{"title":"Effective XML keyword query processing","authors":"Prashant R. Lambole, P. Chatur","doi":"10.1109/ICECA.2017.8203739","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203739","url":null,"abstract":"Keyword search query processing is considered as the most promising way of information retrieval over XML data in present days as it relieves user from understanding complex schemas of XML document and writing difficult queries using XPath and XQuery. Till date various query processing techniques have been proposed to get meaningful results through keyword search using LCA (Lowest Common Ancestor) semantic under tree based approach. Amongst many such LCA based techniques which have been proposed to get more accurate and meaningful results SLCA (Smallest LCA) and ELCA (Exclusive LCA), have considered being the most popular ones. However due to AND-semantic constraints of LCA based techniques, SLCA or ELCA results into NULL for keyword queries involving missing elements and provides unintended results if the technique returns root element of the document. To address these issues, we propose an effective XML keyword query processing technique. In this paper we present the proposed technique based on ELCA query semantic which returns the meaningful results when ELCA based technique results into NULL or document root element thereby providing better information discovery over XML data. The proposed technique can also be applied to SLCA based techniques to get similar SLCA based meaningful results.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122574829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber threat landscape in cyber space","authors":"Anusha Kadambari Shanker, G. Usha","doi":"10.1109/ICECA.2017.8203709","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203709","url":null,"abstract":"As technology rises in innovation and proliferation in the present times, with everyday life melding into the digital realm, so too rise the dangers and threats that such a digital dimension presents. In an age where cyber space has become so synced with physical lives, we must learn the need for cyber security and endeavor to propagate awareness for the same. In this paper, we explore and summarize concisely the various threats we face in cyber space and ways to combat them.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122680105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart attendance","authors":"Aditi Purohit, K. Gaurav, C. Bhati, Atul Oak","doi":"10.1109/iceca.2017.8203717","DOIUrl":"https://doi.org/10.1109/iceca.2017.8203717","url":null,"abstract":"In any institution or company, managing the records of attendance of the staff and students or employees is a tedious task. This project focuses on automating the attendance process through a biometric scanning technique. As, the finger print is a feature that is peculiar to an individual, it would help in efficiently identifying the person and would help in saving a great deal of paper work and other problems such as managing the records and avoidance of a traditional method called ‘buddy punching’. Buddy punching was a major loophole which will be exploiting in the traditional time attendance systems. Though fingerprint recognition is an established field today, but still identifying individual from a set of enrolled fingerprints is a time taking process. Hence, we have developed a project to efficiently identify the individual's finger print, check its authenticity and store the information in a database with various details like time and date of the entry.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125144263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent approaches on authorship attribution techniques — An overview","authors":"Siddharth Swain, Gaurav Mishra, Dr. Sindhu C","doi":"10.1109/ICECA.2017.8203599","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203599","url":null,"abstract":"Authorship analysis deals with the identification of authors which is a problem of text data mining and classification. There are numerous techniques and algorithms that have been published so far, in the field of stylometry. In this regard, the primary objective of the present review is to provide the status of the different studies carried out on authorship analysis based on the important research contributions. The authors have mainly focused on each of the article selected for review (2010–16), by summarizing the authorship detection fields, the corpus, the features of authorship analysis, and authorship attribution techniques used which could provide a platform to distinguish between different research contributions and the diverse techniques used in classifying the author's texts. The details on common tools and authorship attribution techniques published in the recent past would be of importance to the concerned researchers as an aid towards text data mining and future growth in the study of authorship attribution.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129677410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aleesha Susan Jacob, Vandita Chaurasiya, Vagmayee Sharda, Shubhra Dixit
{"title":"Car surveillance security system","authors":"Aleesha Susan Jacob, Vandita Chaurasiya, Vagmayee Sharda, Shubhra Dixit","doi":"10.1109/ICECA.2017.8203640","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203640","url":null,"abstract":"Car automation and surveillance is an escalating trend in this decade. Smart Vehicle security is becoming an indispensable need as it makes it easier for the owners to ensure their automobile's safety wirelessly. The core elements in our system consists of a mini central processing unit, motion detecting sensor accompanied with a camera module and buzzer. Our security network can be used to monitor and control the car wirelessly. We are using Putty software which senses motion, triggers the buzzer, takes the picture and mails it to the owner. The common platform used here is the mini CPU ‘Raspberry Pi’ which interfaces all the embedded peripherals simultaneously, so that our vehicle can be managed through our mobile phones with minimal cost. This paper highlights the advantages of internet of Things and shows how it can be used for realizing smart car security using Raspberry pi, camera module and sensors.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129574427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and mitigation of security attacks using real time SDN analytics","authors":"S. Veena, R. Manju","doi":"10.1109/ICECA.2017.8212770","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212770","url":null,"abstract":"Software Defined Network (SDN) is a proposal to networking world for global administration and management of network services. It also provides an abstraction of networking elements. Most of the security innovations in SDN are bound to an OpenFlow security framework which creates and implement security policies while detecting malicious traffic, that too in a flexible way. Existing methodologies convert policies into human readable form, which reduces the complexity. The proposed system considers detection and mitigation of attacks in single domain topology. The attacks will be the handled at the processing units and it creates on-demand policies to mitigate the attacks with the aid of real time SDN analytics. Once an attack is detected by the processing unit, mitigation can be performed by the system automatically. The system also considers how the above approach can be used in an inter-domain SDN.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124665963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. T. N. Chappa, B. Jammu, Maheswari Adimulam, Maneesh Ayi
{"title":"VLSI implementation of LTSSM","authors":"R. T. N. Chappa, B. Jammu, Maheswari Adimulam, Maneesh Ayi","doi":"10.1109/ICECA.2017.8203658","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203658","url":null,"abstract":"Link Training and Status State Machine (LTSSM) is a state machine in Universal Serial Bus (USB) which is defined for link connectivity and the link power management. LTSSM consists of 12 distinct states which are characterized depending on their functionalities. This paper reveals the FPGA implementation of LTSSM providing with USB 3.1 specifications with a support of USB 3.0 and 2.0 specifications also. The implementation includes the transition of all states present in the state machine. Further LTSSM has been designed by using Verilog code and simulated, synthesized and programmed to the targeted Artix-7 family of FPGA in the Vivado Xilinx environment.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"48 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131596290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. A. V. Sri, N. Yasasvini, M. Anjum, A. Manikanta, D. Harsha, G. Dattatreya, K. K. Naik
{"title":"Analysis of wideband circular ring with rectangular patch antenna for airborne radar application","authors":"P. A. V. Sri, N. Yasasvini, M. Anjum, A. Manikanta, D. Harsha, G. Dattatreya, K. K. Naik","doi":"10.1109/ICECA.2017.8203726","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203726","url":null,"abstract":"The circular ring with rectangular patch antenna (CRRPA) has designed for air borne radar applications at 27.7GHz frequency. On the substrate, circular ring with rectangular patch has loaded for obtain the wide band frequency range is 21GHz–31.8GHz. On the ground plane of substrate small rectangular slot has loaded to enhance the gain. The results are presented and return loss is obtained −36.5dB, gain is 7.40dB.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metric multidimensional scaling and aggregation operators for classifying epilepsy from EEG signals","authors":"H. Rajaguru, S. Prabhakar","doi":"10.1109/ICECA.2017.8203600","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203600","url":null,"abstract":"As a result of sudden and excessive electrical discharges in a specific group of brain cells called neurons, epilepsy occurs and is usually for a brief period. It can occur in various parts of the brain and the patient can experience different symptoms depending on the occurrence of the excessive discharges. So the electrical impulses generated due to the nerve firing in the brain can be measured easily with the help of Electroencephalogram (EEG) by placing the electrodes on the scalp of the patient. As the recordings are too long, the data to be processed is large and hence Metric Multidimensional Scaling (MDS) is used to reduce the dimensions of the EEG data. The dimensionally reduced values are then fed inside the Aggregation Operator Classifiers to classify the epilepsy from EEG signals. Results show that an average accuracy of 92.36% along with an average time delay of 2.44 seconds is found out.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127065214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy logic based data dissemination in Vehicular Ad Hoc Networks","authors":"Revati S. Jadhav, Manoj M. Dongre, Geeta Devurkar","doi":"10.1109/ICECA.2017.8203731","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203731","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs), a sub group of Mobile Ad hoc Networks (MANETs), are networks that have no fixed infrastructure and instead depend on the vehicles themselves to provide exchange of information. They have potential in enhancing road safety by sharing emergency information to other vehicles in the network. However, because of constant movement of vehicles, presenting a successful broadcast service in VANETs is challenging. Therefore, we propose an approach which uses fuzzy logic, with the help of fuzzy logic tool box in MATLAB software, to choose the forwarding nodes and uses network coding to reduce the number of retransmissions. By means of fuzzy logic, the best forwarding nodes are selected which further transmit the messages. By integrating network coding with the fuzzy logic based forwarding, we significantly reduce the number of required transmissions and thus enhance the efficiency for disseminating messages in VANET system.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125738312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}