19 research outputs found

    Research-Based on Telecommunication in Mobile Service Provider's Performance using Enhanced Naive Bayes Classifier

    Get PDF
    In recent years, mobile service providers have rapidly expanded across all countries. Considering unpredictable development trends, mobile service providers are essential to knowledge-based service businesses. Performance may be improved by creating and disseminating new information through innovation activities based on the usage of business intelligence. This research examined the performance of mobile service providers across all countries utilizing an enhanced Naive Bayes classifier based on telecommunication. In comparison to quantitative variables, the naive Bayes performs quite well. In the beginning, data is collected and the normalization technique is used for data preprocessing. Feature extraction is carried out using “Term Frequency and Inverse Document Frequency (TF-IDF)”. “Decision Tree algorithm” is used for data analysis. Then the feature is selected using a two-stage Markov blanket algorithm. Enhanced NaĂŻve Bayes Classifier is the proposed algorithm for telecommunication analysis and at last, the performance of the system is analyzed. This proposed algorithm is used to compare the mobile service provider's performances with existing algorithms. The proposed method measures the following metrics as Throughput, Packet loss, Packet duplication, and User quality of experience. The proposed algorithm is more effective and produces better results.&nbsp

    MMwave MIMO in 5G Network Analysis for Spectral Efficiency with Beamforming Based Channel Estimation

    Get PDF
    5G network has its high energy efficiency and spectrum efficiency, massive multiple-input and multiple-output (MIMO) has been envisioned as a key technology.This research work is centred on optimal method creation of energy-efficient massive MIMO methods, which is most active research technology in the communication industry.The suggested model, which takes into account a multi-cell model scenario, is a realistic method that improved spectral efficiency (SE) of huge MIMO methods.Base stations (BSs) do channel estimate based on uplink (UL) transmission using least-square (LS), element-wise MMSE, and minimum mean-squared error (MMSE) estimators.This research propose novel technique in MMwaveMIMO 5G network based spectral efficiency and channel estimation. The aim of this research is to enhance the spectral efficiency of MIMO channel using HetNets zero forcing Multiuser propagation models. The channel estimation is carried out based on beamforming using matched filter channel estimation with wide band antenna.Finally, simulation results demonstrate the high channel estimate accuracy and spectrum efficiency that the suggested systems can accomplish.Proposed technique attained sum rate of 85%, spectral efficiency of 93%, DoF of 79%, energy efficiency of 98% and detection accuracy of 96% for number of cells and sum rate of 77%, spectral efficiency of 85%, DoF of 71%, energy efficiency of 92% and detection accuracy of 95% for number of users

    Understanding the Different Models used for Software Testing

    Get PDF
    The process of software testing has few guidelines and rules and policies and certain number of stages which the testers are supposed to follow in order to do efficient testing of the product or system software or application. There are number of software testing models which can be used to test the system or product based on the type of system to be tested. There are few stages in each model which on should follow to do testing of the application. This paper will explain each model in detail with the help of diagrams. This will also explain the challenges and advantages of each model in detail

    Cloud Computing Security Optimization via Algorithm Implementation

    Get PDF
    There has been a growing need for significant improvements in cloud computing security ? to ensure that operations and data interactions in the cloud keep abreast with the dynamic nature of information technology. Motivated by the quest for cloud computing security, this paper has examined different approaches that most of the previous scholarly investigations (which focus on the adoption of machine learning in cloud computing security) have proposed ? towards better threat detection. The paper has begun with a general algorithm responsible for establishing the summation of risk levels before proceeding to more advanced algorithms through which threats to cloud data could be determined. Imperative to note is that the advanced approaches have been found to embrace anomaly detection and signature detection, translating into a proposed hybrid model for threat detection in the cloud. Whereas a major weakness is that the proposed model is not compared to another competitive model, its strength lies in the capacity to give an insight into ways in which certain time frames and profile categories could be specified, leading to a better classification of cloud user profiles and the eventual detection of anomalies

    Intelligent Banal type INS based Wassily chair (INSW)

    Get PDF
    oai:ojs2.ijnpme.org:article/2The navigation of physically impaired requires a continuous positioning with certain accuracy in their environments. This paper proposes an automated wheel chair developed for the indoor navigation using Inertial Navigation System (INS) for the physically blight persons. The Wassily chairs are the mobile chairs that facilitate the movement of the user in pre-functioned places. This is an intelligent vehicle which has all the feasibility for the usage of the physically impaired. This mobile chair replaces the traditional gear system with the keypad system to reach the destined places and to locate the things in the destined places. This makes the vehicle smart and user-friendly augmenting the viability to carry out their day to day activities.  It has an additional feature, the automatic airbag system which provides hip bone protections

    Analysis and Design of Universal Shift Register Using Pulsed Latches

    Get PDF
    Power utilization and die region space are the significant boundaries which are considered for structuring low level power outcomes. This paper put forward the structure of low force general move register and 4-piece counter utilizing pipe rationale. Since flip failures are an innate structure hinder in a few applications, different flip lemon are over viewed and executed in widespread move register and 4-piece counter. Flip lemon utilizing pipe rationale is viewed as dependent on the correlation of intensity and region. At last, a low force all inclusive move register and 4-piece counter is planned utilizing pipe rationale. The proposed USR and 4-piece counters are mimicked with various clock rate going from 100 KHz to 500MHz. Re-enactment of these flip flounders, the widespread move register and the 4-piece counters are finished utilizing Tanner device at 180nm innovation. The normal force and the PDP of USR are improved by 33% and 27% and further the normal force and the PDP of 4-piece counter are improved by 36.9% and 30.2% when contrasted and existing plan separately. So the put forward plan is reasonable for low level power and elite applications

    Efficient Cluster Formation Protocol in WSN

    Get PDF
    WSN which is called as Wireless Sensor Networks plays vital role in many applications. Most WSNs exploit clustering method for data communication from sensor destination nodes to the sink. So, Clustering should be made as efficient as possible. In most of the existing clustering protocols, residual nodes (non-cluster nodes) may be formed during clustering. Though these nodes can send their data directly to the base station, it needs large amount of energy. In the proposed method, PSO algorithm which is termed as Particle Swarm Optimization is used for cluster configuration which evades the formation of residual nodes. The base station performs cluster formation. Network Simulator-2 (NS-2) tool is used to achieve simulation. Simulation outcomes reveal enhanced operation of the proposed protocol than existing LEACH and OEERP protocols

    Object Detection and Sorting using IoT

    Get PDF
    Color based object sorting has a significant impact in food and processing Industries. Hand picking process in sorting the huge number of objects in industry is very common and laborious task, and time consuming as well, which needs many labors and this conventional method is prone to error. The proposed work aims to replace the hand-picking process by Industrial Internet of Things. The goal of the technique is to sort and count the objects in to different bins accord to their color. A Color sensor, TCS 230 will identify the object and with the help of motors they are made to drop into different bins. The identification of the object is made with the help of frequency concept. As it known that different colors have different wave lengths, so are the different frequencies (f=c/?). For each frequency, the motor rotates to different angles and thus container is attached to motor is also made to rotate to a certain angle, and the object is made to drop into the bin by a jerk. This action details regarding number of objects manufactured are sent to the IoT server, where the vendor and customer will know the details remotely. This proposed work finds a wide range of usage in fruit industry (to pick the unripen fruit), in candy industry, in grain industry (to remove the black stones from the grains), in recycling industry.&nbsp

    Design of Hand Motion Assist Robot for Rehabilitation Physiotherapy

    Get PDF
    This paper deals about developing a microcontroller based two-axis robot for human hand physiotherapy for the treatment of paralyzed patients. The interactive two-axis motion robot is designed to fit around patient’s arm and work with the patient to reestablish movements of hand by gently moving it in desired direction. The robot moves the patients hand up and down, left and right using servo motor interfaced with it. The motor is controlled by switching ON/OFF the stator winding. The microcontroller generates the switching pulses of the motor; the angular distance and movements are programmable through keys. The robot actively moves the non-responsive body parts allowing it to be a useful tool in all steps of rehabilitation. Note to Practitioners-Compared with cable-driven humanoid arm, a cable less robot is more accurate because a cable driven robot has some drawbacks due to the mismatch of connections. If the connections are mishandled, there is a chance to occur any severe damages. The main drawback is more expensive, very difficult to maintain and clean. This drawback can be rectified by the proposed method. The main feature of this robot is its mobility function

    Prevention of Emulation Attack in Cognitive Radio Networks Using Integrated Authentication

    Get PDF
    Security is the prominent problem in emerging cognitive radio. Protecting the chief user’s and sub-ordinate user’s right to use the spectrum results in the correct cognitive radio operation. The major user emulation attack is a physical layer attack which disrupts the secondary user’s operation. An Advanced Encryption Standard scheme is used in this work that aims to defeat the chief User Emulation Attack by the correct detection of the chief user. The reference signal is encrypted and transmitted along with the Digital TV signal. Using a shared secret the receiver regenerates the reference and the cross association and the auto correlation are calculated which helps in the accurate detection of the chief user as well as the malicious user. The simulations were carried out and the results show that the detection scheme results in zero misdetection and also false alarm which is below a set threshold
    corecore