireless
Communication Technology Based on Bluetooth and Its Application to a Manipulator”,
Beijing Univ. of Aeronaut. & Astronaut., Beijing,2006.
[14] Siegemund, F,Florkemeier C.,” Interaction in pervasive computing settings using
Bluetooth-enabled active tags and passive RFID technology together with mobile phones”,
; Dept. of Comput. Sci., Eidgenossische Tech. Hochschule, Zurich, Switzerland,2003
[15] Jin-Shyan Lee Yu-Wei Su ; Chung-Chou Shen,” A Comparative Study of Wireless
Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi”, ; Ind. Technol. Res. Inst., Hsinchu,2007
[16] Ballagas, R., Rohs, M., Sheridan, J.G. and Borchers, J.,Sweep and point & shoot:
Phonecam-based interactions for large public displays. In Proceedings of the SIGCHI
conference on Human factors in computing systems (CHI'05) Extended abstracts, ACM
Press, 2005.
[17] Cheverst, K. Dix, A., Fitton, D., Kray, C., Rouncefield, M.,Saslis-Lagoudakis, G. and
Sheridan, J. G., Exploring Mobile Phone Interaction with Situated Displays, In Proceedings
of the 1st workshop on Pervasive Mobile Interaction Devices (PERMID),2005.
[18] Cheverst, K., Clarke, K., Fitton, D., Rouncefield, M.,Crabtree, A. and Hemmings, T.,
SPAM on the menu: the practical use of remote messaging in community care, In
Proceedings of the 2003 ACM Conference on Universal Usability, Vancouver, Canada, ACM
Press. 2003, 23-29.
[19] Ferscha, A. and S. Vogl, Pervasive Web Access via Public Communication Walls: In
Proceedings of Pervasive Computing, LNCS 2414, Zurich, Switzerland, 2002, 84-97.
[20] Gaver, W., Dunne, A. and Pacenti, E., Cultural Probes, Interactions: New Visions of
Human-Computer Interaction. (1) (1999).
4. R.V. College of Engineering
Department of Information Science and Engineering Page 31
[21] Graham, K., Cheverst, K., Rouncefield, M. and Kray, C. Going More Public: Situated
Display Design in a Care Setting through Co-realisation, Submitted to the 2005 Conference
on Designing for User eXperience (DUX’05).
[22] Himanshu R., Gossweiler, R. and Milojicic, D., ContentCascade Incremental Content
Exchange between Public Displays and Personal Devices, In Proceedings of the International
Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'04),
Boston, Massachussets, USA, 2004, 374-381.
[23] Shwetak N. Patel and Gregory D. Abowd,” Beyond Mobile Telephony: Exploring
Opportunities for Applications on the Mobile Phone Handset”,College of Computing & GVU
Center, 801 Atlantic Drive, Atlanta, GA 30332-0280, USA {shwetak,
abowd}@cc.gatech.edu,2010
[24] Motorola Global Telecom Solution Sector. (2002) "i95cl Multi-Communication Device
J2ME Developers' Guide". Motorola, 2002.
[25] Nichols, J., B. A. Myers, M. Higgins, J. Hughes, T. K. Harris, R. Rosenfeld and
M.Pignol.(2002) Generating remote control interfaces for complex appliances. Proceedings
of the 15th annual ACM symposium on User interface software and technology (UIST 2002),
ACM Press, Paris, France, pp 161—170.
[26]. Patel, S.N. and G.D. Abowd. (2003) A 2-way Laser-assisted Selection Scheme for
Handhelds in a Physical Environment. Technical Note submitted for review to Ubicomp
2003.
[27] Yesim Tunccekic, and Kivanc Dincer,”Mobile Mapping Applications over J2ME
Enabled PhonesHAVELSAN Eskisehir Yolu, Ankara, TURKE, 2007.
[28] Minoi,J. L., Green P., Arnab, S., 2002, Navigation Application with Mobile Telephony:
Shortest-path, University Malaysia Sarawak, University of Manchester, Map Asia 2002.
[29] Liu, J., Mobile Map: A Case Study in the Design & Implementation of a Mobile
Application, Computer Engineering Dept of Carleton University, http://www.sce.
carleton.ca/wmc/chameleon/mc/JaneThesis.pdf,2002.
[30] Revel, S.,” How Does Location Govern Task? The Delivery of an Intelligent Tourist
Aide Over a Palm Device”,Univ. of Edinburgh, MSc Dissertation Plan, http://www.
geo.ed.ac.uk/~gisadmin/submission/msc0138/plan.html,2007.
[31] Virrantaus, K., Markkula, J., Garmash, A., Terziyan, V.Veijalainen, J., Katanosov, A.,
Tirri, H,” Developing GIS-supported Location Based Services”, Helsinki
University of Technology, University of Jyvaskyla, Finland, 2002.
5. R.V. College of Engineering
Department of Information Science and Engineering Page 32
[32] Megler, V., “ i-mode:From bandwidth problem into Internetphenomenon”, http://www-
106.ibm.com/ developerworks/library/wi-imode/index.html,2002.
[33] Keryer, P., Nara, T.,” i-mode: A Successful Lauch of The Mobile Internet Market”,
Alcatel Telecommunications Review – First Quarter 2001.
[34] Dru, M-A, Saada, S.,” Location-Based Mobile Services”, The Essentials, Alcatel
Telecommunications Review – First Quarter 2001.
[35] Goodman, D. J.,” The wireless Internet: Promises and Challenges”, July 2000 IEEE
Computer magazine.
[36] Laitinen, H., Sun’s Worldwide Java Developer Conference, Development Tools for the
J2ME, 2003 http://www.forum.nokia.com/main/1,35452,1_0_75,00.html,2001.