{"title":"A review of big data analytics over cloud","authors":"Rayan Dasoriya","doi":"10.1109/ICCE-ASIA.2017.8307833","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8307833","url":null,"abstract":"As the volume of data is increasing exponentially, there is a need for better management of data to research and industry. This data, known as Big Data, is now used by various organizations to extract valuable information which can be analysed computationally to reveal patterns, trends and associations revealing the human interaction and behaviour for making various industrial decisions. Due to the large volume of data, it is stored in the cloud and all the analysis is done over Big Data over cloud since it is not possible for traditional systems to store such large amount of data. But the data must be optimized, integrated, secured and visualized to make any effective decision. Analysing of the large volume of data is not beneficial always unless it is analysed properly. The existing techniques are insufficient to analyse the Big Data and identify the frequent services accessed by the cloud users. Various services can be integrated to provide a better environment to work in. Using these services, people become widely vulnerable to exposure. That is, it becomes possible to collect more data than it is required which may lead to data leakage and hence security concerns. Results can be analysed in a better way by visuals like graphs, charts etc. and it helps in faster decision making. It also includes MapReduce Algorithm which will help in maintaining a log of user's activities in the cloud and show the frequently used services. This paper proposes a scheme for making Big Data Analytics more accurate, efficient and beneficial.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121174701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leakage optimization of thick oxide IO/ESD transistors in 40nm global foundry process","authors":"Chinmayee Panigrahi, Mansi Rastogi, Kiran Gopal","doi":"10.1109/ICCE-ASIA.2017.8309321","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309321","url":null,"abstract":"Thick Oxide IO/ESD transistor in 40nm Global Foundry process is studied for reducing leakage while being area efficient and maintaining performance. Gate induced drain leakage(GIDL) and source-drain leakage were found to be the major leakage contributors. Optimum architecture and sizing are found for IO/ESD design and presented in this paper.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122725542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behavioural study of memory allocators for Android platform","authors":"Satish Patel","doi":"10.1109/ICCE-ASIA.2017.8309320","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309320","url":null,"abstract":"Speed is important for a malloc implementation because if malloc is not fast enough, application writers are inclined to write their own custom free lists on top of malloc. This can lead to extra complexity, and more memory usage unless the application writer is very careful to appropriately size the free lists and scavenge idle objects out of the free list. The objective of this paper is to do behavioural study and analysis of the memory data and access time with different types of malloc (nedmalloc, jemalloc, tcmalloc, musl-malloc etc.) implementations on Android operating system. Analysis results — enabling Android application developers to optimize the applications by choosing the right malloc implementation in alignment oí\" different use cases.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132132232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Centralized server based ATM security system with statistical vulnerability prediction capability","authors":"T. Sarath","doi":"10.1109/ICCE-ASIA.2017.8307851","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8307851","url":null,"abstract":"This paper proposes an architecture to develop an ATM security system with a centralized private server for monitoring all the ATMs in a city. Security related information is captured using a wide variety of sensors and switches and this information is processed and sent to a central server for further analysis and data presentation. Information from the sensors is sent continuously in real time to build a database. The system performs statistical vulnerability analysis using the data received from various sensors from different ATMs and assigns a vulnerability quotient to all the ATMs. Thus, helps to be a central system for identifying security gaps in a particular ATM. This system seeks to be a proactive measure to prevent risks associated with ATMs.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116906679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power mitigation in high-performance 32-bit MIPS-based CPU on Xilinx FPGAs","authors":"N. Dwivedi, Pradeep Chhawcharia","doi":"10.1007/978-981-13-1423-0_6","DOIUrl":"https://doi.org/10.1007/978-981-13-1423-0_6","url":null,"abstract":"","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}