{"title":"Barricades in Network Transformation from 4G to 5G in India","authors":"Sorabh Puri, R. S. Rai, Karunesh Saxena","doi":"10.1109/ICRITO.2018.8748303","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748303","url":null,"abstract":"Background and objectives: The next biggest change that the world is waiting to witness in the technology and communication field is the 5th generation or 5G technology that is being to be functional worldwide by 2020. Though it will bring in many new changes in the world like it will be connecting millions of heterogeneous objects while providing high speed internet and using real time data for real time analysis like for coordination of road and car sensors. But before the world looks on to all these functionalities of 5g, there are a huge number of potential challenges in its path of implementation. The present study is aimed at finding and segregating these challenges faced by organizations in Indian Telecom Industry. The respondents used in the present study are the employees of the 3 biggest network providers in India working in the R&D and IT department of these companies. Quantitative survey among the employees (N=135) was conducted to satisfy the aim and objectives of the study. Research Findings: The study found 23 challenges from the researches done so far. Further the study segregated these 23 challenges into 4 broader categories of the challenges according to their similar nature using factor analysis. The 4 broad categories found are system level, network level, spectrum level and performance based challenges. The nomenclature of these categories has been in the study via extensive research on the secondary data and researches.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128429672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Approach for Reduction of Discrete Time System using Modified Cauer Form","authors":"D. K. Sambariya, Trishla Sharma","doi":"10.1109/ICRITO.2018.8748493","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748493","url":null,"abstract":"In this research work, aHOS(high order system)remains decreased into LOS (lower order system) by usage of MCF (modified cauer form) method. The ROM is founded upon CF (Continued fraction) technique also find comes out to be LOM (low-order model). For the reduction of HOS indirect method is used. Presents article, show the graphical comparison of simulation results between MCF ROM and another diminution technique presented in literature. In the simulation, the response comparison displays improved performance of proposed ROM than further approaches obtainable in literature and discuss the result technics of peak time, settling time, rise time also peak amplitude information for higher order and ROM.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Future Terrorism Trend in India Using Clustering Analysis","authors":"Shivali Baghel, Yogesh","doi":"10.1109/ICRITO.2018.8748567","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748567","url":null,"abstract":"Terrorism is an unethical violent strategy to create fear among the public and pose a national threat. It affects the economic, social and political strata of a nation as a whole, which leads to disharmony among the citizens. The extent of devastation caused by terror activities ranges from conflicts among religious or political communities to loss of lives and property. According to the most recent report of 2016-17, India ranks third among the largest terror prone zones of the world, after Iraq and Afghanistan, leaving even Pakistan behind. As it is still a developing country, India must adopt much stronger barriers to terrorism as compared to the already developed countries, which are well equipped with arms, stricter government policies and are equipped with latest technologies. This study aims to track the percentage increase in terrorism over the past 46 years from 1970-2016 world-wide, the result of which will pave way for the need of curbing terrorism in India. The various regions affected by it at the present are identified. The data mining strategy also predicts those regions that are prone to becoming the next hubs of terrorist activities. This knowledge is essential to work towards averting them from any such mishap.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124181467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icrito.2018.8748816","DOIUrl":"https://doi.org/10.1109/icrito.2018.8748816","url":null,"abstract":"","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121433399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic Prediction in Telecom Systems Using Deep Learning","authors":"Prashant Kaushik, S. Singh, P. Yadav","doi":"10.1109/ICRITO.2018.8748386","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748386","url":null,"abstract":"The deep neural network implementation in this work analyses, evaluates and generates predictions based on the open source big data of telecommunications activity released by Telecom Italia. The deep learning library used for the neural network implementation is Tensorflow which contains many high and mid-level APIs to achieve the functionality. The model uses random data from the test dataset for generating predictions and Estimator API of Tensorflow for building the neural network. Also Adam optimizer is used for optimizing the loss function with the model’s resulting efficiency to be around 98.6–99.8%.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"21 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114014991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zahir bin Sulaiman Al Brashdi, S. M. Hussain, Kamaluddin Mohammad Yosof, Shaik Ashfaq Hussain, A. Singh
{"title":"IoT based Health Monitoring System for Critical Patients and Communication through Think Speak Cloud Platform","authors":"Zahir bin Sulaiman Al Brashdi, S. M. Hussain, Kamaluddin Mohammad Yosof, Shaik Ashfaq Hussain, A. Singh","doi":"10.1109/ICRITO.2018.8748751","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748751","url":null,"abstract":"Telecommunications play a vital role in medical fields in terms of Information processing of patients during critical conditions. The advent of IOT has changed the technology to a smart technology where the devices can make self-decisions, self-organize and can smartly co-ordinate with other devices. IOT has expanded its feathers in almost all areas because of its tremendous features. IOT has rouse innovators to setup a dependable stage. One of the major requirements in the field of health care is to keep track of patients health continuously to ensure quality and safety in medical fields. Whenever there is an emergency, It is mandatory to avail the patients data to the Access center. In this paper, IOT based monitoring system is proposed where the patient’s condition is regularly monitored and communicated through cloud based platform. To execute this, Ardunio Uno, ESP8266, SEN1174, LM 35 and think speak platform is utilized. One of the objectives of this research work is to design and develop low cost and low complexity prototype that can ensure high quality monitoring, high level of security through wifi modules and secured communication through cloud data base called thinkspeak.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127568540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ms.Manpreet kaur, Anuranjana, Sanmukh Kaur, Aditya Kesarwani, P. S. Vohra
{"title":"Analyzing the Internal Parameters of Free Space Optical Communication","authors":"Ms.Manpreet kaur, Anuranjana, Sanmukh Kaur, Aditya Kesarwani, P. S. Vohra","doi":"10.1109/ICRITO.2018.8748589","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748589","url":null,"abstract":"Free Space Optical (FSO) Communication is an efficient technology as it offers higher signal bandwidth and less power for transmission. There are some internal parameters on which the performance of the FSO communication depends such as beam divergence, wavelength. The purpose is to optimize these factors to achieve the maximum output and throughput. In this paper FSO model has been designed using PIN Photodiode and Avalanche Photodiode(APD) at receiver’s side. Using the model, Q-Factor has been estimated for different beam divergences and wavelengths at varying bit rates. The results have been compared and analyzed for the two types of photodiodes.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126255458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fake News Filtering: Semantic Approaches","authors":"V. Klyuev","doi":"10.1109/ICRITO.2018.8748506","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748506","url":null,"abstract":"In 2016, the attention to the fake news phenomenon drastically increased. Mobile devices such as cellular phones and sources of information such as social networks are instruments that enable individuals to receive news, publish posts, communicate with peers, watch videos, listen to music, etc. In today’s highly mobile society, this is a current trend. The uncontrolled freedom and simplicity in publications on the Internet result in overwhelming users receiving news that are fake and hoaxes. Detecting and filtering such information is a challenging problem. This paper discusses different approaches to combat fake news. They are used to a) determine text features utilizing linguistic natural language processing methods (it is necessary to create a profile of the text document), b) detect spam bots in social networks to isolate those using machine-learning methods (it is crucial to reduce the number of analyzed documents), and c) confirm the facts in online documents by applying techniques used in search engines (it is very much important to select trusted documents). A system combining these mechanisms may demonstrate a high level of accuracy in filtering fake news.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127913089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Biswas, Shubham Kachroo, Parth Chopra, Shubham Sharma
{"title":"Development of an App Enabled Smart Helmet for Real Time Detection and Reporting of Accidents","authors":"J. Biswas, Shubham Kachroo, Parth Chopra, Shubham Sharma","doi":"10.1109/ICRITO.2018.8748494","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748494","url":null,"abstract":"In this paper we propose a solution to minimise the after effects of a motorcycle accident and also try to create a culture of helping someone in need anonymously. This is implemented using internet enabled Raspberry Pi Zero W with homemade pressure sensors embedded in the helmet. The working is fairly simple; the Raspberry Pi detects accident and its intensity via the MCP3008 Analog to Digital Converter IC and updates Google’s Firebase in real time. The app running on Android phone retrieves this data associated with the particular helmet ID and generates an alert sent to nearby hospitals and other authorities (if any). The app can also be used to help a third person who has met with an accident using its ‘Help Anonymously’ feature. The alert so generated contains the helmet’s owner’s name, location of accident and region-wise intensity of force measure for analytics. The alert is sent within 20 seconds, so if a person is conscious, the alert can be stopped using a PIN number.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130124805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"English-Maithili Machine Translation and Divergence","authors":"Ritu Nidhi, T. Singh","doi":"10.1109/ICRITO.2018.8748786","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748786","url":null,"abstract":"Maithili is a resource poor language from India and Nepal. It lacks the basic computer tools necessary for its survival and promotion in the age of intense competition on the internet. Since English happens to be the dominant language in terms of content, and more than 90 percent of Indian speakers do not use English, a translation from the latter to the former is essential. This paper presents an initial attempt at creating a statistical English-Maithili Machine Translation (EMMT) system and a study of Machine Translation (MT) divergences and errors caused due to divergence.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134415670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}