Sreekumar Vobugari, Madhan Kumar Srinivasan, D. Somayajulu
{"title":"Practitioner's guide for building effective complex enterprise architecture in digital transformation: An experience-based industry best practices summary","authors":"Sreekumar Vobugari, Madhan Kumar Srinivasan, D. Somayajulu","doi":"10.1109/ICATCCT.2017.8389158","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389158","url":null,"abstract":"Enterprise software architectures have profound influence on present day digital transformations in any complex software systems building and overall performance. Enterprise architectures also influence the software systems sustainability to induct design changes for changing business requirements. They provide high-level abstraction by representing structural and behavioral properties of software system and represents multiple views addressing the needs of diverse stakeholders of business organizations. Software architecture of a software application will be at the core in deciding the success or failure of any software system. In a typical enterprise software architecture, key design decisions that address the needs of diverse stakeholders are captured under various architectural headings and unfortunately, the usage of these terminologies have been context based leading to ambiguity. This paper attempts to explain a systematic approach in eliciting key architectural design considerations and various aspects to be considered in formulating Business Architecture, Application Architecture, Data Architecture and Technology Architecture which are key components of any Enterprise Architecture. Also, this paper unveils various types of services that are to be identified that they play in software architecture formulation.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124469073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing IoT using layer characterstics","authors":"A. Kaushik, Shail Talati","doi":"10.1109/ICATCCT.2017.8389150","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389150","url":null,"abstract":"IoT has gained significant popularity and securing such mission critical network remains a big concern. There are already reports of misusing such system. Recently there were reports of sending spam from a refrigerator. Bigger risk of security in IoT is that unrelated systems are connected and if any attacker gets into one object, it could result in harming much bigger segment. Also such connected networks will really be disconnected in terms of management and applied policies. So applying secured policy at each network segment will only help at certain level but it would not be feasible to secure whole ecosystem of IoT devices/objects. Security has been identified as one of the biggest challenge in IoT segment and there are no solid specs or techniques to come over these issue end to end. This paper outlines use of machine learning combining with interesting dimensions like layer characteristics of IoT device's network stack. Paper also provides example of layer characteristics, which are specific to a device, and creating a baseline of such characteristics using machine learning algorithm will help in establishing the identity of IoT devices without the need of sophisticated PKI infrastructure.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123384223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of traffic burst on the behavior of TCP variants for different LTE downlink schedulers","authors":"N. D. Adesh, A. Renuka","doi":"10.1109/ICATCCT.2017.8389100","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389100","url":null,"abstract":"In LTE network, the downlink resource scheduling process plays a vital role in enhancing the system performance and satisfy the end user quality of experience. However, the performance of system is not only confined to the single layer of LTE protocol stack, but there is also a correlation between the traffic dynamics and resource allocation decision. The study has been conducted to understand how the various combination of scheduling algorithms and Transmission Control Protocol (TCP) variants affects the performance of LTE network. This paper also investigates the effects of scheduling decision during traffic burst conditions with different TCP variants on the overall performance of the LTE network. In addition to that, the adverse effect of low and high queue space of users at eNodeB on TCP performance is also studied. The simulation results show that combination of H-TCP with PSS scheduler gives the highest throughput and TCP Vegas with PSS scheduler takes less end to end delay as well as Packet Delivery Fraction (PDF) compared to other TCP variants. By taking overall system performance parameter, TCP Westwood performs better in all combination with schedulers.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"552 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122902799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coin based mobile battery charger with high security","authors":"Dhara G. Rangani, Nikunj Tahilramani","doi":"10.1109/ICATCCT.2017.8389128","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389128","url":null,"abstract":"Nowadays, every people use a Smartphone but in Smartphone everyone getting battery problem so we think for make a coin base battery charger, which can be use in business level. In this system main thing is coin detector and there are many types of coin detector, we use cantilever type sensor in the coin detection. Using cantilever type sensor detect weight of 5 Rs coin and give digital value using ADC and controller check the value and find coin original or duplicate. This system consumes solar power or greed power, basically use solar power greed power is optional when solar power is not available. This type of system can use at public place like bus station, railway station, business point, and also use the rural area where grid power is not available for partial/full daytime and a source of revenue for site providers. And also use as wending machine like chocolate and biscuit wending.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121143775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Regression algorithms for efficient detection and prediction of DDoS attacks","authors":"G. Dayanandam, E. Reddy, D. B. Babu","doi":"10.1109/ICATCCT.2017.8389136","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389136","url":null,"abstract":"In the ICT era the need of depth investigation and analysis is required on network traffic. The analysis should focus on detecting DDoS attacks. In the 21st century the use of communication or transactions are completely doing through online, the political activists, and international cyber terrorists are choosing the DDoS attacks as a powerful weapon for their illegal an un ethical activities. It is impossible to the human being to identify all these unethical activities, hence the need of machine based algorithms are required. In this paper we used GLM, GBM, NN, RF regression algorithms for detection and prediction of DDoS attacks, and also proved that by using regression algorithms we observed more accurate result than using KNN SVM algorithm.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121297179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of multiplexed FSO system with DPSK and Manchester coding","authors":"Jagana Bihari Padhy, B. Patnaik","doi":"10.1109/ICATCCT.2017.8389097","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389097","url":null,"abstract":"In spite of several advantages of free space optics (FSO) such as huge bandwidth, license-free communication and high electromagnetic interference, immunity over radio-frequency technology, these systems are also severely affected by fog and atmospheric turbulence. Generally, the performance of such communication systems can be measured by the two important parameters such as bit error rate (BER) and Q-factor. To improve the average BER performance of the system various advanced modulation techniques with different coding schemes have been proposed in the past literature. Thus in the proposed system, Manchester coding technique is used with the differential phase shift keying (DPSK) modulated signal. The designed system is compared with the differential phase shift keying with the 2-array pulse position modulation (DPSK-2PPM) scheme and the conventional DPSK system. Manchester encoding synchronizes the signal itself; hence, it minimizes the error rate and optimizes the reliability of the proposed system. In addition, a 16-channel wavelength division multiplexing (WDM) FSO system is considered for improving the spectral efficiency of the system. For analyzing, the low to high turbulence level of atmosphere, Gamma-Gamma type channel model is preferred.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126771832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data processing in semantic sensor web: A survey","authors":"L. B. Bhajantri, R. Pundalik","doi":"10.1109/ICATCCT.2017.8389126","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389126","url":null,"abstract":"Wireless Sensor Network (WSN) has set of wireless sensor nodes that are used to generate or sense the high volume of raw data from the environment, transmits the data to its respective sink node. The processing of raw data requires more amount of energy from sensor nodes to sink node or base station through single-hop or multi-hop communication over the nodes. In this context, sensor data need to be quality of data with semantic information in terms of semantic data integration and fusion and data processing, and so on. In order to problem of semantic data and managing raw data in WSN effectively, the Semantic Sensor Web (SSW) is taken into the wireless sensor networks. The SSW is promising technology for realizing the use of sensor data and semantic web that provide the semantic information to existing sensor networks by utilizing domain, spatial and temporal ontologies and other related semantic technology. This paper presents survey of data processing in SSW from various aspects. Besides, it presents the architecture of SSW and its advantages.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131950697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for the brain tumor detection and classification using support vector machine","authors":"B. B. Shankaragowda, M. Siddappa, M. Suresha","doi":"10.1109/ICATCCT.2017.8389112","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389112","url":null,"abstract":"The human brain is the important organ of the human nervous system. One of the main reasons of loss of life people is brain tumor. A brain tumor takes place while extraordinary cells from inside the brain. There are main styles of tumors malignant or cancerous tumors and benign tumors. The technique entails are Preprocessing, Segmentation, Feature extraction, and Classification. The present segments the tumor the use of set of rules and detects and classifies the tumor the usage of Support Vector Machine (SVM) classifier. The main intention to helps the health practitioner to investigate the tumor malignant or benign at earlier degrees.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131983460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An innovative optimized model to anticipate clients about immigration in telecom industry","authors":"M. Naik, S. S. Reddy","doi":"10.1109/ICATCCT.2017.8389139","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389139","url":null,"abstract":"This article proposed an innovative model to predict churning and non churning of clients in the telecom industry. Now-a-days, telecom customers are frequently migrating from one network to the other due to various constraints, policies and standards in public and private sectors. Usually in current industry the cost to retain the existing clients is smaller than getting a pioneering customer. To survive in the current competitive world, there is a need to design an optimal prediction model for churning and non churning of telecom clients. The proposed model has been outperformed with an accuracy level of 99.61% than existing models and techniques. Earlier authors have achieved 94.03 % of accuracy using machine learning techniques to predict churning of customers.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125145785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MQTT based vehicle accident detection and alert system","authors":"R. Kodali, S. Sahu","doi":"10.1109/ICATCCT.2017.8389130","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389130","url":null,"abstract":"Now-a-days as we open the newspaper, we find atleast one news of a road accident. With vehicles becoming increasingly affordable, there has been a surge in the number of vehicles on roads on an average all over the world. Accidents bring devastation upon victims, causing loss of precious time and money. It has been established, after extensive research, that a majority of accidents become fatalities because of lack of communication to the concerned medical authorities and the consequent lack of immediate medical support. This application helps sense the possible occurence of an accident on the road, with the help of sensors attached to the vehicle. This occurence will be immediately communicated to the concerned people so that further action can be taken without any further ado.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130928971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}