Study on Infrastructure Developments of Mobile Generations ijtsrd
Nowadays, as Mobile communication systems have been developing in various ways, people can get better communications and mobility. A long way in a remarkably short time has been achieved in the history of wireless. The first generation 1G has fulfilled the basic mobile voice while the second generation 2G has introduced capacity and coverage. This […]
Lexicon Based Emotion Analysis on Twitter Data ijtsrd
This paper presents a system that extracts information from automatically annotated tweets using well known existing opinion lexicons and supervised machine learning approach. In this paper, the sentiment features are primarily extracted from novel high coverage tweet specific sentiment lexicons. These lexicons are automatically generated from tweets with sentiment word hashtags and from tweets with […]
Simulation and Analysis of III V Characteristic and Bandgap Design for Heterojunction Laser Diode ijtsrd
This paper presents a system that extracts information from automatically annotated tweets using well known existing opinion lexicons and supervised machine learning approach. In this paper, the sentiment features are primarily extracted from novel high coverage tweet specific sentiment lexicons. These lexicons are automatically generated from tweets with sentiment word hashtags and from tweets with […]
Multiscale Modeling Approach for Prediction the Elastic Modulus of Percolated Cellulose Nanocrystal CNC Network ijtsrd
In this study the effective elastic modulus of cellulose nanocrystal CNC network is evaluated using multiscale method and micromechanical analysis. For this purpose, the elastic modulus of CNC water phases are randomly assigned to a two dimensional 2D checkerboard structure and the elastic response is evaluated. In addition, the effect of having a different number […]
Fundamental Areas of Cyber Security on Latest Technology ijtsrd
Cyber Security has developed one of the biggest challenges of information technology in the present day. Cyber security consists of controlling physical access of the hardware, application, networks and protecting against harm that may come via networks. It is a mixture of processes, technologies and practices. The objective of cyber Security is to protect programs, […]