BITS Pilani
ELECTRICAL AND ELECTRONICS ENGINEERING
Introduction. This paper provides a preliminary analysis of the effects of Facebook usage by undergraduate students at Luleå University of Technology in Sweden. The proposed research model tests the perceived effect of personality traits,... more
Introduction. This paper provides a preliminary analysis of the effects of Facebook usage by undergraduate students at Luleå University of Technology in Sweden. The proposed research model tests the perceived effect of personality traits,... more
Increasing Green House Effect and reducing fuel storage of planet contributed highly due to automobile industry drives an alarming situation for researcher to look for alternative options for future generation vehicle. Tesla, Mahindra-eco... more
Cloud Computing is high utility software having the ability to change the IT software industry and making the software even more attractive. It has also changed the way IT companies used to buy and design hardware. The elasticity of... more
The whole finance of the world revolves around currency. It may be physical or digital. Currency functions as a unit of account providing a common measure of goods and services being exchanged. The enormous use of paper currency has... more
Cloud Computing is high utility software having the ability to change the IT software industry and making the software even more attractive. It has also changed the way IT companies used to buy and design hardware. The elasticity of... more
The Steiner minimum tree (SMT) problem is one of the classic nonlinear combinatorial optimization problems for centuries. The Steiner tree problem finds the minimum cost tree connecting a given set of nodes called required nodes in a... more
This assignment addresses two important questions and one minor. The major ones would be how Constantinople and the Western Roman Empire was partly responsible for the fall of the city? Second would be the why the Ottomans were so driven... more
The report undertakes the assignment of reviewing the working and advancements of quantum cascade lasers. The report provides a brief introduction to the study project followed by some discussion over the related research papers. The... more
Traditionally, heuristic methods are used to generate candidates for large scale recommender systems. Model-based candidate generation promises multiple potential advantages, primarily that we can explicitly optimize the same objective as... more
While most autonomous driving efforts reported are directed for general driving and mainly on major roads, there are numerous applications for autonomous vehicles for last mile mobility-from person mobility and mail delivery to flexible... more
This paper shows a framework of the different techniques for the design of the planning and governing components, implementation, Evolution and execution of an intelligent manufacturing system. Architecture of a modern manufacturing... more
Due to variety of materials available to any designer for a particular application, there is a need for a proper technique to select. This paper focuses on the optimum selection of materials for electrostatic microactuators using Ashby... more
Precise payload positioning by an overhead crane is dif£cult due to the fact that the payload can exhibit a pendulum-like swinging motion. Motivated by the desire to achieve fast and precise payload positioning while minimizing swinging... more
Passivity based controllers are known to provide robust stability for inherently passive dynamic systems. Recently, with the development of "passification" techniques, these controllers are also shown to be effective in robust... more
A controllable series device (CSD) is used to damp the transient oscillations in a power system. The power system studied here is the single machine infinite bus (SMIB) and the CSD used is a controllable series capacitor (CSC).... more
A stability result based on the Immersion and Invariance control strategy is derived for a class of systems described by differential equations with algebraic constraints. The result is then applied to synthesize a stabilizing control law... more