Performance analysis of a 5G non-orthogonal waveform filter bank multi carrierYarrabothu, Ravi Sekhar; Kandukuri, Sadhana; Nelakuditi, Usha Rani; Rao, M. Krishna Chennakesava
2017 Electronic Government, an International Journal
doi: 10.1504/EG.2017.087974
As the world, is looking for more data speeds along with support for M2M communication in the next generation (5G), the current orthogonal frequency division multiplexing (OFDM) has limitations such as high PAPR, spectrum wastage due to cyclic prefix (CP), out of band (OOB) emissions. To overcome these limitations, 5G researchers is looking for different wave forms and filter bank multi carrier (FBMC) waveform is one of the prime contenders. In this paper, it has been implemented, the poly-phase network filter bank multi carrier (PPN-FBMC), which reduces the high complexity and computations. A prototype filter for the PPN FBMC with high overlapping factors (K = 6 and 8) are implemented. It also simulates FBMC system using Matlab Software, to characterise and analyse the 5G candidate waveform FBMC and compare with OFDM, in terms of error vector magnitude (EVM), peak to average power ratio (PAR), and power spectral density (PSD) performance. The simulated results prove that FBMC outperforms the OFDM systems in all the above mentioned aspects, even under noisy conditions.
Comparative analysis of applications of identity-based cryptosystem in IoTRamesh, C.; Rao, K. Venu Gopal; Vasumathi, D.
2017 Electronic Government, an International Journal
doi: 10.1504/EG.2017.088003
The internet of things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. The transition from closed networks to enterprise IT networks to the public internet is accelerating at an alarming pace and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect us from intrusions and interference that could compromise personal privacy? Security is paramount for the safe and reliable operation of IoT connected devices. In this aspect, identity-based cryptography (IBC) plays a promising role in IoT due to its benefits, such as facilitating public key management. This paper gives a detailed feasibility study of applicability of IBC in IoT.
Improving the accuracy of item recommendations in collaborative filtering using time-variant systemParasuraman, Desabandhu; Elumalai, Sathiyamoorthy
2017 Electronic Government, an International Journal
doi: 10.1504/EG.2017.087948
Nowadays, the real challenge is to manage the dynamic web content in order to provide a prolific resource to the user. Web personalisation is an outcome of the challenge by which the web is a tailor made to a user. Recommendation systems access the user profile using collaborative filtering and content based filtering to provide better personalisation. This paper focuses on improving the accuracy of item recommendations, based on the dynamic item-based collaborative filtering by utilising time variant system which is implied on user ratings. Similarity between the items is found by using vector similarity and weight is calculated by Pearson correlation coefficient. Comparison of the results of traditional item-based collaborative filtering with dynamic item-based collaborative filtering is also discussed. Finally, it is observed that the user's dynamic voting average improves the accuracy of recommendations comparing to the normal voting average on items.
Middling role of social support between work family conflict and job satisfaction among professional women in Tamil NaduSakthivelrani, S.; Devi, K. Ragles
2017 Electronic Government, an International Journal
doi: 10.1504/EG.2017.087956
In today's era, the business success relies on the worker skills and capabilities. Now a day work-family conflicts is turning into expanded consideration due to work pressure and family responsibilities. The primary objective of the study is to find out the influence of work-family strife and social support on job satisfaction among the employees. This study examines the extent of work-family conflict among respondents on the premise of occupation and marital status. This study additionally verifies the impact of work-family conflict and social support on job satisfaction. Questionnaire technique was accustomed to collect the data and every data were analysed using SPSS t-test, one way analysis of variance, correlation and structural equation modelling (SEM) was utilised in this study. The result shows that the amount of work-family conflict is high among the married women comparing to the unmarried respondents. Job satisfaction among the employees is based on the organisational support providing to them.
Performance benchmarking of tunnel transistors for energy efficient 4-bit adder architectures at low VDDShaik, Sadulla; Krishna, K. Sri Rama
2017 Electronic Government, an International Journal
doi: 10.1504/EG.2017.087980
Tunnel field-effect transistors (TFETs) have emerged as one of the most promising post-CMOS transistor technologies. This paper presents design analysis and benchmarking of TFET based three different 1-bit full adders (8T-XOR Logic, 6T-XOR Logic and MUX Based) are used for designing 4-bit adders in two different topologies targeting a VDD below 500 mV. These topologies are 22T/18T 1-bit full adder based 4-bit carry propagate adder (22T/18TCPA) and multiplexer logic 1-bit full adder based 4-bit carry propagate adder (MCPA). The performance of TFET based 4-bit adder topologies has been benchmarked with 20 nm double gate Si FinFET technology. Tunnel FETs are desirable candidates for building energy efficient and reliable arithmetic blocks with supply voltage scaling. We demonstrate that TFET's steep slope characteristics enable the 22TCPA design to be energy efficient option along with improved reliability and 18TCPA design is the best in terms of energy efficiency and reliability amongst all designs at low supply voltages.
Impact of deflection history based priority on adaptive deflection router for mesh NoCsIsaac, Elizabeth; Babu, M. Rajasekhara; Jose, John
2017 Electronic Government, an International Journal
doi: 10.1504/EG.2017.087997
Network on chip (NoC) has been proposed over bus to address the communicational prerequisite of highly dense multi-core systems. NoCs with buffer-less routers gain popularity due to simplicity in the router design, low power consumption and less chip area. The state of the art of deflection router DeBAR employs side buffers instead of input port buffers, that can accommodate one among the deflected flit per router per cycle. In this paper we propose deflection history as a priority metrics for flit selection. We, modify the primitive DeBAR design, and propose priority based deflection based adaptive router (PBDeBAR) that make use of a cost effective priority scheme to choose a flit that has to be moved to the side buffer. Experimental results shows that PBDeBAR reduces latency, deflection rate, buffer occupancy and link usage with respect to the existing minimally buffered deflection routers.
A survey on integrity verification and data auditing schemes for data verification in remote cloud serversMuthuram, R.; Kousalya, G.
2017 Electronic Government, an International Journal
doi: 10.1504/EG.2017.088006
Cloud computing is the opportunistic model that provides a lot of services to the business organisations to concentrate more on their own business services instead of spending more cost on maintenance. The service providers provide an unlimited storage capability to the clients with characteristics like scalability, reliability, on-demand self-service etc. Clients host their data on cloud servers and pay the cost based on their usage. The data consumers can access the data from the cloud servers. Because of lack of access control and data may tamper by malicious users, business organisations hesitating to use the cloud computing. Ensuring the data storage correctness and integrity is one of the major issues in the cloud computing. In this paper, we discussed the various integrity system models that are available and the procedure for the various existing integrity verification schemes proposed. Finally, those schemes are analysed in terms of security and performance.