2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)最新文献

筛选
英文 中文
Lean six sigma approach for global supply chain management using industry 4.0 and IIoT 使用工业4.0和工业物联网的全球供应链管理精益六西格玛方法
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917940
A. Jayaram
{"title":"Lean six sigma approach for global supply chain management using industry 4.0 and IIoT","authors":"A. Jayaram","doi":"10.1109/IC3I.2016.7917940","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917940","url":null,"abstract":"Global Supply Chain Management is the management of supply chains located globally. Quality control methods such as Lean and Six Sigma are used for improving efficiency and quality of production and distribution carried out by global supply chains. Lean Six Sigma eliminates unnecessary processes and defects which can benefit an enterprise from reduced costs and less wastage of resources. Industry 4.0 refers to automation of industries by the exchange of data between the supply chain and logistics. Industrial internet of things (IIoT) is industrial machines connected to the enterprise cloud storage area for data storage as well as data retrieval. Industry 4.0 along with IIoT can make a big revolution in the management of global supply chain. Lean Six Sigma approach in global supply chain using Industry 4.0 and IIoT creates an ideal process flow that is highly optimized as well as perfect and free from defects and wastage. The models proposed in this paper make the supply chain fully autonomous.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122891657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
Logistic regression within DBMS 数据库管理系统中的逻辑回归
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918045
J. Isaac, Sandhya Harikumar
{"title":"Logistic regression within DBMS","authors":"J. Isaac, Sandhya Harikumar","doi":"10.1109/IC3I.2016.7918045","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918045","url":null,"abstract":"The context of this paper is to come up with an analytical query model for data categorization within DBMS. DBMS being the asset for most of the organizations, classification can help in getting better insight and control over the data. Conventionally, classification algorithms like logistic regression, KNN, etc. are applied after exporting the data out of DBMS, using non DBMS tools like R, matrix packages, generic data mining programs or large scale systems like Hadoop and Spark. However, this leads to I/O overhead since the data within DBMS is updated quite frequently and usually cannot be accommodated in the main memory. This paper proposes an alternative strategy, based on SQL and UDFs, to integrate the logistic regression for data categorization as well as prediction query processing within DBMS. A comparison of SQL with user defined functions (UDFs) as well as with statistical packages like R is presented, by experimentation on real datasets. The empirical results show the viability and validity of this approach for predicting the class of a given query.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129008483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Over speed monitoring system 超速监控系统
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918061
R. Kodali, M. Sairam
{"title":"Over speed monitoring system","authors":"R. Kodali, M. Sairam","doi":"10.1109/IC3I.2016.7918061","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918061","url":null,"abstract":"Over Speed is one of the main reasons for increase in the occurrence of accidents nowadays. Many techniques are being used for over speed monitoring. However, these methods require lot of man power. In this paper, we present the design and implementation of a system, which provides a simple way to traffic authorities for monitoring of all the vehicles from the control room itself. This system calculates the speed and GPS coordinates continuously and these GPS coordinates help to find out the area in which the vehicle has been present and the maximum speed allowed in the respective area. The speed and the coordinates of vehicle calculated are continuously stored in a memory card. If the speed of any vehicle exceeds the speed limit, the driver is alerted through a buzzer indicating the same. If the driver still does not drive within the speed limit, an SMS, which contains the vehicle registration number, GPS coordinates at where he exceeded the speed limit, is sent to traffic authorities. Accordingly an over speed ticket can be issued against the same vehicle.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125395122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Autonomous walking stick for the blind using echolocation and image processing 基于回声定位和图像处理的盲人自主手杖
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917927
Akhilesh Krishnan, G. Deepakraj, N. Nishanth, K. M. Anandkumar
{"title":"Autonomous walking stick for the blind using echolocation and image processing","authors":"Akhilesh Krishnan, G. Deepakraj, N. Nishanth, K. M. Anandkumar","doi":"10.1109/IC3I.2016.7917927","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917927","url":null,"abstract":"The smart walking stick, the Assistor, helps visually challenged people to identify obstacles and provide assistance to reach their destination. The Assistor works based on the technology of echolocation, image processing and a navigation system. The Assistor may serve as a potential aid for people with visual disabilities and hence improves their quality of life. There is a lot of work and research being done to find ways to improve life for visually challenged people. There are multiple walking sticks and systems which help the user to move around, indoor and outdoor locations but none of them provide runtime autonomous navigation along with object detection and identification alerts. The Assistor uses ultrasonic sensors to echo sound waves and detect objects. An image sensor is used to identify the objects in front of the user and for navigation by capturing runtime images and a Smartphone app is used to navigate the user to the destination using GPS (Global Positioning System) and maps.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124947124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Blockchain: Future of financial and cyber security 区块链:金融和网络安全的未来
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918009
Sachchidanand Singh, Nirmala Singh
{"title":"Blockchain: Future of financial and cyber security","authors":"Sachchidanand Singh, Nirmala Singh","doi":"10.1109/IC3I.2016.7918009","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918009","url":null,"abstract":"Blockchain is a decentralized ledger used to securely exchange digital currency, perform deals and transactions. Each member of the network has access to the latest copy of encrypted ledger so that they can validate a new transaction. Blockchain ledger is a collection of all Bitcoin transactions executed in the past. Basically, it's a distributed database which maintains a continuously growing tamper proof data structure blocks which holds batches of individual transactions. The completed blocks are added in a linear and chronological order. Each block contains a timestamp and information link which points to a previous block. Bitcoin is peer-to-peer permission-less network which allows every user to connect to the network and send new transaction to verify and create new blocks. Satoshi Nakamoto described design of Bitcoin digital currency in his research paper posted to cryptography listserv in 2008. Nakamoto's suggestion has solved long pending problem of cryptographers and laid the foundation stone for digital currency. This paper explains the concept, characteristics, need of Blockchain and how Bitcoin works. It attempts to highlights role of Blockchain in shaping the future of banking, financial institutions and adoption of Internet of Things(IoT).","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125100810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 185
Amelioration of load balanced gateway selection protocol in integrated Internet-MANET 综合Internet-MANET中负载均衡网关选择协议的改进
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918793
R. Zaman, Humaira M. Alam, K. ur Rahman Khan, A. V. Reddy
{"title":"Amelioration of load balanced gateway selection protocol in integrated Internet-MANET","authors":"R. Zaman, Humaira M. Alam, K. ur Rahman Khan, A. V. Reddy","doi":"10.1109/IC3I.2016.7918793","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918793","url":null,"abstract":"Internetworking of different types of networks is envisaged as one of the primary objectives of the future 5G networks. One such heterogeneous internetworking architecture is the interconnection of Internet and MANET, called Integrated Internet-MANET. Multiprotocol gateways are used to achieve this interconnection. Some of the most important issues in realizing Integrated Internet-MANET are efficient gateway discovery, mobile node registration and gateway load balancing. In this paper, an improvement is proposed to an existing solution which addresses the issues of efficient gateway discovery and load balancing. The proposed approach uses a genetic algorithm to optimize the gateway load balancing protocol. The proposed protocol has been simulated using network simulation tool ns-2. Based on the simulation results, it is observed that the proposed protocol not only delivers better performance than the existing protocol, but is also optimized using the proposed genetic algorithm.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125220028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Linear-time diagram: A set visualisation technique for personal visualisation to understand social interactions over time 线性时间图:一套可视化技术,用于个人可视化,以了解随时间的社会互动
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917971
Mithileysh Sathiyanarayanan, Donato Pirozzi
{"title":"Linear-time diagram: A set visualisation technique for personal visualisation to understand social interactions over time","authors":"Mithileysh Sathiyanarayanan, Donato Pirozzi","doi":"10.1109/IC3I.2016.7917971","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917971","url":null,"abstract":"With the advent of pervasive social networks and social communication media, people are connected all the time and messages arrive endlessly on their devices, generating an enormous quantity of personal content, such as: textual messages, photos, audio clips and videos. However, when an individual desires to go back in the time, recalling or reflecting on what happened months ago about his/her conversation with friends, he/she needs to continuously frenzy scroll over all the past messages and so far there is no visualisation support that can help in recalling personal chats. This work contributes in the emerging field of the Personal Visual Analytics, introducing the Linear-time diagrams, a combination of linear diagram along with a time line, to easily identify “who interacted with whom and what topic” in a particular period of time. Since, there are no specific tools to visualise and represent set relationships (friendships through messages) over time, but there are many well-known set visualisation tools (without time consideration), such as Euler diagrams, Venn diagrams, Linear diagrams, Spherule diagrams etc. This paper merges Linear diagrams for their scalability in representing set relationships and time-series to represent sequence of events occurred over a period of time to glint the novelty. A prototype tool has been developed, using an anonymous Facebook chat log from the wild. We conducted a workshop with social media users to gain insights about the existing social media without visualisation support and how our visualisation aims in supporting it. The outcomes of the preliminary workshop will help us in enhancing the tool with user-interactions and also consider gestalt principles, perceptual and cognitive theories to navigate easily, analyse and interpret data efficiently.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122511316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Survey on workflow scheduling of scientific processes using cloud technology 基于云技术的科学流程工作流调度研究综述
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917992
B. Rani, A. Babu
{"title":"Survey on workflow scheduling of scientific processes using cloud technology","authors":"B. Rani, A. Babu","doi":"10.1109/IC3I.2016.7917992","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917992","url":null,"abstract":"Scientific and research applications, Big data applications work on huge data sets and often comprise of several tasks depending on the application. To execute these applications, Cloud technology is best suitable because of the scalability and elasticity features along with pay according to the usage of Cloud resources. Resource Allocation in a cloud is a significant area in Cloud Computing as the cloud is a collection of software and hardware resources and the resources in the cloud are allocated to the users on a pay for what you use model. It is important to allocate resources in an efficient manner to reduce the cost for user, satisfy the SLA, and cater to the requirements of more number of users. Scheduling and optimization play an important role in resource utilization, faster execution and minimizing the cost incurred in executing these applications. This paper presents the survey on the research done in this area along with the criteria and algorithms selected.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121795128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rough set based feature selection approach for text mining 基于粗糙集的文本挖掘特征选择方法
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917932
N. Sailaja, L. P. Sree, N. Mangathayaru
{"title":"Rough set based feature selection approach for text mining","authors":"N. Sailaja, L. P. Sree, N. Mangathayaru","doi":"10.1109/IC3I.2016.7917932","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917932","url":null,"abstract":"Text can be thought as the combination of characters. In the environment where the size of unstructured text data is hugely more, to process such data by computers is a challenging task. To extract meaningful and useful patterns from the text, some pre-processing methods and algorithms are required. Feature selection or Reduct generation intends to determine a smallest attributes subset which can represent the same knowledge as the original features(attributes) represented it. Rough set theory (RST) is such a mathematical tool, which can be used with tremendous success. Here, In the paper, we proposed a Rough set based approach for feature selection in the Text data set, which fulfil the aim of Text mining. We have taken different sample Text case documents (like biography text data, sample research articles of various domains, news articles from some sources) as input, these files can be in the form of .txt, .pdf etc. or any other format. We have also presented complexity analysis of our proposed algorithm and experimental results on a sample text data sets.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129485850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Digital forensic investigation using subject-based semantic document processing 基于主体的语义文档处理的数字取证研究
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917981
Shraddha S. More, Anita Chaudhari, Brinzel Rodrigues
{"title":"Digital forensic investigation using subject-based semantic document processing","authors":"Shraddha S. More, Anita Chaudhari, Brinzel Rodrigues","doi":"10.1109/IC3I.2016.7917981","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917981","url":null,"abstract":"Digital Forensic is a branch of Forensic science that encompasses the recovery and investigation of digital devices for material mainly related to computer crime. Digital Forensic Investigation is the process of investigating digital devices for the purpose of generating digital evidence related to an incident or a crime under investigation. A proliferation in the amount of crimes and crime related data has lead to a demand in digital forensic investigation tools that helps the investigator to detect, analyze and investigate the criminal data stored on digital devices. This system introduces a subject-based semantic approach that retrieves a set of top documents that are semantically related to each other corresponding to the subject defined by the investigator.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130738634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信