{"title":"Power efficient automated lights results to security for underground parking space","authors":"H. N. Vishwas, S. Ullas","doi":"10.1109/ICICI.2017.8365214","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365214","url":null,"abstract":"Efficient power consumption and no power wastage is as good as generation extra power. In bit dark areas like parking lots or stock yards, etc huge amount of electricity is wasted because of unnecessary use of lights throughout the day and night. This paper describes an energy-efficient lighting system for underground and indoor parking lots. This system enables the lights to be used only when required and to be turned off otherwise. It uses Zigbee protocol for data transmission, and PIR i.e. Passive Infrared sensors for motion detection.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132277911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automating anomaly detection for exploratory data analytics","authors":"Karun Thankachan","doi":"10.1109/ICICI.2017.8365228","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365228","url":null,"abstract":"This paper discusses a design to automate the process of exploratory data analysis with an emphasis on outlier and anomaly detection. The paper discusses the domain of exploratory data analysis, the complexity involved in automating it and a solution leveraging the latest advances in computing to meet this. The solution details a framework that can accept data, understand the structure and type of variables, extract important variables and detect outliers or anomalies for understanding process bottlenecks. It takes advantage of big-data technologies and distributed computing (Hadoop and Spark) to make feasible the task of carrying out multiple lines of analysis and using intermediate results to drive analysis towards the desired goal. Statistical methods and visual data analytics form the core of the framework helping to automate exploratory data analysis, reducing time and focusing on the most valuable areas of concern in the data.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133566032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy based task prioritization and VM migration of deadline constrained tasks in cloud systems","authors":"R. Kulkarni, S. B. Patil, N. Balaji","doi":"10.1109/ICICI.2017.8365382","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365382","url":null,"abstract":"In the past few years Cloud Computing has become one of the prominent areas of research supporting huge number of distributed applications. Cloud computing can be treated as a way of having utility computing which provides large amount of resources with the help of service providers. There exists a Service Level Agreement (SLA) between cloud service provider and service requester. Cloud being a virtualized environment provides Virtual Machines as processing elements. The workflow with number of tasks will be submitted to cloud by end users. These tasks will be run on VMs for completion of given job. For real time tasks meeting of deadlines is the Quality of Service (QOS) requirement. In this paper we have used the fuzzy logic based approach to improvise the performance of dead line constrained tasks. Fuzzy logic has been applied at two levels, first at the level of assigning priorities to jobs and second on deciding the VM migrations based on the overloaded situation. Over loading of VMs is a common situation in cloud as resources are shared among multiple users. With the virtualization technology, hardware resources of a physical machine are shared among various processing elements i.e. VMs. This resource sharing results in uncertain performance of Virtual Machines because of resource interference between VMs. In this paper fuzzy logic based approach was chosen because it provides a way to represent uncertainty in the dynamic environments like cloud using smaller search areas. With the usage of fuzzy logic it is possible to bring in the performance improvement and hence to improve the quality of service (QOS) as a part of Service level agreement.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116532846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hand gesture recognition using shape and texture evidences in complex background","authors":"D. Vishwakarma","doi":"10.1109/ICICI.2017.8365354","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365354","url":null,"abstract":"Hand Gesture recognition system is a process involving classifying the given gesture of the hand portion. This paper presents a technique for the recognition of hand gesture from the 11 different static gestures taken from NUS hand posture dataset. Hand gesture detection in the complex background is seen as a challenging task. The purpose of this paper is to study and develop a method for the efficient detection and classification of hand gestures in the complex background. Skin similarity measure is used to detect the hand in complex background hand gesture image. The whole of the image is divided into two classes one is hand, and other is background. Subsequently, shape and texture features are extracted from the gestures which form the basis of recognition of the hand gesture.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121804185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient over sampled approach for handling imbalanced data using diversified distribution","authors":"G. Shobana, B. Battula","doi":"10.1109/ICICI.2017.8365232","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365232","url":null,"abstract":"Data mining is the process of finding unknown relations from the databases. In Data mining, classification is the branch of learning which deals with the labeled instances. The existing classification algorithms are not efficient on imbalance datasets. In this paper, we propose a novel algorithm known as Over Sampling using Diversified Distribution (OSDD), to overcome the problem of class imbalance learning. The OSDD algorithm identifies the unique diversified distributions for efficient oversampling. The experimental results suggest that the proposed approach performs better than the compared approach in terms of AUC, precision, recall and f-measure.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122147887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-off control based multi-frequency multi-load inverter configuration for induction cooking application","authors":"S. Porpandiselvi, P. S. Kumar","doi":"10.1109/ICICI.2017.8365350","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365350","url":null,"abstract":"Multiple load induction cooking application is in much demand today. This paper presents a Full bridge inverter operated at multiple frequencies for powering multiple induction heating loads. ADC control and PDM are employed. Three induction cooking loads are used. Each induction cooking load and one resonant capacitor forms a series resonant circuit. Two series resonant load circuits are simultaneously powered in one half cycle and another load is powered during next half cycle. Each load is operated at a constant frequency. Independent load power control is provided. The operation of the proposed inverter and simulation results are presented.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129616685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic monitoring and control of shrimp aquaculture and paddy field based on embedded system and IoT","authors":"P. Sneha, V. Rakesh","doi":"10.1109/ICICI.2017.8365307","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365307","url":null,"abstract":"Aquaculture is the farming of aquatic organism in natural or controlled marine or freshwater environments. The real-time monitoring of environmental parameters are very important for both shrimp aquaculture and paddy farming. Here, an electronic system is proposed for the efficient monitoring and effective control of different environmental parameters related to the paddy field and shrimp aquaculture. The proposed system is implemented as an embedded system to monitor and control the important environmental parameters with the help of sensors and actuators. A set of different types of sensors are placed in the cultivation field and each of them are connected to a common microcontroller board built on an Arduino UNO board. The micro-controller will monitor the sensor values and these real-time values are shared to a data logging system implemented on a Raspberry Pi based single board computer. The real-time sensor values can be logged into the SD card of the Raspberry Pi. The actuators such as pump and aerator will be turned on and off automatically by the Raspberry Pi in accordance with the threshold values of different environmental parameters. Moreover, the farmer is also given a facility to control the pumps and aerators through a latest trend in embedded system technology called the Internet of Things(IoT). The farmers can use a social media open-source Android app called Telegram for monitoring and controlling the system. Also, the real-time temperature and humidity values from the sensors are validated by using the information collected from a weather forecasting website. If any abnormality in the environmental parameters are observed, the system will notify the farmer by generating alert SMSs through a web-service application called Twilio. The installation of such a system in the paddy field will definitely help the farmers to increase the yield in a better environmental condition.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129724927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis of radix-2, radix-4, radix-8 CORDIC processors","authors":"J. Rudagi, S. Subbaraman","doi":"10.1109/ICICI.2017.8365377","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365377","url":null,"abstract":"Digital Signal Processing is widely used in number of data streaming applications. The analytical treatment of all DSP algorithms involve basic arithmetic operations like multiplication and division besides the transcendental functions viz. trigonometric, inverse trigonometric, logarithmic, exponential etc. Generally used software solutions for digital implementation of these products are table look up or Taylor series expansion, but these require large memory and calculation become tedious. Coordinate rotational Digital Computer is one such technique which uses just shift and add arithmetic to implement different functions. By varying few simple parameters, it can be used to efficiently implement trigonometric, logarithmic, exponential function etc. Since it uses only shift and add arithmetic, VLSI implementation of such an algorithm is achievable. Radix-2 CORDIC Processor requires n iteration for n bit input data, so the latency is large. So to reduce the latency higher radix i.e. radix-4 and radix-8 can be employed, which reduces the number of iterations from n/2 to n/4. It is observed from the simulation and synthesis result that radix-8 is more energy efficient and gives high throughput compared to that of radix-2 and radix-4 CORDIC architectures with extra area overhead.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"422 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124430338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. K. Tiwari, Rakesh Ranjan, Mirza Nemath Ali Baig, E. Sravya
{"title":"Power gating technique for reducing leakage power in digital asynchronous GasP circuits","authors":"R. K. Tiwari, Rakesh Ranjan, Mirza Nemath Ali Baig, E. Sravya","doi":"10.1109/ICICI.2017.8365345","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365345","url":null,"abstract":"There are multiple methods to reduce power consumption of digital circuits one of them is power gating. This paper introduces a new Power Gating technique for the GasP family of asynchronous circuits to achieve power savings. Large amount of power utilization in digital circuits is due to leakage current, as sub threshold conduction, junction leakage, and tunneling leakage through gate oxide. As per result from experiment, it is found that power gating is the most effective method to reduce sub threshold leakage. In power, gating there is a PMOS, a NMOS transistor is used to provide virtual power supply to block which is known as Virtual VDD and Virtual GND. NMOS, and PMOS transistor is known as sleep transistors. The power control logic turns on the power in anticipation of the receiving signal. The power control logic turns off the power when the circuit block is idle because either it is empty or pipeline is obstructed. GasP circuit make possible power gating is used in each stage. A latch is used in this article for storing the data coming from previous stage. This latch is power efficient because it drives only when necessary. It preserve its output and permits power gating.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121224519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative study of individual and ensemble methods of classification for credit scoring","authors":"Pradeep Singh","doi":"10.1109/ICICI.2017.8365282","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365282","url":null,"abstract":"Credit Scoring is the primary method for classifying loan applicants into two classes, namely credible payers and defaulters. In general, credit score is the primary indicator of creditworthiness of the person. This credit scoring technique is used by banks and other money lenders to build a probabilistic predictive model, called a scorecard for estimating the probability of defaulters. In the current global scenario, credit scoring is a major tool for risk evaluation and risk management for all the existing and emerging economies. With the introduction of Basel II Accord, Credit scoring has gained much significance in retail credit industry. In this paper, we performed an extensive comparative in order to classify the credit scoring and identification of best classifier. Furthermore, we used two different categories of classifiers i.e. individual and ensemble. Identification of optimal machine-learning methods for credit scoring applications is a crucial step towards stable creditworthiness of the person. Different parameters Accuracy, AUC, F-measure, precision and recall are used for the evaluation of the results.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122518886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}