2017 International Conference on Intelligent Computing and Control (I2C2)最新文献

筛选
英文 中文
Energy-performance trade-off through restricted virtual machine consolidation in cloud data center 通过云数据中心中受限的虚拟机整合来权衡能源性能
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321783
S. Shaw, J. Kumar, A. Singh
{"title":"Energy-performance trade-off through restricted virtual machine consolidation in cloud data center","authors":"S. Shaw, J. Kumar, A. Singh","doi":"10.1109/I2C2.2017.8321783","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321783","url":null,"abstract":"Cloud, the current boom in information and communication technology, has forced the new organizations to think twice before setting up their own infrastructure as it can be rented totally on pay-as-you-go basis from the Cloud Service Providers (CSP). However the large amount of electrical energy consumed by cloud data centers creates one of the major hindrances in the advancement of cloud by increasing the operational costs. It also affects the environment by the emission of carbon dioxide. These challenges motivate the researchers to develop algorithms that can minimize consumption of energy in cloud data center. VM consolidation is one of such methods that saves energy by increasing total count of inactive servers. But its effect on the overall cloud performance is a bit negative. The average response time of the jobs increases since the workload is distributed on lesser number of active servers. So to maintain the energy-performance trade-off VM consolidation must be done in a restricted manner. The paper has proposed a novel approach of adding a constraint to the existing VM consolidation technique to avoid unnecessary VM migration. It saves energy by eliminating the repeated migration of the same VM. We have also proposed heuristics for virtual machine selection algorithm. CloudSim tool is used to simulate the proposed algorithms. Results show that they significantly decrease the consumption of energy and also fulfill the service-level agreement (SLA).","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127288403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and fabrication of a 4 Degree of Freedom (DOF) robot arm for coconut harvesting 四自由度椰子收获机械臂的设计与制造
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321925
S. Parvathi, S. Selvi
{"title":"Design and fabrication of a 4 Degree of Freedom (DOF) robot arm for coconut harvesting","authors":"S. Parvathi, S. Selvi","doi":"10.1109/I2C2.2017.8321925","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321925","url":null,"abstract":"Production of coconut plays an essential part in the economy of India. The coconuts are produced traditionally in the states of Kerala, Tamil Nadu, Karnataka and other regions of Indian territories. The marginal increase in the yield and production rate of coconut gives an opportunity to apply robotics in the coconut harvesting process to do the harvesting trouble free. The development of robotic harvester can overcome the difficulties such as lack of climbing labours and the operational, safety problems in availing manual climbers. The coconut growers and farmers are facing practical difficulties in coconut harvesting because of the height of the tree. Hence development of an automated coconut harvesting machine is required for harvesting of coconut to avoid manual climbing, death and severe injuries on climbers. Based on this idea, a four Degree Of Freedom (DOF) robot arm is designed using Inverse Kinematics calculations and from that design a model is fabricated to do trial operations.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134128840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Review on fraud detection methods in credit card transactions 信用卡交易欺诈检测方法综述
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321781
K. Modi, Reshma Dayma
{"title":"Review on fraud detection methods in credit card transactions","authors":"K. Modi, Reshma Dayma","doi":"10.1109/I2C2.2017.8321781","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321781","url":null,"abstract":"Cashless transactions such as online transactions, credit card transactions, and mobile wallet are becoming more popular in financial transactions nowadays. With increased number of such cashless transaction, number of fraudulent transactions are also increasing. Fraud can be distinguished by analyzing spending behavior of customers (users) from previous transaction data. If any deviation is noticed in spending behavior from available patterns, it is possibly of fraudulent transaction. To detect fraud behavior, bank and credit card companies are using various methods of data mining such as decision tree, rule based mining, neural network, fuzzy clustering approach, hidden markov model or hybrid approach of these methods. Any of these methods is applied to find out normal usage pattern of customers (users) based on their past activities. The objective of this paper is to provide comparative study of different techniques to detect fraud.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125034470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Heart disease prediction using data mining techniques 使用数据挖掘技术预测心脏病
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321771
Abhishek Rairikar, V. Kulkarni, V. Sabale, H. Kale, A. Lamgunde
{"title":"Heart disease prediction using data mining techniques","authors":"Abhishek Rairikar, V. Kulkarni, V. Sabale, H. Kale, A. Lamgunde","doi":"10.1109/I2C2.2017.8321771","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321771","url":null,"abstract":"The healthcare industry collects large amounts of Healthcare data, but unfortunately not all the data are mined which is required for discovering hidden patterns and effective decision making. We propose efficient genetic algorithm with the back propagation technique approach for heart disease prediction. This paper has analyzed prediction systems for Heart disease using more number of input attributes. The System uses medical terms such as Gender, blood pressure, cholesterol like13 attributes to predict the likelihood of patient getting a Heart disease.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132328043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 148
Renewable energy source allocation of air-conditioner using fuzzy logic 基于模糊逻辑的空调可再生能源分配
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321813
K. Ravindra, M. Rao, V. Chaitanya
{"title":"Renewable energy source allocation of air-conditioner using fuzzy logic","authors":"K. Ravindra, M. Rao, V. Chaitanya","doi":"10.1109/I2C2.2017.8321813","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321813","url":null,"abstract":"The per capita consumption of power in India is insufficient compared to other developed countries in the world. Hence, the only way is the optimal utilization of available energy sources. But the difference between production and consumption of electrical energy, during summer is very high, due to large utilization of cooling machines like Air Conditioner, Air Coolers. In such case a Software industry, like BPO call center or any office with large server and many systems need to have a 24 hour working Air Conditioner. This leads to huge power consumption. Conservative measures need to be initiated and implement to decrease this gap. To restrain this situation the concept of DSM has begun in power system planning and management. Therefore this paper included Fuzzy logic applied to AC which results to calculate the actual hourly turn off period and reduction in energy consumption. By the optimal consumption of electrical power results increase saving by reducing the electricity bill and reduce the over load on live grid during peak hours and also calculate the cost of savings and payback period for the return of investment. In this paper, solar energy is used to run air conditioner. The cost of saving and payback period is calculated by considering only Photo Voltaic (PV) and Photo Voltaic with fuzzy controller. Results proved that usage of PV with fuzzy controller has better annual saving and lower pay back period compared with only considering PV.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121588326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance prediction using modified clustering techniques with fuzzy association rule mining approach for retail 基于改进聚类技术和模糊关联规则挖掘方法的零售性能预测
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321777
C. Ezhilarasan, S. Ramani
{"title":"Performance prediction using modified clustering techniques with fuzzy association rule mining approach for retail","authors":"C. Ezhilarasan, S. Ramani","doi":"10.1109/I2C2.2017.8321777","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321777","url":null,"abstract":"Clustering a group of data based on the related components and its similarity, using fuzzy association rule mining is a key to implement data mining in Soft Computing. Traditional way of clustering is only one object is assigned to a cluster, when it is overlapped and had more cluster to an existing object then fuzzy logic is used. Here Modification in the criteria value for membership value of clustering point of an object. Proximity measure is applied in Box metric equation. An analysis is made on retail database this makes better enhancing way to predict the sale and performance based on association rule mining using fuzzy model. The category has been selected in different number of products grouping the products based on the need from customer and Integration of Apriori Model to multi membership and multiple support approach for sale performance prediction.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116940773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Blockchain: The perfect data protection tool 区块链:完美的数据保护工具
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321932
Arpita Nayak, Kaustubh Dutta
{"title":"Blockchain: The perfect data protection tool","authors":"Arpita Nayak, Kaustubh Dutta","doi":"10.1109/I2C2.2017.8321932","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321932","url":null,"abstract":"Blockchain is a technology that is based on Bitcoin cryptocurrency. It is a technology for decentralizing transaction and managing data. Immense research and deep thinking has gone into conceptualizing blockchain since the time it was first showcased by Satoshi Nakamoto in 2008. The growing interest among researchers and technologists is the central attribute of blockchain that provides a high level of security, anonymity and data integrity without any intervention from third party who is in control of the transactions. Here in this study we have carried out through a well-defined study with the sole aim of collecting all relevant research areas and technologies on Blockchain Technology. With Blockchain becoming future in transactions in financial sector, it also comes with its own burden of risks. But since it has the potential to revolutionize the existing technology, it feels right to take the plunge[1].","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124162574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Homomorphic encryption-state of the art 同态加密——最先进的技术
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321774
M. Mohan, Kavitha Devi, Jeevan Prakash
{"title":"Homomorphic encryption-state of the art","authors":"M. Mohan, Kavitha Devi, Jeevan Prakash","doi":"10.1109/I2C2.2017.8321774","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321774","url":null,"abstract":"Homomorphic Encryption has become a viable method for privacy preservation. It basically deals with the computations of encoded data. Homomorphic encryption scheme allows operations on encrypted data which, when decrypted will provide the same results as we performed directly on the raw data. Certain cryptographic algorithms having the homomorphic property. A detailed survey is carried out on the various homomorphic encryption scheme based on the parameter involved, the encryption decryption mechanisms, their hammerphic properties, security considerations etc. The encryption methods with homomorphic property are much suitable for applications require data privacy and security.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115340195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Identification of artificially ripened fruits using smart phones 利用智能手机识别人工成熟的水果
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321857
S. Maheswaran, S. Sathesh, P. Priyadharshini, B. Vivek
{"title":"Identification of artificially ripened fruits using smart phones","authors":"S. Maheswaran, S. Sathesh, P. Priyadharshini, B. Vivek","doi":"10.1109/I2C2.2017.8321857","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321857","url":null,"abstract":"Health is one the most vital aspects that is of greater concern to most of the human beings at present days. To keep people healthier they intake a lot of fruits which contains more amount of nutrition and helps them to remain fit. Health benefits are provided with the intake of fruits and people who regularly intake fruits are expected to have minimized risk of chronic diseases. The Nutrients provided by the fruits are vital for proper maintenance of the body. But those fruits nowadays are ripened through some artificial means like usage of chemicals like calcium carbide as ripening agent which might even cause cancer. An important news that flashes during the mango seasons in television is that the fruit markets contain artificially ripened fruits which is extremely hazardous to health. Artificial ripening of mangoes using calcium carbide was the important fact that was being displayed in the news. Despite repeated warnings, raids and seizures, chemically ripened fruits are flooding the market. According to health officials, the consumption of mangoes ripened using calcium carbide leads to various harmful effects like vomiting, diarrhoea, ulcers of throat and abdomen, general weakness, and sometimes damage of eye permanently and breathing shortness. To avoid such ill effects the consumers have to be careful in buying the mangoes, find out the artificially ripened mangoes. Finding out the artificially ripened fruits is difficult with human eye observation. To aid the detection we have developed a device which uses image processing to find the artificially ripened mangoes. The proposed device gets an input image of mango under test and compares the features (histogram values) with a naturally ripened one and detects fruits which are ripened artificially. This method makes usage of the Smartphone which runs android application that is installed in it and the image processing is executed to detect the artificially ripened fruits. The proposed system has an efficiency of 91% in the identification of the fruits ripened artificially.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123727280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Efficient approach for complex video description into english text 一种高效的复杂视频描述方法
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321778
V. Wankhede, R. Kagalkar
{"title":"Efficient approach for complex video description into english text","authors":"V. Wankhede, R. Kagalkar","doi":"10.1109/I2C2.2017.8321778","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321778","url":null,"abstract":"Human activity and role recognition play an important part in complex event understanding. This paper present a system to automatically generate natural language descriptions from complex videos. The system consists of mainly two parts training and testing. The first part is training section in which the complex videos are trained by storing its features, subject, verb, and objects, tense (past tense, future tense or present tense), and actual description of video into the database. In testing part, the testing video is taken as an input and after applying all video processes and classified using SVM classifier, the grammatically correct description is generated using NLP (Natural Language) processing. The video frames are processed through Gaussian and Canny edge detection. Further features of every frame of video is detected by using SIFT algorithm.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125371661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信