2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)最新文献

筛选
英文 中文
Intellectual performance analysis of students by comparing various data mining techniques 通过比较各种数据挖掘技术分析学生的智力表现
A. Jain, T. Choudhury, Parveen Mor, A. Sabitha
{"title":"Intellectual performance analysis of students by comparing various data mining techniques","authors":"A. Jain, T. Choudhury, Parveen Mor, A. Sabitha","doi":"10.1109/ICATCCT.2017.8389106","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389106","url":null,"abstract":"Student's performance data is an intensely important educational data which needs to be analyzed and studied for building better constructive models to improve education. The field which deals with this, to get us better educational model is known as Educational Data Mining (EDM). Educational Data Mining is concerned with helping educational organisations by applying data mining algorithms on educational data. Our research tries to correlate multiple social factors which can theoretically affect a student's graduate education. We try to find a data mining model to best classify and predict students performance based on this correlation.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123022251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Autonomous photo clicker and website up loader system 自主照片点击和网站上传系统
Dhara G. Rangani, Nikunj Tahilramani, Vandana P. Talreja
{"title":"Autonomous photo clicker and website up loader system","authors":"Dhara G. Rangani, Nikunj Tahilramani, Vandana P. Talreja","doi":"10.1109/ICATCCT.2017.8389111","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389111","url":null,"abstract":"This paper addresses concept of wildlife photography; there is always risk of deadly injuries when capturing image of wild animals from nearby distance. This system can be used instead of manual presence to avoid risk of any accident. Also in Rare-Birds Photography or bird sanctuaries, it is extremely difficult to capture the image as they don't come near human beings. This Photo Clicker is a system that is built on an autonomous board that detects motion, snaps photos and uploads them to website based on Python code (IDEL) loaded in a Raspberry Pi. A PIR (passive infra-red) sensor is used to detects warm-body heat at a specific distance, and triggers the camera to snap photographs. These photos are then uploaded to the dropbox via Raspberry pie.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Teaching formal methods at undergraduate/graduate level: The three perspectives 本科/研究生阶段的正式教学方法:三个视角
N. Jeppu, Y. Jeppu, M. Devi
{"title":"Teaching formal methods at undergraduate/graduate level: The three perspectives","authors":"N. Jeppu, Y. Jeppu, M. Devi","doi":"10.1109/ICATCCT.2017.8389153","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389153","url":null,"abstract":"Formai methods provide easy way of validating properties about systems. These methods are in existence since the last 50 years but have not been used fully by the industry as an engineering tool. One of the challenges of acceptance is education. Educating engineering students to take up formal methods is a challenge. This paper looks at these aspects of formal methods by providing demonstration of its usefulness on a recent failure. A few challenges of teaching formal method are described and three perspectives of formal methods are explained. The viewpoints are from a student who has worked on this, a teacher who teaches this and an industry practitioner of formal methods. We advocate an industry academia partnership to overcome some of these challenges of teaching formal methods to students.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127424019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Challenges and opportunities of integrating Internet of Things (IoT) and Light Fidelity (LiFi) 物联网(IoT)与光保真度(LiFi)融合的挑战与机遇
Mithileysh Sathiyanarayanan, V. Govindraj, Nandakishor Jahagirdar
{"title":"Challenges and opportunities of integrating Internet of Things (IoT) and Light Fidelity (LiFi)","authors":"Mithileysh Sathiyanarayanan, V. Govindraj, Nandakishor Jahagirdar","doi":"10.1109/ICATCCT.2017.8389121","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389121","url":null,"abstract":"The search for faster internet connection is ceaseless and the need for new technologies and techniques is always on rise. Wireless Fidelity (WiFi) is an inconceivable asset, but it is still limited, and as connectivity spreads, both across the world and throughout the Internet of Things (IoT), issues will emerge if WiFi is our exclusive alternative. So, in 2011, a Light Fidelity (LiFi) was introduced such that the speed is over 1 Giga bytes per second (Gbps), that is 100 times faster than the speed of WiFi we are utilizing as of now. The speed of LiFi is additionally anticipated that would achieve 3 to 5 Gbps making it perfect for IoT and to wipe out the constraints and limitations with WiFi technology. In this paper, we discuss the idea of integrating IoT and LiFi, as well as identified the challenges and opportunities of the integrated system to build novel and smart solutions.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125610043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
EH-mulSEP: Energy-harvesting enabled multi-level SEP protocol for IoT-based heterogeneous WSNs EH-mulSEP:基于物联网的异构wsn的能量收集多级SEP协议
Antar S.H. Abdul-Qawy, T. Srinivasulu
{"title":"EH-mulSEP: Energy-harvesting enabled multi-level SEP protocol for IoT-based heterogeneous WSNs","authors":"Antar S.H. Abdul-Qawy, T. Srinivasulu","doi":"10.1109/ICATCCT.2017.8389122","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389122","url":null,"abstract":"In this paper, we propose an improved hierarchical clustering protocol called EH-mulSEP (Energy-Harvesting enabled Multi-level Stable Election Protocol) for green IoT-based heterogeneous WSNs. We study the impact of energy-harvesting techniques in the large-scale systems by adding a number of energy-harvesting relay nodes that receive the aggregated data from the elected cluster heads and transmit to the base stations layer. Besides, we introduce a general formula for multi-level weighted election probability that can support up to n levels of heterogeneous nodes with their respective amounts of initial energies. For this, we leverage a state of the art heterogeneity method that considers more than three types of heterogeneous nodes and provides general models for higher levels of initial energy in WSNs. EH-mulSEP aims to minimize the total energy usage of battery-powered sensor nodes in IoT-based systems so as to maximize energy conservation, extend the network lifetime and ensure a higher level of scalability. The simulation results show that EH-mulSEP highly enhances the network performance in terms of stability, network lifetime, energy consumption, and throughput compared to other versions of SEP protocol in all conditions and scenarios tested.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Prototype model to improve the quality of disability students performance towards mining technology 以原型模型提高残疾学生的学习质量,面向技术挖掘成绩
P. Saraswathi, N. Nagadeepa
{"title":"Prototype model to improve the quality of disability students performance towards mining technology","authors":"P. Saraswathi, N. Nagadeepa","doi":"10.1109/ICATCCT.2017.8389114","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389114","url":null,"abstract":"In today's world, disability students are still lingering and hampering for their academic performance. E-learning is an area of learning background and fewer barriers for disability students. It is mainly used in knowledge discovery to grow the educational research. SRM in mining approach focus to find the strong relationship between the variables. The existing algorithm deals with static data by rescanning the database. The disadvantage of existing work needs more number of cycles to execute the algorithm. To overcome these disadvantages, the proposed work aims to enhance the performance of disability students using assistive tools with ICT to achieve their goals. In order to improve the efficiency, this research work develops the e-LSDS Model with the use of Rule Gain algorithm to find relevant rules according to the measures reduce the number of cycles at the time of execution. The experimental study proves the strong rule with less number of cycles improves the learning gains for the disability students.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133380961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A distributed authentication and key exchange approach for secure M2M communications 用于安全M2M通信的分布式认证和密钥交换方法
B. Satyanarayana Murthy, L. Sumalatha
{"title":"A distributed authentication and key exchange approach for secure M2M communications","authors":"B. Satyanarayana Murthy, L. Sumalatha","doi":"10.1109/ICATCCT.2017.8389148","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389148","url":null,"abstract":"Machine to Machine (M2M) communication is the technology that is used in both wired and wireless technology in which the heterogeneous devices are networked to exchange sensitive information. The devices collect data from other such devices. This data may be prone to so many security threats. In this paper, we propose a simple authentication and key exchange mechanism based on a lightweight public key and symmetric encryption scheme. By using this, any M2M device could be authenticated by the other device. The formal analysis represents that the scheme could endure security attacks.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132577825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
san_sim: Factual and efficient URL text similarity algorithm san_sim:真实高效的URL文本相似度算法
Sandhya Pundhir, Udayan Ghose
{"title":"san_sim: Factual and efficient URL text similarity algorithm","authors":"Sandhya Pundhir, Udayan Ghose","doi":"10.1109/ICATCCT.2017.8389161","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389161","url":null,"abstract":"Similarity determines the relation between two objects. We need this to establish an order between the two objects being compared. Here we want to compare two URLs (Uniform Resource Locater) and find which is more relevant to the input query. Content mining is one of web mining technique which uses text of the web page. Online learning is used where entire dataset cannot be used at training time because of its size. Here few popular text similarity methods are implemented and their relevance is compared with our proposed method. We find that our algo-rithmperforms better than the traditional tex similarity measures such as LCS (Longest Common Sequence) and Dice score. Performance of our proposed method is better as higher Precision, Recall and F measures are achieved. This proves that data specific filtering methods, online learning principles when used with statistical method produces better result.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131921929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security against morphed speech based on speaker verification system 基于说话人验证系统的变形语音安全
Nikunj Tahilramani, N. Bhatt
{"title":"Security against morphed speech based on speaker verification system","authors":"Nikunj Tahilramani, N. Bhatt","doi":"10.1109/ICATCCT.2017.8389147","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389147","url":null,"abstract":"Speaker Verification systems needs to be robust over Morphed or Converted voice. There is possibility of Spoofing attack so to prevent that kind of attack and make surety of the system is big challenge. The main goal of the proposed system is to correctly identify the speaker and preventing the system from the morphing attack to ensure the authenticity, by using security. Morphing is performed by Pitch Synchronous Overlap and Add (PSOLA) method and Verification is performed by Correlation method, in that feature extraction is performed by MFCC and LPC method. Watermarking is performed with the blind detection and DM-QIM is used for watermarking process. In order to evaluate the overall performance of implemented algorithm, Identification rate, ABX test, and WSR are used.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124727305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart detection of rice purity and its grading 大米纯度的智能检测及其分级
M. Manohar, K. Chatrapathy, M. Sowmya
{"title":"Smart detection of rice purity and its grading","authors":"M. Manohar, K. Chatrapathy, M. Sowmya","doi":"10.1109/ICATCCT.2017.8389108","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389108","url":null,"abstract":"The main food in India is Rice. Be it the breakfast, lunch, dinner or some snacks, for everything the most preferred ingredient in Rice. In compared with north Indians, Rice is most used by South Indians. Today's youngsters from villages are migrating to cities in search of jobs after their education. Even farmers have stopped their cultivation and are working towards different business. So, the yield of rice is reduced in India. One more reason for this is because of the poor monsoon. Government is finding it challenging to supply rice to all its consumers. It is expected, because for Rice the consumers are more compared to its production. Government has decided to import the rice from the neighboring countries. This neighboring country knows the demand of rice in India and started supplying contaminated rice. Currently our Government has no technology to check the quality of the rice which they are getting imported, so the result is plastic rice arrived in India. Indirectly, India is in huge loss in terms of money and damages for its citizens health. So, there is a need of automated system to detect the quality of the rice that are imported. Another use of such automated system is that most of the people are not able to identify the type of the rice and the quality of the rice. This system helps even common man a facility in identifying the type and quality of rice.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114656711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信