{"title":"Lean six sigma approach for global supply chain management using industry 4.0 and IIoT","authors":"A. Jayaram","doi":"10.1109/IC3I.2016.7917940","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917940","url":null,"abstract":"Global Supply Chain Management is the management of supply chains located globally. Quality control methods such as Lean and Six Sigma are used for improving efficiency and quality of production and distribution carried out by global supply chains. Lean Six Sigma eliminates unnecessary processes and defects which can benefit an enterprise from reduced costs and less wastage of resources. Industry 4.0 refers to automation of industries by the exchange of data between the supply chain and logistics. Industrial internet of things (IIoT) is industrial machines connected to the enterprise cloud storage area for data storage as well as data retrieval. Industry 4.0 along with IIoT can make a big revolution in the management of global supply chain. Lean Six Sigma approach in global supply chain using Industry 4.0 and IIoT creates an ideal process flow that is highly optimized as well as perfect and free from defects and wastage. The models proposed in this paper make the supply chain fully autonomous.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122891657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Logistic regression within DBMS","authors":"J. Isaac, Sandhya Harikumar","doi":"10.1109/IC3I.2016.7918045","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918045","url":null,"abstract":"The context of this paper is to come up with an analytical query model for data categorization within DBMS. DBMS being the asset for most of the organizations, classification can help in getting better insight and control over the data. Conventionally, classification algorithms like logistic regression, KNN, etc. are applied after exporting the data out of DBMS, using non DBMS tools like R, matrix packages, generic data mining programs or large scale systems like Hadoop and Spark. However, this leads to I/O overhead since the data within DBMS is updated quite frequently and usually cannot be accommodated in the main memory. This paper proposes an alternative strategy, based on SQL and UDFs, to integrate the logistic regression for data categorization as well as prediction query processing within DBMS. A comparison of SQL with user defined functions (UDFs) as well as with statistical packages like R is presented, by experimentation on real datasets. The empirical results show the viability and validity of this approach for predicting the class of a given query.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129008483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Over speed monitoring system","authors":"R. Kodali, M. Sairam","doi":"10.1109/IC3I.2016.7918061","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918061","url":null,"abstract":"Over Speed is one of the main reasons for increase in the occurrence of accidents nowadays. Many techniques are being used for over speed monitoring. However, these methods require lot of man power. In this paper, we present the design and implementation of a system, which provides a simple way to traffic authorities for monitoring of all the vehicles from the control room itself. This system calculates the speed and GPS coordinates continuously and these GPS coordinates help to find out the area in which the vehicle has been present and the maximum speed allowed in the respective area. The speed and the coordinates of vehicle calculated are continuously stored in a memory card. If the speed of any vehicle exceeds the speed limit, the driver is alerted through a buzzer indicating the same. If the driver still does not drive within the speed limit, an SMS, which contains the vehicle registration number, GPS coordinates at where he exceeded the speed limit, is sent to traffic authorities. Accordingly an over speed ticket can be issued against the same vehicle.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125395122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akhilesh Krishnan, G. Deepakraj, N. Nishanth, K. M. Anandkumar
{"title":"Autonomous walking stick for the blind using echolocation and image processing","authors":"Akhilesh Krishnan, G. Deepakraj, N. Nishanth, K. M. Anandkumar","doi":"10.1109/IC3I.2016.7917927","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917927","url":null,"abstract":"The smart walking stick, the Assistor, helps visually challenged people to identify obstacles and provide assistance to reach their destination. The Assistor works based on the technology of echolocation, image processing and a navigation system. The Assistor may serve as a potential aid for people with visual disabilities and hence improves their quality of life. There is a lot of work and research being done to find ways to improve life for visually challenged people. There are multiple walking sticks and systems which help the user to move around, indoor and outdoor locations but none of them provide runtime autonomous navigation along with object detection and identification alerts. The Assistor uses ultrasonic sensors to echo sound waves and detect objects. An image sensor is used to identify the objects in front of the user and for navigation by capturing runtime images and a Smartphone app is used to navigate the user to the destination using GPS (Global Positioning System) and maps.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124947124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain: Future of financial and cyber security","authors":"Sachchidanand Singh, Nirmala Singh","doi":"10.1109/IC3I.2016.7918009","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918009","url":null,"abstract":"Blockchain is a decentralized ledger used to securely exchange digital currency, perform deals and transactions. Each member of the network has access to the latest copy of encrypted ledger so that they can validate a new transaction. Blockchain ledger is a collection of all Bitcoin transactions executed in the past. Basically, it's a distributed database which maintains a continuously growing tamper proof data structure blocks which holds batches of individual transactions. The completed blocks are added in a linear and chronological order. Each block contains a timestamp and information link which points to a previous block. Bitcoin is peer-to-peer permission-less network which allows every user to connect to the network and send new transaction to verify and create new blocks. Satoshi Nakamoto described design of Bitcoin digital currency in his research paper posted to cryptography listserv in 2008. Nakamoto's suggestion has solved long pending problem of cryptographers and laid the foundation stone for digital currency. This paper explains the concept, characteristics, need of Blockchain and how Bitcoin works. It attempts to highlights role of Blockchain in shaping the future of banking, financial institutions and adoption of Internet of Things(IoT).","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125100810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Zaman, Humaira M. Alam, K. ur Rahman Khan, A. V. Reddy
{"title":"Amelioration of load balanced gateway selection protocol in integrated Internet-MANET","authors":"R. Zaman, Humaira M. Alam, K. ur Rahman Khan, A. V. Reddy","doi":"10.1109/IC3I.2016.7918793","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918793","url":null,"abstract":"Internetworking of different types of networks is envisaged as one of the primary objectives of the future 5G networks. One such heterogeneous internetworking architecture is the interconnection of Internet and MANET, called Integrated Internet-MANET. Multiprotocol gateways are used to achieve this interconnection. Some of the most important issues in realizing Integrated Internet-MANET are efficient gateway discovery, mobile node registration and gateway load balancing. In this paper, an improvement is proposed to an existing solution which addresses the issues of efficient gateway discovery and load balancing. The proposed approach uses a genetic algorithm to optimize the gateway load balancing protocol. The proposed protocol has been simulated using network simulation tool ns-2. Based on the simulation results, it is observed that the proposed protocol not only delivers better performance than the existing protocol, but is also optimized using the proposed genetic algorithm.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125220028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear-time diagram: A set visualisation technique for personal visualisation to understand social interactions over time","authors":"Mithileysh Sathiyanarayanan, Donato Pirozzi","doi":"10.1109/IC3I.2016.7917971","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917971","url":null,"abstract":"With the advent of pervasive social networks and social communication media, people are connected all the time and messages arrive endlessly on their devices, generating an enormous quantity of personal content, such as: textual messages, photos, audio clips and videos. However, when an individual desires to go back in the time, recalling or reflecting on what happened months ago about his/her conversation with friends, he/she needs to continuously frenzy scroll over all the past messages and so far there is no visualisation support that can help in recalling personal chats. This work contributes in the emerging field of the Personal Visual Analytics, introducing the Linear-time diagrams, a combination of linear diagram along with a time line, to easily identify “who interacted with whom and what topic” in a particular period of time. Since, there are no specific tools to visualise and represent set relationships (friendships through messages) over time, but there are many well-known set visualisation tools (without time consideration), such as Euler diagrams, Venn diagrams, Linear diagrams, Spherule diagrams etc. This paper merges Linear diagrams for their scalability in representing set relationships and time-series to represent sequence of events occurred over a period of time to glint the novelty. A prototype tool has been developed, using an anonymous Facebook chat log from the wild. We conducted a workshop with social media users to gain insights about the existing social media without visualisation support and how our visualisation aims in supporting it. The outcomes of the preliminary workshop will help us in enhancing the tool with user-interactions and also consider gestalt principles, perceptual and cognitive theories to navigate easily, analyse and interpret data efficiently.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122511316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on workflow scheduling of scientific processes using cloud technology","authors":"B. Rani, A. Babu","doi":"10.1109/IC3I.2016.7917992","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917992","url":null,"abstract":"Scientific and research applications, Big data applications work on huge data sets and often comprise of several tasks depending on the application. To execute these applications, Cloud technology is best suitable because of the scalability and elasticity features along with pay according to the usage of Cloud resources. Resource Allocation in a cloud is a significant area in Cloud Computing as the cloud is a collection of software and hardware resources and the resources in the cloud are allocated to the users on a pay for what you use model. It is important to allocate resources in an efficient manner to reduce the cost for user, satisfy the SLA, and cater to the requirements of more number of users. Scheduling and optimization play an important role in resource utilization, faster execution and minimizing the cost incurred in executing these applications. This paper presents the survey on the research done in this area along with the criteria and algorithms selected.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121795128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rough set based feature selection approach for text mining","authors":"N. Sailaja, L. P. Sree, N. Mangathayaru","doi":"10.1109/IC3I.2016.7917932","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917932","url":null,"abstract":"Text can be thought as the combination of characters. In the environment where the size of unstructured text data is hugely more, to process such data by computers is a challenging task. To extract meaningful and useful patterns from the text, some pre-processing methods and algorithms are required. Feature selection or Reduct generation intends to determine a smallest attributes subset which can represent the same knowledge as the original features(attributes) represented it. Rough set theory (RST) is such a mathematical tool, which can be used with tremendous success. Here, In the paper, we proposed a Rough set based approach for feature selection in the Text data set, which fulfil the aim of Text mining. We have taken different sample Text case documents (like biography text data, sample research articles of various domains, news articles from some sources) as input, these files can be in the form of .txt, .pdf etc. or any other format. We have also presented complexity analysis of our proposed algorithm and experimental results on a sample text data sets.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129485850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shraddha S. More, Anita Chaudhari, Brinzel Rodrigues
{"title":"Digital forensic investigation using subject-based semantic document processing","authors":"Shraddha S. More, Anita Chaudhari, Brinzel Rodrigues","doi":"10.1109/IC3I.2016.7917981","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917981","url":null,"abstract":"Digital Forensic is a branch of Forensic science that encompasses the recovery and investigation of digital devices for material mainly related to computer crime. Digital Forensic Investigation is the process of investigating digital devices for the purpose of generating digital evidence related to an incident or a crime under investigation. A proliferation in the amount of crimes and crime related data has lead to a demand in digital forensic investigation tools that helps the investigator to detect, analyze and investigate the criminal data stored on digital devices. This system introduces a subject-based semantic approach that retrieves a set of top documents that are semantically related to each other corresponding to the subject defined by the investigator.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130738634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}