Arushi Tetarbe, T. Choudhury, Teoh Teik Toe, S. Rawat
{"title":"Oral cancer detection using data mining tool","authors":"Arushi Tetarbe, T. Choudhury, Teoh Teik Toe, S. Rawat","doi":"10.1109/ICATCCT.2017.8389103","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389103","url":null,"abstract":"Previously cancer was an incurable disease, but now with the advancement in technology it has been successful in becoming a curable disease. Oral cancer is the unstoppable increase in the number of cells or mutation that is formed and has the capability to affect the neighboring tissues. In this paper different algorithms of data mining will be used to detect oral cancer. Data mining is referred to a prominent technique employed by various health institutions for classification of life threatening diseases, e.g. cancer, dengue and tuberculosis. In our proposed approach WEKA is applied with ten cross validation to calculate and collate output. WEKA consists of a large variety of data mining machine learning algorithms. First we have classified the oral cancer dataset and then analyzed various data mining methods in WEKA through Explorer and Experiment interfaces. The prime aim is to classify the dataset and help to collect useful material from the data and comfortably choose an appropriate algorithm for accurate prognostic model from it.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115486756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Directory services for identity and access management in cloud computing","authors":"M. T. Banday, Saima Mehraj","doi":"10.1109/ICATCCT.2017.8389157","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389157","url":null,"abstract":"Identity and Access Management (IAM) in cloud computing is a large domain that offers the ability to securely access cloud resources. In the cloud computing paradigm, an efficient IAM is significant for maintaining the Confidentiality, Integrity and Availability (CIA-triad) of the data that is stored in the cloud. As IAM is an essential security component of cloud computing, it cannot be overlooked and needs attention from the research community. This paper outlines the significance and proper understanding of directory services, which are at the center of an organization's IAM because they map user access to different applications and devices. The paper also discusses directory-as-a-service solution which lessens the challenges that organizations face with a directory. In Directory-as-a-service model, the focus is on the directory delivered as cloud service i.e. directory service is provided through the cloud instead of on premise directory solutions.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124361414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study on load-balancing algorithms/or cloud environments","authors":"R. Pushpa, M. Siddappa","doi":"10.1109/ICATCCT.2017.8389154","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389154","url":null,"abstract":"Today, demand of distributed computing technique has grown drastically where cloud computing also has gain considerable attention from researchers and industries for various applications. Cloud computing is provided by cloud service provides where various virtual machines are deployed to accomplish the assigned task. During cloud deployment, cloud service providers aim on the energy cost reduction, load-balancing and efficiently accomplishment of the task. Several researches have been carried out to improve the performance of cloud computing but still there are various issues are unaddressed such as load-balancing, resource allocation, VM migration and energy efficient task scheduling etc. In this article, we have reviewed recent techniques of load-balancing, and resource allocation and discussed about their advantages and drawbacks. A future work plan is also focused for energy efficient load balancing techniques by which performance of cloud computing is enhanced.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116942852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An information divergence based approach to detect flooding DDoS attacks and Flash Crowds","authors":"Gursharanjeet Kaur, Sunny Behal, Shifali","doi":"10.1109/ICATCCT.2017.8389143","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389143","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks poses a severe threat to widely used Internet-based services and applications. Currently, during in the technology era, the internet is the only real exigent that delivers a glut of services like businesses, banking, communication, education, e-commerce, etc. Distributed Denial of Service attack aims to deny access by legitimate users to shared services or resources. Because of the vulnerability of the initial style of the web, attackers can merely mimic the patterns of legitimate network traffic. The prevailing fingerprint or feature-based methods are not appropriate to detect a recent DDoS attack. In this paper our goal is to detect a DDoS attack as well as Flash Crowd using various information distance measures such as Kullbeck-Leibler, Hellinger and Manhattan distance to measure the flow similarity among the traffic. Further the detection parameters such as Detection Rate, Classification Rate, Precision Rate and False Positive Rate is computed and shows that the Kullbeck-Leibler detection metric effectively detects the attack as compared to the other two.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"461 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116025642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of GDOP for IRNSS","authors":"K. J. Manjunath, K. Sudha, S. Raman, Vignesam","doi":"10.1109/icatcct.2017.8389098","DOIUrl":"https://doi.org/10.1109/icatcct.2017.8389098","url":null,"abstract":"The presence of Global Positioning System (GPS) of USA has helped the field of navigation greatly. India has developed and deployed Indian Regional Navigation Satellite System (IRNSS) for navigation within India. The precision of locating position using IRNSS is influenced by a few factors. One such factor is satellite Geometry with respect to the user. Better the geometry spread, better is the location exactness. The Satellite Geometry impact can be measured by Geometric Dilution of Precision (GDOP). Lower the GDOP, better is the accuracy of location. GNSS requires at least four satellites to figure client position. At the point when more number of satellites are in sight, best four satellites can be taken to compute one's position. For making utilization of IRNSS, investigation is made by figuring the best GDOP because of optimum constellation of four satellites in sight as well as for all the satellites in view. The System Tool Kit (STK) is utilized for examination of best GDOP selecting four satellites dynamically to get better client position accuracy over the Indian subcontinent. It is clear that, GDOP computed using all satellites in view is better than the GDOP computed by using best four satellites. Hence it is anticipated that all seven satellites can be used for IRNSS Navigation solution, though it requires little bit more processing time, than selecting four satellites visible from a particular point.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127442378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and performance analysis of multipliers using Kogge Stone Adder","authors":"A. Raju, Sudhir Kumar Sa","doi":"10.1109/ICATCCT.2017.8389113","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389113","url":null,"abstract":"Adders are known to have being frequently used in VLSI designs. This work deals with the designing and implementing multipliers using the underlying principle of parallel prefix adders. We are looking for less delay specific multiplier, so among the prominent PPA's like Kogge Stone Adder(KSA), Sparse Kogge Stone Adder(SKSA), Brent Kung Adder(BKA) and Lander Fischer Adder(LFA), we choose to implement the fastest PPA, i.e., KSA to get a comparative idea about the performance of four different multipliers namely; Binary multiplier, Braun Multiplier, Yedic Multiplier and Baugh Wooley Multiplier. Further the synthesis and simulation results reveal better idea about the proposed multipliers by giving an in depth view of their area, delay and power. A brief discussion about the application of the above is done. We have used Cadence Software and TSMC 180 nm technology.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126670616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weather tracking system using MQTT and SQLite","authors":"R. Kodali, Venkata Sundeep Kumar Gorantla","doi":"10.1109/ICATCCT.2017.8389134","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389134","url":null,"abstract":"Every person is enthusiastic in accessing the information about certain place or object remotely and to make the things around them smart using new emerging technologies. This paper mainly focus an implementation of a framework of publishing data from ESP8266 to SQLite data server hosted on Raspberry pi module using MQTT Protocol. Here the sensor is assembled to ESP8266 microcontroller to read the values. A python application is developed to sense the values from sensor and to publish the data to raspberry pi. Now, ESP8266 acts as MQTT client and sensor data is sent to the MQTT broker running on Raspberry pi module. Additionally SQLite data server is also hosted on the Raspberry pi module and the data from the ESP8266 is stored in JSON format. This data from server is formatted using HTML file and the formatted data can be accessed remotely.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122972211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of big data security practices","authors":"P. Revathy, R. Mukesh","doi":"10.1109/ICATCCT.2017.8389145","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389145","url":null,"abstract":"In modern world, huge amount of data is common across all businesses which aim to unlock new economy from these sources. Hadoop was developed to analyze large scale data repository in a parallel computing architecture. The main task in this process is to handle this “Big Data” by applying proper strategies. So, present industry is focusing on the methods in which this “Big Data” can be used for their business growth. There's no suspicion that the setup of Data Lake on hadoop can provide a new way of analytics and intuition analysis. Beyond experimentations and POCs, today Hadoop is considered more into production. As we are moving towards the stage where Hadoop is considered for real-time production scenarios and major chunk of the production data is normally sensitive, or subject to many control measures, it becomes high priority to consider the security aspects in hadoop before deciding on Hadoop installation for any enterprise. This paper evaluates various issues in Hadoop ecosystem and its popular distributions by top big data players in the market. It further intends to investigate and compare the current security features being provided in those big data distributions along with other open source big data security solutions to help in building secure big data environment.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126569263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-organizing maps classification with application to the low-frequency magnetic field emitted by portable computers","authors":"D. Brodic, I. Draganov","doi":"10.1109/ICATCCT.2017.8389155","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389155","url":null,"abstract":"This study presents an application of the Self-Organizing-Map method used for the classification of the extremely low-frequency magnetic field emission in the close neighborhood of the portable computers. The experiment is conducted on two different groups of portable computers: (i) laptop and (ii) tablet computers. After measuring their extremely low-frequency magnetic field emission, the Self-Organizing-Map is used for the classification of these results, which authorized the typical emission levels. Some of them are dangerous, because they are far above the valid safety standards' limit. At the end, a discussion is performed on the importance of using the classification as a possible solution for safely use of the portable computers. In this way, it is used to define and reduce the risk of the magnetic field emission negative effects to the portable computer users.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131259233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shouray Kumra, T. Choudhury, Nguyen Gia Nhu, Tarun Nalwa
{"title":"Challenges faced by cloud computing","authors":"Shouray Kumra, T. Choudhury, Nguyen Gia Nhu, Tarun Nalwa","doi":"10.1109/ICATCCT.2017.8389105","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389105","url":null,"abstract":"Cloud computing, the anticipating need of registering as a best utility can possibly take an expansive jump in the PC business, is organized and put to the best use as to the present-day trends. This advancement enables numerous organizations and needed resources for customers [1]. Because of ascent administrations in cloud many organizations provides different administrations in cloud foundation is expanded, accordingly making an opposition on costs in the worldwide market. Distributed computing suppliers offer more administrations to their customers extending (laaS), (PaaS), (SaaS), (SECaaS), (TEaaS). The aim of this paper is to provide well-constructed result of solutions of some questions on challenges faced by cloud computing, i.e. 1. How users are guaranteed regarding trust and privacy? 2. How legal and regulatory compliance requirements met? 3 Design of model of pricing? 4. Management of Service Level Argument and Quality of Service and minimization of SLA violations? This paper also includes security algorithms i.e., AES, DES, 3DES which are explained and compared for better understanding.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124247886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}