{"title":"An enhanced transmitter diversity scheme with constellation rotation to estimation errors","authors":"B. Senthil","doi":"10.1109/ICCMC.2017.8282643","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282643","url":null,"abstract":"The performance of constellation rotation scheme in the presence of channel estimation error for space-time coding is investigated. The optimal combining equations with constellation rotation are presented. The simulation results show that the constellation rotation provides the better BER performance in a low variance of channel estimation error for varying signal-to-noise ratio (SNR).","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128719055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommender systems-the need of the ecommerce ERA","authors":"Nayana Vaidya, A. Khachane","doi":"10.1109/ICCMC.2017.8282616","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282616","url":null,"abstract":"Recommendation System belongs to the class of Information Retrieval, Data Mining and Machine Learning. Recommender systems play a major role in today's ecommerce industry. Recommender systems recommend items to users such as books, movies, videos, electronic products and many other products in general. Recommender systems help the users to get personalized recommendations, helps users to take correct decisions in their online transactions, increase sales and redefine the users web browsing experience, retain the customers, enhance their shopping experience. Information overload problem is solved by search engines, but they do not provide personalization of data. Recommendation engines provide personalization. There are different type of recommender systems such as content-based, collaborative filtering, hybrid recommender system, demographic and keyword based recommender system. Variety of algorithms are used by various researchers in each type of recommendation system. Lot of work has been done on this topic, still it is a very favourite topic among data scientists. It also comes under the domain of data Science.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134532067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Water monitoring system using arduino with labview","authors":"Yogesh K. Taru, Anil R. Karwankar","doi":"10.1109/ICCMC.2017.8282722","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282722","url":null,"abstract":"In the many part of the word, availability of potable water is an issue as it is contaminated, there are basic qualitative observations that quickly determine if water is not safe to consume. To prevent the pollution, first part is to detect that pollutant. This system is to develop, implement, monitor and control some parameter of water such as pH level, temperature, turbidity. In this system low cost sensors are used to control and monitor the parameters. Arduino UNO interface with LabVIEW.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129794627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mayuri A. Mhatre, Dakshata Phondekar, Pranali Kadam, A. Chawathe, K. Ghag
{"title":"Dimensionality reduction for sentiment analysis using pre-processing techniques","authors":"Mayuri A. Mhatre, Dakshata Phondekar, Pranali Kadam, A. Chawathe, K. Ghag","doi":"10.1109/ICCMC.2017.8282676","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282676","url":null,"abstract":"Sentiment analysis is the study of people's opinions, sentiments, attitudes and emotions, expressed in written language but this process is time consuming, inconsistent and costly in business context. Pre-processing the data will help to ease this difficulty. Pre-processing is the process of cleaning and preparing the text for its analysis using pre-processing techniques. The existing pre-processing techniques are Handling Expressive Lengthening, Emoticons Handling, HTML Tags Removal, Punctuations Handling, Slangs Handling, Stopwords Removal, Stemming and Lemmatization. In this paper, the effect of various pre-processing techniques and their combinations was analyzed on the dataset taken from Kaggle called Bag of Words Meets Bags of Popcorn. By taking every possible combination of pre-processing techniques, the aim was to find the one giving highest accuracy. Random Forest Classifier was used to predict sentiments as it is known to give good accuracy and the result was evaluated using 10 fold cross validation method. Accuracy increased from unprocessed data to pre-processed data. It was concluded that using pre-processing techniques gives a higher accuracy than the traditional approach i.e. no pre-processing.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview and an approach for QR-code based messaging and file sharing on android platform in view of security","authors":"A. Shah, Vikramsingh R. Parihar","doi":"10.1109/ICCMC.2017.8282711","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282711","url":null,"abstract":"The demands of android smart phones and its use has increased rapidly. As a result, the need for competent message and file sharing techniques for android phones has increased. Messaging has emerged as one of the most important feature and applications in mobiles. The existing messaging techniques incorporate the use of the internet and SMS service. Various techniques of message passing and file sharing by using Wi-Fi/Internet through QR code for hiding purpose and maintaining its integrity are developed. This paper presents an overview of the existing techniques of secure message passing and file sharing in android phones. The overview is followed by our suggested approach which incorporates the RSA algorithm which can be used to encrypt and decrypt the message and MD5 algorithm can be used to check its integrity. The suggested approach ratifies the concept to reduce the use of mobile data while sharing of text or other file over the internet.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122394258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of K-means algorithm: Ant colony optimization","authors":"T. Reddy, K. P. Supreethi","doi":"10.1109/ICCMC.2017.8282522","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282522","url":null,"abstract":"Significance of a versatile and simple clustering algorithm is becoming indispensable with the huge data growth in recent years. K-Means clustering is one such clustering algorithm which is simple yet elegant. But K-Means Algorithm has its disadvantages, dependence on the initial cluster centers and the algorithm tends to converge at a local minima. To overcome these disadvantages, ant colony optimization is applied to improve the traditional K-Means clustering algorithm. Two methods of using ants in K-Means are presented in the paper. In the first method the ant is allowed to go for a random walk and picks a data item. Pick and Drop probabilities of that particular data item are calculated. These values determine whether a data item remains in the same cluster or is moved to another cluster. In the second method instead of letting the ant pick up a data item randomly we calculate the pick and drop and let the ant walk to the data item which has the highest probability to be moved to another cluster. Entropy and F-measure are considered as quality measures.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130767593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Ninikrishna, Sutapa Sarkar, Richa Tengshe, M. Jha, Laxmi Sharma, V. K. Daliya, S. Routray
{"title":"Software defined IoT: Issues and challenges","authors":"T. Ninikrishna, Sutapa Sarkar, Richa Tengshe, M. Jha, Laxmi Sharma, V. K. Daliya, S. Routray","doi":"10.1109/ICCMC.2017.8282560","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282560","url":null,"abstract":"Internet of Things (IoT) is going to be an integral part of connected living and industrialization. Already several billion devices are connected in the IoT framework and this number is growing very fast. Rigidity of current network infrastructure limits the enormous possibilities which IoT can deliver. Software defined networking (SDN) with its agility and elasticity appears promising networking technique for the realization of robust IoT. SDN is quite suitable for the control and management of IoT. However, there are several issues and challenges pertaining to the implementation of SDN based IoT ecosystem. In this article, we present the issues and challenges faced by the network designers while deploying SDN over the IoT.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solar plant monitoring system: A review","authors":"Mayuri Ejgar, B. Momin","doi":"10.1109/ICCMC.2017.8282652","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282652","url":null,"abstract":"The inspection of the solar panels on a periodic basis is important to improve longevity and ensure performance of the solar system. To get the most solar potential of the photovoltaic (PV) system is possible through an intelligent monitoring controlling system. The monitoring controlling system has rapidly increased its popularity because of its user friendly graphical interface for data acquisition, monitoring, controlling and measurements. In order to monitor the performance of the system especially for renewable energy source application such as solar photovoltaic (PV), data-acquisition systems had been used to collect all the data regarding the installed system. In this paper we have given a review on solar plant monitoring system in that we have covered architecture of solar plant, Issues at solar plants, Techniques that are used for monitoring solar plants.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ibrahim Yahya Mohammed Al-Mahbashi, M. Potdar, Prashant Chauhan
{"title":"Network security enhancement through effective log analysis using ELK","authors":"Ibrahim Yahya Mohammed Al-Mahbashi, M. Potdar, Prashant Chauhan","doi":"10.1109/ICCMC.2017.8282530","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282530","url":null,"abstract":"The main aim for any organization is to provide protection for their critical assets because they are face to face with many external threats that may cause interruption on providing services to customers which will lead to economical and reputation disaster. As long as organizations need to provide the protection required to secure their business they have to focus on two types of threats, internal and external threats. In previous paper [1] I have discussed about external threats and in this paper I will draw more attention on how the internal threats that will affect the overall network security mechanism. Log analysis can also help us to reveal the gap existed on our safeguards, which used to provide a protection for our systems, by which we can have a knowledge from the information extracted from our data that will help us to be aware of the gaps and vulnerabilities may found to resolve them before we become victims. For log analysis I will use ELK stack that will help me to receive the forwarded logs from a well-known commercial safeguard deployed in a real environment.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123827094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Djedanem Fidel Matibe, Aslam Durvesh, Krunal K Patel
{"title":"Multi-selfish attacks and detection in cognitive radio network using CRV","authors":"Djedanem Fidel Matibe, Aslam Durvesh, Krunal K Patel","doi":"10.1109/ICCMC.2017.8282531","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282531","url":null,"abstract":"Recent developments of the wireless communication technology lead to the problem of growing spectrum scarcity and spectrum shortage. Most of the frequency spectrum has already been licensed by the government agencies such as Federal Communications Commission (FCC). There exists a spectrum scarcity for new wireless applications and different services. Cognitive radio (CR) is used to solve the spectrum scarcity problem by utilizing the spectrum dynamically. Cognitive Radio can utilize the unused or free spectrum for the secondary usage without interfering a primary licensed user. The cognitive radio network is vulnerable to several harmful attacks launched intentionally or unintentionally. Because of different attacks, security in cognitive radio networks is still an open challenge. The main focus of this research paper is to detect selfish node in cognitive radio network. Here, a method which uses Credit Risk Value (CRV) is being proposed to identify the selfish users to improve the network performance.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114926839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}