1,321 research outputs found

    Overview of Beyond 4G-LTE Wireless Transmission Technologies

    Get PDF
    Non-orthogonal multiple access (NOMA) is a promising applicant innovation for 5G cell systems. By and by MIMO-OFDM remote innovations are utilizing in 4G LTE development remote correspondence. This paper examine about the job of MIMO-OFDM and NOMA as principal contributing execution factors in past 4G LTE Remote Transmission Innovation from a specialized point of view. Long Term Evolution (LTE) utilizes Orthogonal Frequency Division Multiplexing (OFDM) along with MIMO (Multiple Input Multiple Output) reception apparatus innovation standard to accomplish high radio spectral efficiency and multicarrier approach for multiple accesses

    Predicting users’ behavior using mouse movement information: an information foraging theory perspective

    Get PDF
    The prediction of users’ behavior is essential for keeping useful information on the web. Previous studies have used mouse cursor information in web usability evaluation and designing user-oriented search interfaces. However, we know fairly to a small extent pertaining to user behavior, specifically clicking and navigating behavior, for prolonged search session illustrating sophisticated search norms. In this study, we perform extensive analysis on a mouse movement activities dataset to capture every users’ movement pattern using the effects of information foraging theory (IFT). The mouse cursor movement information dataset includes the timing and positioning information of mouse cursors collected from several users in different sessions. The tasks vary in two dimensions: (1) to determine the interactive elements (i.e., information episodes) of user interaction with the site; (2) adopt these findings to predict users’ behavior by exploiting the LSTM model. Our model is developed to find the main patterns of the user’s movement on the site and simulate the behavior of users’ mouse movement on any website. We validate our approach on a mouse movement dataset with a rich collection of time and position information of mouse pointers in which searchers and websites are annotated by web foragers and information patches, respectively. Our evaluation shows that the proposed IFT-based effects provide an LSTM model a more accurate interpretative exposition of all the patterns in the movement of the users’ mouse cursors across the screen

    Designing of RMPA of Double Band Antenna by Modified “Interconnected SRR” Metamaterial Structure

    Get PDF
    A dual band structured antenna is designed after implementing “split rectangular” shaped MTM structure on a normal patch. Initially designed antenna was operating on the frequency of 3GHz but for the application requirement metamaterial was implemented. This implemented structure not only diminished the measure of antenna but also converted it into double band antenna. Modified antenna is able to work at 2.72GHz and 2.27GHz

    Tourist Guides’ Perspectives of Demarketing the Taj Mahal

    Get PDF
    A UNESCO world heritage site since 1983, the Taj Mahal, located in the city of Agra in India is an important contributor to tourism in India. In the year 2018 alone, approximately 280 million tourists visited the monument. However, the popularity of the site has several negative impacts such as yellowing of the structure, pollution and overcrowding which endangers this built cultural heritage. Due to this, the Archaeological Survey of India (ASI), which is the national authority entrusted with managing heritage sites, has initiated steps to check overcrowding in the Taj Mahal. One of the widely adopted strategies is demarketing. This paper discusses the impact of different demarketing techniques implemented at Taj Mahal on the tourist guides operating in the monument. To do this, investigative research was conducted with a total of 17 tourist guides who offer their services at the Taj Mahal. A thematic analysis based on semi-structured in-depth interviews was carried out. The study found that though the tourist guides at Taj Mahal are not directly affected by the demarketing measures yet, they face the reverberations of these initiatives. They appreciate the strategies adopted by the authorities to curtail overcrowding and emphasise the need for conservation of the monument as well. The study suggests that demarketing measures not only help in conserving the monument but also prove beneficial for stakeholders. The findings of the study are helpful for policymakers, and monument leadership in taking such measures to control the excessive tourism activities without affecting local stakeholders’ income. As demarketing is a delicate measure, it should be considered carefully on a case-by-case basis, taking important stakeholders into confidence. Various destinations have applied demarketing strategies in western countries, however, in India, the Taj Mahal is the first monument which has decided to implement such techniques to curb excessive flows of tourists. This study provides a fresh perspective on the effectiveness of this strategy. Further, the concept of demarketing is novel to stakeholders in India in general and the Taj Mahal in particular

    Securing Cloud from Tampering and Duplication

    Get PDF
    Cloud computing is the most emerging technology today which is used by most of the social media sites to store the data. The data stored on the cloud is private data of the user so it must not be tampered by other entities. The previous system has worked on reducing the storage space by copying and archiving data but on the cost of reduced performance rate. We propose a system to enhance the storage space by performing deduplication on data and shuffling the data,between the number of directories within cloud after particular interval of time to avoid the tracking of data to enhance the security. The backup of the data will be taken timely into the back up directory. The proposed system will provide ease to use the cloud

    Clone Detection for Efficient System in WSN Using AODV

    Get PDF
    Wireless sensor networks accommodate a whole lot to thousands of sensor nodes and are wide employed in civilian and security applications. One in every of the intense physical attacks faced by the wireless sensor network is node clone attack. So 2 node clone detection protocols area unit introduced via distributed hash table and arbitrarily directed exploration to detect node clones. The previous primarily based on a hash table value that is already distributed and provides key based facilities like checking and caching to observe node clones. The later one is exploitation probabilistic directed forwarding technique and border determination. The simulation results for storage consumption, communication value and detection chance is completed exploitation NS2 and obtained arbitrarily directed exploration is that the best one having low communication value and storage consumption and has smart detection chance

    Clone Detection for Efficient System in WSN using AODV

    Get PDF
    Wireless sensor is wide deployed for a spread of application, starting from surroundings observance to telemedicine and objects chase, etc. For value effective sensing element placement, sensors are usually not tamperproof device and are deployed in places while not observance and protection, that creates them at risk of fully different attacks. As an example, a malicious user may compromise some sensors and acquire their private information. Then, it?ll duplicate the detectors and deploy clones in an exceedingly wireless sensor network (WSN) to launch a spread of attack that?s mentioned as clone attack. Because the duplicated sensors have an equivalent information, e.g., code and crypto graphical information, captured from legitimate sensors that may merely participate in network operation and launch attacks. Because of the low value for sensing components duplication and preparation, clone attacks became one in all the foremost essential security issues in WSNs. Thus, it?s essential to effectively detect clone attacks therefore to ensure healthy operation of WSNs
    • …
    corecore