Aman Bansal, Shubham Kumar, R. Yadav, Nikita Dhage
{"title":"A review on cross domain recommendation","authors":"Aman Bansal, Shubham Kumar, R. Yadav, Nikita Dhage","doi":"10.1109/ICECA.2017.8212739","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212739","url":null,"abstract":"Social market, consumers frequently connect from ecommerce websites to social networking sites such as Facebook and Twitter. There have been few determinations on accepting the connections between users' community media profiles and their e-commerce activities. Consumers can also post their newly bought products on micro blogs with links to the e-commerce product web pages. Review on Prediction user's buying activities on user's social media profile from the e-commerce. Extract all feature and use for recommendation. Collaborative Filtering does not have several user ratings to base recommendations on, which indications to the cold-start problem. Influence merchandise adopter information for recommendation, we are facing two major challenges. First, review data are actual deafening and often contain dialect, mistakes and emoticons. Product Demo graphic info of many product adopters can be used to describe both products and users, which can be unified into a recommendation. Predict a user's follow-up buying behavior at a specific period with lineage accuracy. Purchase possibility can be leveraged by recommender systems in different circumstances, as well as the zero-query pull-based endorsement consequence. Matrix Factorization to consider user aspects, and show that our protracted yields better analytical correctness compared to traditional Matrix Factorization and to a non-personalized baseline for cold-start product recommendation.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123435364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel design of low power FinFET adiabatic circuits for VLSI applications","authors":"Madhuri, D. Sunila, G. Venkatesh, M. R. Babu","doi":"10.1109/ICECA.2017.8212853","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212853","url":null,"abstract":"The scaling of the commercially popular bulk MOSFETS faces two major challenges as minimization of leakage current and reduction in device to device variability to increase yield. In this paper, an improved low power adiabatic logic based on FinFET has been proposed. FinFET posse's lower leakage current and high on-state current which increase the performance and save area compared to CMOS adiabatic logic. For validating our idea we design power gated adiabatic inverter circuits using techniques like 2N2N2P, DCPAL, PFAL, IPAL and Fin SAL. We have also designed Fin SAL based AND/NAND and XOR/XNOR gates. The test circuit has been demonstrated based on 32-nm FinFET Predictive Technology Model. The simulation results show that adiabatic circuit based on FinFET devices achieve power reduction.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125810951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"20dB Directional coupler for LTE band application","authors":"Khyati K. Mistry, Mayank A. Ardeshana","doi":"10.1109/ICECA.2017.8203639","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203639","url":null,"abstract":"This paper presents a structure of Directional coupler for LTE band application is presented, which has a coupling level accuracy 20dB at 2.4 GHz frequency and FR4 dielectric material use. The design uses single section coupled line method that simulated using simulation software ADS 2011.10. In this paper a lumped element method is also implemented and compare with the conventional design approach and found that directivity and isolation is reasonably good for LTE application.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124780946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seema Yadav, P. Bhanushali, Saurabhkumar Jain, Tejinder Kaur
{"title":"Word matching and retrieval from images","authors":"Seema Yadav, P. Bhanushali, Saurabhkumar Jain, Tejinder Kaur","doi":"10.1109/ICECA.2017.8203695","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203695","url":null,"abstract":"As vast amount of digital image data is stored by the advanced libraries, there is a requirement for an efficient query word searching methodologies which can make them accessible according to user's requirement. For their accurate retrieval, it is essential to understand their contents. Present technologies for optical character recognition (OCR) and image document analysis do not handle such documents adequately because of the recognition errors. Due to the problems faced by traditional OCR during recognition, computer is unable to extract the textual characters properly after scanning them. In this paper, we propose an effective word extraction and matching scheme from image documents that achieves high performance, even in the presence of noise in the image, degradation and font-variants. Initially, each image in image-database is pre-processed. In the next step, find contour method is used to detect blobs which are further passed in tesseract engine. Tesseract segments the characters from the image and stores in character database. Each word in the database is used to index a given set of images. During retrieval, the query word presented to the system is matched with characters in the database and all images containing instances of the query word are retrieved and presented to the user. Using this approach, our system is able to properly handle images with different font styles, size and heavily touching characters. From the experimental results on the various image formats it is observed that the extraction of text from the images is mostly accurate and indexing of words based on the position is working perfectly.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125026414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Bharathi, U. Srivani, M. D. Azharudhin, M. Srikanth, M. Sukumarline
{"title":"Home automation by using raspberry Pi and android application","authors":"H. Bharathi, U. Srivani, M. D. Azharudhin, M. Srikanth, M. Sukumarline","doi":"10.1109/ICECA.2017.8212754","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212754","url":null,"abstract":"Automation is the use of control systems and information technologies to reduce the need for human work in the production of goods and services. Automation plays an important role in the world economy and in daily life. In this we describe the design and development of a remote household appliance control system using raspberry pi and android mobile phone. We will be able to control any appliance in home from anywhere throughout the world, when you have done with this Raspberry Pi home automation. It is necessary to control the home from any location. Home automation is the control of any electrical and electronics device in our home and office whether we are there or anywhere.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129893816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of underwater wireless communication networks","authors":"Shikha Gupta, Manoj M. Dongre","doi":"10.1109/ICECA.2017.8203732","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203732","url":null,"abstract":"In underwater acoustic sensor networks (UWASNs), several transmitters using the same power send data to the sink. Then, the sink will collect more interference because of the slow-fading of signal, due to this, a higher outage probability and high energy consumption occurs. Underwater wireless communication is quite difficult because of the factors like propagation delay, small available bandwidth, strong signal attenuation, and interference from natural and man-made acoustic interferences. In underwater wireless acoustic communication all these factors depend on the frequency and distance. Higher frequency defines the worst case in terms of power consumption, and in terms of battery lifetime of the network. So in this work, we consider optimal distance between transmit nodes and receiver node to enhance the performance. The optimal power control schemes has been proposed in underwater wireless networks, of which the principle thought is to utilize distinctive power levels for enhancing the performance. By using this scheme, we get reduction of outage probability and enhancement of transmission capacity. Simulation results confirm the effectiveness of the optimal power allocation schemes compared to the frequency domain allocation scheme.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127155022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BotShark — Detection and prevention of peer-to-peer botnets by tracking conversation using CART","authors":"Pooja M. Pondkule, B. Padmavathi","doi":"10.1109/ICECA.2017.8203690","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203690","url":null,"abstract":"Botnets are networks of malware-compromised machines that are controlled by an opponent are the cause of a large number of problems on the internet. They are increasing faster than any other type of malware and have created a huge army of hosts over the internet. Managed by the Botmaster, they conduct distributed denial-of-service (DDoS) attacks, email spamming, key logging, abusing online advertisements, spreading new malware, etc. Today, the Botnet population is growing rapidly and they represent some computer armies and have become a huge threat on the Internet. In this work, we have proposed new network defense system for detection and prevention of peer-to-peer botnets by tracking conversation using CART.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127365488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Friend recommendation system for online social networks: A survey","authors":"V. S. Parvathy, T. Ratheesh","doi":"10.1109/ICECA.2017.8212834","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212834","url":null,"abstract":"The social network users always need personalized information. In the present scenario, people are not willing to spend a lot of time to specify their personal needs. So a system is needed which automatically suggest personalized things to users. The Recommendation system is a system which is used to recommend resources that user may be interested in by mining users' interests and/or preferences. There are different types of recommendation system in social network and each of this system uses different technologies for recommendation. The friend recommendation system is such a system which automatically suggests potential friends to users. This paper does a survey of different friend recommendation systems using different techniques. In this literature a comparative study of the methodology is also done.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130146946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT-based E-health system security: A vision archictecture elements and future directions","authors":"G. Tamizharasi, H. P. Sultanah, B. Balamurugan","doi":"10.1109/ICECA.2017.8212747","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212747","url":null,"abstract":"The application of IoT has become widespread across several industries such as logistics, smart homes, smart cities, e-health, and agriculture. IOT based E-Health Systems provides healthcare services across a series of interconnected networks and IoT devices. In such type of systems data security remains to be the major issue as the data generated from the E-health systems are accessed by the variety of users for medication, diagnosis, and research purposes. Even an outbreak of the single GB of the health data creates serious impacts as they are highly confidential in nature. Thus, an effective security measure across the IoT-based E-health systems has become the primary requirement. Further, the underlying architecture of the IoT-based E-health systems also greatly influences the data management and security issues. In this paper, we review some of the security considerations and challenges of IOT based E-Health systems. The proposed research work suggests efficient architecture models and access control algorithms for IoT-based E-health systems. As a result, a comparative analysis of various architecture elements and security measures are discussed, and the most appropriate techniques are suggested.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128950016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Menon, A. Nair, Jaslina Vinod, A. K. Shameela, T. Adarsh
{"title":"Trash Wi-Fi: Wi-Fi password generation and transmission after detection of waste","authors":"A. Menon, A. Nair, Jaslina Vinod, A. K. Shameela, T. Adarsh","doi":"10.1109/ICECA.2017.8212764","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212764","url":null,"abstract":"This paper aims to reduce improper disposal of waste. The system exploits the technical need for Wi-Fi by the general population. The idea is to inspire people to properly dispose of waste. Here the trash bin acts like Wi-Fi hotspot. Once the user puts waste of certain quantity and enters his/her mobile number, the system sends him a SMS containing a OTP to access the Wi-Fi. This can help us to reduce the waste and also encourage the public to make use of proper waste disposal system.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130781418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}