2019 3rd International Conference on Computing and Communications Technologies (ICCCT)最新文献

筛选
英文 中文
Telepathic Virtual Assistant 心灵感应虚拟助手
V. Narmadha, J. U. AJAY KRISHNAN, R. P. Kumar, R. Kumar
{"title":"Telepathic Virtual Assistant","authors":"V. Narmadha, J. U. AJAY KRISHNAN, R. P. Kumar, R. Kumar","doi":"10.1109/ICCCT2.2019.8824886","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824886","url":null,"abstract":"The purpose of our paper is to make the virtual assistant respond to the requests of the user which are by means of thoughts. The user thinks of the task and the personal assistant gets to process the request without any text or audio based inputs from the user. The thoughts of the user is fed to the virtual assistant by means of brain computer interface(BCI) with the help of devices like Electroencephalogram. This device helps in converting the thoughts of the user to signal which are then converted into text. The emotional classifierused in the system helps to understand the state of the user and help the virtual assistant to respond accordingly. The response of the virtual assistant is processed to the user in a much technological way via the Bone conduction technology which helps in perceiving for the people with auditory problems.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132076335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey on Game Theory Approach in Wireless Body Area Network 无线体域网络中博弈论方法研究综述
M. Naik, P. Samundiswary
{"title":"Survey on Game Theory Approach in Wireless Body Area Network","authors":"M. Naik, P. Samundiswary","doi":"10.1109/ICCCT2.2019.8824973","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824973","url":null,"abstract":"A Wireless Body Area Network (WBAN) is used to collect biological signals from human body with the help of medical equipment and sensors that are connected wirelessly and they are placed outside or inside the body for different no-nmedical and medical applications. The standard developed for WBAN is IEEE 802.15.6. The rapid enhancement of Body Sensor Networks (BSNs) provides continuous health monitoring to control patient’s life as they play important role for saving life of patient’s by utilizing several variety of sensors that are used in the health care applications. These sensors monitor continuously different biological functions such as blood pressure, temperature, Electrocardiogram(ECG), heart rate, Electroencephalogram (EEG) etc. The data which is collected are transmitted the information at regular intervals to a central hub. The patient’s health monitor in real-time is the primary goal as it helps to design and support several non-medical applications such as detection of gesture for interactive games, cognitive, movement and recognition of emotions during drive assistance etc. However, WBAN application concept is still a exigent post to be considered for several technical demands like energy efficiency, lifetime of network, security, criticality of data, network throughput and prioritization. Hence, most of the WBANs utilizes wireless channel for process of communication in which these typical sensors with single transceiver device transmits the information with low power by utilizing a single /multi-channel by game theoretic approach in WBAN. In this paper, an attempt has been made to explain different types of game theoretic approaches used in WBAN.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134212946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Scheme for Feature Selection from Gene Expression Data using Recursive Feature Elimination with Cross Validation and Unsupervised Deep Belief Network Classifier 基于交叉验证递归特征消除和无监督深度信念网络分类器的基因表达数据特征选择方案
Nimrita Koul, S. Manvi
{"title":"A Scheme for Feature Selection from Gene Expression Data using Recursive Feature Elimination with Cross Validation and Unsupervised Deep Belief Network Classifier","authors":"Nimrita Koul, S. Manvi","doi":"10.1109/ICCCT2.2019.8824943","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824943","url":null,"abstract":"In the treatment of cancers, the efficacy depends on the correct diagnosis of the nature of tumor as early as possible. Micro-array Gene expression data which contains the expression profiles of entire genome provides a source which can be analyzed to identify bio-markers of cancers. Micro-array data has a large number of features and very few number of samples. To make effective use of this data, it is very beneficial to select a reduced number of genes which can be used for tasks like classification. In this paper, we propose a two level scheme for feature selection and classification of cancers. First, the genes are ranked using Recursive Feature Elimination which uses Random Forest Classifier for evaluation of fitness of genes with five fold cross-validation , later these genes are used to pre-train an Unsupervised Deep Belief Network Classifier to classify the samples based on the selected genes. We compared the results in terms of cross validation matrix parameters viz. classification accuracy, precision and recall, obtained from our approach with the results obtained by using some standard feature selector-classifier combinations viz. Mutual Information with Support Vector Machines, Kernel Principal Component Analysis with Support Vector Machine, Support Vector Machine -Recursive Feature Elimination and Mutual Information with Random Forest Classifier. The results show that our scheme performs at par with standard methods used for feature selection from gene expression data.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133399607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MAITEMB (Mobile Application Intervention to Enhance Motivated Behavior) MAITEMB(移动应用干预增强动机行为)
M. Yogesh, M. Balamurugan, S. Varun, M. Ananthi
{"title":"MAITEMB (Mobile Application Intervention to Enhance Motivated Behavior)","authors":"M. Yogesh, M. Balamurugan, S. Varun, M. Ananthi","doi":"10.1109/ICCCT2.2019.8824796","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824796","url":null,"abstract":"A NEUROSCIENCE –informed mobile app intervention to treat schizophrenia by analyzing the data from sensors in headwear which is transferred via Bluetooth to the mobile. At the root of all our thoughts, emotions and behavior is the communication between neurons within our brains. Brain waves are detected using sensors (EEG electrode) placed on the scalp. They are divided into bandwidth to describe their functions. The EEG raw data are read through brain sense headwear and the data are transferred to mobile via Bluetooth (HC-06). And it automatically plays a depression control music (meditation music), notify the patient’s friends or relatives. Give some warning messages to user (patient). It is quite probable that in the future most of our appliances will be controlled directly through our wishes or the brain and this project stand as an affirmation to that vision. Our application analysis the present psychological state of the person in delusions or hallucinations which are the symptoms of schizophrenia and request them with some suggestions to follow. Signals from the brain can be further studied and the technology can be refined to bring about more specific results.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134072606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey On Cloud Security Issues And Blockchain 关于云安全问题和区块链的调查
S. Pavithra, S. Ramya, S. Prathibha
{"title":"A Survey On Cloud Security Issues And Blockchain","authors":"S. Pavithra, S. Ramya, S. Prathibha","doi":"10.1109/ICCCT2.2019.8824891","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824891","url":null,"abstract":"The need for cloud computing is gradually increasing day by day. The cloud computing security is the major difficulty. Since the data in the cloud has to be transferred through internet, the security of data becomes a major concern. The key mechanisms for data protections like integrity, accountability, privacy, access control, authentication, authorization must be maintained. Blockchain is a technology which makes cloud computing better. Blockchain overcomes the security issues in cloud computing. This survey aims at analyzing and comparing various issues in the cloud environment and security issues using blockchain.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120850268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
BAGH – Comparative Study BAGH -比较研究
B. Kamala
{"title":"BAGH – Comparative Study","authors":"B. Kamala","doi":"10.1109/ICCCT2.2019.8824878","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824878","url":null,"abstract":"Process mining is a new emerging research trend over the last decade which focuses on analyzing the processes using event log and data. The raising integration of information systems for the operation of business processes provides the basis for innovative data analysis approaches. Process mining has the strong relationship between with data mining so that it enables the bond between business intelligence approach and business process management. It focuses on end-to-end processes and is possible because of the growing availability of event data and new process discovery and conformance checking techniques. Process mining aims to discover, monitor and improve real processes by extracting knowledge from event logs readily available in today’s information systems. The discovered process models can be used for a variety of analysis purposes. Many companies have adopted Process-aware Information Systems for supporting their business processes in some form. These systems typically have their log events related to the actual business process executions. Proper analysis of Process Aware Information Systems execution logs can yield important knowledge and help organizations improve the quality of their services. This paper reviews and compares various process mining algorithms based on their input parameters, the techniques used and the output generated by them.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129671486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CloudBC-A Secure Cloud Data acess Management system cloudbc—安全的云数据访问管理系统
S. Ramamoorthy, B. Baranidharan
{"title":"CloudBC-A Secure Cloud Data acess Management system","authors":"S. Ramamoorthy, B. Baranidharan","doi":"10.1109/ICCCT2.2019.8824828","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824828","url":null,"abstract":"Data security and Storage Management becomes the most promising task for any IT operation in the future. The business and service provider’s mange to finds the technology like cloud computing for pooled computing resources. The enormous amounts of research works are initiated in parallel to protect data on the cloud environment. This leads to the strong evidence of unanswered questions related to the data security over the cloud data centres. The Cloud computing model used as a primary technology in many IT business operations across the millions of users. To ensure the data security and modification over the data stored on the cloud considered as a major issue among the community cloud users. The Proposed research work aims to protect the cloud data by implementing the new approach using blockchain technology. The Hybrid approach to combine the BlockChain(BC) Technology with cloud computing to ensure the data security among the community cloud users. is Hybrid approach will restrict the malicious data access and modification on the cloud servers. The secure hash blocks are generated and maintained by the cloud storage devices enhance the data security on the cloud. The block chains allow the user to trace back the malicious data access and modifications.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Jaunt India With Pre-Planned Budget 带着预先计划好的预算去印度旅行
B. Renuka Devi, V. Srimathi, R. Suvethi, M. Akshaya
{"title":"Jaunt India With Pre-Planned Budget","authors":"B. Renuka Devi, V. Srimathi, R. Suvethi, M. Akshaya","doi":"10.1109/ICCCT2.2019.8824817","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824817","url":null,"abstract":"“The motive of “Tour Budget Analysis” application is to build easy travel assistant planning for the people who are new to the place and don’t know how to plan their tour. We are using greedy algorithm to calculate the shortest path between the two points i.e from the source to destination. Budget analysis plays the major role in this application, before analysing the budget it intakes the requirements from the users using filter. This application will be very useful for the people who would like to travel alone, especially for women as we have checkpoints indicator which indicates each and every checkpoint from their source to destination to their family members. In addition to it we have “Save Our Souls emergency” module which provides the state emergency numbers of the current location such as police, fire, ambulance and women safety numbers. This application also helps us to find the nearby restaurants, hotels, ATMs, banks etc...","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127837079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Cloud Data Center using CloudSim – A methodology 使用CloudSim - A方法优化云数据中心
B. Priya, T. Gnanasekaran
{"title":"Optimization of Cloud Data Center using CloudSim – A methodology","authors":"B. Priya, T. Gnanasekaran","doi":"10.1109/ICCCT2.2019.8824950","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824950","url":null,"abstract":"Cloud computing can be termed as provisioning of computing power, storage, Infrastructure and other resources over the internet as an on-demand pay service. Recent developments in the technological advancement are in the cloud storage, security, fault tolerances, load balancing and optimization. Cloud simulator is a tool that assists in modelling different cloud applications. Cloudism offers a simulation framework for modelling and simulation that emphasis more on exploring design issues without factoring cloud infrastructure and services. Load balancing in cloud is a method of allocation of workload across multiple nodes to obtain resource optimization with minimum response time. In this paper the state of the art of the cloud simulations along with an approach implemented using CloudSim3.0 is illustrated.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信