2015 International Conference on Green Computing and Internet of Things (ICGCIoT)最新文献

筛选
英文 中文
Performance analysis of DFS based ordered walk learning routing protocol in MANET MANET中基于DFS的有序行走学习路由协议性能分析
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380456
Balram Swami, Ravindar Singh
{"title":"Performance analysis of DFS based ordered walk learning routing protocol in MANET","authors":"Balram Swami, Ravindar Singh","doi":"10.1109/ICGCIOT.2015.7380456","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380456","url":null,"abstract":"Mobile Ad-hoc is the most attractive area of research because of its dynamic topology and mobile environment of network. It is a structure less, self adjustable, dynamic network. Routing is the main challenging in MANET because of its nature. AODV is reactive routing protocol which is based on Breadth first search and it uses flooding. DSDV is a proactive routing protocol which maintains a routing table which contains routing information and every node forward the updates or complete updated table to all of its neighbor nodes. In this paper we are compare these well known MANET routing protocol with Ordered walk learning routing protocol. OWL is also a reactive routing protocol but it uses DFS in place of BFS and it does not flood the whole network. OWL can be used efficiently for small scale networks. Simulation Results show that OWL can perform comparable with well known MANET routing protocols (e.g. AODV and DSDV).","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127132482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Internet of everything smart environment 万物互联智能环境
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380668
Siffi Singh, Kirti Mittal
{"title":"Internet of everything smart environment","authors":"Siffi Singh, Kirti Mittal","doi":"10.1109/ICGCIOT.2015.7380668","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380668","url":null,"abstract":"The Internet of Things (IoT) poses completely new challenges when compared to the traditional Internet which cannot be faced if the involved objects are just traditional “smart” objects. IoT technologies improve our lives, but along with those benefits bring the real responsibility of securing the systems which have now incorporated a huge amount of data and the ability to control systems across the Internet. In this framework, the key function is the ability of acquiring personal information (i.e., human factors) simultaneously with the information from the social and physical context that constitutes the environment. Hence, in this paper we have tried to bring forward some new and efficient technologies that will help in security of the data and of the individual in a way that has not been thought yet in this world of things.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125392256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Restaurant recommender system based on psychographic and demographic factors in mobile environment 移动环境下基于心理和人口因素的餐厅推荐系统
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380592
R. Katarya, O. Verma
{"title":"Restaurant recommender system based on psychographic and demographic factors in mobile environment","authors":"R. Katarya, O. Verma","doi":"10.1109/ICGCIOT.2015.7380592","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380592","url":null,"abstract":"Today the number of smart phone users is approximately 1.6 billion and with drastic improvement in internet technology, the way information is accessed and used is changed completely. Recommendation systems filter and recommend only relevant data to the user using different filtering techniques. Restaurant recommendation is one of the latest research area which requires further effort. In this paper, a new model is introduced for the restaurant recommendation which uses first psychographic attributes where lifestyle, interest and personality of an individual can be predicted based on mobile usage pattern, second demographic attributes such as age, gender etc. and third current location. We have verified over results using standard statistical metrics like root mean square or variance.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125615183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Real-time prediction of information search channel using data mining techniques 利用数据挖掘技术实时预测信息搜索通道
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380595
Gaurav Khatwani, Praveen Ranjan Srivastava
{"title":"Real-time prediction of information search channel using data mining techniques","authors":"Gaurav Khatwani, Praveen Ranjan Srivastava","doi":"10.1109/ICGCIOT.2015.7380595","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380595","url":null,"abstract":"One of the biggest challenges associated with using the Internet as a real-time marketing vehicle concerns digital media fragmentation. The vast amount of potential media sources and platforms that are available to marketers entails that it can be very difficult to formulate a succinct strategy through which they can interact with the existing and potential customers. While a large number of businesses typically use consumer's previous actions as a means of understanding their information search behavior, very little is understood about how demographics influence information search and the use of various digital platforms. Previous research has focused on identifying these demographic factors but, as yet, no one has developed a real-time model that is capable of predicting consumer's information search preferences. This research considers four information search channels: personal, marketer-dominated, neutral and experiential channels, and assesses the extent to which existing classification techniques, such as classification and regression tree, neural networks and support vector machines, can be effectively employed to forecast individual's search preferences according to their demographic context. It is envisaged that the development of a method that can accurately forecast search behavior will help organizations to ensure that they allocate marketing resources in an efficient and effective manner.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126740875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A knowledge based Indian agriculture: With cloud ERP arrangement 基于知识的印度农业:与云ERP安排
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380484
Tameem Ahmad, Shamim Ahmad, Mohammed Jamshed
{"title":"A knowledge based Indian agriculture: With cloud ERP arrangement","authors":"Tameem Ahmad, Shamim Ahmad, Mohammed Jamshed","doi":"10.1109/ICGCIOT.2015.7380484","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380484","url":null,"abstract":"The knowledge and experiments' sharing can inculcate a healthy competitive environment in agriculture sector across the country. In this age of high usage of mobile devices by rural India the problem of absence of requisite extension services to farming community can easily be dealt by launching a two-way interactive value creating service through mobile devices. Agriculturists is India, by and large, are dispersed, unorganized, illiterate, deficient in resources and run a high risk of natural calamities, market uncertainties and price crashes. Pooling the traditional and scientific wealth of knowledge from across agricultural domains into a cloud based ERP (Enterprise Resource Planning) will develope an e-agriculture Resource Planning platform for the empowerment of agricultural fraternity. The paper emphasizes the need of an externally hosted cloud computing platform to manage full utilization and application of appropriate knowledge and technology by the users across the country. The availability of ERP-cloud based integrated e-agricultural setup for accessing all types of desired information will benefit them with customised solutions across geographical locations. The study proposes an application for Usage and Execution Behaviour `UnEB' to facilitate the end users taking suitable steps timely to maximize their returns from agricultural and allied activities. The proposed application may be integrated with ERP-cloud to recommend quality decisions based on GIS (geographic information system), remote sensing using smartphones and feedback mechanism. The intended system may lead to improving the farming practices, overcoming the crises and developing an upgraded agricultural system for the country.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124197579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Spectrum hand off in Cognitive Radio Network using Dynamic Threshold 基于动态阈值的认知无线网络频谱切换
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380665
S. Bhushan, R. S. Bali, Akwinder Kaur
{"title":"Spectrum hand off in Cognitive Radio Network using Dynamic Threshold","authors":"S. Bhushan, R. S. Bali, Akwinder Kaur","doi":"10.1109/ICGCIOT.2015.7380665","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380665","url":null,"abstract":"The scarcity of spectrum is increasing day by day due to the spectrum scarcity faced by the wireless based service providers led to high congestion levels. The main reason that leads to inefficient utilization of the radio spectrum is the spectrum licensing system itself. If the allocated radio spectrum is not used by primary users, it cannot be utilized by secondary users. Due to this static and rigid allocation, wireless systems have to work only on a dedicated band of spectrum and cannot change the transmission band with the change in the environment. For example, if one channel of spectrum band is heavily used, the wireless system cannot change to work on another more lightly used band. To address these critical problems, the FCC recently approved the use of unlicensed devices in licensed bands. Consequently, dynamic spectrum access techniques are proposed to solve these current spectrum inefficiency problems. The key enabling technology for dynamic spectrum access techniques is CR networking which allows intelligent spectrum-aware devices to opportunistically use the licensed spectrum bands for transmissions. In Cognitive Radio Network(CRN) during the transmission period of a secondary connection, multiple interruptions from the primary users result in multiple spectrum hand offs and the need of determining a set of target channels for spectrum hand offs. A suitable hand off scheme has been proposed whose objective is to help cognitive user to find suitable channel to resume the unfinished transmission as quickly as possible. Dynamic Threshold approach is an important and one of the most authentic approaches in studying, modeling and analyzing the cognitive interaction process. The simulation results of the proposed scheme show that the model works well in increasing the throughput and packet delivery ratio in Cognitive Radio Networks.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124343897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Search model for searching the evidence in digital forensic analysis 数字取证分析中证据检索模型
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380677
Sweedle Mascarnes, P. Lopes, P. Sakhare
{"title":"Search model for searching the evidence in digital forensic analysis","authors":"Sweedle Mascarnes, P. Lopes, P. Sakhare","doi":"10.1109/ICGCIOT.2015.7380677","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380677","url":null,"abstract":"Digital forensics investigation involves the examination of the digital devices to gather evidence associated with the crime. The amount of data that needs to be processed in a typical forensic investigation today is immense and extremely diverse. Thus finding relevant evidence related to the case is difficult and time-consuming. This research work aims in designing a search model that hunts pertinent evidence by analysing large amount of data for faster and more effective processing in criminal investigation. The proposed work allows the investigator to semantically cluster the data collected from digital devices based on the keyword specified by the investigator or suggested by system. Experiments were conducted on dummy crime dataset to test the accuracy and the scalability of the proposed system. Experimental results proved that subject suggestion improved the accuracy and thus speeds up the process of searching the evidence.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122629744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Educational Data Mining techniques and their applications 教育数据挖掘技术及其应用
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380675
John Jacob, Kavya Jha, Paarth Kotak, Shubha Puthran
{"title":"Educational Data Mining techniques and their applications","authors":"John Jacob, Kavya Jha, Paarth Kotak, Shubha Puthran","doi":"10.1109/ICGCIOT.2015.7380675","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380675","url":null,"abstract":"Educational Data Mining (EDM) is a learning science, and an emerging discipline, concerned with analyzing and studying data from academic databases. Through the exploration of these large datasets, using various data mining methods, one can identify unique patterns which will help study, predict and improve a student's academic performance. This paper elaborates a study on various Educational Data Mining techniques and how they could be used for the benefit of all the stakeholders in the educational system. Correlation is used to see if a variation in one variable results in a variation in the other. Decision trees give possible outcomes and are used to predict students' performance in this study. Regression analysis is used in the construction of a model involving a dependent variable and multiple independent variables; if the model is satisfactory, then the value of dependent variable is determined using the values of the independent variables. Clustering finds groups of objects so that objects that are in a cluster are more like each other than to objects in another cluster, helping in arranging items under consideration; clustering would help in analyzing the job profiles that would be suited for each student.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131932836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Wireless network security: Tough times 无线网络安全:艰难时期
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380613
Utkarsh Wadhwa
{"title":"Wireless network security: Tough times","authors":"Utkarsh Wadhwa","doi":"10.1109/ICGCIOT.2015.7380613","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380613","url":null,"abstract":"Since, the development of the IEEE standard for Wireless network 802.11, it has faced many challenges and issues, continuous development of the exploits have left the wireless network unsecure and compromisation on the CIA triad i.e. Confidentiality, Integrity and the Availability of the 802.11 networks. Although we know that wireless devices are so small and majority of the users are working on the mobile phones for their day to day use due to which hackers or the unethical elements of the society find it a cake walk to attack on these devices. This paper is about some of the most dangerous attacks left unexplored by the people, an eye-opener for the non-specialized users to cover the patches and also on the challenges and issues of the wireless security.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122290116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Negative pressure wound therapy impact on fast recovery in major and minor surgery recovery time 负压治疗影响伤口快速恢复的大小手术恢复时间
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380723
R. Kaur, Manpreet Kaur, Jaspreet Kaur
{"title":"Negative pressure wound therapy impact on fast recovery in major and minor surgery recovery time","authors":"R. Kaur, Manpreet Kaur, Jaspreet Kaur","doi":"10.1109/ICGCIOT.2015.7380723","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380723","url":null,"abstract":"The negative pressure wound therapy is these days very popular among all big operation plastic surgery. As they provide quick recovery and also keep wound infection free. So these days that market is expending a lot and the requirement for negative wound therapy increase. So this topic as a engineer is new for observation as on study we find that there is lot of scope in developing of these machine result in fast recover of wound and also make less infected. So we think that if the medical and engineering field together work it result in lot more improvement in these machine.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115102523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信