Himanshu Gupta, A. Gupta, S. Gupta, Pranshu Nayak, Tanmay Shrivastava
{"title":"How effective is Black Hole Algorithm?","authors":"Himanshu Gupta, A. Gupta, S. Gupta, Pranshu Nayak, Tanmay Shrivastava","doi":"10.1109/IC3I.2016.7918011","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918011","url":null,"abstract":"Metaheuristics have become popular in solving optimization problems. Recently literature has been flooded with lot of “novel” optimization techniques. These techniques are inspired by various natural phenomenons. One such technique is Black Hole Algorithm, which is inspired by the Black Holes. The author of this technique claim it to be better than Particle Swarm Optimization (PSO), but we have found it contrary. In this paper we compare the Black Hole Algorithm and Particle Swarm Optimizaion(PSO) by evaluating them on standard test suite. The results show that BHA performs very poorly as compared to PSO and thus, falsifying the claim made by authors of BHA.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"10 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114047200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A relative study of task scheduling algorithms in cloud computing environment","authors":"Syed Arshad Ali, Mansaf Alam","doi":"10.1109/IC3I.2016.7917943","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917943","url":null,"abstract":"Cloud Computing is a paradigm of both parallel processing and distributed computing. It offers computing facilities as a utility service in pay as par use manner. Virtualization, self-service provisioning, elasticity and pay per use are the key features of Cloud Computing. It provides different types of resources over the Internet to perform user submitted tasks. In cloud environment, huge number of tasks are executed simultaneously, an effective Task Scheduling is required to gain better performance of the cloud system. Various Cloud-based Task Scheduling algorithms are available that schedule the user's task to resources for execution. Due to the novelty of Cloud Computing, traditional scheduling algorithms cannot satisfy the cloud's needs, the researchers are trying to modify traditional algorithms that can fulfil the cloud requirements like rapid elasticity, resource pooling and on-demand self-service. In this paper the current state of Task Scheduling algorithms has been discussed and compared on the basis of various scheduling parameters like execution time, throughput, makespan, resource utilization, quality of service, energy consumption, response time and cost.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122347304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Al and Cu interconnects using VHDL-AMS and SPICE modeling","authors":"Saurabh Chaturvedi, M. Božanić, S. Sinha","doi":"10.1109/IC3I.2016.7918031","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918031","url":null,"abstract":"This paper compares the transient characteristics of aluminum (Al) and copper (Cu) microstrip line structures. Interconnects are represented using distributed resistance inductance capacitance (RLC) transmission line (TL) model. The equivalent RLC-ladder networks for Al and Cu interconnects are first implemented using VHDL-AMS, and their time-domain simulation responses are compared. For the verification of the results obtained from VHDL-AMS implementation, the process is repeated with SPICE modeling. Both the simulation results are in good agreement.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"39 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122633796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lean six sigma approach for global supply chain management using industry 4.0 and IIoT","authors":"A. Jayaram","doi":"10.1109/IC3I.2016.7917940","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917940","url":null,"abstract":"Global Supply Chain Management is the management of supply chains located globally. Quality control methods such as Lean and Six Sigma are used for improving efficiency and quality of production and distribution carried out by global supply chains. Lean Six Sigma eliminates unnecessary processes and defects which can benefit an enterprise from reduced costs and less wastage of resources. Industry 4.0 refers to automation of industries by the exchange of data between the supply chain and logistics. Industrial internet of things (IIoT) is industrial machines connected to the enterprise cloud storage area for data storage as well as data retrieval. Industry 4.0 along with IIoT can make a big revolution in the management of global supply chain. Lean Six Sigma approach in global supply chain using Industry 4.0 and IIoT creates an ideal process flow that is highly optimized as well as perfect and free from defects and wastage. The models proposed in this paper make the supply chain fully autonomous.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122891657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Logistic regression within DBMS","authors":"J. Isaac, Sandhya Harikumar","doi":"10.1109/IC3I.2016.7918045","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918045","url":null,"abstract":"The context of this paper is to come up with an analytical query model for data categorization within DBMS. DBMS being the asset for most of the organizations, classification can help in getting better insight and control over the data. Conventionally, classification algorithms like logistic regression, KNN, etc. are applied after exporting the data out of DBMS, using non DBMS tools like R, matrix packages, generic data mining programs or large scale systems like Hadoop and Spark. However, this leads to I/O overhead since the data within DBMS is updated quite frequently and usually cannot be accommodated in the main memory. This paper proposes an alternative strategy, based on SQL and UDFs, to integrate the logistic regression for data categorization as well as prediction query processing within DBMS. A comparison of SQL with user defined functions (UDFs) as well as with statistical packages like R is presented, by experimentation on real datasets. The empirical results show the viability and validity of this approach for predicting the class of a given query.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129008483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Over speed monitoring system","authors":"R. Kodali, M. Sairam","doi":"10.1109/IC3I.2016.7918061","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918061","url":null,"abstract":"Over Speed is one of the main reasons for increase in the occurrence of accidents nowadays. Many techniques are being used for over speed monitoring. However, these methods require lot of man power. In this paper, we present the design and implementation of a system, which provides a simple way to traffic authorities for monitoring of all the vehicles from the control room itself. This system calculates the speed and GPS coordinates continuously and these GPS coordinates help to find out the area in which the vehicle has been present and the maximum speed allowed in the respective area. The speed and the coordinates of vehicle calculated are continuously stored in a memory card. If the speed of any vehicle exceeds the speed limit, the driver is alerted through a buzzer indicating the same. If the driver still does not drive within the speed limit, an SMS, which contains the vehicle registration number, GPS coordinates at where he exceeded the speed limit, is sent to traffic authorities. Accordingly an over speed ticket can be issued against the same vehicle.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125395122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akhilesh Krishnan, G. Deepakraj, N. Nishanth, K. M. Anandkumar
{"title":"Autonomous walking stick for the blind using echolocation and image processing","authors":"Akhilesh Krishnan, G. Deepakraj, N. Nishanth, K. M. Anandkumar","doi":"10.1109/IC3I.2016.7917927","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917927","url":null,"abstract":"The smart walking stick, the Assistor, helps visually challenged people to identify obstacles and provide assistance to reach their destination. The Assistor works based on the technology of echolocation, image processing and a navigation system. The Assistor may serve as a potential aid for people with visual disabilities and hence improves their quality of life. There is a lot of work and research being done to find ways to improve life for visually challenged people. There are multiple walking sticks and systems which help the user to move around, indoor and outdoor locations but none of them provide runtime autonomous navigation along with object detection and identification alerts. The Assistor uses ultrasonic sensors to echo sound waves and detect objects. An image sensor is used to identify the objects in front of the user and for navigation by capturing runtime images and a Smartphone app is used to navigate the user to the destination using GPS (Global Positioning System) and maps.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124947124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain: Future of financial and cyber security","authors":"Sachchidanand Singh, Nirmala Singh","doi":"10.1109/IC3I.2016.7918009","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918009","url":null,"abstract":"Blockchain is a decentralized ledger used to securely exchange digital currency, perform deals and transactions. Each member of the network has access to the latest copy of encrypted ledger so that they can validate a new transaction. Blockchain ledger is a collection of all Bitcoin transactions executed in the past. Basically, it's a distributed database which maintains a continuously growing tamper proof data structure blocks which holds batches of individual transactions. The completed blocks are added in a linear and chronological order. Each block contains a timestamp and information link which points to a previous block. Bitcoin is peer-to-peer permission-less network which allows every user to connect to the network and send new transaction to verify and create new blocks. Satoshi Nakamoto described design of Bitcoin digital currency in his research paper posted to cryptography listserv in 2008. Nakamoto's suggestion has solved long pending problem of cryptographers and laid the foundation stone for digital currency. This paper explains the concept, characteristics, need of Blockchain and how Bitcoin works. It attempts to highlights role of Blockchain in shaping the future of banking, financial institutions and adoption of Internet of Things(IoT).","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125100810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Zaman, Humaira M. Alam, K. ur Rahman Khan, A. V. Reddy
{"title":"Amelioration of load balanced gateway selection protocol in integrated Internet-MANET","authors":"R. Zaman, Humaira M. Alam, K. ur Rahman Khan, A. V. Reddy","doi":"10.1109/IC3I.2016.7918793","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918793","url":null,"abstract":"Internetworking of different types of networks is envisaged as one of the primary objectives of the future 5G networks. One such heterogeneous internetworking architecture is the interconnection of Internet and MANET, called Integrated Internet-MANET. Multiprotocol gateways are used to achieve this interconnection. Some of the most important issues in realizing Integrated Internet-MANET are efficient gateway discovery, mobile node registration and gateway load balancing. In this paper, an improvement is proposed to an existing solution which addresses the issues of efficient gateway discovery and load balancing. The proposed approach uses a genetic algorithm to optimize the gateway load balancing protocol. The proposed protocol has been simulated using network simulation tool ns-2. Based on the simulation results, it is observed that the proposed protocol not only delivers better performance than the existing protocol, but is also optimized using the proposed genetic algorithm.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125220028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear-time diagram: A set visualisation technique for personal visualisation to understand social interactions over time","authors":"Mithileysh Sathiyanarayanan, Donato Pirozzi","doi":"10.1109/IC3I.2016.7917971","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917971","url":null,"abstract":"With the advent of pervasive social networks and social communication media, people are connected all the time and messages arrive endlessly on their devices, generating an enormous quantity of personal content, such as: textual messages, photos, audio clips and videos. However, when an individual desires to go back in the time, recalling or reflecting on what happened months ago about his/her conversation with friends, he/she needs to continuously frenzy scroll over all the past messages and so far there is no visualisation support that can help in recalling personal chats. This work contributes in the emerging field of the Personal Visual Analytics, introducing the Linear-time diagrams, a combination of linear diagram along with a time line, to easily identify “who interacted with whom and what topic” in a particular period of time. Since, there are no specific tools to visualise and represent set relationships (friendships through messages) over time, but there are many well-known set visualisation tools (without time consideration), such as Euler diagrams, Venn diagrams, Linear diagrams, Spherule diagrams etc. This paper merges Linear diagrams for their scalability in representing set relationships and time-series to represent sequence of events occurred over a period of time to glint the novelty. A prototype tool has been developed, using an anonymous Facebook chat log from the wild. We conducted a workshop with social media users to gain insights about the existing social media without visualisation support and how our visualisation aims in supporting it. The outcomes of the preliminary workshop will help us in enhancing the tool with user-interactions and also consider gestalt principles, perceptual and cognitive theories to navigate easily, analyse and interpret data efficiently.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122511316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}