23 results on '"N. Sathish"'
Search Results
2. Energy aware decision stump linear programming boosting node classification based data aggregation in WSN
- Author
-
A.S. Narmadha, S. Kokilavani Sankaralingam, and N. Sathish Kumar
- Subjects
Routing protocol ,Boosting (machine learning) ,Computer Networks and Communications ,Computer science ,Network packet ,Real-time computing ,020206 networking & telecommunications ,02 engineering and technology ,Energy consumption ,Data aggregator ,Euclidean distance ,Sensor node ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Decision stump ,Wireless sensor network ,Efficient energy use - Abstract
Data collection is a considerable operation in Wireless sensor network (WSN) to minimize the energy dissipation of sensor nodes and thereby increasing the network lifetime. A lot of research works have been designed for data gathering in WSN. A multi-mobile agent itinerary planning based energy and fault aware data aggregation and zone-based energy-aware data collection routing protocol was introduced to obtain better energy usage and data delivery in WSN. However, data aggregation accuracy was not increased and energy consumption during data aggregation was not reduced. In order to overcome such limitations, an Energy Aware Decision Stump Linear Programming Boosting Node Classification based Data Aggregation (EADSLPBNC-DA) Model is proposed. Initially, residual energy for every sensor node is calculated for performing the node classification. After that, linear programming boosting classification (LPBC) model is applied in EADSLPBNC-DA Model which increased the margin between the training samples (i.e., sensor nodes) of different classes. The LPBC model constructs a strong classifier by combining number of weak decision stump result. Subsequently, strong classifier in EADSLPBNC-DA Model accurately classifies each input sensor node as higher energy or lower energy node which reduced the misclassification error. Then, the lesser energy sensor nodes in WSN transmit the data packets to the neighboring higher energy sensor nodes through calculating the distance by Manhattan distance formula. Finally, the sink node gathers the data packets from the higher energy sensor nodes. As a result, EADSLPBNC-DA Model attains energy efficient data collection in WSN. Experimental evaluation of EADSLPBNC-DA Model is carried out on factors such as energy consumption, delay, data aggregation accuracy, network lifetime and data aggregation time with respect to number of sensor nodes and number of data packets. From the simulation results, proposed EADSLPBNC-DA Model significantly reduces the energy consumption by 22%, delay by 35% and data aggregation time by 28% when compared to the existing techniques. In addition, the data aggregation accuracy and network lifetime gets increased by 13% and 10% respectively compared to state-of-the-art works.
- Published
- 2020
3. Low Complexity Hybrid PSO-BB Detection Algorithm for Massive MIMO System
- Author
-
M. Kasiselvanathan and N. Sathish Kumar
- Subjects
Multidisciplinary ,Continuous phase modulation ,Computer science ,MIMO ,Particle swarm optimization ,QAM ,symbols.namesake ,Additive white Gaussian noise ,Modulation ,symbols ,Bit error rate ,Algorithm ,Quadrature amplitude modulation ,Computer Science::Information Theory - Abstract
Objective: A massive Multiple Input and Multiple Output (MIMO) receiver utilizes the proposed detection algorithm to reduce the complexity. Methods: The existing research work namely Noise and Relevancy aware Low Complexity Detection (NRLCD) algorithm for massive MIMO receiver utilizes normalized cross correlation based pruning strategy to viably evacuate uncorrelated signals. However, the existing research work still has more complexity with increasingly number of iterations to find more relevant signal vector. In this research paper, it is proposed to investigate execution of massive MIMO system utilizing Continuous Phase Modulation (CPM) modulation which is used to carry out signal modulation. Then, Hybrid Particle Swarm Optimization-and-Branch-and-Bound (Hybrid PSO-BB) algorithm is proposed for low complexity detection. Findings: CPM demonstrated to give superior performance over Quadrature Amplitude Modulation (QAM) technique with the presence of phase noises. Hybrid PSO-BB is anticipated; in which the best attainable solution were found and renewed using PSO. The performance assessment of the proposed research work and existing methods is done under Adaptive Additive Gaussian Channel (AWGN) using MATLAB Communication tool box. Improvements: From the simulation results, it is inferred that the Hybrid PSO-BB algorithm is superior to the existing methods in-terms of Bit Error Rate (BER) performance and complexity. Keywords: Bit Error Rate (BER), Continuous Phase Modulation (CPM), Low Complexity, Massive Multiple Input and Multiple Output (MIMO), Particle Swarm Optimization (PSO)
- Published
- 2019
4. High-Performance Disease Prediction and Recommendation Generation Healthcare System Using I3 Algorithm
- Author
-
P. J. Sathish Kumar, N. Sathish, V. Auxilia Osvin Nancy, S. B. Balaji, K. Kajendran, and N. Pugazhendi
- Subjects
Measure (data warehouse) ,Data collection ,Point (typography) ,Computer science ,business.industry ,Machine learning ,computer.software_genre ,Class (biology) ,Data set ,Set (abstract data type) ,Identification (information) ,Data point ,Artificial intelligence ,business ,computer - Abstract
The increase in number of disease challenges medical practitioner in making right decisions. As most diseases have the same set of symptoms, the medical practitioner struggles to take decision on recognizing disease as well as right treatment methods. A number of approaches are available for the disease identification and providing treatment, but finding the right approach is what matters. To solve this issue, an inter-/intra-disease impact, the disease-based prediction and recommendation generation method, is presented. The method first reads the input data set and produces a series of clusters with the samples obtained. In the second level, the method estimates inter-disease impact measure and intra-disease impact measure on various disease classes for every data point of the data collection. Using these two measures, the method computes I2-Disease weight for each data point in assigning a label to the data points. For the classification, the method estimates symptomatic disease weight based on inter-/intra-symptom correlation assessment. Based on the selected disease class, a set of treatment samples is populated and ranked according to their curing rate.
- Published
- 2021
5. Implementation of Adaptive Huffman Codes for PAPR Reduction in OFDM Systems
- Author
-
S. P. Vimal, M. Kasiselvanathan, and N. Sathish Kumar
- Subjects
Computer science ,Orthogonal frequency-division multiplexing ,business.industry ,Huffman coding ,QAM ,Reduction (complexity) ,symbols.namesake ,Encoding (memory) ,symbols ,Wireless ,Symbol rate ,business ,Algorithm ,Intermodulation - Abstract
Orthogonal Frequency Division Multiplexing (OFDM) is one of the upcoming techniques for achieving large data rates in 4G/5G wireless communication. In OFDM system, the data are transmitted over sizable subcarriers and modulated with low symbol rate. High-peak-to-average-power ratio (PAPR) is the major disadvantage in OFDM systems that results in out of band energy distortion, intermodulation among the subcarriers, and saturation in power amplifiers. This paper deals with the analyzing the PAPR reduction in OFDM systems using digital communication codes. Adaptive Huffman codes (AHC) is selected and applied in OFDM transmitter section for reducing the high peak signals. The encoding part selected in AHC is Vitter’s algorithm. QAM16 and PSK mapping schemes are used for modulating the data. Simulation is carried out for the proposed work using MATLAB software, and PAPR results are showed in Complementary Cumulative Distribution Function (CCDF) plot. Further, the PAPR results are compared with Huffman coding and using no codes. Simulation results show that for all subcarriers, the PAPR reduction of adaptive Huffman codes dominates the Huffman codes and using no codes.
- Published
- 2020
6. Performance Comparison of Various Machine Learning Algorithms for Ultrasonic Fetal Image Classification Problem
- Author
-
S. P. Vimal, M. Kasiselvanathan, and N. Sathish Kumar
- Subjects
Contextual image classification ,Computer science ,business.industry ,Dimensionality reduction ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Decision tree ,Image processing ,Machine learning ,computer.software_genre ,Perceptron ,ComputingMethodologies_PATTERNRECOGNITION ,Computer Science::Computer Vision and Pattern Recognition ,Principal component analysis ,Artificial intelligence ,business ,computer ,Classifier (UML) ,Algorithm - Abstract
The machine learning uses statistical algorithms to provide the ability to learn with and without data programming. Image classifier is used to categorize a subject or an object present in an image into predefined classes. A statistical algorithm used in numerous fields like pattern classification, regression, control systems, identification, and prediction. This research paper presents a novel approach performance comparison of machine learning classifiers used for the classification of ultrasonic fetal images. It presents Gabor feature extraction and various classification techniques to classify three different classes of ultrasound images. The proposed method is presented as follows. Initially, the Gabor features are obtained from raw images. To remove redundancy in features and dimensionality reduction principal component analysis (PCA) is applied. Finally, the features obtained from PCA are fed to the various machine learning classifiers and its performances are evaluated. The simulations results are carried out using MATLAB image processing toolbox. From the results, it is observed that decision tree (DT) algorithm and multi-layer perceptron (MLP) perform to be closer and this classifier outperforms all other classifiers.
- Published
- 2020
7. Implementation and Performance Analysis of Traffic Engineered Multiprotocol Label Switching Network for IPv6 Clients
- Author
-
N. Sathish Kumar, Sai Prasad N, Sachin Prasad, and Sri Kumaran M
- Subjects
Routing protocol ,computer.internet_protocol ,Resource Reservation Protocol ,business.industry ,Computer science ,Quality of service ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Open Shortest Path First ,Multiprotocol Label Switching ,Border Gateway Protocol ,MPLS VPN ,business ,computer ,Computer network - Abstract
Traffic engineering (TE) is one of the effective methods of IP routing used in Service provider networks when routers are overloaded due to uneven utilization of links. Multiprotocol Label Switching (MPLS) is a routing technique used in computer networks that guides data packets from one node to other node based on the concept of short path labels and speeding the traffic flows to support multiple customers. This project describes the design and Implementation of MPLS VPN (Virtual Private Network) along with dedicated traffic tunneling known as MPLS-TE with the help of Resource Reservation Protocol (RSVP), Open Shortest Path First protocol (OSPF) and Border gateway protocol (BGP) for IPv6 customers. The network is designed and simulated in GNS3 platform with Wireshark and various QoS performance metrics of the network are calculated to analyze the operational behavior of the network. A performance comparison of tunnel enabled and disabled MPLS VPN network is executed as an additional objective.
- Published
- 2020
8. Smart Irrigation System in Agriculture
- Author
-
S. P. Vimal, N. Sathish Kumar, K. B. Gurumoorthy, and M. Kasiselvanathan
- Subjects
History ,Irrigation ,Computer science ,Agriculture ,business.industry ,Agricultural engineering ,business ,Computer Science Applications ,Education - Abstract
The most difficult task in agriculture is watering the fields. The different types of watering system are drip system, nozzles type, tube method and sprinkler system. This paper focus about the drip system. The work specifies the moisture level sensing of the crops and supply the require water when needed. The components included in this work are ATmega 328 Microcontroller, GSM Module, Humidity sensor and soil moisture sensor. A prototype has been developed to protect the plants or crops more self sufficient from watering and sunlight. The model reports the status of current condition and also reminds the need of water through GSM module. The prototype model is a loop closed control system is designed to continuously monitor the humidity, temperature, soil moisture level and controlling the irrigation systems from the output of the pumping unit.
- Published
- 2021
9. An Hybrid Defense Framework for Anomaly Detection in Wireless Sensor Networks
- Author
-
A. Bharat Raj, S. Subburaj, N. Sathish, and S. B. Balaji
- Subjects
Secure communication ,Network security ,business.industry ,Packet loss ,Computer science ,Network packet ,Intrusion detection system ,business ,Flow network ,Wireless sensor network ,Computer network ,Network simulation - Abstract
Wireless sensor network consists of set of source, sink nodes and communication devices to interact without any support of the infrastructure. Unlike wired networks, the challenges faced in mobile ad-hoc networks possessed such as security design, network infrastructure, stringent energy resources and network security issues. The need to these security issues is much focused in overcoming the challenges in WSN. Here the perpetual work focuses on the secure communication using a novel defense framework named role based control model is proposed to analyze the network flow and to identify the misbehaving nodes. The communication is performed based on the cluster of immense size these confided in node(s) will most likely be passing on together, in the meantime allowing or section entry/correspondence of the unauthorized node(s) to continue keeping up a constant, tied down, dependable communication of versatile nodes. The simulation is performed using network simulator where the network parameters such as throughput, packet delivery ratio, delay and packet loss are analyzed to identify the malicious nodes.
- Published
- 2019
10. Adaptive neuro‐fuzzy inference system–based energy conservation system for performance enhancement of MANET
- Author
-
A Jegatheesan, C Anna Palagan, and N. Sathish Kumar
- Subjects
Adaptive neuro fuzzy inference system ,Computer Networks and Communications ,Computer science ,business.industry ,Mobile ad hoc network ,Computer Science Applications ,Theoretical Computer Science ,Energy conservation ,Computational Theory and Mathematics ,Residual energy ,Artificial intelligence ,Performance enhancement ,business ,Software ,Efficient energy use - Published
- 2019
11. Bit error rate aware accurate prediction of original signals with low distortion using low complexity detection algorithms
- Author
-
N. Sathish Kumar and M. Kasiselvanathan
- Subjects
Low complexity ,Computational Theory and Mathematics ,Low distortion ,Computer Networks and Communications ,Computer science ,Bit error rate ,Algorithm ,Software ,Computer Science Applications ,Theoretical Computer Science - Published
- 2019
12. Smart Health Monitoring Bodyarea Network Using Raspberry Pi
- Author
-
K Prendra, K V Ranjith, K Mohil Varmaa, V Nandalal, N Sathish Kumar, and T Robinsingh
- Subjects
History ,Heartbeat ,business.industry ,Computer science ,Process (computing) ,Monitoring system ,Computer Science Applications ,Education ,Set (abstract data type) ,Raspberry pi ,Microcontroller ,Software ,Bed-ridden ,Embedded system ,business - Abstract
In today’s world more death occurs due to not immediate treatment for bed ridden patients. It also requires more man power. This document presents the model, installation and looks of a hardware and software platform for health monitoring system for patients. The main purpose of this system is to set up a system that can watch over bedridden patient’s health. This project depends on both hardware and software. It is developed using sp02, temperature, heartbeat connected to a raspberry pi micro controller, which get the sensor values and process it in machine learning process to produce a dosage prediction. It also intimates the doctor by triggering an automatic email. In addition, one can know the patients records and prediction of dosage from anywhere using the mobile application linked with it.
- Published
- 2021
13. Estimation of Fare Collection and Count Determination in Public Transportation
- Author
-
N Sathish, C. Thyaga rajan, N Pugazhendh, and S..Subbu raj
- Subjects
Transport engineering ,Estimation ,Computer science ,business.industry ,Public transport ,business - Published
- 2016
14. Design and implementation of low power and high speed multiplier using quaternary carry look-ahead adder
- Author
-
V. Muralidharan and N. Sathish Kumar
- Subjects
Adder ,Power–delay product ,Power gating ,Computer Networks and Communications ,business.industry ,Computer science ,020208 electrical & electronic engineering ,Binary number ,02 engineering and technology ,Analog multiplier ,020202 computer hardware & architecture ,CMOS ,Artificial Intelligence ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Radix ,Multiplier (economics) ,Multiplication ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Arithmetic ,business ,Software ,Digital signal processing - Abstract
Need of Digital Signal Processing (DSP) systems which is embedded and portable has been increasing as a result of the speed growth of semiconductor technology. Multiplier is a most crucial part in almost every DSP application. So, the low power, high speed multipliers is needed for high speed DSP. Array multiplier is one of the fast multiplier because it has regular structure and it can be designed very easily. Array multiplier is used for multiplication of unsigned numbers by using full adders and half adders. It depends on the previous computations of partial sum to produce the final output. Hence, delay is more to produce the output. In the previous work, Complementary Metal Oxide Semiconductor (CMOS) Carry Look-ahead Adders (CLA) and CMOS power gating based CLA are used for maximizing the speed of the multiplier and to improve the power dissipation with minimum delay. CMOS logic is based on radix 2(binary) number system. In arithmetic operation, major issue corresponds to carry in binary number system. Higher radix number system like Quaternary Signed Digit (QSD) can be used for performing arithmetic operations without carry. The proposed system designed an array multiplier with Quaternary Signed Digit number system (QSD) based Carry Look-Ahead Adder (CLA) to improve the performance. Generally, the quaternary devices require simpler circuit to process same amount of data than that needed in binary logic devices. Hence the Quaternary logic is applied in the CLA to improve the speed of adder and high throughput. In array multiplier architecture, instead of full adders, carry look-ahead adder based on QSD are used. This facilitates low consumption of power and quick multiplication. Tanner EDA tool is used for simulating the proposed multiplier circuit in 180 nm technology. With respect to area, Power Delay Product (PDP), Average power proposed QSD CLA multiplier is compared with Power gating CLA and CLA multiplier.
- Published
- 2020
15. Enhanced image steganography using AES & SPIHT compression
- Author
-
R. Thamaraiselvan, N. Sathish Kumar, M. Rahul, and M. Malathi
- Subjects
TheoryofComputation_MISCELLANEOUS ,0209 industrial biotechnology ,Steganography ,Cover (telecommunications) ,business.industry ,Computer science ,020208 electrical & electronic engineering ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Encryption ,Image (mathematics) ,Set partitioning in hierarchical trees ,020901 industrial engineering & automation ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Computer vision ,Artificial intelligence ,business ,Key exchange - Abstract
Steganography is derived from Greek word, ‘steganos’ which refers to covered writing of messages. It is a mechanism of hiding messages or data by embedding them into some other data. Through this mechanism, the secured message can be completely hidden from unauthorized access. In existence, Steganography along with SPIHT compression is done using asymmetric cryptographic algorithm. In this model, Steganography is being employed with SPIHT compression where wavelet transformation of image takes place and AES cryptographic algorithm along Diffie-Hellman key exchange mechanism is used for providing additional security and processing speed. In the proposed system, the secret image is compressed using SPIHT compression and encrypted using cover image. Hence, the encrypted stego image with cover image and secret image is obtained. To perform decryption over the stego-image which, the key is to be exchanged using Diffie-Hellman technique. After decrypting, the image is subjected into SPIHT decompression process which is employed to retrieve the original secret image.
- Published
- 2017
16. Performance Analysis and Comparison of Full Chip and Half Chip Rate DC and NC Code Acquisition in MIMO DSCDMA over Uncorrelated Rayleigh Wireless Channel
- Author
-
K. R. Shankar Kumar and N. Sathish Kumar
- Subjects
Article Subject ,business.industry ,Computer science ,Real-time computing ,MIMO ,Data_CODINGANDINFORMATIONTHEORY ,Direct-sequence spread spectrum ,Chip ,Computer Science::Hardware Architecture ,Bit error rate ,Electronic engineering ,Wireless ,Radio frequency ,MATLAB ,business ,computer ,Computer Science::Information Theory ,computer.programming_language ,Communication channel - Abstract
This paper presents the performance analysis and comparison of full chip and half chip rate of noncoherent (NC) and differentially coherent (DC) code acquisition scheme in (multiple input-multiple output) MIMO assisted by direct sequence spread spectrum (DS-CDMA) wireless system when communicated over uncorrelated Rayleigh channel. Four schemes are investigated, namely, SISO with full chip rate, SISO with Half chip rate, MIMO with full chip rate, and MIMO with half chip rate by varying the code acquisition technique. The simulation is done in RF signal processing Lab using matlab tool box, and the performance metrics are considered, namely, Bit Error Rate (BER) and mean acquisition time (MAT). The simulation results indicate that DC performance is superior than NC in both full chip and half chip rate and also shown that half chip performance is better than full chip in both DC and NC code acquisition methods.
- Published
- 2011
17. Performance Analysis of M X N Equalizer Based Minimum Mean Square Error (MMSE) Receiver for MIMO Wireless Channel
- Author
-
N. Sathish Kumar and K. R. Shankar Kumar
- Subjects
Noise power ,Minimum mean square error ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,MIMO ,Equalizer ,Data_CODINGANDINFORMATIONTHEORY ,Interference (wave propagation) ,Signal-to-noise ratio ,Interference (communication) ,Electronic engineering ,Bit error rate ,Fading ,Antenna (radio) ,Telecommunications ,business ,Computer Science::Information Theory ,Communication channel - Abstract
The effect of fading and interference effects can be combated with equalizer. This paper analyses the performance of MMSE equalizer based receiver for MIMO wireless channel .The BER characteristics for the various transmitting and receiving antenna is simulated in mat lab tool box and many advantages and disadvantages the system is described. The simulation carried out signal processing lab show that the MMSE equalizer based receiver is a good choice for removing some ISI and minimizes the total noise power. The results show that the BER decreases as the m x n antenna configurations is increased. General Terms Equalizer, Bit error rate, Signal to noise ratio (eb/N0),transmitting antenna, receiving antenna
- Published
- 2011
18. Performance Analysis of a Successive Interference Cancellation for Multi-user Detector with VBLAST MIMO wireless Channel
- Author
-
N. Sathish Kumar and K. R. Shankar Kumar
- Subjects
Single antenna interference cancellation ,business.industry ,Computer science ,MIMO ,Electronic engineering ,Wireless ,business ,Multi user detector ,Communication channel - Published
- 2010
19. Key frame extraction algorithm for video abstraction applications in underwater videos
- Author
-
N. Sathish Kumar, S. Balaji, and G. Shobha
- Subjects
business.industry ,Computer science ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Video processing ,Video tracking ,Key (cryptography) ,Key frame ,Computer vision ,Video denoising ,Artificial intelligence ,Underwater ,business ,Abstraction (linguistics) - Abstract
It is extremely time consuming for researchers looking for particular events of interest to manually search in the video database. Therefore, there is enormous scope in research in the field of automatic extraction of key frames from underwater video sequences. Analysis of underwater video poses many challenges to existing techniques in computer vision including camera movement, turbidity, uneven background, non uniform lighting, moving objects in the underwater and inaccessibility of environment. The main aim of this paper is to (i) describe about the existing methods for key frame extraction, (ii) emphasize the key challenges in underwater environment, (iii) propose a new method to extract key frames which suits for underwater environment, (iv) perform the automatic detection and characterization of events of interest in underwater videos.
- Published
- 2015
20. Bit error rate performance analysis of Cholesky decomposition based quasi ML receiver for large scale MIMO system
- Author
-
M. Kasiselvanathan and N. Sathish Kumar
- Subjects
Public Administration ,Computer science ,Transmitter ,MIMO ,Real-time computing ,Detector ,Minimum degree algorithm ,Data_CODINGANDINFORMATIONTHEORY ,Computer Science Applications ,Bit error rate ,Higher-order modulation ,Algorithm ,Quadrature amplitude modulation ,Computer Science::Information Theory ,Cholesky decomposition - Abstract
Large scale multiple input multiple output (LS-MIMO) system is an emerging technology that has large antennas at both transmitter and receiver. In this paper, a novel approach is proposed namely Cholesky Decomposition based quasi maximum likelihood (ML) detector followed by list sequential (LISS) decoder (Quasi ML-LISS) receiver for LS-MIMO system. The refined empirical log-likelihood ratio (RELLR) generated by ML soft detector is decoded by using LISS decoder. The performance of the receiver is enhanced for turbo coded MIMO system by generating the RELLR at the detector output for higher order modulation. Simulation results show that bit error rate (BER) performance of proposed receiver is closer to the ML performance and superior to the multiple stage (MS) receiver.
- Published
- 2017
21. Bit Error Rate Performance Comparison of Large Scale MIMO Receivers using Spatial Modulation
- Author
-
N. Sathish Kumar and M. Kasiselvanathan
- Subjects
Transmission (telecommunications) ,Scale (ratio) ,Computer science ,Modulation ,Message passing ,MIMO ,Bit error rate ,Electronic engineering ,Constellation diagram ,Data_CODINGANDINFORMATIONTHEORY ,General Medicine ,Amplitude and phase-shift keying ,Computer Science::Information Theory - Abstract
This paper proposes a novel approach of an Approximate Message Passing (AMP) detection method for Large Scale Multiple Input Multiple Output (LS-MIMO) receiver which uses MT transmit antennas and MR receive antennas to detect the information bits transmitted. An efficient transmission technique called Spatial Modulation (SM) in which the information bits are encoded and conveyed through the indexes of the transmit antennas using M-ary Amplitude and Phase Shift Keying (APSK) modulation to increase the efficiency of the receiver. Simulation results show that the Bit Error Rate (BER) performance of the proposed detection method performs near to the Maximum Likelihood (ML) detection and outperforms than the Modified Maximum Ratio Combiner (MMRC) detection.
- Published
- 2016
22. Performance analysis of unsupervised feature selection methods
- Author
-
A. Nisthana Parveen, E. N. Sathish Kumar, and H. Hannah Inbarani
- Subjects
FOS: Computer and information sciences ,Reduct ,Computer science ,business.industry ,Pattern recognition ,Feature selection ,Machine Learning (cs.LG) ,Computer Science - Learning ,Statistical classification ,ComputingMethodologies_PATTERNRECOGNITION ,Discriminative model ,Feature (computer vision) ,Problem domain ,Principal component analysis ,Rough set ,Artificial intelligence ,business - Abstract
Feature selection (FS) is a process which attempts to select more informative features. In some cases, too many redundant or irrelevant features may overpower main features for classification. Feature selection can remedy this problem and therefore improve the prediction accuracy and reduce the computational overhead of classification algorithms. The main aim of feature selection is to determine a minimal feature subset from a problem domain while retaining a suitably high accuracy in representing the original features. In this paper, Principal Component Analysis (PCA), Rough PCA, Unsupervised Quick Reduct (USQR) algorithm and Empirical Distribution Ranking (EDR) approaches are applied to discover discriminative features that will be the most adequate ones for classification. Efficiency of the approaches is evaluated using standard classification metrics., Comment: 7 pages, Conference Publications
- Published
- 2012
23. Dynamic road traffic management based on krushkal's algorithm
- Author
-
N. Sathish Kumar, V. Venkateswaran, T. T. Sampath Kumar, V. Shashikiran, and S Balaji
- Subjects
Traffic congestion reconstruction with Kerner's three-phase theory ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Navigation system ,Floating car data ,Vehicle Information and Communication System ,Traffic optimization ,Shortest path problem ,business ,Algorithm ,Dijkstra's algorithm ,Traffic bottleneck ,Computer network - Abstract
The dynamic road traffic management is based on the dynamic vehicle routing during peak hour traffic. The real time traffic management has become a hectic problem in daily life due to the increasing traffic, sudden accidents, and bottle necks due to various reasons. In Dynamic Vehicle Navigation System (DVNS), the real time traffic junctions are mapped as nodes and the traffic rate between the signals is considered as the link weight for the selection of routes from source to destination. The selection of the route depends on various parameters such as traffic rate, speed of the vehicle, shortest path etc. The dynamic route selection is implemented using the krushkal's algorithm based on different parameters. The end-user selects the source and destination and sends the information to our system using Google maps; our system suggests the optimal route to the end-user based on the dynamic routing table. The traffic in-charge personnel have to update the traffic rates using their mobile PDA. The Dynamic routing table is updated periodically to accomplish the optimal solution.
- Published
- 2011
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.