Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1102
C.Sateesh kumar Reddy, Poornaiah Billa
In order to achieve high data rates (DR) in the fifth generation (5G), Massive Multiple Input Multiple Output (m-MIMO) systems must be altered to boost spectral efficiency. These systems must be used in conjunction with Small Cell Antennas (SCA). When compared to a number of User Terminals (UTs) provided in the same time-frequency resource without significant inter-user interference, m-MIMO enables a significant increase in spectrum efficiency. This is accomplished by deploying a large number of antenna elements at the base station, anywhere from tens to hundreds. The evolution of SC technology has resulted in decreased latency, decreased energy consumption, and increased data rates, all of which are necessary conditions for the deployment of 5G. In this study, we construct an m-MIMO system with SCAs that takes into account partial channel state information. We do this by reaching DR in the lower limit by repeating pilot sequences in time division duplex. In this way, we are able to achieve our goal (TDD). Either implementing massive MIMO at the base stations (BSs) or overlaying SCAs on top of the infrastructure already in place may help improve the energy efficiency of cellular networks. We present some intriguing results that demonstrate that combining Massive MIMO with small cells may be able to drastically cut total power usage. Beam-forming techniques with a low level of complexity, such as the proposed multi-flow RZF beam-forming, also have the potential to
{"title":"Implementation of small cell antenna based massive MIMO system for high spectrum and energy efficiencies","authors":"C.Sateesh kumar Reddy, Poornaiah Billa","doi":"10.58599/ijsmem.2023.1102","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1102","url":null,"abstract":"In order to achieve high data rates (DR) in the fifth generation (5G), Massive Multiple Input Multiple Output (m-MIMO) systems must be altered to boost spectral efficiency. These systems must be used in conjunction with Small Cell Antennas (SCA). When compared to a number of User Terminals (UTs) provided in the same time-frequency resource without significant inter-user interference, m-MIMO enables a significant increase in spectrum efficiency. This is accomplished by deploying a large number of antenna elements at the base station, anywhere from tens to hundreds. The evolution of SC technology has resulted in decreased latency, decreased energy consumption, and increased data rates, all of which are necessary conditions for the deployment of 5G. In this study, we construct an m-MIMO system with SCAs that takes into account partial channel state information. We do this by reaching DR in the lower limit by repeating pilot sequences in time division duplex. In this way, we are able to achieve our goal (TDD). Either implementing massive MIMO at the base stations (BSs) or overlaying SCAs on top of the infrastructure already in place may help improve the energy efficiency of cellular networks. We present some intriguing results that demonstrate that combining Massive MIMO with small cells may be able to drastically cut total power usage. Beam-forming techniques with a low level of complexity, such as the proposed multi-flow RZF beam-forming, also have the potential to","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"96 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113999616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1403
K. Venkatesan, V.Ramakrishna, Rayudu Srinivas
The mobile communications sector is consuming an alarming amount of energy and having a significant impact on the environment at an increasingly rapid rate as mobile data continues to advance. Because of this, research into technologies that are more efficient with energy is essential for minimizing the impact of adverse effects. This strategy will benefit from turning off the station during the off-peak hours when there is less demand for it. This article presents an algorithm for selecting a base station based on the status of the switches, which can be either ”on” or ”off.” This research makes use of the penalty function to define the risks in order to get beyond the numerous constraints that were part of the original optimizations. The outcomes of our simulations of multiple randomly created cellular networks indicate that our methodology may generate results that are satisfactory.
{"title":"Base Station Power Shutdown using New SNARK Algorithm","authors":"K. Venkatesan, V.Ramakrishna, Rayudu Srinivas","doi":"10.58599/ijsmem.2023.1403","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1403","url":null,"abstract":"The mobile communications sector is consuming an alarming amount of energy and having a significant impact on the environment at an increasingly rapid rate as mobile data continues to advance. Because of this, research into technologies that are more efficient with energy is essential for minimizing the impact of adverse effects. This strategy will benefit from turning off the station during the off-peak hours when there is less demand for it. This article presents an algorithm for selecting a base station based on the status of the switches, which can be either ”on” or ”off.” This research makes use of the penalty function to define the risks in order to get beyond the numerous constraints that were part of the original optimizations. The outcomes of our simulations of multiple randomly created cellular networks indicate that our methodology may generate results that are satisfactory.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134202171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1704
G. Rao, K. Venkatesan, Allanki Sanyasi Rao
The rapid development of the underlying infrastructure of the internet has permitted the widespread acceptance of a number of emerging technologies that have far-reaching ramifications for current society. As a result of the expansion of the Internet of Things, several new networking protocols and upgrades have been created and implemented. On top of that, there is a significant shortage of financing for the development of information technology applications, as well as critical security problems that jeopardise private data. As if that weren’t enough, there are also substantial weaknesses in the data’s privacy protection. In spite of the enormous research that has been done, there has not been a single security solution for the IoT network that has been proved to be entirely effective. This is due to the fact that the network of things connected to the Internet of Things has a unique mix of low energy usage, rare materials, sufficient computational power, and considerable operational expenses. As a consequence of this, we consider the modification of the protocol to be a viable and comprehensive strategy for defending Internet of Things devices from cyberattacks. The inclusion of IoT layer-specific security solutions into enhanced code is one of the many ways in which algorithmic enhancements contribute to the accomplishment of this objective. In this study, we propose improving and integrating the DTLS Procedure with the earwigging mechanism, also then testing the protocol on representative models o
{"title":"Combining Lightweight Encryption Methods to Secure IoT Networks","authors":"G. Rao, K. Venkatesan, Allanki Sanyasi Rao","doi":"10.58599/ijsmem.2023.1704","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1704","url":null,"abstract":"The rapid development of the underlying infrastructure of the internet has permitted the widespread acceptance of a number of emerging technologies that have far-reaching ramifications for current society. As a result of the expansion of the Internet of Things, several new networking protocols and upgrades have been created and implemented. On top of that, there is a significant shortage of financing for the development of information technology applications, as well as critical security problems that jeopardise private data. As if that weren’t enough, there are also substantial weaknesses in the data’s privacy protection. In spite of the enormous research that has been done, there has not been a single security solution for the IoT network that has been proved to be entirely effective. This is due to the fact that the network of things connected to the Internet of Things has a unique mix of low energy usage, rare materials, sufficient computational power, and considerable operational expenses. As a consequence of this, we consider the modification of the protocol to be a viable and comprehensive strategy for defending Internet of Things devices from cyberattacks. The inclusion of IoT layer-specific security solutions into enhanced code is one of the many ways in which algorithmic enhancements contribute to the accomplishment of this objective. In this study, we propose improving and integrating the DTLS Procedure with the earwigging mechanism, also then testing the protocol on representative models o","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115334353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1305
J. Lakshmi, Mallikarjun P Y
Computing in the cloud is the method that is most frequently employed by companies for the purpose of storing huge volumes of data. In the data-driven society that we live in today, a significant amount of data is produced each day. You are going to need data backup and recovery services in the event that you suffer an unplanned loss of these files. Here, we examine a variety of data-protection methods in order to compare and contrast their respective merits and downsides and to better understand the innovative aspects of each technique.
{"title":"Information Preservation and Restore Strategies for the Cloud Era","authors":"J. Lakshmi, Mallikarjun P Y","doi":"10.58599/ijsmem.2023.1305","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1305","url":null,"abstract":"Computing in the cloud is the method that is most frequently employed by companies for the purpose of storing huge volumes of data. In the data-driven society that we live in today, a significant amount of data is produced each day. You are going to need data backup and recovery services in the event that you suffer an unplanned loss of these files. Here, we examine a variety of data-protection methods in order to compare and contrast their respective merits and downsides and to better understand the innovative aspects of each technique.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114204792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1105
Nagarjuna Reddy Gujjula, Rameshbabu Kellampalli
SRAM is a key component in many VLSI circuits for efficient storage data. Various researches have been performed on implementation of SRAM using Conventional CMOS, FinFET and GNRFET technologies. But, these methodologies generating the more number of faults with high power and delay consumption, tosolve this problem proposed10T SRAM cell is implemented with the CNTFET respectively. Present research involving CNTFET SRAM deals with leakage analysis and dealt with the dual hilarity characteristics. Fault introduction and analysis of faults were limited with CMOS SRAM. The detection algorithms and circuits possess limitations in terms of detecting the current at nanoscales and restricted with CMOS SRAM. These limitations made us to pursue the research in these areas to bring novel ideas. The performance metrics evaluated and experimental analysis is made and it helps us to choose between various SRAMS. The simulation results shows that the proposed 10T SRAM consumes less delay and power compared to the 7T SRAM cell.
{"title":"Design and implementation of 10T-SRAM cell using Carbon Nano Tube Field Effect Transistor","authors":"Nagarjuna Reddy Gujjula, Rameshbabu Kellampalli","doi":"10.58599/ijsmem.2023.1105","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1105","url":null,"abstract":"SRAM is a key component in many VLSI circuits for efficient storage data. Various researches have been performed on implementation of SRAM using Conventional CMOS, FinFET and GNRFET technologies. But, these methodologies generating the more number of faults with high power and delay consumption, tosolve this problem proposed10T SRAM cell is implemented with the CNTFET respectively. Present research involving CNTFET SRAM deals with leakage analysis and dealt with the dual hilarity characteristics. Fault introduction and analysis of faults were limited with CMOS SRAM. The detection algorithms and circuits possess limitations in terms of detecting the current at nanoscales and restricted with CMOS SRAM. These limitations made us to pursue the research in these areas to bring novel ideas. The performance metrics evaluated and experimental analysis is made and it helps us to choose between various SRAMS. The simulation results shows that the proposed 10T SRAM consumes less delay and power compared to the 7T SRAM cell.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124034102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1501
K. Venkatesan
In today’s world, the quantity of cars on the road remains steadily rising at a quickening pace. Due to the growing sum of automobiles on the road also the imperfect number of parking spaces, it can be a pain and a waste of time to look for a parking spot. This is because there are fewer parking spots than there are cars. The upshot of this is traffic congestion on the roads. According to studies that were carried out in this region, motorists typically spend 15 minutes driving about in search of a parking spot and cover a distance of 0.5 miles while travelling at a speed of 10 mph. The use of intelligent parking solutions has the potential to significantly cut down on the severity of these difficulties. Because it requires a large number of sensors to be installed at each parking lot, the traditional method is not only expensive but also time-consuming and labour-intensive. The results of this study present a smart parking classification that is based on image dispensation and may be utilised in a number of scenarios, including open parking lots, parking garages with many levels, and other similar places. In order to ascertain whether or not a parking spot in the gathered video is occupied, the proposed design for the system utilises a combination of edge detection and coordinate bound pixel sections. In addition to that, it functions as an illustration of the process of transforming text into images. Tesseract is utilised whenever an image is analysed in order to extract the text contained within it. It is possible to modify the strength of the image processing so that each photograph experiences precisely the amount of processing that is necessary to provide the highest quality text results.
{"title":"Opencv in Smart Parking Space Allocation and Management","authors":"K. Venkatesan","doi":"10.58599/ijsmem.2023.1501","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1501","url":null,"abstract":"In today’s world, the quantity of cars on the road remains steadily rising at a quickening pace. Due to the growing sum of automobiles on the road also the imperfect number of parking spaces, it can be a pain and a waste of time to look for a parking spot. This is because there are fewer parking spots than there are cars. The upshot of this is traffic congestion on the roads. According to studies that were carried out in this region, motorists typically spend 15 minutes driving about in search of a parking spot and cover a distance of 0.5 miles while travelling at a speed of 10 mph. The use of intelligent parking solutions has the potential to significantly cut down on the severity of these difficulties. Because it requires a large number of sensors to be installed at each parking lot, the traditional method is not only expensive but also time-consuming and labour-intensive. The results of this study present a smart parking classification that is based on image dispensation and may be utilised in a number of scenarios, including open parking lots, parking garages with many levels, and other similar places. In order to ascertain whether or not a parking spot in the gathered video is occupied, the proposed design for the system utilises a combination of edge detection and coordinate bound pixel sections. In addition to that, it functions as an illustration of the process of transforming text into images. Tesseract is utilised whenever an image is analysed in order to extract the text contained within it. It is possible to modify the strength of the image processing so that each photograph experiences precisely the amount of processing that is necessary to provide the highest quality text results.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124219697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1705
K. Venkatesan, Mohan Babu Bukya, Gasiganti Vidyasagar
The use of lightweight cryptography might be beneficial for low-power devices such as RFID tags, nodes in the Internet of Things, and nodes in wireless sensor network nodes. When developing a lightweight strategy, it is essential to take into consideration a cryptographic algorithm’s data storage requirements, processing speed, throughput, and energy consumption. Taking everything into consideration, the findings of this research provide a contemporary foundation for the effective lightweight cryptographic technology known as mCrypton. The restoration not only reduces the overall size of the common rooms but also boosts the efficiency of those spaces. FPGA boards manufactured by Xilinx, namely the Spartan 3, were used in the construction of the recommended design by ISE. The results of the simulation show that the proposed architecture is capable of functioning at a frequency of 302 MHz, accomplishing a amount of 646 Mbps, also accomplishing an efficacy of 1.7 Mbps/slice while using a entire of 0.089 W of power. Because of this, the proposed layout achieves superior results than those of its contemporaries in terms of the amount of space used, the energy consumption, the performance, and the throughput.
{"title":"Implementing the Lightweight mCrypton Algorithm in Hardware using FPGA","authors":"K. Venkatesan, Mohan Babu Bukya, Gasiganti Vidyasagar","doi":"10.58599/ijsmem.2023.1705","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1705","url":null,"abstract":"The use of lightweight cryptography might be beneficial for low-power devices such as RFID tags, nodes in the Internet of Things, and nodes in wireless sensor network nodes. When developing a lightweight strategy, it is essential to take into consideration a cryptographic algorithm’s data storage requirements, processing speed, throughput, and energy consumption. Taking everything into consideration, the findings of this research provide a contemporary foundation for the effective lightweight cryptographic technology known as mCrypton. The restoration not only reduces the overall size of the common rooms but also boosts the efficiency of those spaces. FPGA boards manufactured by Xilinx, namely the Spartan 3, were used in the construction of the recommended design by ISE. The results of the simulation show that the proposed architecture is capable of functioning at a frequency of 302 MHz, accomplishing a amount of 646 Mbps, also accomplishing an efficacy of 1.7 Mbps/slice while using a entire of 0.089 W of power. Because of this, the proposed layout achieves superior results than those of its contemporaries in terms of the amount of space used, the energy consumption, the performance, and the throughput.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122484332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1203
S.Yuvaraj, B.Babu, Rameshwari Yadav
Throughout the manufacturing process of a car, the safety of pedestrians is frequently put in a secondary position to that of the occupants of the vehicle, despite the fact that both are extremely important. The findings of this study will perhaps shed some light on the problem of pedestrian safety when they are on the road. The accomplishment of the objective is made possible by conducting research on the safety system that, in the event of the worst-case scenario, applies warning signals and brakes automatically in order to avoid collisions involving vehicles and pedestrians. In this situation, an image-processing-based safety technology is utilised to detect pedestrians and immediately apply the brakes. At first, the camera that has been mounted in the vehicle makes use of an image processing algorithm in order to monitor the obstacles that are in its route. The automobile will automatically apply the brakes if it determines that a human is approaching at a distance that could be considered hazardous. In the event of an unexpected emergency, such as when pedestrians unexpectedly cross the path of the automobile, the controller will deploy the airbag by employing a servo motor to pull it out from behind the engine cover. Using this strategy, we may ensure the safety of pedestrians by lowering the number of accidents that occur, all without changing the kinds of cars that are driven or driven by. A functional prototype of the suggested improvements is currently available for evaluation.
{"title":"Safety Attachment for Carriers of Walking Disabled Persons","authors":"S.Yuvaraj, B.Babu, Rameshwari Yadav","doi":"10.58599/ijsmem.2023.1203","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1203","url":null,"abstract":"Throughout the manufacturing process of a car, the safety of pedestrians is frequently put in a secondary position to that of the occupants of the vehicle, despite the fact that both are extremely important. The findings of this study will perhaps shed some light on the problem of pedestrian safety when they are on the road. The accomplishment of the objective is made possible by conducting research on the safety system that, in the event of the worst-case scenario, applies warning signals and brakes automatically in order to avoid collisions involving vehicles and pedestrians. In this situation, an image-processing-based safety technology is utilised to detect pedestrians and immediately apply the brakes. At first, the camera that has been mounted in the vehicle makes use of an image processing algorithm in order to monitor the obstacles that are in its route. The automobile will automatically apply the brakes if it determines that a human is approaching at a distance that could be considered hazardous. In the event of an unexpected emergency, such as when pedestrians unexpectedly cross the path of the automobile, the controller will deploy the airbag by employing a servo motor to pull it out from behind the engine cover. Using this strategy, we may ensure the safety of pedestrians by lowering the number of accidents that occur, all without changing the kinds of cars that are driven or driven by. A functional prototype of the suggested improvements is currently available for evaluation.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129890242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}