{"title":"An approach to predict taxi-passenger demand using quantitative histogram on Uber data","authors":"A. Bharathi, S. Prakash","doi":"10.1109/ICACCE46606.2019.9079980","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079980","url":null,"abstract":"The precise prediction of the day to day and monthly transactions is of great value for companies. This information can be beneficial for the companies in analyzing their ups and downs and draw other plans. Moreover, a precise prediction method can optimize the performance of a company. The branch of analytics that deals with prediction is known as predictive analytics. This paper presents the use of data analytics in analyzing the transaction dataset provided by Uber to predict the possible outcomes and the changes to be made. The histograms and heat maps drawn provide us a clear visualization of the dataset and we must predict the rest out of it.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124722587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Energy-Efficient Allocation Technique for Distributing Resources in a Heterogeneous Data Center","authors":"Mohd Mursleen, Yogesh Kothyari","doi":"10.1109/ICACCE46606.2019.9079973","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079973","url":null,"abstract":"Now a days currently there is a lot of power consumption in data centers due to high demand in cloud services like online data storage services, software services on cloud like Google Apps, Sales force and platform as a service on cloud. Due to heavy usage of all these services over the Cloud, now a day's Data Centers are consuming a heavy amount of Energy. This heavy Energy Consumption by data centers is not only including the higher running cost of data centers but it is also effecting the environment inversely. There are basically two ways in which we can reduce energy consumption in Data Centers, first way is by minimising the parameter of data centers while the second method is by exercising an efficiently constructed asset allocation technique to get the optimal balance between energy consumption and performance of the data centers. In this paper, we are dealing with the second approach which is a software based approach i.e. designing an efficient resource allocation technique while the first approach is a hardware based approach. Furthermore, here we will not only deal with homogeneous data centers but we are also considering the heterogeneous data centers. So, our prime focus of this research work is to allocate the resources in homogeneous and heterogeneous data centers in such a manner that energy consumed by data centers usage becomes optimal and energy consumption is reduced without effecting in the performance of data centers. Therefore, for the above we have come up with a novel algorithm toward energy efficiency in such a way that it takes care of scheduling the algorithm fairly while allocating the resources of data centers.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Raghavaraju, T. Ramakrishna, B. Madhav, T. Bhavani
{"title":"A novel study on EBG structured CPW- fed CoM antenna for WiMAX, WLAN applications","authors":"A. Raghavaraju, T. Ramakrishna, B. Madhav, T. Bhavani","doi":"10.1109/ICACCE46606.2019.9079999","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079999","url":null,"abstract":"CM antenna with coplanar wave guide feeding is constructed with the combination of EBG structure for the improvement of bandwidth. DGS is engraving on the ground plane to obtain the EBG features in the proposed antenna model. A complete analysis confers to reflection coefficient, VSWR, impedance radiation pattern, current distribution, gain and efficiency are presented in this work. The depicted model occupies the dimension of 50×50×1.60 mm on FR4 substrate with dielectric constant of 4.3. Aerial operating in the dual band of 1.5-3.6 GHz (GPS, LTE, Bluetooth and Wi-Fi applications) and 4.8-15 GHz (WLAN, X-Band and Satellite communication applications) with bandwidth of 2.10 and 10.20 GHz respectively. To meet gain for this is about 4.80 db and peak Efficiency additional amount of 80% are the key marks of designed model.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130183748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supplier Management and Selection System considering Sustainability for a Thermal Power Heavy Industry","authors":"P. Kathirvel, P. Parthiban","doi":"10.1109/ICACCE46606.2019.9079966","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079966","url":null,"abstract":"An Indian thermal power heavy industry has to focus more on sustainable supply chain activities. To increase the sustainable recitation of a supply chain, the SSCM experts should select their suppliers prudently in relation to their own stratagem. Sustainability supply chain management can be maintained by reducing the influence of the barriers of Economic stability, Social Ethics, and Environmental Conservation. These three factors are called the Triple Bottom Line (TBL) concept of the sustainable supply chain management. The factor is considered from the previous research and the team of experts evaluate the factors and factors are given weights accordingly. The barriers of the economic social and environmental are the cost of implementation, lack of potential to save money, Infrastructure, Absence of incentive policies and lack of preparation, understanding & knowledge, Organizational culture also lack awareness of existing environmental regulations, expertise, and understanding of strategies to address environmental issues etc. This research helps to assess an assortment of the suppliers of the thermal power heavy industry based on their performance of The MCDM tool TOPSIS is used to rank the suppliers in thermal power heavy industry. The research also developing healthy competition among the suppliers and improving performance.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Lakshmi, N. Shankar, K. Maheswari, S. Manivannan
{"title":"Improved Bidirectional Converter for PV System with Battery Storage","authors":"J. Lakshmi, N. Shankar, K. Maheswari, S. Manivannan","doi":"10.1109/ICACCE46606.2019.9079982","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079982","url":null,"abstract":"Solar energy is the most popular renewable energy source in the recent times. The use of solar energy for electricity generation is limited and it's non- continuous availability makes the solar power unreliable for critical applications. These problems can be overcome by using other resources in parallel with the solar energy and making it to operate when the solar power is not available. One such solution includes the usage of Hybrid Energy Storage System along with solar power. HESS has different configurations and includes different resources. Here the battery is used as a backup source along with solar. The battery gets charged during the time when solar power is available and the load is supplied by the battery storage while the solar power is unavailable. This system is discussed in detail in this paper. The power flow in both the direction will be controlled by the bidirectional converter. This paper also discusses the simulated results of this proposed system in detail.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129198056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Hemalatha, S. Yuvaraj, K. Kiruthikaa, V. Viswanathan
{"title":"Automatic Detection of Lung Cancer Identification using ENNPSO Classification","authors":"B. Hemalatha, S. Yuvaraj, K. Kiruthikaa, V. Viswanathan","doi":"10.1109/ICACCE46606.2019.9079963","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079963","url":null,"abstract":"The main source of lung cancer is to gasping the tobacco smoke regularly, which affects around 90% of lung cancers. Cancer cells are to be carried to and from the lungs within the blood or lymph fluid ambience the lung tissue. Early diagnosis and treatment can save life. In this, the image processing techniques have been utilized to identify the lung cancer. Initially, the CT scan image is pre-processed for removing the unwanted signals and smoothing them by employing Improved Kaun Filter (IKF). Subsequently, the preprocessed image is portioned by an Active contour method to get exactness of segmented results. Next, specific features are extracted to raise the anticipated accuracy. At last, the tumour has been categorized by Elman Neural Network (ENN) and weights are optimized with PSO and compared the accuracy results with SVM, RBFN and ANFIS.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robustness Evaluation of Cyber Physical Systems through Network Protocol Fuzzing","authors":"T. Ananda, Gitanjali Simran T, S. T, S. D, R. P.","doi":"10.1109/ICACCE46606.2019.9079995","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079995","url":null,"abstract":"With the technological explosion of Internet of Things(IoT) and the conception of every particle being tied to the Internet, the “security” of these globally connected nodes is critical. The availability and reliability of these networked nodes can be guaranteed by securing the physical nodes and the data associated with them but more importantly by ensuring the network security associated with their communication stack. Thus, in this paper we evaluate the security robustness of the Network protocols associated with these networking capable devices through Fuzzing or corner case checks. Through the Fuzz assessments, we can assess the node behavior when the various applications are under fuzz and establish the security damage/robustness associated with it. This supplies a point of node vulnerability to be fixed before the node connects with a global network.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114357215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-learning services: Insights from Twitter Analytics","authors":"P. Vanitha, Sreejith Alathur","doi":"10.1109/ICACCE46606.2019.9080001","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9080001","url":null,"abstract":"Electronic learning is a formalized teaching-learning service using electronic resources. With the help of Information and Communication Technologies (ICTs), knowledge can be shared via the Internet anywhere, anytime. Although, the massive growth of technologies available, e-learning service may not distribute equally in developing countries like India. The objective of the study is to explore the technological challenges of e-learning services in the Indian context. In the present study, the real-time feedback about the technological challenges is collected directly from Twitter social media. Initially, the tweets were extracted based on the hashtags, and the location-based analysis is performed using geocoding. In this study, various types of technological challenges are identified, and the most influential factor is determined. It gives better results when this research is carried on developing countries like India. The suggestion provided in this research will help to decrease the technological challenges in the e-learning service.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121931085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trigger Event and Hate Content: Insights from Twitter Analytics","authors":"Naganna Chetty, Sreejith Alathur","doi":"10.1109/ICACCE46606.2019.9079952","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079952","url":null,"abstract":"The problematic act damages the target and seeds the fear in the neighborhood. Social media sites are used for planning and coordinating problematic acts. The problematic act is a trigger event which influences hatred feeling. The objective of the paper is to analyze the aftermath of a recent problematic incident in the southern part of the Asian continent from Twitter content. After the problematic incident, citizens used to share their views over social media sites. A total of 48,819 opinions shared through Twitter social media are collected and analyzed using the software developed in the R programming language. The results show hatred against the problematic act through different related emotions. Results also contain more negative tweets which are almost thrice the positive tweets. Fear and anger emotions exhibit a high degree of emotions than the other.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132773171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of E-Mail Spam Classification using different Machine Learning Techniques","authors":"V. Vinitha, D. Renuka","doi":"10.1109/ICACCE46606.2019.9080000","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9080000","url":null,"abstract":"Most of the business and general communication is done through email because of its cost effectiveness. This efficiency leads email exposed to various attacks including spamming. Nowadays spam email is the foremost concern for email users. These spams are used for sending fake proposals, advertisements, and harmful contents in the form of executable file to attack user systems or the link to the malicious websites resulting in the unessential consumption of network bandwidth. This paper elucidates the different Machine Learning Techniques such as J48 classifier, Adaboost, K-Nearest Neighbor, Naive Bayes, Artificial Neural Network, Support Vector Machine, and Random Forests algorithm for filtering spam emails using different email dataset. However, here the comparison of different spam email classification technique is presented and summarizes the overall scenario regarding accuracy rate of different existing approaches.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134398170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}