S. S. S. Reddy, Ramesh Shahabadkar, Ch Mamatha, P. Chatterjee
{"title":"Protection policy in networked locations using machine learning and data science approach","authors":"S. S. S. Reddy, Ramesh Shahabadkar, Ch Mamatha, P. Chatterjee","doi":"10.1109/ICATCCT.2017.8389140","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389140","url":null,"abstract":"A protection policy employs diverse techniques and mechanisms to sense protection related glitches and coercions in a networked location. The protection policy is big-data focused and services machine learning technique to perform protection analytics using data science. The protection policy performs entity behavioral analytics to sense the protection related glitches and coercions, regardless of whether such glitches/coercions were previously known. The protection policy can include both real-time and group modes for sensing glitches and coercions. By visually presenting diagnostic results scored with jeopardy assessments and auxiliary indication, the protection policy enables network protection administrators to respond to a sensed glitch or coercions, and to take action promptly.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134526281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suyog Trivedi, R. Kumar, Gopichand Agnihotram, Pandurang Naik
{"title":"Unsupervised feature learning using deep learning approaches and applying on the image matching context","authors":"Suyog Trivedi, R. Kumar, Gopichand Agnihotram, Pandurang Naik","doi":"10.1109/ICATCCT.2017.8389137","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389137","url":null,"abstract":"Image matching is quite challenging task to identify the matching images in the data. There are multiple methods in computer vision techniques such as histogram based algorithms, color/edge based algorithms, textual based features, SIFT and Surf algorithms which will help to identify the similar images. Here in our paper we are addressing an Industrial problem to provide the better solution where US multinational courier delivery services facing challenges in delivering the products where labels/tags and barcodes of the products are missed while delivering to the customers and customer comes with the product image and with some information about the product. The job is to map the user/customer product information with the existing missed products in the database in order to deliver them. This entire process currently goes manual and it takes lot of time to address the missed products. The advances in computer science and availability of GPU machines, the problem will be addressed and solution can be automated using deep learning approaches. The paper describes the solution for matching the images accurately and comparing the solution with the existing classical computer vision algorithms.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114112911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outlier detection in data streams using MCOD algorithm","authors":"S. Reddy, T. Harshita, S. Koneru, K. Ashesh","doi":"10.1109/icatcct.2017.8389156","DOIUrl":"https://doi.org/10.1109/icatcct.2017.8389156","url":null,"abstract":"Data mining is one of the most exciting fields of research for a researcher. In data mining, outlier detection is one of the important area where similar kind of data objects are grouped together and the objects that does not belong to the group are termed as outliers. This helps in finding objects that have different behavior with respect to other objects. Due to the presence of outliers overall nature of the data may be compromised. So it is a challenging task to find outliers present in the data. Every day huge amount data is flowing around us which belong to different streams, so our main is to find the objects that does not belong to the particular stream. In this paper, different outlier detection algorithms are described and implemented and the best algorithm among them is found based on their performance with the help of MOA tool. Performance issues like memory consumption, domain queries, time are shown. MOA tool contains prescribed algorithms where one can be used as a base algorithm to compare remaining algorithms. Each algorithm is an increasing and adaptive to concept extension. Finally the performance of each algorithm is tabled.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116166224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prakriti Aggarwal, Parnika Saxena, Shuchismita Pani
{"title":"Gain enhancement of PIFA with DGS for wireless communication","authors":"Prakriti Aggarwal, Parnika Saxena, Shuchismita Pani","doi":"10.1109/ICATCCT.2017.8389141","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389141","url":null,"abstract":"In recent times, PIFA antennas are most commonly used in the wireless communication due to the fundamental features like low cost, less weight and small size. The design proposed in this paper, is Planar Inverted F-Antenna with dumbbell-shaped defected ground structure. Gain enhancement has been done by suitably cutting slots in the ground plane. Gain improved significantly from 3.96 dB to 5.62 dB and further to 6.13 dB at 5.8 GHz frequency by optimizing antenna dimensions and using DGS technique respectively. The proposed antenna is useful for various wireless applications.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"56 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120935834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rishabh Kataria, Tushar Sharma, T. Choudhury, Praveen Kumar
{"title":"Image enhancement of old manuscripts using machine learning","authors":"Rishabh Kataria, Tushar Sharma, T. Choudhury, Praveen Kumar","doi":"10.1109/ICATCCT.2017.8389104","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389104","url":null,"abstract":"Old manuscripts are important documents aging up to 1000 years discovered from all over the world and suffer from reimbursements and rottenness. These damages may be substantial making it problematical for researchers to scrutinize it. These damages contain varying contrast changes, degraded quality of the paper over time due to storage conditions, material of the document itself etc. To make these documents legible we consider image enhancement methods to enhance the quality standard of the manuscripts and make them constructive. This paper uses the concepts of machine learning algorithms in image enhancement and detection of patterns. In this paper, Ratio Rule machine learning algorithm is used out for various algorithms such as Bayesian Nets, Decision Trees and Nearest Neighbors algorithms.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128721082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayush Rai, T. Choudhury, Sheetal Sharma, Kuo-Chang Ting
{"title":"An efficient method to predict software quality using soft computing techniques","authors":"Ayush Rai, T. Choudhury, Sheetal Sharma, Kuo-Chang Ting","doi":"10.1109/ICATCCT.2017.8389159","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389159","url":null,"abstract":"Quality of the software is the prime priority of many software development organizations now days. Software reliability is directly associated with the software quality and requires modeling techniques in predicting software quality. Early defect prediction helps many software development organization in saving both money and time and thus increase the reliability of the software. The paper presents a model which predict the software quality by using Fuzzy logic. The model has been applied to different applications using fuzzy logic as an evaluation criterion. The fuzzy logics approaches are widely used in predicting software quality because unlike the traditional logics fuzzy logics have very high prediction capability and successfully produces the meaningful and appropriate results early in the testing phase of the software.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126893409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}