{"title":"Automatic detection of bad smells from excel sheets and refactor for performance improvement","authors":"Urja Rajdev, Anantdeep Kaur","doi":"10.1109/INVENTIVE.2016.7824903","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7824903","url":null,"abstract":"This paper presents the prevailing analysis, as well as some of experimental findings analogous to the factual study of so called Bad smells. An anatomy is presented which categorize bad smells given by Fowler in context of object-oriented programming. Many research papers have been published quantifying the effect of code smells on maintenance efforts. Notion of bad smells can be applied to multiple areas other than Software. This paper intends to give a review to look for bad smells in the context of spreadsheets. Many authors in past years have worked on spreadsheet bad smells. Here in this paper, a systematic review is proposed demonstrating list of bad smells for spreadsheets and related work issued in past in field of spreadsheet bad smells.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133030906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Prakasha, Balachandra Muniyal, Srushti, D. Shetty
{"title":"Multi user authentication protocol using visual sceret sharing","authors":"K. Prakasha, Balachandra Muniyal, Srushti, D. Shetty","doi":"10.1109/INVENTIVE.2016.7830205","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7830205","url":null,"abstract":"Security is one of the basic needs of a system. New methods of providing security need to be found. To overcome all the security issues in current protocol, a new protocol is defined. The protocol makes use of visual cryptography technique by which images can be used as password. Here, we use the visual secret sharing scheme to protect the data that cannot afford getting hacked. Authentication is a very important, as it prevents unauthorized person from accessing the confidential file and protects it by allowing only authorized members to use it. We authenticate the user by assigning image password using the visual secret sharing scheme. This protocol is best suited for a file which can be used by more than one user at a time with equal rights. It prevents only one user using it without other user members knowing about it. Here, access to the confidential file is not given even if a small part of the password is incorrect.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115041892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of solar street lamp with energy management algorithm for ensuring lighting throughout a complete night in all climatic conditions","authors":"Shruti Bora, Praveen V. Pol","doi":"10.1109/INVENTIVE.2016.7824868","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7824868","url":null,"abstract":"The paper proposes design of a solar energy LED street lamp with energy management algorithm for estimation of solar energy stored in the battery, determination of night hours and controlling the intensity of the street lamp for effective utilization of stored energy. This ensures working of the street lamp for a complete night without switching OFF in between the night, especially in rainy or cloudy seasons when less energy is stored in the battery. The total input charge to the battery is counted by integrating the charging current for a complete day time and the night time is counted by sensing the absence time of solar panel output in the previous night. Based on the above measured parameters, the intensity of the LED lamp is set in the night hours in a specified intensity pattern according to the traffic hours so that light from street lamp is available throughout the night without getting battery discharged fully in the midnight and causing a blackout. The system is developed using a microcontroller and practically implemented for realization.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robot relay: An optimal path planning for multiple client service","authors":"Aastha Goel, J. Bhattacharya, Anika","doi":"10.1109/INVENTIVE.2016.7830074","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7830074","url":null,"abstract":"Service robots are being widely implemented to provide specialized services to mankind. Their functionality are widespread among various application domains for providing services related to surveillance, vigilance, accident reporting, mechanical labor and behavior analysis. This paper presents the application of a mobile robot X80SV in a college campus. The robot equipped with a camera makes use of a pre generated map learned by the robot by integrating GPS data and motion sensor information. The map is used for navigating our robot to the desired location for multiple request servicing based on the job specified by the client. The work presents an architecture for efficient handling of the requests for an optimal order of their execution. Optimal path is calculated considering the shortest path; the request order and the processing time required in servicing the client request. The completion of services further depends upon the decision taken after processing the visual data at the end node. The proposed architecture including map based navigation, multiple service handling, optimal service processing and visual data analysis is applied to a subset of services as demonstrated in the result section of the paper. This includes physical transfer of important documents, information about particular region, calling a person and video data transfer.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115147221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved CURE clustering for big data using Hadoop and Mapreduce","authors":"P. Lathiya, Rinkle Rani","doi":"10.1109/INVENTIVE.2016.7830238","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7830238","url":null,"abstract":"In the Era of Information, Extracting useful information out of massive amount of data and process them in less span of time has become crucial part of Data mining. CURE is very useful hierarchical algorithm which has ability to identify cluster of arbitrary shape and able to identify outliers. In this paper we have implemented CURE clustering algorithm over distributed environment using Apache Hadoop. Now a days, to handle large store and handle huge data, Mapreduce has become very popular paradigm. Mapper and Reducer routines are designed for CURE algorithm. We have also discussed how different parameters affect quality of clusters by removing outliers.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123070059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vector method for ranking of sensors in IoT","authors":"Neha, S. Saxena","doi":"10.1109/INVENTIVE.2016.7830231","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7830231","url":null,"abstract":"Internet of Things (IoT) consists billions of objects that are spread over the world. Each object has its own sensors and each produces enormous amount of data. This will arise a problem of searching the sensor which holds the right information to solve the task from the billions of sensors. Sensor search will be an essential service for many IoT applications. A sensor search service that allows for finding Things with certain Properties. In this article sensor searching and ranking approach has been discussed and also a working prototype model is built to resolve the above issue.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123094379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecture implementation of optimized DSP accelerator with modified booth recoder in FPGA","authors":"Li Jiji, Ragimol","doi":"10.1109/INVENTIVE.2016.7830138","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7830138","url":null,"abstract":"Digital Signal Processors are special type of microprocessors with its architecture optimized for signal processing applications. Hardware acceleration has been proved as an extremely promising implementation strategy for the digital signal processing (DSP) and multimedia application domain. An accelerator module can be attached to processor core for enhancing performance. It enhances the performance or functionality by executing certain function in the accelerator instead of executing in the processor core. Adding accelerators is feasible and suitable in cases where the flexibility is essential and in most of the DSP applications. The accelerator module mainly consists of flexible computational units (FCUs). The structure of the computational unit is designed to enable high performance flexible operation based on a set of operation templates found in DSP kernels. One of the main advantages of this multiplier is that the recoding scheme used in it reduces the number of partial products which in turn reduces the area and the delay. The proposed solution forms an efficient design tradeoff point delivering optimized latency/area. It also provides high computing performance, real time processing to variety of applications ranging from sensors to servers.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123298791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speech control pick and place robotic arm with flexiforce sensor","authors":"Jyoti B. Ramgire, S. Jagdale","doi":"10.1109/INVENTIVE.2016.7824893","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7824893","url":null,"abstract":"Speech processing has become more popular for providing gigantic security in industrial applications. This paper proposes speech control pick and place robotic arm with flexiforce sensor. For security purpose different techniques are used but speech provides more security. Authentication is most important for industrial robot. Here speaker and speech recognition is done by using MFCC algorithm. MFCC is the best method for feature extraction. For authentication first speaker recognition is done and then controlling mechanism is carried out for industrial robot. According to the instruction robot moves forward, backward, right, left, pick, place and stop. The flexiforce sensor is used to provide required pressure on object. An applied force is in terms of voltage and flex-count. Authentication is very important for handling explosive material in industry to avoid harmful condition.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124693461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved approach for enhancing public cloud data security through steganographic technique","authors":"M. Mohis, V. Devipriya","doi":"10.1109/INVENTIVE.2016.7830073","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7830073","url":null,"abstract":"Cloud is simply a network of computers. It refers to a network of computers owned by one person or company, where other people or companies can store their data. In personal machines, every relevant data is stored in a single physical storage device. Cloud storage refers to a virtual storage area that can span across many different physical storage devices. When cloud storage is used, some of the files would be stored in various physical servers located at far away countries. Since most users do not know where their physical files are, using cloud storage can be thought of as a vague, untouchable thing like a cloud itself. One of the major issues faced by user while dealing with cloud storage is security of the data. Many of encryption schemes mainly attribute based and other hierarchical based are implemented to provide data confidentiality and access control to cloud storage where they are failed to address the security issues inside cloud. The proposed system includes a Mediated certificateless encryption which is an advanced encryption scheme that offers more security to the cloud data sharing and a steganographic method which enhances the security of data inside the cloud. Steganography approach reduces the falsification of unauthorized users. By implementing mediated certificateless encryption with steganography shows the performance of the system is better in comparison with other schemes and also embedding the secret text inside the noise using Least Significant Bit image embedding technique which protects the data from the attackers.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124826199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A component based perspective for inconsistency detection in software component source code","authors":"Srishti Gupta, Iqbaldeep Kaur, Amit Verma","doi":"10.1109/INVENTIVE.2016.7823243","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7823243","url":null,"abstract":"In recent years, the research done for developing automated inconsistency checker has proved a boon for many developers and testers. Inconsistency in the code leads to many issues. There is availability of some inconsistency tools that have been developed to check various kinds of inconsistencies. In this paper, a comparative review on the existing methods/tools available is presented for the inconsistencies detection. The comparative review is based on the types of Semantic, Syntactic inconsistencies and POS (Parts-Of-Speech) tagging. POS is further considered in POS-Phrase basis and POS-Word basis.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123541808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}