{"title":"Intellectual performance analysis of students by comparing various data mining techniques","authors":"A. Jain, T. Choudhury, Parveen Mor, A. Sabitha","doi":"10.1109/ICATCCT.2017.8389106","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389106","url":null,"abstract":"Student's performance data is an intensely important educational data which needs to be analyzed and studied for building better constructive models to improve education. The field which deals with this, to get us better educational model is known as Educational Data Mining (EDM). Educational Data Mining is concerned with helping educational organisations by applying data mining algorithms on educational data. Our research tries to correlate multiple social factors which can theoretically affect a student's graduate education. We try to find a data mining model to best classify and predict students performance based on this correlation.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123022251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dhara G. Rangani, Nikunj Tahilramani, Vandana P. Talreja
{"title":"Autonomous photo clicker and website up loader system","authors":"Dhara G. Rangani, Nikunj Tahilramani, Vandana P. Talreja","doi":"10.1109/ICATCCT.2017.8389111","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389111","url":null,"abstract":"This paper addresses concept of wildlife photography; there is always risk of deadly injuries when capturing image of wild animals from nearby distance. This system can be used instead of manual presence to avoid risk of any accident. Also in Rare-Birds Photography or bird sanctuaries, it is extremely difficult to capture the image as they don't come near human beings. This Photo Clicker is a system that is built on an autonomous board that detects motion, snaps photos and uploads them to website based on Python code (IDEL) loaded in a Raspberry Pi. A PIR (passive infra-red) sensor is used to detects warm-body heat at a specific distance, and triggers the camera to snap photographs. These photos are then uploaded to the dropbox via Raspberry pie.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching formal methods at undergraduate/graduate level: The three perspectives","authors":"N. Jeppu, Y. Jeppu, M. Devi","doi":"10.1109/ICATCCT.2017.8389153","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389153","url":null,"abstract":"Formai methods provide easy way of validating properties about systems. These methods are in existence since the last 50 years but have not been used fully by the industry as an engineering tool. One of the challenges of acceptance is education. Educating engineering students to take up formal methods is a challenge. This paper looks at these aspects of formal methods by providing demonstration of its usefulness on a recent failure. A few challenges of teaching formal method are described and three perspectives of formal methods are explained. The viewpoints are from a student who has worked on this, a teacher who teaches this and an industry practitioner of formal methods. We advocate an industry academia partnership to overcome some of these challenges of teaching formal methods to students.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127424019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mithileysh Sathiyanarayanan, V. Govindraj, Nandakishor Jahagirdar
{"title":"Challenges and opportunities of integrating Internet of Things (IoT) and Light Fidelity (LiFi)","authors":"Mithileysh Sathiyanarayanan, V. Govindraj, Nandakishor Jahagirdar","doi":"10.1109/ICATCCT.2017.8389121","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389121","url":null,"abstract":"The search for faster internet connection is ceaseless and the need for new technologies and techniques is always on rise. Wireless Fidelity (WiFi) is an inconceivable asset, but it is still limited, and as connectivity spreads, both across the world and throughout the Internet of Things (IoT), issues will emerge if WiFi is our exclusive alternative. So, in 2011, a Light Fidelity (LiFi) was introduced such that the speed is over 1 Giga bytes per second (Gbps), that is 100 times faster than the speed of WiFi we are utilizing as of now. The speed of LiFi is additionally anticipated that would achieve 3 to 5 Gbps making it perfect for IoT and to wipe out the constraints and limitations with WiFi technology. In this paper, we discuss the idea of integrating IoT and LiFi, as well as identified the challenges and opportunities of the integrated system to build novel and smart solutions.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125610043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EH-mulSEP: Energy-harvesting enabled multi-level SEP protocol for IoT-based heterogeneous WSNs","authors":"Antar S.H. Abdul-Qawy, T. Srinivasulu","doi":"10.1109/ICATCCT.2017.8389122","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389122","url":null,"abstract":"In this paper, we propose an improved hierarchical clustering protocol called EH-mulSEP (Energy-Harvesting enabled Multi-level Stable Election Protocol) for green IoT-based heterogeneous WSNs. We study the impact of energy-harvesting techniques in the large-scale systems by adding a number of energy-harvesting relay nodes that receive the aggregated data from the elected cluster heads and transmit to the base stations layer. Besides, we introduce a general formula for multi-level weighted election probability that can support up to n levels of heterogeneous nodes with their respective amounts of initial energies. For this, we leverage a state of the art heterogeneity method that considers more than three types of heterogeneous nodes and provides general models for higher levels of initial energy in WSNs. EH-mulSEP aims to minimize the total energy usage of battery-powered sensor nodes in IoT-based systems so as to maximize energy conservation, extend the network lifetime and ensure a higher level of scalability. The simulation results show that EH-mulSEP highly enhances the network performance in terms of stability, network lifetime, energy consumption, and throughput compared to other versions of SEP protocol in all conditions and scenarios tested.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prototype model to improve the quality of disability students performance towards mining technology","authors":"P. Saraswathi, N. Nagadeepa","doi":"10.1109/ICATCCT.2017.8389114","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389114","url":null,"abstract":"In today's world, disability students are still lingering and hampering for their academic performance. E-learning is an area of learning background and fewer barriers for disability students. It is mainly used in knowledge discovery to grow the educational research. SRM in mining approach focus to find the strong relationship between the variables. The existing algorithm deals with static data by rescanning the database. The disadvantage of existing work needs more number of cycles to execute the algorithm. To overcome these disadvantages, the proposed work aims to enhance the performance of disability students using assistive tools with ICT to achieve their goals. In order to improve the efficiency, this research work develops the e-LSDS Model with the use of Rule Gain algorithm to find relevant rules according to the measures reduce the number of cycles at the time of execution. The experimental study proves the strong rule with less number of cycles improves the learning gains for the disability students.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133380961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distributed authentication and key exchange approach for secure M2M communications","authors":"B. Satyanarayana Murthy, L. Sumalatha","doi":"10.1109/ICATCCT.2017.8389148","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389148","url":null,"abstract":"Machine to Machine (M2M) communication is the technology that is used in both wired and wireless technology in which the heterogeneous devices are networked to exchange sensitive information. The devices collect data from other such devices. This data may be prone to so many security threats. In this paper, we propose a simple authentication and key exchange mechanism based on a lightweight public key and symmetric encryption scheme. By using this, any M2M device could be authenticated by the other device. The formal analysis represents that the scheme could endure security attacks.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132577825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"san_sim: Factual and efficient URL text similarity algorithm","authors":"Sandhya Pundhir, Udayan Ghose","doi":"10.1109/ICATCCT.2017.8389161","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389161","url":null,"abstract":"Similarity determines the relation between two objects. We need this to establish an order between the two objects being compared. Here we want to compare two URLs (Uniform Resource Locater) and find which is more relevant to the input query. Content mining is one of web mining technique which uses text of the web page. Online learning is used where entire dataset cannot be used at training time because of its size. Here few popular text similarity methods are implemented and their relevance is compared with our proposed method. We find that our algo-rithmperforms better than the traditional tex similarity measures such as LCS (Longest Common Sequence) and Dice score. Performance of our proposed method is better as higher Precision, Recall and F measures are achieved. This proves that data specific filtering methods, online learning principles when used with statistical method produces better result.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131921929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security against morphed speech based on speaker verification system","authors":"Nikunj Tahilramani, N. Bhatt","doi":"10.1109/ICATCCT.2017.8389147","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389147","url":null,"abstract":"Speaker Verification systems needs to be robust over Morphed or Converted voice. There is possibility of Spoofing attack so to prevent that kind of attack and make surety of the system is big challenge. The main goal of the proposed system is to correctly identify the speaker and preventing the system from the morphing attack to ensure the authenticity, by using security. Morphing is performed by Pitch Synchronous Overlap and Add (PSOLA) method and Verification is performed by Correlation method, in that feature extraction is performed by MFCC and LPC method. Watermarking is performed with the blind detection and DM-QIM is used for watermarking process. In order to evaluate the overall performance of implemented algorithm, Identification rate, ABX test, and WSR are used.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124727305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart detection of rice purity and its grading","authors":"M. Manohar, K. Chatrapathy, M. Sowmya","doi":"10.1109/ICATCCT.2017.8389108","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389108","url":null,"abstract":"The main food in India is Rice. Be it the breakfast, lunch, dinner or some snacks, for everything the most preferred ingredient in Rice. In compared with north Indians, Rice is most used by South Indians. Today's youngsters from villages are migrating to cities in search of jobs after their education. Even farmers have stopped their cultivation and are working towards different business. So, the yield of rice is reduced in India. One more reason for this is because of the poor monsoon. Government is finding it challenging to supply rice to all its consumers. It is expected, because for Rice the consumers are more compared to its production. Government has decided to import the rice from the neighboring countries. This neighboring country knows the demand of rice in India and started supplying contaminated rice. Currently our Government has no technology to check the quality of the rice which they are getting imported, so the result is plastic rice arrived in India. Indirectly, India is in huge loss in terms of money and damages for its citizens health. So, there is a need of automated system to detect the quality of the rice that are imported. Another use of such automated system is that most of the people are not able to identify the type of the rice and the quality of the rice. This system helps even common man a facility in identifying the type and quality of rice.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114656711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}