Using Image Processing Techniques for Automated Detection and Annotation of Faulty Regions in Thermal Infrared Images of PV Modules
With the increasingly growing number of solar energy sites, the need for better and faster fault detection techniques becomes more pressing. Using IR imaging is reliable and effective but scanning thousands or even hundreds of thousands of PV modules in mega sites quickly turns to be a time consuming and tedious task. To save on […]
An Analytical Survey on Data Access Control Mechanism in Cloud using Blockchain
Cloud storage is known for its huge infrastructure, this property of the cloud inevitably invites attackers. However, to overcome this data stored in encrypted form, this security measure is not enough to handle the issue of data privacy. The other threat to the data arises during the process of accessing these data through various forms […]
LoRa Technology – DNA of IoT
Although many techniques exist to transfer data from the widely distributed sensors that make up the Internet of Things IoT e.g., using 3G 4G networks or cables , these methods are associated with prohibitively high costs, making them impractical for real life applications. LoRa Long Range modulation together with LoRaWAN LoRa Wide Area Networks communication […]
Ambient Humidity Stabilizer with Nebulizer and Dehumidifier
The amount of water vapor in the air is called humidity. Humidity in the air varies according to regional climatic conditions. The ideal ambient humidity for human health is between 30 and 50 . The aim in this study, by keeping the humidity in the air at desired values, was to create the ideal ambient […]
Color Cryptography using Substitution Method
In world of computer network, fears come in many different forms. Some of the most common fears today are software attacks. If we want to secure any type of data then we can use encryption method. All traditional encryption methods use substitution and switch. Substitution methods map plain text into ciphertext in which characters, numbers […]