{"title":"Analyzing the effect of difficulty level of a course on students performance prediction using data mining","authors":"Kamaljit Kaur, K. Kaur","doi":"10.1109/NGCT.2015.7375222","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375222","url":null,"abstract":"Recently the University Grants Commission of India has introduced a multistage examination system in higher education institutes in the country. The new system, called the Credit Based Continuous Evaluation and Grading System (CBCEGS), assesses a student on the basis of her continuous evaluation during the semester, combined with her performance in the end semester examination. This multistage examination pattern provides an opportunity to students to improve their performance. If a student cannot perform well in tests during the semester, she can improve her performance in the end semester test. But it does not seem so easy. In certain courses, due to their difficulty level such as mathematics, a student may not be able to improve her knowledge at the last moment despite hard work. Though, it may be possible in case of courses that are comparatively easy such as System Analysis and Design. This paper analyzes and predicts students performance using data mining techniques for two data sets of 1000 students each one for Mathematics, and the other for System Analysis, and Design. This study can help the education community to understand learning behavior of students as far as courses of varying difficulty are concerned. It is observed that Classification and Regression Tree (CART) supplemented by AdaBoost is the best classifiers for the prediction of students' grades for both subjects. J48 supplemented by AdaBoost performs excellent for System Analysis, and Design but perform worst for mathematics and M5P generates best results for early prediction of students' marks in the major test.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"9 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116931394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison, evaluation and characterization of MAC protocols in Wireless Body Area Network","authors":"Vikash Mainanwal","doi":"10.1109/NGCT.2015.7375107","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375107","url":null,"abstract":"The advancement in technology, Wireless Body Area Network (WBAN) is one of the increasing interests for various purpose, such as health monitoring, defense, sports etc. by the help of inbuilt human body-sensor networks. Wireless body area network monitoring by used to supervise vital signs sensor node of human body in or around the outside body. This paper analysis the main characteristics of MAC protocol for used in body wireless network. The most common protocols for Wireless Body Area Network (WBAN) is S-MAC TMAC, ZigBeeMAC, Baseline-MAC protocols. Here study and survey of these MAC Protocols in WBAN regarding to characteristics of these Protocol. After that simulation of these MAC protocol and what we find out the result after simulation is described in the paper. Here consider the main factor of MAC protocol is energy efficiency, latency, throughput, transmission packet rate, receiving packet rate, fade-depth distribution and many other objective factors. The simulations are conducted by Castalia 3.2 simulator under the environment of Omnet++4.5 as like on human body in different scenarios. After analysis, comparison, and evaluation to conclude which MAC protocol is best other than comparison MAC protocol in different point of view.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"889 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116379500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Link and switch conflicts-free routing in Optical Multistage Interconnection networks","authors":"Shobha Arya, Nipur","doi":"10.1109/NGCT.2015.7375132","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375132","url":null,"abstract":"Multistage Interconnection Network (MIN) is a class of high-speed network and formed by many stages of interconnected switches. With the growth of parallel processing, the MIN has become a hotspot of this field. Optical Multistage Interconnection networks (OMINs) came into existence because of its high speed of data transmission as compare to electrical (traditional) MIN. OMINs are high speed interconnection networks but also have some issues like crosstalk. Crosstalk problem is generated by undesired coupling of two wavelengths. These undesired coupling could be caused by Link conflicts and Switch Conflicts. In Electronic MINs there is only Link conflicts but in Optical MINs both Switch Conflicts and Link Conflicts occurs. Based on study and analysis a number of researches have been done for resolving these conflicts. In this paper, we have proposed a method Link-Switch Conflicts (LSC) on Optical Omega Networks, which detects Link Conflicts and switch conflicts separately. We are also routing these conflicted messages to resolve crosstalk. The results of Link-Switch Conflict (LSC) method are analyzed and compared with Windows Method (WM), Improved Windows Method (IWM) in Omega Network. This method is used to minimize the crosstalk problem.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122572177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face recognition using original and symmetrical face images","authors":"M. Yusuf, Firoz Siddiqui, Sukesha","doi":"10.1109/NGCT.2015.7375249","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375249","url":null,"abstract":"The biggest bottleneck of face recognition is the insufficient training samples of face images. In reality, face possess varying nature of expressions, illumination, poses, etc. There is a constrained of insufficient training samples due to number of reasons which reduces the accuracy of face recognition techniques. A method to generate various symmetrical face images by exploiting the axis-symmetrical structure of the face is proposed. This method is simple and computationally efficient. The new generated symmetrical samples i.e. Left symmetrical face, Right symmetrical face and Mirror symmetrical face, is basically different from the original face but reflects different appearance of the original face. Classification is performed on all these samples using Principal Component Analysis (PCA) algorithm. Score fusion technique is used for ultimate classification result. Experiments shows that proposed method improves the accuracy of the recognition. It might improve other face recognition methods too.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114449448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced leader election for Cognitive Radio Ad-Hoc Networks","authors":"P. Kumar, M. Murmu","doi":"10.1109/NGCT.2015.7375110","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375110","url":null,"abstract":"Leader election protocol is a classical approach for coordination and synchronization between nodes in a network. Cognitive Radio Network is the improved version of wireless network in which the primary concern is spectrum sharing or spectrum utilization among the secondary user (SU) nodes. Henceforth, for this type of network, there is also requirement of leader election approach for the synchronization and coordination among secondary users, since they access the unused or less-used free spectrum of primary users. This paper presents an enhanced method for the election of leader in Cognitive Radio Ad-Hoc Networks [4], which can be implemented or adopted with some change to a leader election protocol for this network. Since for Cognitive Radio Networks a very less in number leader election algorithm is proposed by different authors and simultaneously all the critical parameter of Cognitive Radio Networks is not considered. In this paper we have considered primary user (PU) involvement during leader election phase in Cognitive Radio Ad-Hoc Networks.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122219610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber security password policy for industrial control networks","authors":"S. Sarkar, S. Sarkar, K. Sarkar, Soumalya Ghosh","doi":"10.1109/NGCT.2015.7375151","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375151","url":null,"abstract":"An enormous growing of Information Technology and its applications in diverse fields enables us to think for digital world wherein cyberspace is being emerged significantly. After land, sea, air and space, cyberspace is the fifth domain where cybercrime, espionage and cyber weapons are on rising day by day. As a result, cyber security is a multi-dimensional concept and a complex issue straddling many disciplines and fields. Development of Information Technology makes possible to automate the industrial control system (ICS) for its efficient and remote operations. The automation in turn makes the industrial control system vulnerable to cyber security threats. Keeping in mind cyber security as a multi-dimensional complex issue, in this paper we have proposed a password policy for industrial control networks (ICNs) to have highest level of security. Our proposed password policy provides a set of guidelines for all involved individuals and associated systems in ICN and ICS ((IC)2NS) with aim ensure security aspects such as authentication, authorization, confidentiality, integrity, availability, non-repudiation and cyber security best practices in (IC)2NS. The password policy covers password creation criteria, minimum required length of password and character sets for password composition. We have also discussed about the purpose, scope, policy exception, review and enforcement of the password policy in (IC)2NS.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128596394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature extraction from EEG signal through one electrode device for medical application","authors":"Sravanth Kumar, Vivek Kumar, B. Gupta","doi":"10.1109/NGCT.2015.7375181","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375181","url":null,"abstract":"In recent years, a vast researches are concentrated towards the development of EEG based human computer interface in arrangement to enhancing the quality of life for medical as well as non-medical applications. Industry and community of research has been attracted by wireless EEG devices and they are easily available in the market. Such technology can be incorporated to psychology, anesthesiology, and for real-time patients monitoring. The Neurosky Mind wave headset device was generally utilize to detect and measure electrical activity of the user's forehead and transmits the collected data wirelessly, to a computer for further processing. After processing data base, the signals are categories into various frequency bands for feature extraction. In this paper, we present the characteristics and specification of EEG based human computer interfaces for real-time applications. Furthermore, we discuss about the mental or behavior state of the person (Eye Blink, Meditation, Attention levels) through the NeuroSky Mind wave (MW001) device using Openvibe.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124972917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic gadget charger using coin detection","authors":"Gunjan Chhabra, Sunil Kumar, P. Badoni","doi":"10.1109/NGCT.2015.7375261","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375261","url":null,"abstract":"In this communication era, mobile -telephone industry has grown profoundly. The urban population uses the latest mobile-phone technology while the rural population buys second hand ones, mostly with degraded battery, that require frequent charging. This battery-problem becomes a giant when user doesnt have a standard charger or an electricity connection. In this paper, researchers intent is to propose a public coin based mobile battery charging system. By using image processing techniques, value of the coin has been detected for a limited time, it will charge the device accordingly. A suitable microcontroller is programmed for all the controlling applications. The source for charging is obtained either from a direct power grid or by solar energy.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130537784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sagar Patni, Jobin George, Pratik Lahoti, J. Abraham
{"title":"A zero-copy fast channel for inter-guest and guest-host communication using VirtIO-serial","authors":"Sagar Patni, Jobin George, Pratik Lahoti, J. Abraham","doi":"10.1109/NGCT.2015.7375072","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375072","url":null,"abstract":"Virtualization technology, in the computer architecture domain, is characterized by the property of sharing system resources among the virtual machines (VMs) hosted on a physical server. Isolation is also a characteristic property of virtualization, which prevents the guest operating system running on these virtual machines to be aware of each other's presence on the same host. The isolation property of virtualization is essential for the security of co-resident VMs. However, this becomes a bottleneck, when some of the co-resident VMs need to communicate with each other for accomplishing a common task. A trivial method to communicate would be using a TCP/IP channel. This does accomplish the goal of communication, albeit with unsatisfactory performance, efficiency and security. In view of this, we need a mechanism which maintains the isolation characteristic of virtualization and yet provides a fast, efficient and secure channel for communication. In this paper, we discuss virtIO-serial, a fast channel for communication on KVM, an open source hypervisor based on the Linux kernel.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent traffic light controller using inductive loops for vehicle detection","authors":"Lala Bhaskar, Ananya Sahai, Deepti Sinha, Garima Varshney, Tripti Jain","doi":"10.1109/NGCT.2015.7375173","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375173","url":null,"abstract":"Through this paper we present the use of inductive loops as an instrument to measure traffic density. A microcontroller can be programmed to receive information about traffic density on different lanes, as measured by the inductive loops. Algorithms that not only ease congestion but also ensure the people in less congested lanes dont have to wait too long are discussed. Depending upon the traffic density a suitable algorithm can be executed to clear the congestion. A new design of inductive loop to suit our algorithm in case of multiple lane traffic has also been discussed here. Apart from causing delay, many times traffic congestion has resulted in loss of precious lives since help isnt able to reach the needy on time. In our proposed model we make use of radio transmitter-receiver to detect the presence of any ambulance/ fire brigade/ police vehicle and provide immediate right of way by traffic signal pre-emption. Lastly, there are many people who have a tendency of stopping way beyond the zebra crossing at a red signal. The use of infrared sensors to detect such vehicles and sound a buzzer to alert the traffic police has been presented. Overall, it is a complete model, one solution to many of traffic congestion related problems.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114359850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}