{"title":"Improving content sequencing of packaged content through feedback and priority","authors":"J. Roman, Devarshi Mehta, P. Sajja","doi":"10.1109/ICTBIG.2016.7892672","DOIUrl":"https://doi.org/10.1109/ICTBIG.2016.7892672","url":null,"abstract":"Educational Technology has proved to be a blessing for those who have a thrust to learn on their own. This is not restricted to normal learners, but special needs learners can also benefit from the technology. Although, it is not an easy task for such learners, due to their difficulties, they can still learn by Assistive Technologies. Generation and design of digital learning objects and sequencing of these objects are the major challenges faced by any Educational Technology. In this piece of work, we propose a generic method for sequencing of digital learning objects to cater to the educational needs of these special needs learners. We have considered the sequences to be generated in terms of multi-levels having priorities and difficulty levels. Each term in a sequence is considered to be a package of learning content, revision content, assessment module and feedback. The feedback is an important deciding factor for dynamism in sequence generation.","PeriodicalId":129759,"journal":{"name":"2016 International Conference on ICT in Business Industry & Government (ICTBIG)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124850821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Singh, Kavita Deshmukh, J. S. Kumare, Raju Sharma, P. Saxena
{"title":"Object template matching using topological models","authors":"U. Singh, Kavita Deshmukh, J. S. Kumare, Raju Sharma, P. Saxena","doi":"10.1109/ICTBIG.2016.7892658","DOIUrl":"https://doi.org/10.1109/ICTBIG.2016.7892658","url":null,"abstract":"Object extraction from complex scene of image is important for computer vision and pattern recognition. However, it is difficult to measure visual change due to environment or different viewpoint in an image. This work concerned with very simple and efficient method to measure the similarity contents between object from query image and database images. In this method first desired object is extracted from query image, after extracted object is matched with the images in the database on the basis of colour and texture. In this paper an interactive topological model based object extraction and matching are proposed, which is based on two main important properties (i) initially low level segmentation and (ii) similarity measures among query and database images. The extensive experiment has been perform to the efficiency and effectiveness of proposed method.","PeriodicalId":129759,"journal":{"name":"2016 International Conference on ICT in Business Industry & Government (ICTBIG)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125941615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new Sink Placement Strategy for WSNs","authors":"Nirmaljeet Kaur, R. Bedi, R. C. Gangwar","doi":"10.1109/ICTBIG.2016.7892662","DOIUrl":"https://doi.org/10.1109/ICTBIG.2016.7892662","url":null,"abstract":"in this paper, we have urbanized a fresh sink placement policy in Wireless Sensor Networks (WSNs). We studied the problems in previous sink placement strategies such as RSP, CNP, GOSP, SOSP, CLHM, ISP, and GSP. These previous sink placement strategies are not concerned about dynamicity of the network under consideration. The information about sensor nodes positions is not known beforehand in concerned WSN environment. On the reverse, GSP policy is designed particularly for unidentified feeler nodes site and is proposed as a standard sink placement policy in WSNs. So, GSP has been chosen to compare our strategy that reduces both energy consumption as well as routing overheads. We are proposing the new and improved strategies which work on concentric ring routing principle with and without density. In with density, a new random protocol used, in which the location of sinks are placed according to the density of the nodes and in the new uniform protocol they are fixed.","PeriodicalId":129759,"journal":{"name":"2016 International Conference on ICT in Business Industry & Government (ICTBIG)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114526220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amit Barve, Sneha Khomane, Bhagyashree Kulkarni, Shubhangi Katare, Sonali Ghadage
{"title":"A serial to parallel C++ code converter for multi-core machines","authors":"Amit Barve, Sneha Khomane, Bhagyashree Kulkarni, Shubhangi Katare, Sonali Ghadage","doi":"10.1109/ICTBIG.2016.7892700","DOIUrl":"https://doi.org/10.1109/ICTBIG.2016.7892700","url":null,"abstract":"Today multi-core machines are very common and hence number of problems are being tried to exploit the tremendous processing power of such machines. Parallel compilation is one of the areas that have been greatly influenced by such architectures. Automatic conversion of serial code into its functionally equivalent parallel version remains an open challenge for researchers for the past decade. These tools can transform legacy serial code into a parallel code to execute on parallel architectures. This paper presents a tool which translates a serial C++ program into its parallel version. Since C++ language is used by almost all the organizations, this tool will be helpful for them to take advantage of multi-core machines.","PeriodicalId":129759,"journal":{"name":"2016 International Conference on ICT in Business Industry & Government (ICTBIG)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114538665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. S., J. Bhavya, S. Sakshi, K. Varun, G. Debarshi
{"title":"Home Monitoring and Security system","authors":"S. S., J. Bhavya, S. Sakshi, K. Varun, G. Debarshi","doi":"10.1109/ICTBIG.2016.7892665","DOIUrl":"https://doi.org/10.1109/ICTBIG.2016.7892665","url":null,"abstract":"Home security is becoming necessary nowadays as the possibilities of intrusion are increasing day by day. Lot of Security companies are available towards protecting house from getting vandalized or so. But still there is no much guarantee that the house be safe or even if the house vandalized, security personnel safe and sound to report to police nearby. This leads to property loss and damage.","PeriodicalId":129759,"journal":{"name":"2016 International Conference on ICT in Business Industry & Government (ICTBIG)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132314833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Kayande, Elsa Rebello, Shweta Sharma, Monica Tandel
{"title":"Overview of a payment solution for NFC-Enabled Mobile phones","authors":"D. Kayande, Elsa Rebello, Shweta Sharma, Monica Tandel","doi":"10.1109/ICTBIG.2016.7892685","DOIUrl":"https://doi.org/10.1109/ICTBIG.2016.7892685","url":null,"abstract":"The present payment scenario involves payment through cash and smart cards. In the retail world, the point of sale terminal (POS) are used along with smart cards for the payment process. The problems with this system is that, it is very slow, less secure and time consuming. Since, contactless payment in India has got a big boost with the payment scenario joining the game. The proposed system in the paper, uses this same concept of Near field Communication (NFC) where Two NFC-Enabled Mobile phones are involved. To enable more security, the system will be using Cloud Storage. Also the system will provide security using the One-Time-password (OTP) which is a automatically, generated numeric string of characters.","PeriodicalId":129759,"journal":{"name":"2016 International Conference on ICT in Business Industry & Government (ICTBIG)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132331359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security assessment of routing protocols in Mobile Adhoc Networks","authors":"Megha Soni, B. K. Joshi","doi":"10.1109/ICTBIG.2016.7892676","DOIUrl":"https://doi.org/10.1109/ICTBIG.2016.7892676","url":null,"abstract":"Mobile Ad-hoc Network (MANet) is a set of wireless mobile nodes forming flexible networks, thus they do not need infrastructure and central access points. With increase in the use of Mobile Adhoc Networks security became an essential requirement due to its dynamic topology, limited processing capacity, bandwidth limitations, high bit error rate etc. To provide secured communication among mobile nodes, there is a need to build multi fence security and routing solutions to overcome these challenges. In this paper, we present security analysis of routing protocol in general and Adhoc On demand Distance Vector in particular under different type of attacks.","PeriodicalId":129759,"journal":{"name":"2016 International Conference on ICT in Business Industry & Government (ICTBIG)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134226572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerabilities, attack effect and different security scheme in WSN: A survey","authors":"Amit Patle, Neetesh Gupta","doi":"10.1109/ICTBIG.2016.7892724","DOIUrl":"https://doi.org/10.1109/ICTBIG.2016.7892724","url":null,"abstract":"The sensor nodes are independent and work as sender, receiver and intermediate node in Wireless Sensor Network (WSN). The sensor nodes are forming the small network in which the one or more sender is sending data to one destination/s through intermediate nodes or sending information to Base Station (BS). The information collect by base station is further analyzed. The nodes are also static or mobile depends on the situation or conditions. The connection establishment and data sending is possible through routing protocols of WSN. The routing protocols of WSN are not same as traditional wireless routing protocols. One major issue on this network is security. The routing protocols are sending information to destination from particular source and the routing strategy is provides the better way of delivery in the network. The sensor nodes in network are performing through limited battery supply called node energy or power. The attacker are also affected the limited energy resource. In this paper the center of consideration is on the security issues related to WSN routing protocols. The routing in WSN remains a key issue because of that without accurately functioning of routing protocols, the network cleanly will not work the technique it's intended to. Unfortunately, routing also one of the most difficult to protect against attacks malicious activities because of the administration in WSN. The better protection scheme is provides the complete security from attacks and the secure routing is provides the better and trustful network performance.","PeriodicalId":129759,"journal":{"name":"2016 International Conference on ICT in Business Industry & Government (ICTBIG)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133904984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for smart transportation using Big Data","authors":"Samiksha Shukla, Balachandran K, Sumitha V S","doi":"10.1109/ICTBIG.2016.7892720","DOIUrl":"https://doi.org/10.1109/ICTBIG.2016.7892720","url":null,"abstract":"In the current era of information technology, data driven decision is widely recognized. It leads to involvement of the term “Big Data”. The use of IOT and ICT deployment is a key player of the smart city project in India. It leads to smart transportation systems with huge amounts of real time data that needs to be communicated, aggregated, interpreted, analyzed and maintained. These technologies enhance the effective usage of smart transportation systems, which is economical and has a high social impact. Social applications like transportation can be benefited by using IOT, ICT and big data analytics to give better prediction. In this paper, we present how big data analytics can be used to build a smart transportation system. Increasing traffic and frequent jams in today's scenario are becoming a routine, citizens are facing various health issues due to the bad transportation systems such as high blood pressure, stress, asthma due to air and noise pollution. In smart transportation mobility can be easily implemented as most of the citizens use smartphones. It can be easily linked to smart traffic signals to achieve the objective of smart transportation. Smart transportation is a key component to attract companies as it leads to better services, business planning, support beneficial environment and social behavior.","PeriodicalId":129759,"journal":{"name":"2016 International Conference on ICT in Business Industry & Government (ICTBIG)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134090907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic facial expression recognition: A survey based on feature extraction and classification techniques","authors":"Nazima Kauser, J. Sharma","doi":"10.1109/ICTBIG.2016.7892679","DOIUrl":"https://doi.org/10.1109/ICTBIG.2016.7892679","url":null,"abstract":"Facial expression carries information about the emotional and physical state of a human being. In the past few years facial expression recognition has become a promising research area. With the developing robotic era the systems needs intelligence to understand human's behavior. Expression recognition is applied and useful from emoticons to disease detection in medical field. Apart from automated systems the applications include human-computer interfaces, human emotion analysis, awareness systems, surveillance and security, medical diagnosis, law enforcement, automated tutoring systems and many more.","PeriodicalId":129759,"journal":{"name":"2016 International Conference on ICT in Business Industry & Government (ICTBIG)","volume":"45 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}