{"title":"Performance Analysis of Operational Amplifier for High Gain & Low Power Applications","authors":"Saumya Srivastava, Ttipti Sharma","doi":"10.1109/ISCON47742.2019.9036199","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036199","url":null,"abstract":"In this paper diverse technologies are utilized to improve the performance of operational amplifier, these parameters are basic piece of all the analog and mixed circuits. Major performance parameters of analog circuits are DC gain, Slew rate, UGBW, Power consumption, Area and settling time. In past designer's primary concern was to enhance gain and diminish size of gadget, although in modern era low power and low voltage are recent research area of designers. Positive feedback is exceptionally popular and it plays critical job for amplification. Review introduces a graphical method to make relative examination of various techniques on premise of year to year variation and talk about how these parameters get improved from last one to two decades. Here a comparative survey is introduced to make it clear what's recent trends are going on for better performance of analog and mixed circuit.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116763029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Degraded Script Identification of Urdu and Devanagari Document-A Survey","authors":"S. Habib, M. Shukla, Rajiv Kapoor","doi":"10.1109/ISCON47742.2019.9036305","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036305","url":null,"abstract":"Script identification especially for non-Latin script have gained the attention of researchers from both the academics and industry. There are lots of challenges associated with this since most of the existing research focuses on Latin scripts. Most of the researches in this field are working only with the latest or modern documents and font types. Historical and Degraded documents have not been given much importance in the OCR research. This paper provides the different stages required for the identification of the scripts. A brief overview of the different techniques for identifying and classifying the characters in Devanagari and Urdu Script. This has been performed especially for degraded and historical texts. The paper has been concluded with a strong future scope.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122458398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Balakrishnan, S. Hariharan, Alfi Nadar, Narayanmoorthy Ranganathan, Sriram Gopalkrishnan
{"title":"Design, Analysis, Simulation, and Implementation of 4-D Quadrature FSK Modulator","authors":"B. Balakrishnan, S. Hariharan, Alfi Nadar, Narayanmoorthy Ranganathan, Sriram Gopalkrishnan","doi":"10.1109/ISCON47742.2019.9036185","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036185","url":null,"abstract":"Fundamental to all wireless communications is modulation, the process of superimposing the carrier signal on the modulation signal. Most of the wireless transmissions today are digital with the limited spectrum available, the type of modulation is more critical than it has ever been. The main purpose of modulation is to squeeze them as much data into the least amount of spectrum possible. The term known as spectral efficiency measures how quickly data can be transmitted in an assigned bandwidth. Multiple techniques have popped to achieve and improve spectral efficiency. Thus ‘4- dimensional QFSK’ will help in reducing the required bandwidth for transmission compared to existing techniques to a greater extent without increasing the Probability of Error (Pe).","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"7 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132629943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Two-Tier Solution to Converge People Analytics into HR Practices","authors":"Bhawna Gaur, Sadia Riaz","doi":"10.1109/ISCON47742.2019.9036312","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036312","url":null,"abstract":"Last few years have seen an overwhelming increase in the application of People Analytics, as an HR practice globally. Organizations have formed specialized teams and software companies, are designing newest predictive systems to help HR with data extraction and understanding People Analytics. However, there are still a number of limitations reported in numerous studies, such as: data privacy and perception limitations hindering effective convergence of People Analytics into HR practices. This study holistically approaches the topic by critically reviewing and synthesizing the existing literature; by comparing region-wise business performance indicators to understand the role of People Analytics, performs content analysis on selected reports to identify perception level limitations of People Analytics, and finally generates correlated qualitative themes to address convergence limitations of People Analytics into HR practices. The study provides a Two-Tier solution validated through Content Analysis performed in the Nvivo. Data analysis shows emergence of two broad correlated themes - 1) limitations at functional level and 2) limitations at normative (psychological) level. The study provides specific guidelines to HR practitioners and business researchers on how to overcome application limitations related to People Analytics within their organizations.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132846905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OLWS: Optimized Light Weight Secure Clustering protocol for Wireless Sensor Networks","authors":"Harshit Agarwal, Meenakshi Tripathi","doi":"10.1109/ISCON47742.2019.9036303","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036303","url":null,"abstract":"The amount of research in wireless sensor networks (WSNs) is gaining a lot of interest in the research community. The sensors are deployed in the remote areas and establishment of communications between these nodes is ad-hoc in nature and thus are vulnerable to multiple security attacks which result in low network performance. The main bottleneck in these sensor nodes is the limited resources and because of that traditional security mechanism which involves complex computations and large communication overhead are not feasible. So designing and implementing a secure and efficient WSN is a challenging task. In this paper, we present a novel approach called “Optimized Light Weight Secure Clustering protocol (OLWS) for WSN” to increase the security with reduced overhead. In OLWS, the key for hashing is generated dynamically and calculated based on the identity of the node hence the complexity of key management is reduced. The proposed protocol leads to early detection of the attacker as in case of attack, the adversary node is identified at the cluster head only. Extensive simulations are done on NS2 and results indicate that OLWS performs better in terms of energy consumption and provide an increased level of security.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116157714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive Analysis of Container Technology","authors":"Tamanna Siddiqui, Shadab Siddiqui, N. A. Khan","doi":"10.1109/ISCON47742.2019.9036238","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036238","url":null,"abstract":"Containers is the new buzz word within the computer technology space. With the technology growing at an exponential pace and within a short span of time, the industry has evolved from native to virtualized, to cloud and now to container technology. This evolution is focused more on decoupling the software with the hardware and making software or applications more lean and agile. Containers has done a lot of good in achieving this objective and has also helped to cope up with the deficiencies faced in virtualized and cloud based environment. This paper tries to do a literature review of the evolution of containers and will also attempt to analyze container eco system. This article will also discuss the differences between the containers and virtual machines and will highlight the efficiencies that container technology brings over the virtualized environment.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123355462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Banking Trojans APK Detection using Formal Methods","authors":"Nitesh Kumar, Vinay Kumar, Manish Gaur","doi":"10.1109/ISCON47742.2019.9036319","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036319","url":null,"abstract":"Nowadays, malware attacks are increasing for mobile devices because of the smartphones became requisite in usual activities for almost everyone. The Android operating system has grown the conventional OS for mobile devices in all places. Due to the open-source term of Android, these devices are mostly targeted by the attackers. Malware author uses various techniques to insert the bad code (instructions) into the clean application so that it performs malicious behavior. The modern signature-based anti-malware system may confuse the detection system by minor code transformations. To overcome the above issues this work analyzes the Java Bytecode instructions present in the class files extracted from the Android application files. The calculus of communicating systems (CCS) process model is generated using these Java Bytecode instructions by referring to a new process for each instruction of Java Bytecode. The malicious behavior properties are defined to verify the application files after invoking a formal verification tool for detection of Android Banking Trojans malware family. The experimental results show that our approach can detect Banking Trojans malware family with 98.91 % of accuracy.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123268108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Real-Time Data Processing based on Multilayer Windows and the Measurement Interchange Schema","authors":"M. Diván","doi":"10.1109/ISCON47742.2019.9036200","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036200","url":null,"abstract":"The dynamism of the economies requires updated data when decisions must be made. Currently, the Internet-of-Things incorporates a lot of different tiny and low-cost electronic devices able to be used for implementing a measurement process. However, those data sources are heterogeneous. The Data Stream Processing Architecture (DSPA) uses a Measurement and Evaluation (M&E) framework for warrantying the repeatability and consistency in the measurement process, jointly with the comparability of their results. The data arrive from the heterogeneous data sources to DSPA organized under the Measurement Interchange Schema (MIS), which is based on the project definition and allows matching each concept under monitoring with the corresponding measure from each device. Because the metric (or variable) related to each entity under monitoring should be analyzed in its own context and considering that data continuously arriving, a new strategy related to sliding logical windows is incorporated into the PAbMM_Win library, fostering processing alternatives jointly with the data interchange. Thus, the concepts of Layers and Carriers are introduced. On the one hand, the layers abstract the data processing from the logical viewpoint using the measurement project definition. On the other hand, the carriers allow transporting interpreted data to external data processing platforms in a transparent way. Its internal organization is here described. A discrete simulation shows its associated processing times. A snapshot on a whole measurement project could be taken and transported to a thirds' platform in only 16.72 ms with 1000 measures.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130582485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Jain, R. Pamula, Sarfraj Ansari, D. Sharma, Lakshmibai Maddala
{"title":"Airline recommendation prediction using customer generated feedback data","authors":"P. Jain, R. Pamula, Sarfraj Ansari, D. Sharma, Lakshmibai Maddala","doi":"10.1109/ISCON47742.2019.9036251","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036251","url":null,"abstract":"Nowadays consumers are increasingly relying on online resources to aid in purchasing decisions. Online resources also help companies to learn from customer reviews, how different types of customers have different priorities and how customer choice affects their review. In the U.S. 82%, the adult says that they have been referring online reviews and ratings provided by the customer, before going to purchase items for the first time, including 40% who say that they have referring always or almost always do so. In this paper, we have been performed predictive analysis for qualitative reviews on the data that have been collected by different online sites. We have been also performed an explanatory analysis of the different classes of airline services. The findings of this paper show that the review of most of the business class is on the food and friendliness of staff whereas most of the economy class views were on legroom and seat comfort.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115940581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Avishek Garain, Arpan Basu, Rudrajit Dawn, S. Naskar
{"title":"Sentence Simplification using Syntactic Parse trees","authors":"Avishek Garain, Arpan Basu, Rudrajit Dawn, S. Naskar","doi":"10.1109/ISCON47742.2019.9036207","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036207","url":null,"abstract":"Text simplification is one of the domains in Natural Language Processing which offers great promise for exploration. Simplifying sentences offer better results, as compared dealing with complex/compound sentences, in many language processing applications as well. Recently, Neural Networks have been used in simplifying texts, be it by state of the art LSTM's and GRU cells or by Reinforcement learning models. In contrast, in this work, we present a classical approach consisting of two separate algorithms, for simplification of complex and compound sentences to their corresponding simple forms.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116034890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}