2018 International Conference on Information Technology (ICIT)最新文献

筛选
英文 中文
A Grey Relation Approach for Selection of Industrial Robot 工业机器人选择的灰色关联方法
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00038
K. Muduli, J. Pumwa, D. Yadav, Raj Kumar, S. Tripathy
{"title":"A Grey Relation Approach for Selection of Industrial Robot","authors":"K. Muduli, J. Pumwa, D. Yadav, Raj Kumar, S. Tripathy","doi":"10.1109/ICIT.2018.00038","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00038","url":null,"abstract":"The necessity of robots in industries, especially, manufacturing, logistics, and similar applications has reached the zenith. Therefore, in a manufacturing environment, a crucial problem is to select a mechanized robot for carrying out certain industrial tasks. The latest development in automation has enhanced the use of robots with distinctive abilities, attributes, and requirements. The competitiveness of a company in relation to productivity and quality of products is unfavorably affected through inappropriate choice of robots. For decision makers, it is hard to decide the most suitable robot reflecting on the numerous contradictory qualitative and quantitative criteria. Hence, Grey relational analysis (GRA) is an effective estimation approach, which is internationally employed in multi criterion decision making (MCDM) problems, mainly owing to ambiguity in decisions that has been proposed in this research. A few robot selection parameters were considered, and GRA was employed to evaluate the best robot as per grey relational grade.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127424053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
[Copyright notice] (版权)
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/icit.2018.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icit.2018.00003","DOIUrl":"https://doi.org/10.1109/icit.2018.00003","url":null,"abstract":"","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121505763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Agriculture: An Approach for Agriculture Management using Recent ICT 智慧农业:利用最新信息通信技术进行农业管理的方法
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00047
Subasish Mohapatra, Pratik Srichandan, Subhadarshini Mohanty, Harkishen Singh, P. Patra
{"title":"Smart Agriculture: An Approach for Agriculture Management using Recent ICT","authors":"Subasish Mohapatra, Pratik Srichandan, Subhadarshini Mohanty, Harkishen Singh, P. Patra","doi":"10.1109/ICIT.2018.00047","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00047","url":null,"abstract":"Agriculture forms the backbone of a country's economy. Indian GDP mainly depends on agriculture yield growth and their products from these agro-industry. As it largely depends on monsoons, which affects the yield to a huge extend, for which agriculture yield analysis and prediction is the toughest task for different agricultural departments across the country. Other agriculture factors which can affect yield are pests attack, deviation in temperature, soil moisture, nutrient deficiency, global warming etc. As a developing economy, this can severely affect the country's GDP, hence predicting the yield and advising certain important measures to counter the ill effects on the growth of crop are important for a stable and effective contribution to the economy of the country. It can be done by monitoring, analysing, controlling and implementing accurate amount parameters such as required amount of irrigation, in limit use of chemical fertilizers, manure, choosing crop type according to weather, soil type suitability for crop, crop rotation, moisture amount, temperature etc. In our paper, IoT sensors are used for gathering data, and analysis is done to prepare a predictive model. Our model gives comparative analysis from real data and in turn gives a predictive model which predicts from the remarks of different production data with their environmental condition. This model is tested for the effective prediction and the estimate of the agribusiness yield for the different product in Odisha state.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124958957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Framework for Fake Review Detection: Issues and Challenges 虚假评论检测框架:问题与挑战
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00014
Jitendra Kumar Rout, A. Dash, N. Ray
{"title":"A Framework for Fake Review Detection: Issues and Challenges","authors":"Jitendra Kumar Rout, A. Dash, N. Ray","doi":"10.1109/ICIT.2018.00014","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00014","url":null,"abstract":"With evolution of 4G and availability of wireless Internet access at a much higher speed, makes it possible for developing countries to use E-commerce for getting product and services. As each and every company now-a-days have presence in online mode of marketing, getting the right product as well as service is also tough. This leads to the importance of online reviews on the Internet. For taking purchase as well as financial decisions, every individual have to depend on online reviews. Online reviews given by users regarding a particular product or service may not be always genuine. Some companies as well as individuals trick the reviews to promote a specific product or brand and demote its competitors. A little has been done in past to address this issue and still companies as well as researches are trying to get-rid of this. In this work, we have tried our best to summarize the overall issues as well as challenges for detection of fake reviews as well as fake reviewers. Finally, a framework has been proposed to deal with fake reviews.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125506615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
VM Selection using DVFS Technique to Minimize Energy Consumption in Cloud System 基于DVFS技术的云系统能耗最小化虚拟机选择
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00064
S. Mishra, Sonali Mishra, Mohit Kumar, B. Sahoo, Deepak Puthal, S. Bharti
{"title":"VM Selection using DVFS Technique to Minimize Energy Consumption in Cloud System","authors":"S. Mishra, Sonali Mishra, Mohit Kumar, B. Sahoo, Deepak Puthal, S. Bharti","doi":"10.1109/ICIT.2018.00064","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00064","url":null,"abstract":"Energy consumption becoming a key issue for the execution of operation and maintenance of cloud system. The virtual machine selection plays an important role in the execution of the task without violating SLA. In this paper, a VM selection technique is proposed using Dynamic Voltage Frequency Scaling (DVFS) for optimizing the energy consumption and makespan in the cloud system.We have proposed a heuristic for the selection of VM for each task to optimize the energy utilization by applying the DVFS technique. The proposal extends to incorporate an energy model supporting the evaluation of energy consumption in cloud data centers. Each task has an energy-based SLA to execute in the cloud system. The DVFS Mechanism is applied to the virtual machines level to reduce the energy of the cloud system. Moreover, the performance of the diverse algorithms (Random allocation, and FCFS) are compared with the proposed DVFS-based VM selection strategy with the help of CloudSim.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133990208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
FireDS-IoT: A Fire Detection System for Smart Home Based on IoT Data Analytics FireDS-IoT:基于物联网数据分析的智能家居火灾探测系统
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00042
Sourav Kumar Bhoi, S. K. Panda, B. N. Padhi, Manash Kumar Swain, B. Hembram, Debasish Mishra, C. Mallick, Munesh Singh, P. M. Khilar
{"title":"FireDS-IoT: A Fire Detection System for Smart Home Based on IoT Data Analytics","authors":"Sourav Kumar Bhoi, S. K. Panda, B. N. Padhi, Manash Kumar Swain, B. Hembram, Debasish Mishra, C. Mallick, Munesh Singh, P. M. Khilar","doi":"10.1109/ICIT.2018.00042","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00042","url":null,"abstract":"Fire is the most widespread cause of death by accident. Fire affects thousand of residents each year, resulting in injury and loss of life. In this paper, an Internet of Things (IoT) based Fire Detection System (FireDS-IoT) is designed to prevent people from fire by providing an alert message in the emergency. The system is designed using MQ-135 (CO_2), MQ-2 (smog), MQ-7 (CO) and DHT-11 (temperature) sensors embedded with Arduino to get the fire event information in the surrounding more accurately. This research distinguishes the conditions in a surrounding as fire, no fire, and may be fire. This classification is performed using the K-Nearest Neighbors (K-NN) and decision tree machine learning algorithms in Python. Several scenarios were recorded in the experiment for training. Results show that K-NN and decision tree shows an accuracy of 93.15% and 89.25%, respectively. As a result, we were able to prove that K-NN provides more accuracy in detecting fire. Therefore, it is used for classification, and if fire conditions arise then a safety message is sent to the registered mobile number using Python programming.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132517035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Design of A Pedagogical Framework for Configuration, Execution and Analysis of Distributed Programs 分布式程序配置、执行与分析教学框架的设计
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00028
K. Bairagi, Ratnadeep Dey, P. K. Das
{"title":"Design of A Pedagogical Framework for Configuration, Execution and Analysis of Distributed Programs","authors":"K. Bairagi, Ratnadeep Dey, P. K. Das","doi":"10.1109/ICIT.2018.00028","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00028","url":null,"abstract":"In distributed system it may pose some problems to visualize the exact nature of functioning and the sequence of events in various nodes of the said system and such insights are essential to comprehend and analyze the behavior of different algorithms executing in different nodes of the system mentioned. This paper describes a framework that has been implemented to help visualize and analyze the working behavior of various algorithms on distributed system. Using this platform it is possible for students and researchers to gain insight into the working of various nodes of a distributed system, check their interactions at run time and thus to test different algorithms in a simulated as well as actual environment. The framework lets the student to check the behavior of certain standard built-in distributed algorithms, viz., Leader Election using Bully and Ring Algorithms, Ricart-Agrawala's Mutual Exclusion Algorithm and Chandy-Mishra-Hash deadlock detection algorithm. The users can also write their own algorithms and use a program generator module to generate programs for different nodes using this framework. Subsequent to the execution, a graphical analyzer module aids the user by showing the execution behavior of the algorithm using a space-time graphical diagram that makes use of Lamport's Time Stamping algorithm. The framework provides built-in system-level supports to facilitate exclusive access to shared resources and detects distributed deadlock also.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130145344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Establishing Correlation Between Structural and Spectral Property in K-Shell Structure 建立k -壳结构的结构与光谱性质的关系
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00030
Debasis Mohapatra, Soubhagya Ranjan Pradhan, Hahnemann Lenka, R. Tripathy, Anjana Panda, Monalisa Sethy
{"title":"Establishing Correlation Between Structural and Spectral Property in K-Shell Structure","authors":"Debasis Mohapatra, Soubhagya Ranjan Pradhan, Hahnemann Lenka, R. Tripathy, Anjana Panda, Monalisa Sethy","doi":"10.1109/ICIT.2018.00030","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00030","url":null,"abstract":"Degeneracy in graph theory, often known as k-shell decomposition in the graph is a well-studied problem. It is used to generate a core-periphery structure of a network that defines the levels of importance of the nodes of a network. The core nodes are the most influential nodes of a network. In this paper, we investigate the cascade capacity of a node inside a shell. We found that the intra-shell cascade capacity of a node in the core is more than the others because the Clustering Coefficient (CC) of the core is high and the Localization factor is less. There exist a negative correlation between CC and IPR. We have established this relationship between structural property CC and spectral property of Principal Eigen Vector (PEV) Localization using IPR and validated the intra-shell cascade capacity using Independent Cascade(IC) Model.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116302444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
H-RAN: An Approach Toward Cloud-RAN Load Balancing H-RAN:一种云- ran负载平衡方法
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00052
Byomakesh Mahapatra, A. K. Turuk, N. Ray, Awaneesh Kumar Yadav
{"title":"H-RAN: An Approach Toward Cloud-RAN Load Balancing","authors":"Byomakesh Mahapatra, A. K. Turuk, N. Ray, Awaneesh Kumar Yadav","doi":"10.1109/ICIT.2018.00052","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00052","url":null,"abstract":"The centralized cloud radio access network (C-RAN), change the BS architecture to a large extent, in term of associated cost and coverage. The main limitations of C-RAN architecture is that it has a centralized processing unit, which increases the network latency by increasing the service waiting time. The proposed Heterogeneous Radio Access Network (H-RAN) consist of some Edge node and local processing unit (LPU) which resides in remote radio head (RRH). This introduction of enhanced RRH (eRRH) node increases the capacity of the network and decrease the network latency, on the other hand its also share the computing and controlling task of the centralized BBU. The proposed LPU unit consists of a number of small VB which generally handle real-time computing and processing task. In the first section of this paper, we have proposed a new RAN architecture and all the load balancing condition are represented through a detail mathematical model. The paper also present a load-aware dynamic BS switching algorithm (LDBSS) for power optimization and load balancing. The simulation work is carried out with the help of CloudSim 3.0.3 simulator by considering equal number of packet arrival for both C-RAN and H-RAN. The simulated result shows that with the introduction of the middle Edge layer and LPU at the RRH reduces the waiting time and blocking probability of the network as compared the C-RAN architecture.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133597860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Malarial Outbreak using Machine Learning and Deep Learning Approach: A Review and Analysis 使用机器学习和深度学习方法预测疟疾爆发:回顾和分析
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00019
Godson Kalipe, V. Gautham, Rajat Kumar Behera
{"title":"Predicting Malarial Outbreak using Machine Learning and Deep Learning Approach: A Review and Analysis","authors":"Godson Kalipe, V. Gautham, Rajat Kumar Behera","doi":"10.1109/ICIT.2018.00019","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00019","url":null,"abstract":"In the present era of information, data has revealed itself to be more valuable to organizations than ever before. By applying machine learning and deep learning approaches to historical or transactional data, we are now able to derive new ground breaking insights helping us to make better informed decisions and adopt the best strategies in order to face the events that are likely to happen in the future. In this paper, we have not only sought to establish a relationship between climatic factors and a possible malarial outbreak but we also tried to find out which algorithm is best suited for modeling the discovered relationship. For that purpose, historical meteorological data and records of malarial cases collected over six years have been combined and aggregated in order to be analyzed with various classification techniques such as KNN, Naive Bayes, and Extreme Gradient Boost among others. We were able to find out few algorithms which perform best in this particular use case after evaluating for each case, the accuracy, the recall score, the precision score, the Matthews correlation coefficient and the error rate. The results clearly implied that weather forecasts could be legitimately leveraged in the future to predict malarial outbreaks and possibly take the necessary preventing measures to avoid the loss of lives due to malaria.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132858566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信