{"title":"Role of Machine Learning in ETL Automation","authors":"K. Mondal, Neepa Biswas, Swati Saha","doi":"10.1145/3369740.3372778","DOIUrl":"https://doi.org/10.1145/3369740.3372778","url":null,"abstract":"In the current business landscape, real-time analysis of enterprise data is very crucial for decision-makers of the organization to take strategic resolution and stay ahead of the competitors. Most of the time, it happens that data is outdated by the time it reaches to the user. The organization needs reliable, up to minute information to make better proactive business decisions, improve the process and organizational efficiency. Availability of information and business-critical report at real-time can be achieved through an automated ETL process. Typically, running a data warehouse in an enterprise requires coordination of many operations across many teams including applications and database teams. Also, it required a lot of manual intervention, which is error-prone. Executing all related steps in correct sequences under accurate conditions can be a challenge. Automated ETL process helps to address all these problems. Moreover, the preprocessing of data is a crucial step for making data ready to load in a data warehouse for analysis. Machine learning-based preprocessing can be used to ensure the quality of data. In this paper, we have addressed the issues faced in traditional data warehouse related to availability as well as the quality of data. We have explained how to automate the ETL process and how machine learning can be leveraged in the ETL process so that the quality and availability of data does not ever have been compromised and reached to the user on a near real-time basis.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115935090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Mondal, Imran Ali, Praveen Kumar, Sujoy Saha, Indrajit Bhattacharya
{"title":"Designing an Information Bot for an Opportunistic Mobile Environment in Disaster Response Scenario","authors":"T. Mondal, Imran Ali, Praveen Kumar, Sujoy Saha, Indrajit Bhattacharya","doi":"10.1145/3369740.3372762","DOIUrl":"https://doi.org/10.1145/3369740.3372762","url":null,"abstract":"This work primarily comprises of designing a framework of an information bot for an opportunistic mobile environment in post disaster situation. The bot would collect the required classes information periodically through questioning various mobile nodes by considering their roles (i.e. Volunteer, Local People and Victims) in disaster situation. Besides, it would validate the collected information through sharing with other nodes of same area of interest during information exchange. A portion of the designed framework has been considered for emulation in AIML platform using python. From observations, it is evident that the assistance of an information bot during data acquisition and validation is worthwhile for preservation of consistent disaster intent information.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114486002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajeswara Rao Ramisetty, Chengyi Qu, Rumana Aktar, Songjie Wang, P. Calyam, K. Palaniappan
{"title":"Dynamic Computation Off-loading and Control based on Occlusion Detection in Drone Video Analytics","authors":"Rajeswara Rao Ramisetty, Chengyi Qu, Rumana Aktar, Songjie Wang, P. Calyam, K. Palaniappan","doi":"10.1145/3369740.3369793","DOIUrl":"https://doi.org/10.1145/3369740.3369793","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) or drones equipped with cameras are extensively used in different scenarios such as surveillance of hazardous locations, disaster response and crime fighting. The related video streaming/analytics requires real-time drone-to-Ground Control Station (GCS) communication and computation co-ordination for desired user Quality of Experience (QoE). In situations where the quality of the video can be affected by occlusions (e.g., image distortion, frame stalling) due to network bottlenecks, there is a need to dynamically make decisions on the computation offloading and networking protocols in order to properly handle the video data for real world application purposes. In this paper, we propose a novel function-centric computing approach that helps a user to perform drone video analytics to assess a wide-area scene to chart a plan of action. Our approach involves handling network impairments affecting the switching between high resolution/low resolution video capture, or change of camera direction for assessment of the scene effectively. It also features a novel video quality enhancing algorithm based on occlusion-detection that adapts to video impairments related to image distortion and frame stalling. Our experiment results from a realistic testbed show that our approach can efficiently choose the suitable networking protocols (i.e., TCP/HTTP, UDP/RTP, QUIC) and orchestrate both the camera control on the drone, and the computation off-loading of the video analytics over limited edge computing resources. The performance improvements for computation off-loading involving our video quality enhancing algorithm are shown for different network conditions in terms of occlusion rate and processing times.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123366750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing the human behavior using pervasive sensing system","authors":"Maitri Vaghela, Kalyan Sasidhar","doi":"10.1145/3369740.3372766","DOIUrl":"https://doi.org/10.1145/3369740.3372766","url":null,"abstract":"Smartphones are becoming an integral part of the Internet of Things-(IoT) paradigm with their built-in sensor ecosystem providing a convenient platform to study human behavior. Examples include activity monitoring, transportation mode detection, travel behaviour and so on. All of these examples are connected in one way or the other to the IoT domain such as smart cities, smart health and so on. In this paper, we attempt to use smartphone sensors to understand college student behaviour within a campus for 30 days. The rising use of smartphones by the student population, motivated us to install a continuous sensing application on their smartphones to understand their daily routines, their physical activity levels, their sleep patterns, and their mobility patterns within the campus. Our empirical data was supported by qualitative responses from the students. The results of this experiment showed that smartphones indeed could be utilized to extract behavioral patterns of students.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127548279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kashi Nath Datta, Pradipta Das, M. Saha, Sujoy Saha
{"title":"Designing Embedded Visible Light Communication System Adaptable to Fluctuations in Light Intensity","authors":"Kashi Nath Datta, Pradipta Das, M. Saha, Sujoy Saha","doi":"10.1145/3369740.3372758","DOIUrl":"https://doi.org/10.1145/3369740.3372758","url":null,"abstract":"Internet of Things (IoT) extends the connectivity of internet connected devices like laptops, smartphones with internet-enabled embedded devices using wireless communication technology and sensing devices to interact with the external world. IoT based devices mainly use wireless technology like WiFi, Zigbee, Bluetooth Low Energy (BLE) for communication. Due to the large number of IoT devices and limited spectrum in the Radio Frequency band the system suffers from bandwidth crunch. Hence, the high bandwidth capacity of visible light provides the solution to the spectral crisis. So, the visible light based new wireless technology opens up a new domain of integrated communication system with sensors using lights. The LED beams transmit information from the transmitter's side to the photo-detector on the receiver's side. But, the photo-detector is affected by fluctuations in the brightness of ambient light and also by the variations in the distance between transmitter and receiver. To solve these problems, we design a hardware circuit to eliminate the effect of ambient light during transmission and also remove the effect of the variable intensity of transmitted LED power introduced due to change in the relative distance between the transmitter and receiver. In the experimental setup we use 5mm RED LED and OPT101 photodiode as transmitter and receiver respectively. Our experimental setup can eliminate up to 273 lux ambient light and detect bits correctly upto a bit duration of 1 μs","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123382908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CNN Based Approach for Post Disaster Damage Assessment","authors":"Srijan Nag, Tamal Pal, Souvik Basu, S. Bit","doi":"10.1145/3369740.3372753","DOIUrl":"https://doi.org/10.1145/3369740.3372753","url":null,"abstract":"After any disaster, the Government rehabilitates the victims based on the severity of the damage caused to their properties. Since a huge number of rehabilitation claims flow in after the disaster, it takes up a lot of manual labor in inspecting and validating the claims along with deciding the amount of rehabilitation to be granted. Moreover, such manual inspection leads to a lack of transparency. In recent years, social media posts, text, and images have become a rich source of post-disaster situational information that may be useful in assessing damage at a low cost. Most of the existing research explores the use of social media text for extracting situational information useful for disaster response. The usage of social media images to assess disaster damage is limited. In this paper, we propose a convolutional neural network-based approach to locate damage in a disaster image and to quantify the degree of the damage. The proposed damage assessment system categorizes images of earthquake-affected buildings and decides the severity of the damage caused by the earthquake. Our proposed approach enables the use of social media images for post-disaster damage assessment and provides an inexpensive and feasible alternative to the more expensive GIS approach. Our approach exhibits high accuracy in classifying earthquake-affected buildings and determining the severity of damage at a negligible loss.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"37 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131608795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Prefetching at Network Edge to Improve DASH QoE","authors":"Hema Kumar Yarnagula, V. Tamarapalli","doi":"10.1145/3369740.3373802","DOIUrl":"https://doi.org/10.1145/3369740.3373802","url":null,"abstract":"In recent years, Dynamic Adaptive Streaming over HTTP (DASH) has emerged as a popular adaptive video streaming technique to improve the bandwidth utilization. Moreover, DASH with segment-based flexibility also brings a potential benefit for the end user's Quality of Experience (QoE)1. Despite the tremendous popularity of technology like DASH, video delivery over the mobile networks is still facing some serious challenges.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134059982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. P. Mahato, Jasminder Kaur Sandhu, Gitanshu, Kamlesh Dutta
{"title":"Distributed routing for underwater wireless sensor networks using cuckoo search-ant colony optimization","authors":"D. P. Mahato, Jasminder Kaur Sandhu, Gitanshu, Kamlesh Dutta","doi":"10.1145/3369740.3372757","DOIUrl":"https://doi.org/10.1145/3369740.3372757","url":null,"abstract":"Underwater sensor network is a promising networking technique. Several challenges such as dynamic structure, high rates of energy consumption, long propagation delay, and narrow bandwidth are being faced by underwater sensor networks. The traditional routing approaches never give reliable and expected performance. This paper presents a novel routing algorithm to tackle acoustic transmission problems in underwater. The proposed algorithm is based on cuckoo search and ant colony optimization.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134276774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia
{"title":"A Scalable Algorithm for Multiparty Interactive Communication with Private Channels","authors":"Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia","doi":"10.1145/3369740.3369771","DOIUrl":"https://doi.org/10.1145/3369740.3369771","url":null,"abstract":"A group of n players wants to run a distributed protocol ρ over a network where communication occurs via private point-to-point channels. Unfortunately, an adversary, who knows P, is able to maliciously flip bits on the channels. Can we efficiently simulate ρ in the presence of such an adversary? We show that this is possible, even when L, the number of bits sent in ρ, and T, the number of bits flipped by the adversary are not known in advance. In particular, we show how to create a robust version of ρ, ρ' such that 1) ρ' fails with probability at most δ, for any δ > 0; and 2) ρ' sends Õ (L + T) bits, where the Õ notation hides a log(nL/δ) term multiplying L. Critically, our result requires that ρ be a protocol that runs correctly in an asynchronous network; in contrast, our protocol ρ' must run in a synchronous network. Additionally, we show how to improve this result when the average message size is not constant. In particular, we show how to create a protocol ρ' that sends O(L(1 + (1/α) log(nL/δ)) + T) bits, where α is the average message size. This new ρ' is adaptive in that it does not require a priori knowledge of α. We note that if α is Ω (log(nL/δ)), then this improved algorithm sends only O(L + T) bits, and is therefore within a constant factor of optimal.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130049755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Subhash Bhagat, P. Flocchini, K. Mukhopadhyaya, N. Santoro
{"title":"Weak robots performing conflicting tasks without knowing who is in their team","authors":"Subhash Bhagat, P. Flocchini, K. Mukhopadhyaya, N. Santoro","doi":"10.1145/3369740.3369794","DOIUrl":"https://doi.org/10.1145/3369740.3369794","url":null,"abstract":"In this paper, we consider the problem of having two teams of identical robots, each with its own task, inhabiting the same space. The robots operate in Look-Compute-Move cycles and each team needs to solve its own task without being able to distinguish which of the robots belong to its team. The tasks we consider are two classical conflicting pattern formation problems: gathering (where the robots need to gather at some arbitrary point), and circle formation (where the robots need to place themselves in distinct points of a circle). We show how to achieve this double goal using robots that are anonymous, oblivious, silent, and asynchronous; the robots share a coordinate system, but with possibly different orientations. Unlike all the previous literature, which considers a single team of robots with a single goal, this is the first result addressing multiple anonymous teams of robots performing different (and possibly conflicting) tasks in the same space at the same time.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130925968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}