scispace - formally typeset
Search or ask a question

Showing papers in "Communications on Applied Electronics in 2017"


Journal ArticleDOI
TL;DR: Simulation results show that the combination of Walsh-Hadamard Transform precoding with A-law companding can achieve a better PAPR reduction and bit error rate(BER) performance compared to the combined WHT precode with Mu companding technique.
Abstract: Filter bank multicarrier (FBMC) system support better spectral efficiency and high data rate compared to OFDM system. However, the capacity of FBMC system can be increased significantly by occupying Multiple Input and Multiple Output MIMO system. The combination of MIMO and FBMC system may be used for next communication system 5G to support high spectral efficiency. The major disadvantage of FBMC MIMO system are high peak to average power ratio (PAPR) which reduced the performance of the FBMC system .There are many reduction techniques have been used to reduce PAPR. However, The nonlinear companding technique and Precoding system used widely to reduced peak to average power ratio (PAPR) for Multicarrier Modulation(MCM) System. In this paper, we Proposed new schemes based on the combination of Walsh-Hadamard Transform (WHT) Precoding with the companding technique based on the A-law and Mu-law technique to reduce PAPR for MIMO FBMC system with using Space Frequency Block Coding (STBC). Moreover, the Precoding Technique used in the frequency domain and nonlinear companding technique in the time domain. However, simulation results show that the combination of WHT precoding with A-law companding can achieve a better PAPR reduction and bit error rate(BER) performance compared to the combination of the WHT precoding with Mu companding technique.

11 citations



Journal ArticleDOI
TL;DR: The purpose of this paper is to study the security attacks and the defense mechanism over WSN, and Trust Management will be clarified and its importance in security.
Abstract: There are a lot of application using wireless sensor network, including using in enemy environment. One of the most valuable issues in any WSN is security. The purpose of this paper is to study the security attacks and the defense mechanism over WSN. Trust Management will be clarified and its importance in security.

7 citations


Journal ArticleDOI
TL;DR: Effort is made to give a genetic algorithm that solves the knapsack problem and greedy strategy along with the traditional genetic algorithm has been improved that shorten the time of solution.
Abstract: Abstract: 0--1 knapsack problem is a typical NP complete problem in field of computer. Traditional knapsack problem is solved recursively using backtracking, branch and bound, dynamic programming and greedy methods. The advantages of using recursive backtracking to solve knapsack problem algorithm are – its simplicity, completely traverse the search space and sure to find the optimal solution. But the solution space is exponential growth, when extended to certain extent. This algorithm will solve the knapsack problem unrealistically. The greedy algorithm can only be used to get Approximate Solution in a certain range near the optimal solution. This paper is based on 0-1 knapsack problem, a mathematical model, and analysis of the greedy strategy. Effort is made to give a genetic algorithm that solves the knapsack problem. Greedy strategy along with the traditional genetic algorithm has been improved that shorten the time of solution. Further, it improves the accuracy of the solution.

7 citations



Journal ArticleDOI
TL;DR: This roadmap provides detailed steps to construct the EHR nationwide network and overcome time barrier, take practical steps towards the confidentiality and privacy of EHR data, overcome reasons of potential resistance of actors then preparation of feasibility studies.
Abstract: Electronic Health Record (EHR) gives the ability to share health information electronically; this can help to provide higher quality and safer care for patients. This research aims to provide a roadmap to implement the EHR in Egypt. This roadmap provides detailed steps to construct the EHR nationwide network. Designing the proposed roadmap used the experiences of countries which successfully implemented EHR, previous experiments in Egypt and the views of health service partners in Egypt. Also, all barriers faced EHR implementation general and especially in Egypt collected and studied to give the feasibility of the proposed roadmap. The most important steps in the proposed roadmap are: overcome time barrier, take practical steps towards the confidentiality and privacy of EHR data, overcome reasons of potential resistance of actors then preparation of feasibility studies. General Terms Bioinformatics, information system, information theory, soft computing

6 citations



Journal ArticleDOI
TL;DR: It was observed that compiled, interpreted and hybrid programming languages have their strengths and weakness, hence the need for programmers to critically analyzed their goal and how the various programming languages will help to achieve that goal before choosing a language.
Abstract: Programmers use programming languages to develop software. But how efficiently programmers can write software depends on the translation mode that is used by them. In computing, the general modes of execution for modern highlevel languages are interpretation, compilation and hybrid. The selection of these general modes of execution is dependent on the choice of programming language. In this paper, the study compared compiled, interpreted and hybrid programming languages under translation process, execution, efficiency, portability, maintainability, and security. The paper contains idea about how software development are influenced by the decision to use compiler, interpreter or hybrid as a mode of translation hence purpose of this research. It was observed that compiled, interpreted and hybrid programming languages have their strengths and weakness, hence the need for programmers to critically analyzed their goal and how the various programming languages will help to achieve that goal before choosing a language.

5 citations


Journal ArticleDOI
TL;DR: This paper focuses on verifying congestion probability on Wireless Sensor Networks (WSNs) which is modelled by CPN, and adds probabilities added into the transitions in the CPN probability model before checking congestion.
Abstract: Analysing probability properties on Coloured Petri Nets (CPNs) model is one of a favorite topic on system verification recently. This paper focuses on verifying congestion probability on Wireless Sensor Networks (WSNs) which is modelled by CPN. Actually, WSNs are the collection of sensors. A WSN topology is formed by the interaction among sensors via Wi-Fi connections. However, sensors can be consider as unsteady devices when working in the harsh environment due to limited processing capacity, non-replacement battery, etc. Hence, each sensor needs to attach a reliable probability so that users can know the probability of reaching the sink of data. Such probabilities are added into the transitions in our CPN probability model before checking congestion. Whole verifying process introduces also in order to emphasize the purpose of this paper via a straight example.

5 citations


Journal ArticleDOI
TL;DR: This study proposes the best set of criteria for evaluating a secure framework that are to support eCommerce with security requirements analysis and elicitation, based upon the construction of a context for the system and satisfaction arguments for the security of the system.
Abstract: This study proposes the best set of criteria for evaluating a secure framework that are to support eCommerce with security requirements analysis and elicitation, based upon the construction of a context for the system and satisfaction arguments for the security of the system. The novel contribution of this paper is an information security framework hail as the secure framework, comprising of technical, operational, business, process and maturity models to address information security requirements for eCommerce transactions.

5 citations


Journal ArticleDOI
TL;DR: Comparisons with different performance measures suggest that no single classification method is the best for all types of datasets on all type of performance measures and that single decision tree is a good classifier for this data as it has reasonable classification accuracy and less training and testing time.
Abstract: In this paper an ensemble approach to classify network security data have been presented. The experiments are carried out with Decision trees and Naïve Bayes classifiers and ensemble them with methods like Bagging, Adaboost.M1, Random Forests, MultiBoosting, Rotation Forest and Random Sub Space on NSL KDD dataset which is a modified KDD anomaly detection dataset [1]. Results with different performance measures suggest that no single classification method is the best for all types of datasets on all type of performance measures. The results based on the experiments have been tabulated and their comparative performance suggests that the decision trees ensembles performed better than the Naïve Bayes ensembles. Results also suggest that single decision tree is a good classifier for this data as it has reasonable classification accuracy and less training and testing time.

Journal ArticleDOI
TL;DR: Using 2π model a closed form crosstalk noise modeling for on-chip VLSI RC interconnects is presented in this thesis, which can be modeled as distributed RC segments with sufficient accuracy for the low frequency of operation.
Abstract: This thesis presents an approach to solve the VLSI (very large scale integration) layer assignment problems that will lead to the minimization of crosstalk noise. Using 2π model a closed form crosstalk noise modeling for on-chip VLSI RC interconnects is presented in this thesis. The interconnection can be modeled as distributed RC segments with sufficient accuracy for the low frequency of operation. When step input and saturated ramp input is applied to the aggressor which is adjacent to the victim net then this crosstalk noise modeling is perpetrated. In this thesis, the working model represents the noise voltage waveform. This thesis is worked to find out noise pulse width and noise amplitude for RC interconnection. In this thesis, the original 2π model is further simplified and it has simply closed form expressions, which is capable of measuring noise pulse width and noise amplitude for RC interconnect. The closed form expressions of a 2π model are simulated using Matlab. This model considers various parameters, such as coupling location (near the driver and near receiver) and course distributed RC characteristics for victim net.

Journal ArticleDOI
TL;DR: The consumption of natural gas is evaluated with respect to environmental factors through neural network based approach and compared the forecasting results and the analysis results and comparison model show the better results.
Abstract: Natural resource is a limited resource and its utilization with proper planning is utmost important for human being. Natural gas is one of the highly consumed natural resource which requires a proper planning and utilization. Environmental factor such as temperature, humidity is few of the factors which effect the natural gas consumption. In this paper, the consumption of natural gas is evaluated with respect to environmental factors through neural network based approach and compared the forecasting results. The analysis results and comparison model show the better results and could be used in forecasting of the future natural gas consumption. General Terms Neural Networks, Forecasting


Journal ArticleDOI
TL;DR: In this article, the authors present simultaneous impact of cell temperature and the irradiance falling on the plane of solar panels on the dc voltage(Vdc) of a multicrystalline photovoltaic(PV) module, one of the most important parameter governing dc power and hence efficiency of PV power plant.
Abstract: Solar irradiance and cell temperature are the two most important parameters governing the efficiency of PV power plant. This paper presents simultaneous impact of cell temperature and the irradiance falling on the plane of solar panelsPOA (Plane of Array Irradiance) on the dc voltage(Vdc) of a multicrystalline Photovoltaic(PV) module, one of the most important parameter governing dc power and hence efficiency of (PV) power plant. In contrast to existing literature which specify negative temperature coefficient for Vdc above 25 C cell temperature, analysis in actual environmental conditions of Western Rajasthan for a grid connected multicrystalline PV power plant shows that Vdc has about -0.431%/C temperature coefficient for cell temperature greater than 49C and not 25C as evaluated in laboratory. Moreover, voltage for cell temperature in the range of 4960C is far greater than voltage at 25-45C. Further at very high cell temperature of about 49C dc voltage (Vdc) reaches a point of saturation attaining 85% of its maximum rated value. It decreases slightly by about 4% as cell temperature increases from 49C to 60C but as soon as sun begins to descent, cell temperature starts reducing and Vdc starts increasing, maintaining nearly constant value in the range of 80-85% of its maximum rated value for about 6-8 hours. If cell temperature is less than about 45C, neither Vdc reaches point of saturation nor does it attain constant value. Thus, high cell temperature has overall positive effect on dc voltage of a multicrystalline grid connected PV power plant. Western Rajasthan being blessed with high temperature and high insolation for 6-7 hours in a day for about eight months has the capability of high energy yield as dc power is directly proportional to dc voltage. General Terms Solar Irradiance, DC output voltage, Grid connected PV power plant


Journal ArticleDOI
TL;DR: In this article, the authors discuss the culture of numeracy in primary schools and how to learn numeracy knowledge from an early stage as numeracy encompasses recognizing numbers, basic computation, measurement, geometry, probability and statistics.
Abstract: Numeracy culture is a part of mathematics and intertwined with each other. In particular, numeracy is the ability to perform basic mathematical operations and understand simple mathematical ideas and apply knowledge and skills of mathematics in everyday life. Numeracy knowledge is very important to learn from an early stage as numeracy encompasses recognize numbers, basic computation, measurement, geometry, probability and statistics. This article will discuss the culture of numeracy in primary schools. Mental visualisation are used to seeing cultural numeracy among primary school pupil. Through a culture of student mental picture can be seen by their existing knowledge of a particular topic. Culture numeracy in primary schools ensuring excellence at a higher level again. This is because the culture of numeracy in the classroom, students can apply knowledge of numeracy in everyday life. Culture numeracy from an early stage can help students give correct answers by linking basic questions numeracy. Culture numeracy in primary schools is very important for students to understand because every topic related to each other. The word 'culture' is something that is complex and can take a variety of meanings, especially in numeracy. Culture depends on the context numeracy and what is expected of students. Therefore to know what students actually understand about the culture, a lot depends on how teachers identify, collect, and interpret the evidence. When a topic or concept that has been studied, it does not necessarily change when a new or different information found. Being able to obtain new information or knowledge does not entitle a student a full understanding. A student who gains full understanding will be able to express it verbally or simply displaying his skill.

Journal ArticleDOI
TL;DR: This paper studies the impact transmission range of routing protocols by designing a simulator in Qualnet and notes an obvious impact of variable transmission range on power consumption.
Abstract: Mobile Ad-hoc Network (MANET) is normally recognized in zones someplace infrastructural services such as base station, routers etc. do not happen or have been damaged due to natural hardship. They have numerous pressures such as bandwidth, computational volume and battery power of each node as of their infrastructure-less nature. Power preservation is serious to appropriate actions of MANET. Countless scientists have been provided several mechanisms to diminish the power consumption variable transmission range of nodes is one such tool taken into interpretation. This paper studies the impact transmission range of routing protocols by designing a simulator in Qualnet. We note an obvious impact of variable transmission range on power consumption. All extra protocols are defined in terms of Packet Delivery Ratio (PDF), End-To-End Delay (ETED), average jitter rate, throughput etc. General Terms MANET, AODV, DSR, OLSR, Propagation Model


Journal ArticleDOI
TL;DR: In this article, a novel fractal stacked inductors using modified Hilbert space filling curve was presented, which showed more than 50% improvement in Q over conventional fractal inductors maintaining same inductance value with the same occupying area.
Abstract: High-Quality factor miniaturized inductors are prerequisites of RFIC Applications. This paper presents a novel fractal stacked inductors using modified Hilbert space filling curve. The parallel stacked inductor with differential excitation improves the Q factor values. The results show more than 50% improvement in Q over conventional fractal inductors maintaining same inductance value with the same occupying area.

Journal ArticleDOI
TL;DR: The Management of Key is additionally a focal segment in MANET security and the motivation behind key management is to give secure strategies to taking care of cryptographic keying materials.
Abstract: One of the most important issues for mobile ad-hoc Networks (MANETs) is Security. The feature of MANETs posture both difficulties and openings in accomplishing security objectives, for example, privacy, validation, respectability, accessibility, control of access, and non-repudiation at the end. The techniques of Cryptographic are generally utilized for secure interchanges in wired and remote systems. Most mechanisms of cryptographic, for example, symmetric and asymmetric cryptography, frequently include the utilization of cryptographic keys. Nevertheless, every single cryptographic method will be useless if the management of the key is feeble. The Management of Key is additionally a focal segment in MANET security. The motivation behind key management is to give secure strategies to taking care of cryptographic keying materials.

Journal ArticleDOI
TL;DR: In this paper, the effects of applying correction factors on radio propagation model used in planning for 4G-WiMAX network through a comparative analysis between estimated and field data collected on received power for a 4GWiMAX site.
Abstract: One of the salient factors to look at during wireless network planning is developing a modified path loss prediction models to suit a new environment other than the one it was originally designed for. This helps to give accurate predictive outcomes. This paper seeks to demonstrate the effects of applying correction factors on radio propagation model used in planning for 4G-WiMAX network through a comparative analysis between estimated and field data collected on received power for a 4G-WiMAX site. Four existing models were considered for this research; COST 231 Hata, Extended COST 231 Hata, SUI (Stanford University Interim) and Ericsson models. In order to optimize and validate the effectiveness of the proposed models, the mean square error (MSE) and correlation co-efficient were calculated for each model between the predicted and the measured received power for the selected area before and after applying an appropriate correction factor. Based on this, the Extended COST-231 Hata prediction model proved to correlate well with the measured values since it showed least Mean Square Error (MSE) but with highest correlation co-efficient. Through comparative analysis of the corrected models, the Extended COST-231 Hata model could be applied for effective planning of the radio systems in Ghana and the subregion at large.

Journal ArticleDOI
TL;DR: In this paper, the authors used wavelet based and empirical mode decomposition analysis of captured data on 23 September 2015 which is September Equinox period to detect ionospheric irregularities and their effect on new Indian Regional Navigation Satellite System (IRNSS).
Abstract: Ionospheric scintillation effects on satellite signals is one of the major source of errors which has to be determined. Severe ionospheric scintillation causes amplitude scintillations, phase scintillations, drop in carrier to noise power ratio that may results into loss of lock of the global positioning system (GPS) receiver with a particular satellite and may interrupt various navigational and positioning services. The present study comprises of measurement of ionospheric irregularities and their effect on new Indian Regional Navigation Satellite System (IRNSS). IRNSS is India’s Navigation system similar to GPS which will provide various navigational and positioning services in Indian region. One of the IRNSS receiver is given by Indian Space Research Organization (ISRO), Ahmedabad, India to Department of Electronics Engineering, SVNIT, Surat which is located at low latitude region of India at Latitude 21° 9’ 50.19 N, and longitude 72° 47’ 1.15 E. Measurement of various Ionospheric scintillation parameters like Total electron content (TEC), vertical total electron content (VTEC), carrier to noise power ratio (C/N), elevation angle of various IRNSS satellites from IRNSS 1A to 1D is presented here. TEC Variations and detection of ionospheric scintillation instances are carried out by using Wavelet based and empirical mode decomposition analysis of captured data on 23 September 2015 which is September Equinox period. Empirical mode decomposition decomposes signal into intrinsic mode functions (IMF) for detecting ionospheric irregularities instances using TEC data for various events like earthquake, solar storms, solar eclipse, magnetic storms, plasma bubbles etc. General Terms Daubechies wavelet decomposition, GPS, Hilbert Huang decomposition, IRNSS, Ionospheric irregularities, Satellite communications and wavelet based decomposition.

Journal ArticleDOI
TL;DR: In this article, a parallel coupled microstrip band pass filter, its electrical responses obtained through iterative numerical electromagnetic simulations, and discussions on the results measured and tested after fabrication using FR4 substrate.
Abstract: Designing Microstrip filter is the prime requirement for optimum and efficient performance of next generation communication systems. This research article presents design, and mathematical and numerical analysis of a parallel coupled microstrip band pass filter, its electrical responses obtained through iterative numerical electromagnetic simulations, and discussions on the results measured and tested after fabrication using FR4 substrate. Comparing this filter with international industry standards for its operational frequency applications at 2.4 GHz using Ansoft Designer Software we found satisfactory parameters such as insertion loss above 5.00 dB, reflection loss below -20 dB, negligible energy loss and frequency bandwidth of 6.25%. Volumetric miniaturization and sustainable compatibility we researched are pivotal in RF and microwave communication spectrum resulting into minimum cost to production and a step towards green earth saving the material extraction from the earth’s crust. General Terms Reflection loss, Insertion loss

Journal ArticleDOI
TL;DR: This paper discusses and analyzes that how are the services provided by disaster management systems by detection of disaster in immediate manner, how to improve this system to identify the affected area immediately and to reach over there with minimum delay and what sort of network architecture and paging mechanism can be designed for better communication withminimum delay.
Abstract: Number of disasters is increasing day by day. A large number of people get affected by these disasters. The most immediate action to take once some disaster has occurred is to visit that location and provide facilities to the victims of disaster. This approach i.e. to provide services to the affected victims should be as timelier and as soon possible to save maximum lives and other properties from disasters. This paper discusses and analyzes that how are the services provided by disaster management systems by detection of disaster in immediate manner, how we can improve this system to identify the affected area immediately and to reach over there with minimum delay. It also discusses that what sort of network architecture and paging mechanism can be designed for better communication with minimum delay. General Terms Disaster Management

Journal ArticleDOI
TL;DR: The developed robotic arm of this paper is tracked the movement of human arm with a good accuracy and could be expected for overcoming the problems such as picking or placing object that are away from the users or could be used in medical applications.
Abstract: There are high requirements to develop artificial arms for many inhuman situations where human interactions are presenting challenges or not possible (i.e. impossible situations). This paper presents information, methods, and techniques which are essential for building a robotic arm controlled by the movements of normal human arm (Gesture Robotic Arm) whose data is acquiring by using the sensor fusion technique of Gyroscope, Accelerometers and Magneto sensors (MEMS sensors). For appropriate control mechanism and for reducing the noise amount which is coming in from the sensors, a proper averaging algorithm is used for smoothening the accelerometer output. The development of this arm is based on the Arduino platform; in which all are interfaced with each other by using Bluetooth wireless communication. The prototype of robotic arm of this paper has been implemented practically. The developed robotic arm of this paper is tracked the movement of human arm with a good accuracy. Implementation of this arm could be expected for overcoming the problems such as picking or placing object that are away from the users or could be used in medical applications.

Journal ArticleDOI
TL;DR: The role played by the media particularly newspaper press in the decolonization of the country from 1881 to 1960 was examined in this article, where the role of the media in Nigeria's independence was examined.
Abstract: In 2014, Nigeria became 100 years as an entity following the amalgamation of the Northern and Southern protectorates by Sir Lord Lugard, the British colonial Governor-General in 1914. This paper therefore examines the role played by the Nigerian media particularly newspaper press in the decolonization of the country from 1881 to 1960. The first newspaper in Nigeria published by Reverend Henry Townsend (Iwe Irohin) was debut in Abeokuta in 1859. But as from 1881, the Lagos Times and Gold Coast Advertiser published by Richard Beale Blaize began to champion the cause for representative government. This noble cause attracted subsequent newspapers such as Weekly Record of the Jacksons, Nigeria Times of James Bright Davies, Lagos Daily News of Herbert Macaulay, West African Pilot of Nnamdi Azikiwe, Nigerian Tribune of Obafemi Awolowo among others. All the newspapers opposed British colonial administration and agitated for independence. Apart from their pungent writings which were critical of the colonial government, many of the proprietors led protest to England to demand for independence. The agitations finally led to independence on October 1, 1960. While applauding the media for its effort so far, this paper however, laments the low performance of the media in the 2015 General elections when the media descended so low by taking position on the side of the ruling political party which turned out to favour an opposition party.

Journal ArticleDOI
TL;DR: In this article, the performance of two off-grid sites using dual prime generators and hybrid power systems have been evaluated at a 100% site load and it was realized that the hybrid efficiency operates within a 2% tolerance of the simulated results and provides fuel saving of 61.70% as compared to the site using dual-prime generators at a constant site load per day.
Abstract: Due to non-existent commercial power, unreliable power supply and high cost of running diesel generators at remote locations in Ghana, it is becoming increasingly uneconomical for network operators to maintain off-grid communication infrastructure at remote locations since subscriber numbers are relatively low in these locations. In order to surmount these challenges, network operators are turning towards the use of alternative power supply systems to power their offgrid infrastructure in these remote areas. This paper seeks to perform a techno-economic evaluation of two commonly used power supply systems for BTS in these remote locations; namely dual prime generators and hybrid power systems. The performance of two off-grid sites using dual prime generators and hybrid power systems have been evaluated at a 100% site load. The load per day from the two sites was measured as 100W on the average. During the evaluation process, it was realized that the hybrid efficiency operates within a 2% tolerance of the simulated results and provides fuel saving of 61.70% as compared to the site using dual prime generators at a 100% site load per day. It was also realized that, the hybrid system has the capability to expand to 5 rectifier modules although the maximum is limited by the size of the generator. With a greater amount of rectification available to increase the rate of recharge for the batteries, it is possible to improve on the reduction in diesel run time and thereby further increase operational expenditure (OPEX) savings to more than 80%.

Journal ArticleDOI
TL;DR: An illustration of this study will be given in an application of control of an autonomous hexacopter developed by the team architecture of systems, in the national engineering school of electricity and mechanic in Casablanca in Morocco.
Abstract: An unmanned aerial vehicle UAV (also known as a drone) refers to a pilotless aircraft. Next generation of this kind of flying robots will be designed to fly autonomously at long range and high endurance for multi-complex purposes as surveillance, reconnaissance, electronic warfare and target acquisition. For operating in uncontrolled and dynamic environments, the robot must constantly reconfigure itself to adapt to the external conditions and its own goals. The need of control architecture to manage these reconfigurations becomes the first order of business to improve the autonomy of such robots. Such control is achieved through the use of computer systems. But “truly” autonomous UAV is done by placing a computer onboard the UAV with efficient control architecture, allowing it to process all commands itself. The most popular system meeting these criteria is the Raspberry Pi and Arduino families of microcontrollers. In the other hand an array of sensors including a GPS, an IMU and a camera are used. Through using of software state of the art and modern telecommunication networks, this aerial robots will be capable of intelligent navigation (multi-agent control architecture) combining GPS (Global Positioning System) in outdoor environment through the use of a machine interface employing mapping software maintaining an internet connection through 4G LTE and image processing in indoor space utilizing various image processing algorithms. An illustration of this study will be given in an application of control of an autonomous hexacopter developed by the team architecture of systems, in the national engineering school of electricity and mechanic in Casablanca in Morocco.

Journal ArticleDOI
TL;DR: In this paper, ensemble technique is used with incremental algorithm for student’s career choice and results over real world data sets are used to validate the effectiveness of this method.
Abstract: Education plays vital role in a student’s life. While choosing any field, number of options available in front of student. Student’s marks, aptitude, family background, educational environment are main essential factors while selecting a career path and these factors act as a training set to the learning system for classification. With time educational records are accumulating and increasing rapidly. To handle this data along with new features without forgetting previously learnt knowledge, incremental learning technique is introduced by machine learning. Incremental learning algorithm handles previous knowledge to take future decisions and update the system. Knowledge is represented by combining different classifiers for identification of student’s features for his/her career growth. In this paper, ensemble technique is used with incremental algorithm for student’s career choice and results over real world data sets are used to validate the effectiveness of this method.