View ijsrd journal's profile on LinkedIn
Showing posts with label International Journal. Show all posts
Showing posts with label International Journal. Show all posts

Tuesday, February 9, 2016

Safer Internet Day 2016 | IJSRD

Safer Internet Day 2016 | IJSRD

Safer Internet Day gives us an opportunity to pause and reflect on this fact, but also to think about the challenges we face in our globally connected world. At the same time, it’s important to remember that these challenges are not the product of the internet. 

IJSRD Celebrate 10th Safer Internet Day and support to use Safe Internet.
IJSRD is an Open-Access peer reviewed International Journal.Exhaustive list of executive board members who were invited from all the Colleges , Universities and research organization.Research scholar can download any article from the website for free of cost.

Friday, August 28, 2015

#IJSRD focus Ionospheric Study using Image Processing of All-Sky Imager

As India is growing on the Geo Informatics domain IJSRD has received an article entitled “Ionospheric Study using Image Processing of All-Sky Imager” 

Schematic of the all-sky imager
Schematic of theall-sky imager
Authors Rohit Patil, S. B. Patil from D.Y.Patil COE,Kolhapur R. N. Ghodpage, M.F. Radar from Indian Institute of Geomagnetism, India has made use of Image processing for studying the Ionospheric Activities. This article submitted to IJSRD authors tells that.....
 "The study of ionosphere which plays the main role in HF transmission. The equatorial ionospheric plasma bubbles that occur at the low-latitude F-region of the ionosphere and the irregularities associated with them are responsible for everal interference and sudden disruption of transionospheric radio propagation up to Giga Hertz frequency range, interfering with the communication systems, including the GPS. A CCD-based all-sky imager with 180° field-of-view is used to take photographs of all sky on clear, moonless nights, to study the F-region dynamics through the imaging with optical filter OI 630.0 nm oxygen emission line."

To know more about this article click here

For more news about latest technologies please visit www.ijsrd.com


Friday, October 17, 2014

#IJSRD | Wireless Phone Charger: the uniqueness and the features

Wowhoo Wireless Phone Charger: the uniqueness and the features
blog#IJSRD | Research Lets Do it… #call for paper
Major wireless phone carriers have all been adapting the Qi wireless technology. Additionally many car manufactures are adding them to their 2014-2015 models. Manufactures include but are not limited to the following: Jeep, Toyota, Prius Harrier, Mercedes Benz, BMW, Volkswagen, Audi aswell as Porsche.
Due to the new and improved design and usability our initial launch date has been revised from Jan 7th to March 1st. we added approximately 8mm to our diameter to allow a better internal design.  The small revision to the Wowhoo charger allow us to get that quicker charge which is most important. The 10% is a big jump in charging speed.
for more details click here

Friday, August 15, 2014

#IJSRD advanced persistent threat (APT)


Advanced Persistent Threats (APTs) are a cybercrime category directed at business and political targets. APTs require a high degree of stealithiness over a prolonged duration of operation in order to be successful. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com

#IJSRD MOBILE PROTECTION VICTIMISATION VOICE VERIFICATION


Cellular communication business has developed leaps and bounds to become the core of day to day science. Mobile phones is that the spirit of cellular business. the quantity of mobile phones users is rising exponentially. however the privacy of user and security of mobile phones leftovers a difficult question. Theft of mobile phones has become the attention catching business for offender. There ought to be a reliable methodology of protective the instrument from thief. My paper proposes a brand new innovative, reliable, trick proof precautions for mobile phones victimization VOICE VERIFICATION. Voice verification is that the identification of a personal identity victimization speech because the spotting quality. The voice of the user is processed employing a digital gesture processor that is that the prime a part of a mobile. we have a tendency to are programming this DSP to implement this safety technique. For most a resourceful voice record of the user is formed. This record is hold on within the Flash read-only storage that is out there within the mobile. Then whenever the user speaks through the mobile phones a part of the speech sample is taken and hold on. This processed voice of the user is compared with the first folder to examine the identity of the user. If the user is allowed, he’s allowed to continue his speak. If not the transmission is cut unexpectedly by creating the DSP in inactive state. Therefore the mobile is being shielded from any extralegal user. Not with standing the mobile phones was purloined or lost it won’t be helpful for the other individual. The programmability of DSP and generality of Voice based mostly classification has given our methodology a twin advantage. Our set up demands neither external hardware nor additional price. The on top of methodology cause no hardship for the user not like this safety systems. This methodology may be adopted universally altogether models of Mobile phones and mobile phones for cover.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….
kindly share to all engineers…
Visit us on www.ijsrd.com

Wednesday, August 13, 2014

#IJSRD Cost effective and innovative housing technology


Shelter is amongst the three basic human needs but now-a-days, about two-third of the total Indian population does not have their own shelter. This two-third population belongs to the middle and lower income class. These people find it difficult to construct their houses at an affordable cost by using conventional construction technology. It is found in many cases that people serve their whole life constructing their own house, but fail. The mission and dream of these people can be achieved by appropriate use of cost effective and innovative construction technology. As a whole, the housing shortage of the country can be overcome within lesser FUNDS, without compromising with the quality control and structural stability of the structure.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….
kindly share to all engineers…
Visit us on www.ijsrd.com

https://wordpress.com/post/71238472/46/


Shelter is amongst the three basic human needs but now-a-days, about two-third of the total Indian population does not have their own shelter. This two-third population belongs to the middle and lower income class. These people find it difficult to construct their houses at an affordable cost by using conventional construction technology. It is found in many cases that people serve their whole life constructing their own house, but fail. The mission and dream of these people can be achieved by appropriate use of cost effective and innovative construction technology. As a whole, the housing shortage of the country can be overcome within lesser FUNDS, without compromising with the quality control and structural stability of the structure.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com