{"title":"Fiber Network Implementation by Using Standard Routing Techniques","authors":"M. Harish, C. Singh","doi":"10.1109/ICEECCOT43722.2018.9001359","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001359","url":null,"abstract":"Network Survivability is important concept when it comes to fault detection and fault recovery, it also plays a very important role in detecting the shortest path and to route the data in that data path. Due to increase in industries and consumers, demand for the high data rate and also fast service also increases and to fulfill the demands the concept called Traffic Demand Distribution (TDD) arises. Here the data is sensitive if the system fails to maintain the data because of path fault it may incur huge lose in communication field and also leads to poor service at end users. In keeping this situation in mind, survivability techniques to serve the data to pass through desired data path is implemented. This paper further describes the TDD and survivability techniques to overcome failure.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130902972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-Bipolar Sentiment Assessment of Text Reviews","authors":"Keerthana B. Chigateri, Rekha Bhandarkar","doi":"10.1109/ICEECCOT43722.2018.9001649","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001649","url":null,"abstract":"With the evolution and blooming of Internet, an indeterminately great number of mankind devote their time profusely for browsing, especially on social media. Public share their perspective in the form of opinions about various entities like ongoing affairs or a particular locality or their shopping experience etc. in internet. In the early stages, individuals practiced writing mode for this motive. But gradually accounting the headway made by technology the channel broadened from text to other diverse modes to convey their opinions like images, audio, video. These means were well received and prevailed so far. Because simple movements of face and pictures convey treasure of information. The voice tune changes along with the change in opinion. Thus these mediums are more descriptive than text. These feelings and conceptions exhibit their sentiments which shape the public opinion. Opinions are usually based on knowledge or experience. It is more concrete whereas Sentiments are feelings one feels about something. An Opinion is composed of Sentiment(s). A particular or group of sentiments leads to a concrete Opinion. Though these two terms are used interchangeably, these two terms are very close but slightly differ in their meanings. People express their held sentiments about an entity socially. A general opinion can be derived or extracted from these sentiments. These Sentiments collectively shape a particular Opinion like positive, negative or neutral which in turn impact and aids other customers, traders, or society in deciding their deals. Additionally, many trends keep recreating dynamically. With this rate of advancement, people keep refreshing their approaches and practices. Hence their sentiments. Thus, these sentiments propagate to others via social media. In the meantime, the pertinent authority can adapt to these changes before the change signals the call and grow wider every day and thus stay connected with customers. Apart from customers, they must be knowledgeable globally with surfacing trends and challenges, new needs and envision the demands. Accordingly, the sentiments circulate swiftly in online system]. But the exiting work on social network sentiment is just to distinguish the sentiment polarity of public opinion i.e., Positive or Negative which can be termed as Bipolarity. Bi-means two and Polarity means two opposite poles or opinions. Current research is confined to bipolar assessment of an opinion and multi-modal sentiment analysis is expecting more attention. This paper mainly presents a survey on these two areas.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130719421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Simulation of a Capless Low Drop Out Voltage Regulator","authors":"Sujatha Kotabagi, Gautami Karkun, P. S. Bhat","doi":"10.1109/ICEECCOT43722.2018.9001436","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001436","url":null,"abstract":"The changing requirements of the industry is directing towards the full integration of SoC. This requires the power management block to have the Low Drop Out(LDO) regulator with reduced external capacitor. This paper proposes the study of behavior of the LDO voltage regulator with an external capacitor and capless low drop out voltage regulator. The regulated voltage of 1.8V is obtained using the typical power supply of 2.2V. The total quiescent current used in the circuit is less than 30uA with the load current variation of 0 to 20mA. The capless LDO architecture is verified in the UMC 180nm technology. The architecture provides a stable regulated voltage of 1.8V with both line and load variations and also for the transient variations. The stability issues are overcome using the compensation techniques which uses a current amplifier and a capacitor in the differentiator configuration. The current amplifier implemented uses current mirror with current copying ratio of unity.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133508103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Energy Efficient FCM and CAT Swarm Optimization based Data Gathering in WSN","authors":"R. N. Sree, A. Ananth, L. Reddy","doi":"10.1109/ICEECCOT43722.2018.9001375","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001375","url":null,"abstract":"The collection of information from sensor nodes (SN) used for transmitting the data towards the sink node is said to be data aggregation. In data aggregation the nearest node will receives the information about the nodes which send information to the sink. From now, the sink overloaded and energy loss will occur because of loss of information. In this paper Fuzzy C-Means (FCM) based technique is used for selecting the rendezvous points (RP). Now the main intention is to transmit the nodes/points based on the weightage. Here, the nodes with uppermost weight of RP is selected and transmitted. The outstanding RP were utilized by preserving energy. Finally, CAT swarm optimization (CSO) is used for optimal path selection of mobile sink. The proposed methodology is implemented in the working platform of NS2 and the results were evaluated by using Network lifetime, delay and delivery ratio metrics.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123473636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Pre Processing Approach for Accurate Identification of Plant Diseases in leaves","authors":"Deepa","doi":"10.1109/ICEECCOT43722.2018.9001616","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001616","url":null,"abstract":"Detection of diseases in plant leaves is very crucial in agriculture. If the diseases in leaves are not identified at the initial stage it may affect the productivity. Pre processing the images is an important step in any image processing applications. Several algorithms are used to detect the diseases in plant leaves. But, when these algorithms are used for the noisy images or images taken under poor light conditions, they do not tend to generate expected result. Pre processing of these images becomes necessary because of noise, difference in illumination, camera orientation. Pre processing of images assists the further processing steps. In the proposed method the image is initially sharpened, and then Median filter is applied for denoising. The image is then segmented using k-means clustering. Combining these methods, better quality image was obtained.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117220277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Literature Review on Big Data Analytics and Demand Modeling in Supply Chain","authors":"Puneeth Kumar T, M. N, R. Hegadi","doi":"10.1109/ICEECCOT43722.2018.9001513","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001513","url":null,"abstract":"New digital technologies have been introduced into our business and social environments, causing a major change that is recognized as the digital transformation in recent years. While environmental shifts suggest that most of the organization starts using advanced technologies such as Internet of Things(IoT), Mobile applications, Blackchain, Intelligence Things, catboats and many more in their supply chain planning to gain an early competitive advantage and these technologies generates enormous amount of data that the traditional business intelligence system difficult to handle processing of vast data in real-time or nearly real time causes abstraction to the insight discovery, demand modeling and supply chain optimization, Big Data initiatives for demand modeling and supply chain optimization promise to answer these challenges by incorporating various services, methods and tools for more agile and adaptably analytics and decision making, there by this paper focus on reviewing the level of analytics and the forecasting methods being used in the supply chain, understating the fundamentals of supply chain and role of demand modeling, there by proposing a high level framework for supply chain analytics in the context of big data with the knowledge of data science, artificial intelligence, big data echo system and supply chain.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"36 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124512345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Study of Binary Classification Methods for Pulsar Detection","authors":"V. Priyanka, B. Anil, B. R. Dinakar","doi":"10.1109/ICEECCOT43722.2018.9001517","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001517","url":null,"abstract":"Pulsars are fast spinning neutron stars which on observing, emit pulsed appearance of radio waves and other electromagnetic radiation with very high pulse rate. The study of these dense neutron stars provides key insights on various physical occurrences like the plasma behavior in highly dense environments, behaviors of binary system consisting of a pulsar and a black hole and general relativity for the same. This requires a very elaborate dataset of pulsars and their statistical data for both repeatability and experimental accuracy. For this to be implemented, many large-scale pulsar surveys are conducted from time to time. During the process of the survey, manual classification of the data thus obtained, introduces bottleneck both in terms of labor needed and accuracy of classification. Hence statistical learning approaches can be used for the same for autonomous detection of pulsars. The raw dataset obtained for sampling is usually highly unbalanced and this study explores the comparison between the methods for diminishing the effects of unbalanced training datasets on different supervised classifiers to increase the accuracy of classification.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125025443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. R. Raghunandhan, Surendra Shetty, Ganesh Aithal, N. Rakshith
{"title":"Enhanced RSA Algorithm using Fake Modulus and Fake Public Key Exponent","authors":"K. R. Raghunandhan, Surendra Shetty, Ganesh Aithal, N. Rakshith","doi":"10.1109/ICEECCOT43722.2018.9001351","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001351","url":null,"abstract":"In cryptography Public key cryptography plays an important role in the field of data communication. Public key uses two different keys where keys are associated in such a way that, the public key can use to encrypt the data and private key is used to decrypt. RSA is considered as one of the efficient algorithm in public key cryptography. Efficiency of RSA Algorithm mainly depends on how effectively public key components is shared i.e. modulus $n$ and public key exponent e. If these components compromised using mathematical attack, obtaining private key becomes easier job for the intruder. In this paper an enhanced RSA algorithm is proposed to increase the factoring complexity of the public keys, we use fake public key exponent $f$ instead of $e$ and modulus $X$ instead of ‘n’. Results of our scheme overcome the limitations of Integer factorization attack. Paper also gives comparative analysis of the proposed work using standard metrics.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross Layer and Management Plane Integration Approach for Detection and Prevention of Malicious Activities in WSN","authors":"B. M. Devaraju, G. Raju","doi":"10.1109/ICEECCOT43722.2018.9001301","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001301","url":null,"abstract":"Wireless Sensor Networks (WSNs) are the next generation envision and have several applications in military, infrastructure monitoring, healthcare, environment monitoring, manufacturing and Internet of Things (IoT) applications. WSN is basically a collection of sensor nodes that are deployed without infrastructure deployed anywhere, anytime, without administrator and every node works as host and router. Sensor nodes are more susceptible to failure because they are deployed in open areas, may be tampered by intruders. Malicious attacks like, Denial of Service (DoS), Sybil attack, Blackhole/Sinkhole attack, Hello Flood attack, Wormhole attacks may modify sensitive information results in performance degradation. The next emerging technology is WSN with IoT, wherein billions of devices are connected with internet and every day millions of new hackers and malicious activities are identified. Hence it has become essential to propose different approaches and different measurements to identify malicious activities and to avoid them is big challenge in WSN. Several researchers have proposed cross layer design to improve QoS by reducing latency and computation overhead. But these proposed ideas have not been standardized in global level networking. So there is a need for designing security models for various devices and conform National Information Security Framework (NISF) policies. One way to detect and identify malicious activities is through analyzing nodes activities pattern in the network. This paper proposes a cross layer and management plane integration approach for detection and prevention of malicious activities in Wireless Sensor Networks","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123822530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Wireless fNIRS Patch with Short-Channel Regression to Improve Detection of Hemodynamic Response of Brain","authors":"M. Saikia, K. Mankodiya","doi":"10.1109/ICEECCOT43722.2018.9001342","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001342","url":null,"abstract":"The functional near-infrared spectroscopy (fNIRS) utilizes near-infrared (NIR) light sources and light detectors to non-invasively image hemodynamic responses of the brain. The unique advantages of fNIRS over the other existing brain imaging technologies led to widespread adoption of fNIRS in various brain research studies including neurology, neuroscience, clinical psychology, and psychiatry. The fNIRS systems are portable, inexpensive and provide higher temporal resolution for scanning a brain. In this paper, we present a wireless wearable fNIRS patch that has the capability of short channel regression to improve the detection of hemodynamic responses of the brain. The patch has two targeted fNIRS channels and a short-channel. The short-channel measures the background hemodynamic responses explicitly from the extracerebral region. Then it performs a regression process to eliminate background interferences from the targeted fNIRS channels to reduce the influence of the interferences. We have interfaced the patch with our laboratory-developed portable fNIRS controller. The patch and the controller are wearable. The controller is wirelessly connected to a host computer to receive commands from it and to wirelessly transmit measurement data to the host computer for the data processing and visualization. The graphical user interface (GUI) in the host computer helps the user to record and visualize fNIRS data. The experimental results of imaging prefrontal cortex of the brain using the fNIRS patch show that the patch has the potential to reduce unrelated hemodynamic activity from the targeted fNIRS channels.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132599442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}