2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)最新文献

筛选
英文 中文
Practitioner's guide for building effective complex enterprise architecture in digital transformation: An experience-based industry best practices summary 在数字化转型中构建有效的复杂企业架构的实践者指南:基于经验的行业最佳实践总结
Sreekumar Vobugari, Madhan Kumar Srinivasan, D. Somayajulu
{"title":"Practitioner's guide for building effective complex enterprise architecture in digital transformation: An experience-based industry best practices summary","authors":"Sreekumar Vobugari, Madhan Kumar Srinivasan, D. Somayajulu","doi":"10.1109/ICATCCT.2017.8389158","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389158","url":null,"abstract":"Enterprise software architectures have profound influence on present day digital transformations in any complex software systems building and overall performance. Enterprise architectures also influence the software systems sustainability to induct design changes for changing business requirements. They provide high-level abstraction by representing structural and behavioral properties of software system and represents multiple views addressing the needs of diverse stakeholders of business organizations. Software architecture of a software application will be at the core in deciding the success or failure of any software system. In a typical enterprise software architecture, key design decisions that address the needs of diverse stakeholders are captured under various architectural headings and unfortunately, the usage of these terminologies have been context based leading to ambiguity. This paper attempts to explain a systematic approach in eliciting key architectural design considerations and various aspects to be considered in formulating Business Architecture, Application Architecture, Data Architecture and Technology Architecture which are key components of any Enterprise Architecture. Also, this paper unveils various types of services that are to be identified that they play in software architecture formulation.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124469073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Securing IoT using layer characterstics 使用层特性保护物联网
A. Kaushik, Shail Talati
{"title":"Securing IoT using layer characterstics","authors":"A. Kaushik, Shail Talati","doi":"10.1109/ICATCCT.2017.8389150","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389150","url":null,"abstract":"IoT has gained significant popularity and securing such mission critical network remains a big concern. There are already reports of misusing such system. Recently there were reports of sending spam from a refrigerator. Bigger risk of security in IoT is that unrelated systems are connected and if any attacker gets into one object, it could result in harming much bigger segment. Also such connected networks will really be disconnected in terms of management and applied policies. So applying secured policy at each network segment will only help at certain level but it would not be feasible to secure whole ecosystem of IoT devices/objects. Security has been identified as one of the biggest challenge in IoT segment and there are no solid specs or techniques to come over these issue end to end. This paper outlines use of machine learning combining with interesting dimensions like layer characteristics of IoT device's network stack. Paper also provides example of layer characteristics, which are specific to a device, and creating a baseline of such characteristics using machine learning algorithm will help in establishing the identity of IoT devices without the need of sophisticated PKI infrastructure.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123384223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of traffic burst on the behavior of TCP variants for different LTE downlink schedulers 流量突发对不同LTE下行链路调度程序的TCP变体行为的影响
N. D. Adesh, A. Renuka
{"title":"Impact of traffic burst on the behavior of TCP variants for different LTE downlink schedulers","authors":"N. D. Adesh, A. Renuka","doi":"10.1109/ICATCCT.2017.8389100","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389100","url":null,"abstract":"In LTE network, the downlink resource scheduling process plays a vital role in enhancing the system performance and satisfy the end user quality of experience. However, the performance of system is not only confined to the single layer of LTE protocol stack, but there is also a correlation between the traffic dynamics and resource allocation decision. The study has been conducted to understand how the various combination of scheduling algorithms and Transmission Control Protocol (TCP) variants affects the performance of LTE network. This paper also investigates the effects of scheduling decision during traffic burst conditions with different TCP variants on the overall performance of the LTE network. In addition to that, the adverse effect of low and high queue space of users at eNodeB on TCP performance is also studied. The simulation results show that combination of H-TCP with PSS scheduler gives the highest throughput and TCP Vegas with PSS scheduler takes less end to end delay as well as Packet Delivery Fraction (PDF) compared to other TCP variants. By taking overall system performance parameter, TCP Westwood performs better in all combination with schedulers.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"552 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122902799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Coin based mobile battery charger with high security 硬币式移动电池充电器,安全性高
Dhara G. Rangani, Nikunj Tahilramani
{"title":"Coin based mobile battery charger with high security","authors":"Dhara G. Rangani, Nikunj Tahilramani","doi":"10.1109/ICATCCT.2017.8389128","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389128","url":null,"abstract":"Nowadays, every people use a Smartphone but in Smartphone everyone getting battery problem so we think for make a coin base battery charger, which can be use in business level. In this system main thing is coin detector and there are many types of coin detector, we use cantilever type sensor in the coin detection. Using cantilever type sensor detect weight of 5 Rs coin and give digital value using ADC and controller check the value and find coin original or duplicate. This system consumes solar power or greed power, basically use solar power greed power is optional when solar power is not available. This type of system can use at public place like bus station, railway station, business point, and also use the rural area where grid power is not available for partial/full daytime and a source of revenue for site providers. And also use as wending machine like chocolate and biscuit wending.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121143775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Regression algorithms for efficient detection and prediction of DDoS attacks 回归算法的有效检测和预测DDoS攻击
G. Dayanandam, E. Reddy, D. B. Babu
{"title":"Regression algorithms for efficient detection and prediction of DDoS attacks","authors":"G. Dayanandam, E. Reddy, D. B. Babu","doi":"10.1109/ICATCCT.2017.8389136","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389136","url":null,"abstract":"In the ICT era the need of depth investigation and analysis is required on network traffic. The analysis should focus on detecting DDoS attacks. In the 21st century the use of communication or transactions are completely doing through online, the political activists, and international cyber terrorists are choosing the DDoS attacks as a powerful weapon for their illegal an un ethical activities. It is impossible to the human being to identify all these unethical activities, hence the need of machine based algorithms are required. In this paper we used GLM, GBM, NN, RF regression algorithms for detection and prediction of DDoS attacks, and also proved that by using regression algorithms we observed more accurate result than using KNN SVM algorithm.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121297179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and analysis of multiplexed FSO system with DPSK and Manchester coding 采用DPSK和曼彻斯特编码的多路FSO系统设计与分析
Jagana Bihari Padhy, B. Patnaik
{"title":"Design and analysis of multiplexed FSO system with DPSK and Manchester coding","authors":"Jagana Bihari Padhy, B. Patnaik","doi":"10.1109/ICATCCT.2017.8389097","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389097","url":null,"abstract":"In spite of several advantages of free space optics (FSO) such as huge bandwidth, license-free communication and high electromagnetic interference, immunity over radio-frequency technology, these systems are also severely affected by fog and atmospheric turbulence. Generally, the performance of such communication systems can be measured by the two important parameters such as bit error rate (BER) and Q-factor. To improve the average BER performance of the system various advanced modulation techniques with different coding schemes have been proposed in the past literature. Thus in the proposed system, Manchester coding technique is used with the differential phase shift keying (DPSK) modulated signal. The designed system is compared with the differential phase shift keying with the 2-array pulse position modulation (DPSK-2PPM) scheme and the conventional DPSK system. Manchester encoding synchronizes the signal itself; hence, it minimizes the error rate and optimizes the reliability of the proposed system. In addition, a 16-channel wavelength division multiplexing (WDM) FSO system is considered for improving the spectral efficiency of the system. For analyzing, the low to high turbulence level of atmosphere, Gamma-Gamma type channel model is preferred.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126771832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data processing in semantic sensor web: A survey 语义传感器网络中的数据处理研究进展
L. B. Bhajantri, R. Pundalik
{"title":"Data processing in semantic sensor web: A survey","authors":"L. B. Bhajantri, R. Pundalik","doi":"10.1109/ICATCCT.2017.8389126","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389126","url":null,"abstract":"Wireless Sensor Network (WSN) has set of wireless sensor nodes that are used to generate or sense the high volume of raw data from the environment, transmits the data to its respective sink node. The processing of raw data requires more amount of energy from sensor nodes to sink node or base station through single-hop or multi-hop communication over the nodes. In this context, sensor data need to be quality of data with semantic information in terms of semantic data integration and fusion and data processing, and so on. In order to problem of semantic data and managing raw data in WSN effectively, the Semantic Sensor Web (SSW) is taken into the wireless sensor networks. The SSW is promising technology for realizing the use of sensor data and semantic web that provide the semantic information to existing sensor networks by utilizing domain, spatial and temporal ontologies and other related semantic technology. This paper presents survey of data processing in SSW from various aspects. Besides, it presents the architecture of SSW and its advantages.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131950697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel approach for the brain tumor detection and classification using support vector machine 基于支持向量机的脑肿瘤检测与分类新方法
B. B. Shankaragowda, M. Siddappa, M. Suresha
{"title":"A novel approach for the brain tumor detection and classification using support vector machine","authors":"B. B. Shankaragowda, M. Siddappa, M. Suresha","doi":"10.1109/ICATCCT.2017.8389112","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389112","url":null,"abstract":"The human brain is the important organ of the human nervous system. One of the main reasons of loss of life people is brain tumor. A brain tumor takes place while extraordinary cells from inside the brain. There are main styles of tumors malignant or cancerous tumors and benign tumors. The technique entails are Preprocessing, Segmentation, Feature extraction, and Classification. The present segments the tumor the use of set of rules and detects and classifies the tumor the usage of Support Vector Machine (SVM) classifier. The main intention to helps the health practitioner to investigate the tumor malignant or benign at earlier degrees.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131983460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An innovative optimized model to anticipate clients about immigration in telecom industry 电信行业移民客户预测的创新优化模型
M. Naik, S. S. Reddy
{"title":"An innovative optimized model to anticipate clients about immigration in telecom industry","authors":"M. Naik, S. S. Reddy","doi":"10.1109/ICATCCT.2017.8389139","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389139","url":null,"abstract":"This article proposed an innovative model to predict churning and non churning of clients in the telecom industry. Now-a-days, telecom customers are frequently migrating from one network to the other due to various constraints, policies and standards in public and private sectors. Usually in current industry the cost to retain the existing clients is smaller than getting a pioneering customer. To survive in the current competitive world, there is a need to design an optimal prediction model for churning and non churning of telecom clients. The proposed model has been outperformed with an accuracy level of 99.61% than existing models and techniques. Earlier authors have achieved 94.03 % of accuracy using machine learning techniques to predict churning of customers.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125145785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MQTT based vehicle accident detection and alert system 基于MQTT的车辆事故检测与报警系统
R. Kodali, S. Sahu
{"title":"MQTT based vehicle accident detection and alert system","authors":"R. Kodali, S. Sahu","doi":"10.1109/ICATCCT.2017.8389130","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389130","url":null,"abstract":"Now-a-days as we open the newspaper, we find atleast one news of a road accident. With vehicles becoming increasingly affordable, there has been a surge in the number of vehicles on roads on an average all over the world. Accidents bring devastation upon victims, causing loss of precious time and money. It has been established, after extensive research, that a majority of accidents become fatalities because of lack of communication to the concerned medical authorities and the consequent lack of immediate medical support. This application helps sense the possible occurence of an accident on the road, with the help of sensors attached to the vehicle. This occurence will be immediately communicated to the concerned people so that further action can be taken without any further ado.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130928971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信