Application of Cartoon Like Effects to Actual Images IJTSRD
This paper represents different techniques of converting image to cartoon. Using any one of below mentioned techniques it is possible to convert all types of captured images to cartoon such as images of person, mountains, trees, flora and fauna etc. There are several other techniques for image to cartoon conversion such as using photoshop, adobe […]
A Review on Performance Enhancement of Catalytic Conveter by Making Geometrical Changes IJTSRD
Now a days the global warming and air pollution are big issues in the world. The 70% of air pollution is due to emissions from an internal combustion engine. Catalytic monolith converters have been used for nearly four decades to reduce the toxicity of exhaust gases from the internal combustion engine powering automotive/machines The harmful […]
Enclosure Design for 3D Printing IJTSRD
In the recent past many industries have widely started adopting 3D Printing for prototyping and manufacturing of low volume customized parts. This paper will look at additive manufacturing or 3D printing and how electronic enclosures can be developed using this technology. It will define the meaning of this term and what is so significant about […]
Nanotribology and its Need A Review IJTSRD
tribology is a texture of two latin words tribo and lodgy . Tribo refers adding glove and lazy data. The Greeks first added it to appreciate the development of huge stones on the surface of the world. Today Tribology accepts a fundamental job in different imaginative districts in advanced mechanical organizations of semiconductor and data […]
Analysis of Hardware Security to Prevent the Scan Based Attacks by using Sticky Counter IJTSRD
Security of integrated circuits (ICs) has emerged as a major concern at different stages of IC life-cycle, spanning design, test, fabrication and deployment. Modern ICs are becoming increasingly vulnerable to various forms of security threats, such as: 1) illegaluse of hardware intellectual property (IP) \IP Piracy. 2) Illegal manufacturing of IC\ IC Piracy. Designing of […]