{"title":"A Survey on Software Defined Network based on Architecture, Issues and Challenges","authors":"Sarika Singh, S. Prakash","doi":"10.1109/ICCMC.2019.8819785","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819785","url":null,"abstract":"Today almost everything is connected via Internet which is accessible from anywhere anyplace and anytime. Therefore, to overcome the traditional network challenges, we have employed new technology called software defined network. SDN is a new adventure in networking domain which is different from traditional networking models. In this technology SDN Controllers performs the control decision task in either centralized or distributed mode. SDN has been recommended as biggest hopeful outcome for upcoming internet. SDN has separated control plane from data plane and provides the estimation for network utilization development. SDN results in a more efficient and innovative design and delivers a better performance with a higher flexibility without the use of proprietary devices. This paper nicely presents fundamentals, detailed literature review and research challenges on software defined networks. Further provides a comparative study based on their techniques and features. This article will be helpful for new researchers to get an overview on the fundamentals of SDN architecture, related techniques and the corresponding features.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126774752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Abusive Comments in Social Media using Deep Learning","authors":"Mukul Anand, R. Eswari","doi":"10.1109/ICCMC.2019.8819734","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819734","url":null,"abstract":"Social media has provided everyone to express views and communicate to masses, but it also becomes a place for hateful behavior, abusive language, cyber-bullying and personal attacks. However, determining comment or a post is abusive or not is still difficult and time consuming, most of the social media platforms still searching for more efficient ways for efficient moderate solution. Automating this will help in identifying abusive comments, and save the websites and increase user safety and improve discussions online. In this paper, Kaggle’s toxic comment dataset is used to train deep learning model and classifying the comments in following categories: toxic, severe toxic, obscene, threat, insult, and identity hate. The dataset is trained with various deep learning techniques and analyze which deep learning model is better in the comment classification. The deep learning techniques such as long short term memory cell (LSTM) with and without word GloVe embeddings, a Convolution neural network (CNN) with or without GloVe are used, and GloVe pretrained model is used for classification","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117300414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Shaikh, Feza Shaikh, K. Sayed, Needa Mittha, Naziya Khan
{"title":"Smart Toilet Based On IoT","authors":"F. Shaikh, Feza Shaikh, K. Sayed, Needa Mittha, Naziya Khan","doi":"10.1109/ICCMC.2019.8819606","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819606","url":null,"abstract":"In today’s world with the ever increasing growth in the population of India, the hygiene of our country is endangered. Our Prime Minister Sir Narendra Modi has introduced \"Swach Bharat Abhiyan\" Scheme to improve cleanliness in the country. Our project will definitely be a help to improve hygiene condition in India. It will create awareness among people in terms of \"Toilet Management\". The proposed system \"Smart Toilet\" is based on IoT, smell sensor, IR sensor, sonic sensor, RFID sensor. The smart toilet will take care of opening and closing of the toilet seat, the IR sensor tracks the dirt present on the toilet seat and raise an alarm, The cleanliness of the toilet will be improved by monitoring the sweeper’s activity to maintain the hygiene of the toilet, it also will deal with water conservation.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124068046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discrete Sliding Mode Controller Action With PID Sliding Surface For Non Linear Plant Along With Changing Set Point","authors":"B. Patil, L. Waghmare, M. Uplane","doi":"10.1109/ICCMC.2019.8819864","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819864","url":null,"abstract":"In this paper, a discrete time sliding mode controller (DSMC) is proposed for higher request in addition to postpone time (HOPDT) forms. A sliding mode surface is picked as a component of framework states and mistake and the tuning parameters of SMC are resolved by utilizing the overwhelming post situation procedure. The control object for \"ball in a barrel\" is to regulate the speed of a DC supplying fan which blows air into a chamber in order to keep a ball suspended at some foreordained position in the barrel. The DSMC is worked to direct the ball's position consequently. Albeit adroitly straightforward, this is a troublesome control issue due to the non-direct consequences for the ball and the perplexing material science administering its conduct. Besides, the ball is amazingly touchy to any outer aggravations from the fan. Taken together, it is hard to be constrained by the customary science, and not actually caught in reproduced or numerical correlations of control calculations. The reproduction and experimentation results demonstrate that the proposed strategy guarantees the required elements. The perfection of current proposed system is it grants the following of progress which will progressively set point in the near future. This gadget helps to tentatively analyze a customary PID controller and DSMC controller. The results show significant differentiations in the execution characteristics of the controllers.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129785079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Ramesh, M. Anto Bennet, H. M., V. D., V. K, J. R
{"title":"Enhancement of lifetime using Energy efficient cross layer approach for WSN","authors":"K. Ramesh, M. Anto Bennet, H. M., V. D., V. K, J. R","doi":"10.1109/ICCMC.2019.8819740","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819740","url":null,"abstract":"Energy minimization is becoming a major issue in wireless sensor networks (WSN) and is mostly event based. An energy saving approach or tool is important for extending the life of a sensor node. This study proposes a cross-approach between access to MAC and the network layer for energy efficiency. Use the LEACH algorithm to select a channel. Broadcasting is carried out only at the cluster head (CH),which saves energy. The simulation results show that the interlevel approach provides significant energy savings compared to traditional applications.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129725090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"—Multiple Cluster-Android lock Patterns (MALPs) for Smart Phone Authentication‖","authors":"JavedAkhtar Khan","doi":"10.1109/ICCMC.2019.8819635","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819635","url":null,"abstract":"This paper proposes the implementation of progressive authentication service in smart android mobile phone. In this digital era, massive amount of work can be done in the digital form using the smart devices like smart phone , laptop, Tablets , etc. The number of smartphone users approx. reach to 299.24 million, as per the recent survey report [1] in 2019 this count will reach 2.7 billion and after 3 years, this count will increase up to 442.5 million. This article includes a cluster based progressive smart lock with a dependent combination that is short and more secure in nature. Android provides smart lock facilities with the combination of 9 dot, 6dot, 5dot, 4dot and 1-9 number. By using this mobile phone user will be able to generate pattern lock or number password for authentication. This is a single authentication system, this research paper includes a more secured multiple cluster based pattern match system.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133051001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Framework for Detection of Malicious Activities in IoT Networks using Keras Deep Learning Library","authors":"Abhinaya Nagisetty., Govind P. Gupta","doi":"10.1109/ICCMC.2019.8819688","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819688","url":null,"abstract":"Secure and reliable services of the smart cities are generally depend on the reliable services provided by different devices of the Internet of Things ecosystem and Internet of Things backbone networks. In order to provide secure and reliable services, there is need to install intrusion detection mechanism to detect malicious and intrusions activities of the malicious attackers on the IoT network. This paper presents a framework for detection of malicious activities in IoT Backbone Networks using Keras Deep Learning Library. The proposed framework uses four different deep learning models such as Multi Layer Perceptron (MLP), Convolutional Neural Networks (CNN), Deep Neural Networks (DNN) and Autoencoder for predicting the malicious attacks. Performance evaluation of the proposed framework is done using two well known datasets such as UNSW-NB15 and NSL-KDD99 and its result analysis are discussed in terms of accuracy, RMSE and F1-score.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125325590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on Design & Testing of CCD Detector Data Generation & Acquisition System","authors":"Ankit Dhulekar, Bharat V. Tank","doi":"10.1109/ICCMC.2019.8819653","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819653","url":null,"abstract":"In this review paper, a CCD detector is used to capture the image of the object in dim level of light. The video signal coming from the detector is fed into the video processor which remove the intrinsic noise from the signal, a 0dB to 36dB PGA is inbuilt in processor which is adjusted by programming the PGA register and finally, convert the analog signal into digital by 12-bit ADC. The video processor consists the different kind of registers like control register, ADC register, PGA register, CLPDM, SCLK, OE register etc. These registers are need a clock pulse to perform the specific task and that clock pulse is generated in LabVIEW tool. A PXI card is used for data generation & Acquisition system. The generated clocks are passed to the video processor according to the pin configuration of video processor. Finally, a 12-bit of digital output is generated.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114828681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intelligent Controller based Power Grid Interconnected System for Reliable Operation","authors":"V. B. Thurai Raaj, K. Suresh","doi":"10.1109/ICCMC.2019.8819771","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819771","url":null,"abstract":"the main objective of this research paper is to control the Unidirectional Boost Converter (UBC) by implementing an intelligent controller (IC). IC is the only competent to control and maintain the constant power flow at the load terminal. From the data of power output from wind and solar energy, power conversion are continuously captured by IC based on which the data value gate pulses are injected to power electronic switch. The proposed model is connected with micro grid to provide utilization path for surplus power, similarly grid supplies the power to load (i.e. renewable energy gets fails to produce minimum requirement). The overall design and simulation is performed by using MATLAB/SIMULINK. Unidirectional converter is use to interfaces the RER, BSS and load. Battery controlling unit (BCU) always monitoring the battery parameters, based on that values it control the battery operation.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123307750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bhagyashree Parija, S. Behera, Ruturaj Pattanayak, S. Behera
{"title":"Power Quality Improvement in Hybrid Power System using D-STATCOM","authors":"Bhagyashree Parija, S. Behera, Ruturaj Pattanayak, S. Behera","doi":"10.1109/ICCMC.2019.8819656","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819656","url":null,"abstract":"The emanate use of distributed energy sources in electricity grid has created new ultimatum for the utility load as regard to power quality, voltage stabilization and efficient energy utilization. Wind and Solar are considered as the most assuring source of renewable energy. However, the standalone operation of either Photo-voltaic or wind energy system does not offer a very reliable source of electricity production, mainly due to the unpredictability over the availability of the wind and solar irradiance. Thus, an assortment of wind and solar power generation structure can form a very much potential and reliable source of electricity. In this work a hybrid model of wind and Photo-voltaic system has been presented. This kind of system is very beneficial and useful to the remotely located or islanded areas where grid integration is not very economical. However, the interfacing of power electronic devices to DG systems induces very severe power quality problems, such as, harmonic generation and the reactive power compensation that disturbs the power distribution system. In this work, a simulation model of hybrid wind-PV generation system of capacity 750 KW has been presented. The performance of this system with grid connected mode is analyzed. The power quality of the wind-SPV hybrid system has been evaluated by calculating the total harmonics distortion (THD) at different wind speed. Power quality of this hybrid system has been improved by using D-STATCOM.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128177407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}