![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
LFC Technique of an Interconnected Hybrid Grid System with the Forecasting of Wind Power
As the wind power is random and strong, higher efforts have been incorporated into the load frequency (LF) controlling techniques. The research objective is we consider an interconnected power grid unit with a...
-
Chapter and Conference Paper
QCM Sensor-Based Alcohol Classification by Advance Machine Learning Approach
The consumption of alcohol is a general trend in many persons. But intense drinking will be disruptive and dangerous. The excessive intake of alcohol is allied with a selection of unconstructive consequences t...
-
Chapter and Conference Paper
Teaching Learning Aspects for Current Technical Education
Technical Institutes and participating stakeholders have to support the process of providing skill based education through inventive practices that blends classroom teaching and experiential-learning resources...
-
Chapter and Conference Paper
Design of Microstrip Antenna with Extended Ground
In this work, a novel microstrip antenna with the patch is compared with the patch with the ground extended of the same dimensions. The antenna with the extended ground has shifted frequency to higher side wit...
-
Chapter and Conference Paper
Role of Soft Computing Techniques in Software Effort Estimation: An Analytical Study
In develo** software, software effort estimation plays an important role in the success of a software project. Inaccurate, inconsistent, and unreliable estimation of a software leads to failure. Because of v...
-
Chapter and Conference Paper
Estimating Software Effort Using Neural Network: An Experimental Investigation
Software companies develop various softwares at the same time. It is very critical task that is to be managed by project managers. Completion of a project is purely dependent on various parameters such as time...
-
Chapter and Conference Paper
Fuzzy-Based Integration of Security and Trust in Distributed Computing
To protect the resources from various vulnerability factors, resources should have various routine security mechanisms such as antivirus capability, firewall capability, usage of secure network connections, pr...