scispace - formally typeset
Search or ask a question

Showing papers by "P A College of Engineering published in 2019"


Journal ArticleDOI
01 Dec 2019-Fuel
TL;DR: In this article, the effects of graphene oxide nanoparticles on performance and emissions of a CI engine fueled with dairy scum oil biodiesel was studied, and an ideal graphene-to-surfactant ratio was defined, highest absolute value UV-absorbency was seen for a mass fraction of 1:4.

137 citations


Journal ArticleDOI
TL;DR: In this article, a review of the effect of ultrasonication on different properties of nanofluids are confined. But, the authors did not find that the longer ultrasonation duration was not better in all cases where best performance was obtained for an optimum duration of Ultrasonication, and they found that with an increased sonication time/energy, reduces the particle size and aids in obtaining a better dispersion leading to enhancement of stability, thermal conductivity and reducing viscosity.
Abstract: Preparation of nanofluid is of prime importance to obtain better thermal and physical properties. Different preparation parameters used in nanofluid preparation sometimes perform contrarily even if prepared with same nanoparticles and base fluid. Stability, thermal conductivity, and viscosity of the nanofluid are significantly affected by the cluster (agglomerate) size of nanoparticles in the base fluid which deteriorate thermal performance. In order to break the agglomerates and improve the dispersion of nanoparticles, ultrasonication is a more prevalent method. Nanofluids react differently for different sonication time and the reaction of the nanofluid with the change in sonication time varies for different nanofluids, which is dependent on various factors. In this regard, research works pertinent to the effect of ultrasonication on different properties of nanofluids are confined. In this paper, review of investigations carried out on experimentally evaluated ultrasonication effects on thermal properties and various physical properties of nanofluid. It is found that with an increased sonication time/energy, reduces the particle size and thus aids in obtaining a better dispersion leading to enhancement of stability, thermal conductivity and reducing viscosity. However, the longer ultrasonication duration was not found to be better in all cases where best performance was obtained for an optimum duration of ultrasonication.

114 citations


Journal ArticleDOI
TL;DR: There is enough scope for extended research for realizing optimal design of disc brake system by truly emulating all the relevant practical situations, according to the present article.
Abstract: Disc brake system is one of the most critical components in a vehicle, which is always exposed to nonlinear transient thermoelastic conditions. Optimal design of a brake system to suit the heat transfer, weight and packing requirements is an ongoing challenge. Substantial researches have been carried out and are underway, in order to address the diverse issues related to thermal, mechanical and structural performances of automobile disc brakes. With the extensive application of numerical tools and techniques, the analyses involved became easier and effective. The present article provides an exhaustive review of the numerical and experimental studies reported so far, on the analysis and design of solid and ventilated disc brakes. The directions for future works are also described. The review reveals that, there is enough scope for extended research for realizing optimal design of disc brake system by truly emulating all the relevant practical situations.

54 citations


Journal ArticleDOI
TL;DR: In this paper, the effect of the spacing between the battery cells on thermal performance of Li-ion battery cells is investigated in detail using finite volume method-based numerical code for the present analysis, conjugate boundary condition at the cell and coolant interface is considered.
Abstract: In this article, effect of spacing between the battery cells ($$\bar{W}_{\text{f}}$$) on thermal performance of Li-ion battery cells is investigated in detail. Developing a finite volume method-based numerical code for the present analysis, conjugate boundary condition at the cell and coolant interface is considered. SIMPLE algorithm employed for solving the Navier–Stokes equation is validated with famous benchmark lid-driven cavity problem. The heat generation inside the modern battery cell is uniform in accordance with cell zone. Air being the coolant flows between the channel spacing of the battery cells. Forced laminar flow of coolant and steady-state analysis with operating parameters like heat generation term ($$\bar{S}_{\text{q}}$$), Reynolds number (Re), conduction–convection parameter (ζcc), and aspect ratio (Ar) is analyzed with main focus of $$\bar{W}_{\text{f}}$$. The range of $$\bar{W}_{\text{f}}$$ is from 0.02 to 0.14 varied in steps of 0.02 and Re from 250 to 2000 in step of 250. Coupled heat transfer behavior in terms of maximum temperature and average Nusselt number for these parameters is provided. From the numerical analysis, it is observed that for most of the range of operating parameters, at $$\bar{W}_{\text{f}} = 0.02$$, causes a sudden increase in temperature distribution and rise in maximum temperature above critical limits. Average Nusselt number increased with decrease in $$\bar{W}_{\text{f}}$$ up to 0.04 and below this, it dropped. Spacing of $$\bar{W}_{\text{f}} = 0.04$$ and $$\bar{W}_{\text{f}} = 0.06$$ proved to be an optimal spacing at which average Nusselt number is the highest and the maximum temperature is within the safe limit for parameters considered.

53 citations



Journal ArticleDOI
TL;DR: This work proposes an effectual methodology for retrieval of AN images utilizing Deep Belief CNN Feature Representation and the test outcomes evinced that the proposed work is better than the other existent techniques.
Abstract: Avascular Necrosis (AN) is a cause of muscular-skeletal disability. As it is common amongst the younger people, early intervention and prompt diagnosis is requisite. This disease normally affects the femoral bones, in order that the bones’ shape gets altered due to the fracture. Other common sites encompass knees, humerus, shoulders, jaw, and ankles. The retrieval of the AN affected bone images is challenging due to its varied fracture locations. This work proposes an effectual methodology for retrieval of AN images utilizing Deep Belief CNN Feature Representation. Initially, the input dataset undergoes preprocessing. The image noise is eradicated utilizing Median Filter (MF) and is resized in the preprocessing stage. Features are represented using Deep Belief Convolutional Neural Network (DB-CNN). Now, the image feature representations are transmuted to binary codes. Then, the similarity measurement is computed utilizing Modified-Hamming Distance. Finally, the images are retrieved centered on the similarity values. The test outcomes evinced that the proposed work is better than the other existent techniques.

39 citations


Journal ArticleDOI
TL;DR: In this paper, the authors explored the significance of the load distribution along the face width and the load sharing between the pairs when the contact moves from the highest point of tooth contact (HPTC) to the lowest point of needle contact (LPTC) on the SIF calculation.

18 citations



Journal ArticleDOI
TL;DR: In this paper, the problem of optimum spacing of channels formed by parallel plates having volumetric heat generation, subjected to conjugate forced convection-conduction cooling was addressed, where the authors solved the problem simultaneously with stream function, vorticity transport, and energy equation for the flow and thermal fields of the fluid domain, using appropriate finite difference method.

17 citations


Journal ArticleDOI
TL;DR: Experimental results are shown that the proposed multi biometric system based of fingerprint and palmprint performs well than the other methods considered for comparison.
Abstract: Biometric authentication is the process of recognizing a person by means of his\her psychological or behavioral traits. One of the most important issues faced by the biometric system developer is to protect the template obtained from the biometric of a person. Unimodal biometric system has some drawbacks such as noisy data, interclass variations and spoof attack. Multimodal biometric system has been developed to address the boundaries of unimodal biometric system and increase the security of template. In this paper, template security analysis of multimodal biometric system based of fingerprint and palmprint is proposed and implemented. Fuzzy vault scheme is employed to protect both the fingerprint and palmprint template. At enrollment, image processing techniques such as image enhancement, segmentation and bottom-hat filtering are applied on both the biometric to improve the quality and subsequently the most important features are extracted. Extracted features are concatenated. Combined features along with secret key are utilized to generate the database in the vault. During authentication, query images are sent as an input with the stored template to recover the key. Experimental results are shown that the proposed multi biometrics system performs well than the other methods considered for comparison.

16 citations


Journal Article
TL;DR: In this article, the authors compared the performance of different types of biodiesel and found that Pongamia pinnata biodiesel gave the highest brake thermal efficiency (BTE) among the biodiesels used.
Abstract: The biodiesel production from Pongamia pinnata, Calophyllum inophyllum, and waste cooking oil with different free fatty acid content was carried out by using different stages of transesterification process. Physical and chemical properties of biodiesel such as flash point, fire point, calorific value, density, and viscosity were found. Engine performance studies were carried out, with 100 % biodiesel being produced from different sources and with blends such as B50, B65, and B80 with diesel. In the comparison of biodiesels, it was found that Pongamia pinnata biodiesel showed highest Brake Thermal Efficiency (BTE) among the biodiesels used. For the B65 blend, Pongamia pinnata biodiesel gives highest BTE. For B50 blend, Pongamia pinnata and Calophyllum inophyllum biodiesel provide highest BTE. When these blends were compared for a particular type of biodiesel, B50 shows better performance characteristics in all aspects for different biodiesels used and among the biodiesel blends used.

Journal ArticleDOI
TL;DR: In this paper, the numerical prediction and comparison of thermal performance characteristics of a nuclear fuel element with and without cladding (bare fuel element) having non-uniform energy generation in axial direction is studied in detail.

Journal ArticleDOI
TL;DR: This work has proposed a parallel version of traditional K-means so as to execute it over Hadoop distributed framework and the experimental results show that the proposed K- means algorithm outperforms traditional K -means while clustering large volume of datasets.
Abstract: The volume of datasets is increasing in a very fast rate due to the expansion of digitalization of each file of work. The traditional clustering algorithm becomes ineffective in analyzing such huge volume of datasets as it requires large time to cluster such huge volume of datasets. The parallel and distributed architectures are designed to process such large datasets. In order to obtain efficiency in clustering job, traditional clustering algorithms are required to be designed for such parallel and distributed architectures. Few parallel clustering algorithms are designed for gaining efficiency in clustering which works on datasets which are loaded and accessed from main memory, which in turn develops a limitation in clustering large datasets that cannot load millions of data objects in memory at once. In this work, we have proposed a parallel version of traditional K-means so as to execute it over Hadoop distributed framework. The experimental results show that our proposed K-means algorithm outperforms traditional K-means while clustering large volume of datasets.

Proceedings ArticleDOI
01 Mar 2019
TL;DR: A secure cryptosystem with three level security based on chaos for video encryption that provides three- level security (FS, PO and DF) in extracting the encrypted information.
Abstract: The express development of communication and technology has created new challenges to transfer data in a secured way. This paper presents a secure cryptosystem with three level security based on chaos for video encryption. The proposed method employs one round permutation and diffusion structure for encryption. The logistic and tent maps are combined (LTS) to generate the initial parameters for the proposed encryption system. The video frame is first selected based on Frame Selection (FS) is encrypted by applying permutation order (PO) and then diffusion is carried out on the permuted frame by diffusion frame (DF) generated. After encryption, the encrypted frame is placed in order, to create a video sequence for transmission. This method provides three- level security (FS, PO and DF) in extracting the encrypted information. Experimental outcomes and analyses confirm that the method is competent.

Journal ArticleDOI
TL;DR: The work intended to design and develop an automated and manual AC system working in remote and local mode, to increase the level of comfort, easy operation, reducing human intervention and faults occurring in the system.
Abstract: In the era of automation, most of the application of engineering and science are interrelated with system for optimal operation. To get the efficient result of an operation and desired response, interconnected systems should be controlled by directing, regulating and commanding. Here, air conditioning (AC) system is considered for experimentation, to supervise and control its functioning in both, automated and manual mode. This paper reports the work intended to design and develop an automated and manual AC system working in remote and local mode, to increase the level of comfort, easy operation, reducing human intervention and faults occurring in the system. The Programmable Logical Controller (PLC) and Supervisory Control and Data Acquisition (SCADA) system were used for remote supervision and monitoring of AC systems using series ninety protocol and remote terminal unit modbus protocol as communication module to operate in remote mode. PLC was used as remote terminal for continuous supervision and control of AC system. SCADA software was used as a tool for designing user friendly graphical user interface. The proposed SCADA AC system successfully monitors and controls in accordance within the parameter limits like temperature, pressure, humidity and voltage. With all the features, this designed system is capable of efficient handling of the resources like the compressor, humidifier etc., with all the levels of safety and durability. This system also maintains the temperature and controls the humidity of the remote location and also looks after the health of the compressor.

Journal ArticleDOI
TL;DR: In this article, the performance of a shell and tube heat exchanger with zinc oxide nanofluid was compared with water as the base fluid, and the authors concluded that heat transfer enhancement and effectiveness does occur with nano fluids but at the cost of pumping power.
Abstract: In Shell and Tube Heat Exchanger (STHX), heat is exchanged between hot water (coming from industrial outlet by forced convection) to the cold water. Instead of water, if Nano fluids are used into these tubes, then there is a possibility of improved heat transfer because of high thermal conductivity of the nanofluids. From many literature and patents, it was clear that the study of STHX using metal oxide nanoparticles is very scarce. Therefore, the objective of the present investigation is to check the thermal performance of STHX operated with zinc oxide nanofluid and compare with water as the base fluid. Heat transfer analysis of a shell and tube heat exchanger was carried out experimentally using Zinc oxide as a nanofluid. Mass flow rate on tube side was varied while on the shell side it was kept constant. Various heat transfer parameters like heat transfer coefficient, heat transfer rate effectiveness and LMTD (Log Mean Temperature Difference) were studied. The experimental readings were recorded after the steady-state is reached under forced flow conditions. It was found that the effectiveness improves with increase in mass flow rate of nanofluids as compared to base fluid. From the obtained results, it was concluded that heat transfer enhancement and effectiveness improvement does occur with nano fluids but at the cost of pumping power.

Journal ArticleDOI
TL;DR: In this article, the influence of deep cryogenic treatment on hardness and toughness of En 31 steel is discussed, which is a high carbon steel which is highly demandable for industrial applicat...
Abstract: The influence of deep cryogenic treatment on hardness and toughness of En 31 steel is discussed in this paper. En 31 steel is a high carbon steel, which is highly demandable for industrial applicat...

Journal ArticleDOI
TL;DR: A compact Depth Motion Map based representation methodology with hastey striding, consisely accumulating the motion information is proposed, and empirically prove the feasability of the method under standard protocols, achieving proven results.
Abstract: . Accumulating the motion information from a video sequence is one of the highly challenging and significant phase in Human Action Recognition. To achieve this, several classical and compact representations are proposed by the research community with proven applicability. In this paper, we propose a compact Depth Motion Map based representation methodology with hastey striding, consisely accumulating the motion information. We extract Undecimated Dual Tree Complex Wavelet Transform features from the proposed DMM, to form an efficient feature descriptor. We designate a Sequential Extreme Learning Machine for classifying the human action secquences on benchmark datasets, MSR Action 3D dataset and DHA Dataset. We empirically prove the feasability of our method under standard protocols, achieving proven results.

Journal ArticleDOI
26 Aug 2019
TL;DR: In this paper, the authors presented numerical modeling using the ANSYS software adapted for finite element method, to follow the evolution of the global temperatures for the two types of brake discs, full and ventilated disc during a braking scenario.
Abstract: In this work, we will present numerical modeling using the ANSYS software adapted for finite element method, to follow the evolution of the global temperatures for the two types of brake discs, full and ventilated disc during a braking scenario. Also, the numerical simulation of the transient thermal analysis and the static structural one is performed here sequentially with the coupled thermo-structural method. A numerical procedure of calculation relies on important steps such that the CFD thermal analysis is well illustrated in 3D, showing the effects of heat distribution over the brake disc. This CFD analysis will help us in the calculation of the values of the thermal coefficients (h) that will be exploited in the 3D transient evolution of the brake disc temperatures. Three different brake disc materials were selected in this simulation and a comparative analysis of the results was conducted in order to derive the one with the best thermal behavior. Finally, the resolution of the coupled thermomechanical model allows us to visualize other important results of this research such as; the deformations, and the equivalent stresses of Von Mises of the disc, as well as the contact pressure of the brake pads. Following our analysis and the results we draw from it, we derive several conclusions. The choice will allow us to deliver the best suitable design of the brake rotor to ensure and guarantee the good braking performance of vehicles.

Journal ArticleDOI
TL;DR: The proposed method ensures the protected data transmission with exact and trustworthy validation and introduces sharing of the data securely using a method called Improved Diffie Hellman Key Exchange Algorithm (IDHKE).
Abstract: One of the vital hitches in today's world of research is ensuring the security of the Cloud. This security can be ensured by inventing new techniques that may possibly help in safeguarding and assuring the optimal status of information in the cloud. Contents that are stored in the Cloud are majorly affected by the attempts made by illegitimate sources that are trying to access it. The security level of the contents that are stored in the cloud can be guaranteed by focusing on a task that helps in both securing and verifying the data. In order to manage the security level, (SE-KAC) which is also known as Scalable and Enhanced Key-Aggregate Cryptosystem was initiated in current research method. But this method of securing and sharing secret keys cannot be used in the stage of decryption. However this problem can be resolved in proposed method since it introduces sharing of the data securely using a method called Improved Diffie Hellman Key Exchange Algorithm (IDHKE). By introducing the Improved Diffie Hellman Key Exchange Algorithm, securely sharing the secret keys to the receivers of the data has been achieved. The secret key details can be exchanged securely using this method. By this means it makes sure its affirmations. Here the key is safely generated using one random prime number, a master secret key and parameter value. Intended for the secured and consistent access control limitation, an encryption which is attribute-based is used. The proposed method thus ensures the protected data transmission with exact and trustworthy validation.

Journal ArticleDOI
TL;DR: Simulation result demonstrates that the proposed method gives better performance than other methods and improves the robustness against some security attacks.
Abstract: Biometric cryptosystem is an integrated system of cryptography with biometric features which is considered to be a promising component of template security. This paper presents a novel method for biometric cryptosystem based on fuzzy vault using palmprint features. Initially, pre‐processing is performed to remove noise in palmprint enrolled image and to pre‐align image automatically. Bottom‐hat filtering is employed for the feature extraction from the palmprint images. A polynomial is evaluated from the secret key and this polynomial is used to generate projections from palmprint features. Fuzzy vault is created by combining projected points with randomly generated dummy or chaff points. During decoding process, matching scores are calculated by comparing the query feature and stored vault. The vault is successfully decoded when the matched scores should be greater than a predefined threshold value. Experiments were conducted on CASIA database. Simulation result demonstrates that the proposed method gives better performance than other methods and improves the robustness against some security attacks.

Proceedings ArticleDOI
15 Mar 2019
TL;DR: This paper describes about the design of low cost, portable oscilloscope which is an alternative to the typical cathode ray oscilloscopes used in the laboratories, and consists of three main circuits for performing front end, sampling and triggering.
Abstract: This paper describes about the design of low cost, portable oscilloscope which is an alternative to the typical cathode ray oscilloscopes used in the laboratories. The objective of the design is to make the oscilloscope an affordable one. This design consists of three main circuits for performing front end, sampling and triggering. The primary focus is to provide a clear waveform which aids the user to measure the time period and amplitude with high accuracy. This handy CRO has the features of hardware triggering, user control, 200 KHz bandwidth and +/- 1.5V input swing.

Journal ArticleDOI
TL;DR: In this article, the performance of vapor compression refrigeration system using hydrocarbon refrigerant (HCR) mixture (R600a and R290), hydrocarbon nanorefrigerant mixture (HNF), and polyethylene glycol (PEG) was investigated.
Abstract: This paper studies the performance of vapor compression refrigeration system using hydrocarbon refrigerant (HCR) mixture (R600a and R290), hydrocarbon nanorefrigerant mixture (R600a and R290/TiC) a...

Proceedings ArticleDOI
01 Dec 2019
TL;DR: This proposed work is focused on diagnosing and identifying the conjunctivitis using deep learning technique and there are lot of technical challenges in the identifying the right algorithm and implementing in both clinical and technical areas.
Abstract: Artificial Intelligence[AI] using deep learning (DL) plays the significant trend in the image processing. Also AI using natural language processing and speech recognition is a recent trend in the health care industry. There are various ongoing researches for incorporating deep learning in ophthalmic field which is more trending now. DL can be used for extracting the fundus photographs, optical coherence tomography which is accomplishing the performance in identifying the conjunctivitis. How ever there is lot of technical challenges in the identifying the right algorithm and implementing in both clinical and technical areas. This proposed work is focused on diagnosing and identifying the conjunctivitis using deep learning technique.

Journal ArticleDOI
TL;DR: An experimental result proves that proposed research methodology SE-KAC attains higher security and less complexity.
Abstract: Cloud based intelligent health monitoring system (CIHMS) is smart equipment which facilitates the patients to repossess the health care information without going to the hospital. By recording the health care information of the patients in the cloud environment, this could be attained. Nevertheless, while coming to the part of security of healthcare information is a difficult issue. Cloud computing gives a means of storing and distributing the huge amount of data’s from the several users. Storing and distributing data contents via third party server will bring about more security problems. The care should be taken on those contents that are dealing via the cloud storage and the illegal access made by malevolent users must be observed and retracted. In the previous research, Bi-directional storage verification in cloud storage (BD-SVCS) is presented for the cloud environment that will validate each user beforehand giving them authentication. Nevertheless, this technique still found to be short of the safe and competent authentication. Here encryption information could be hacked simply. These issues are eliminated in the proposed methodology called scalable and enhanced key-aggregate cryptosystem (SE-KAC), in which the safe and consistent dealing of data contents is guaranteed. It gives competent security for healthcare information. This technique deals with the issue of outflow of sensitive information and implements a safe CIHMS for giving the security of the related parties and their data. By utilizing this technique, the patient and healthcare institutions could record the health and medical prescription data in encrypted format. For encryption, the double encryption technique with cipher text id known as classes for enhancing the security. The key owner contains a master secret key which is utilized to extract the secret keys for various classes. The extracted key is accumulated and forwards as a single aggregate key to the patient for the purpose of decryption. In addition, unique data shared by numerous users are found out that would be given via the similar set of resources with the intention of evading the annoying resource wastage. This is accomplished by taking the similar data contents needed by the users in the identical virtual machine. An experimental result proves that proposed research methodology SE-KAC attains higher security and less complexity.

Journal ArticleDOI
TL;DR: Simulation results prove that the proposed fingerprint template protection scheme can achieve high genuine acceptance rate with improved security and validated on FVC 2002 database.
Abstract: Biometric systems accumulate information from biometric elements of an individual and used to exceptionally confirm the person with the physical and behavioral properties of the biometric characteristic. Biometrics and cryptography systems have been identified as the two main components of digital security system. Cryptography is combined with biometric to achieve high security. In this paper, fingerprint template protection is proposed which is based on fuzzy vault scheme. Initially, enrolled fingerprint images are preprocessed using some image processing techniques and preprocessed images are prealigned automatically using directed reference point. All the minutiae points are extracted and extracted minutiae features along with secret key are used to produce the fuzzy vault. Query features are given as an input with the stored template to recover the corresponding key. The proposed method is validated on FVC 2002 database. Simulation results prove that the proposed method can achieve high genuine acceptance rate with improved security.

09 Apr 2019
TL;DR: A Machine Learning - (ML)-based system architecture and algorithms to find patterns of learning, interaction, and relationship and effective valuation for a complex system involving massive data that could be obtained from a proposed collective learning environment (CLE).
Abstract: Novel organic single Machine learning has fascinated more and more attention in the past few decades. In this paper, we have proposed machine learning-based system architecture and algorithms to find patterns of learning, interaction, and relationship and effective valuation for a complex system involving massive data that could be obtained from a proposed collective learning environment (CLE). Collective learning may take place among larger team members to find solutions for real-time events or problems, and to discuss concepts or interactions during situational judgment tasks (SJT). Modelling a collective, networked system that involves multimodal data presents many challenges. This paper focuses on proposing a Machine Learning - (ML)-based system architecture to promote understanding of the behaviours, group dynamics, and interactions in the CLE. The designed framework integrates techniques from computational psychometrics (CP) and deep learning models that include the utilization of convolution neural networks (CNNs) for feature extraction, skill identification, and pattern recognition. The proposed framework also identifies the behavioral components at a micro level, and can help us model behaviors of a group involved in learning.

Journal ArticleDOI
TL;DR: The article has been withdrawn on the request of the authors and the editor of the journal Current Signal Transduction Therapy as discussed by the authors on the basis of plagiarism or fabricated information was discovered.
Abstract: The article has been withdrawn on the request of the authors and the editor of the journal Current Signal Transduction Therapy. Bentham Science apologizes to the readers of the journal for any inconvenience this may have caused. It is a condition of publication that manuscripts submitted to this journal have not been published and will not be simultaneously submitted or published elsewhere. Furthermore, any data, illustration, structure or table that has been published elsewhere must be reported, and copyright permission for reproduction must be obtained. Plagiarism is strictly forbidden, and by submitting the article for publication the authors agree that the publishers have the legal right to take appropriate action against the authors, if plagiarism or fabricated information is discovered. By submitting a manuscript the authors agree that the copyright of their article is transferred to the publishers, if and when the article is accepted for publication.

Proceedings ArticleDOI
15 Mar 2019
TL;DR: This Robotic vehicle is involved to rescue the human beings and extinguishing the fire where fire fighters are not able to enter into the fire accidental area.
Abstract: At present all the works of human beings are replaced by the robots. Generally robotics are classified into service robotics and industrial robotics. Nowadays all fields are occupied by robotics including, hospitals, agriculture, defense, hazardous environment and office. The Robots are used where ever human does not do their work efficiently and safely such as handling poisonous and explosive products in industries. The direction of the robotic vehicle and the spraying of water in the fire is controlled by the voice command. The communication between the vehicle and humans are established through the NODE MCU and ARDUINO. The vehicle consists of three major components such as the NODE MCU, ARDUINO, and water level indicator (on vehicle). This Robotic vehicle is involved to rescue the human beings and extinguishing the fire where fire fighters are not able to enter into the fire accidental area.

Journal ArticleDOI
TL;DR: Hardware complexity here proposed a compressor‐based multiplier to increase the performance of JPEG standard as well as reducing the logic resources in CYCLONE IV FPGA.