{"title":"[Copyright notice]","authors":"","doi":"10.1109/icacat.2018.8933679","DOIUrl":"https://doi.org/10.1109/icacat.2018.8933679","url":null,"abstract":"","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82759603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cascaded Gradient Sequence for LTE System to Reduce Peak Power","authors":"Amit Shivhare, Manish Patidar, Ravi Kumar","doi":"10.1109/ICACAT.2018.8933602","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933602","url":null,"abstract":"This article provides an assessment of combinational technique for maximum power reduction in the transmitter of long-term evolution (LTE). An intelligent combination has been presented using constellation extension and scrambling technique in the Orthogonal Frequency Division Multiplexing (OFDM) structure. The principle of this arrangement approach is to apply approximate gradient project (AGP) and partial transmit sequence (PTS) on the OFDM subcarrier. The simulation results show that the proposed approach reduce the PAPR as compared to traditional techniques and maintain the bit error rate (BER) performance of the system especially at low signal to noise ratio (SNR).","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84292610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design, Layout and Simulation of 8 bit Arithmetic and Logic Circuits Pad frame using C5 Process for deep submicron CMOS","authors":"P. Rai, Shivoy Srivastava, Ayoush Johri","doi":"10.1109/ICACAT.2018.8933609","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933609","url":null,"abstract":"A critical component of the microprocessor, the core component of central processing unit. Arithmetic and logic circuits comprises the combinational logic that implements logic operations such as AND and OR, and arithmetic operations such as Addition, Subtraction, and Multiplication. In this presented work, an 8-bit arithmetic logic circuit is designed, implemented and simulated using the Electric CAD and SPICE software. The proposed design is an 8-bit arithmetic and logic circuit that can perform: A AND B, A OR B, A + B (addition), and A - B (subtraction) and all possible arithmetic and Logical operations. Physical design of every sub module is carried out using C5 process 300 nm process technology. A pad frame is also designed and subsequent Design Rule Checks and network consistency checks are performed on the same.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"91 12 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77285802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical Analysis of Data for Dissolved Gases in Transformer","authors":"Navneet Bhargava, Aparna R. Gupta, Litesh Bopche","doi":"10.1109/ICACAT.2018.8933700","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933700","url":null,"abstract":"The Genetic Algorithm is practical to resolve the obstacles of tiny samples and provide better prognostication for non linear behaviors and it is desirable for the Dissolved Gas Analysis in Power Transformers. The GA generates the initial accumulation at random prosper and scrutiny space faster and modifies the global search cognition and convergent speed. As question arises whether the data was nonlinear or not? It was decided to do the data analysis first. Thus the gas concentration in ppm (parts per million) of all the DGA samples was checked for non linearity.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"11 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74418100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advance Malware Analysis Using Static and Dynamic Methodology","authors":"Saurabh","doi":"10.1109/ICACAT.2018.8933769","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933769","url":null,"abstract":"As we are becoming more and more dependent on computers the attack vectors on them are increasing day by day. The cyberspace is becoming the battlefield of the 21st century as we are witnessing the increasing potential of a cyber-attack on the critical infrastructure. Malware are the most sophisticated evil code It is designed to damage computer systems without the knowledge of the owner these days malware are made up with special arbitrary to evade detection from the antivirus [1] with a huge potential to damage computer systems. Malware analysis is a process for studying the components and the behavior of malware. For analyzing malware we will use two types of methods static analysis and the dynamic analysis. In the static analysis the malware are examined without running it, whereas in dynamic analysis the malware is analyzed while running it in a virtual and controlled environment. In this research we are going to focus on malware analysis using the static and the dynamic method which will help us to access damage, to know the indicators of compromise and to determine the sophistication level of an intruder and to catch the creator of the malware.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"44 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74076110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified Z-Shape MSA with DGS for WLAN Ranges","authors":"Abhiruchi Rathi, Neenansha Jain","doi":"10.1109/ICACAT.2018.8933794","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933794","url":null,"abstract":"Microstrip patch antenna plays a vital role in WLAN communication, mobile communication, 3G, 4G, and WiFi, WI-MAX devices in different range. Z-shape microstrip patch antenna is very interesting shape for researchers. In this research work proposed a Z-shape microstrip antenna (MSA), and apply defected ground structure (DGS) on the ground side. Designed antenna is a dual band antenna that is intended to work at 1 to 10 GHz and shows good result in this range. After modelling and simulation, designed, implemented. These results are compared with different previous design on the basis of return loss (S-11) VSWR and other antenna parameters.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"29 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87167079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sixth Sense Teaching Aid","authors":"S. Chaman, Aniket Ghadi, Ninad Ketkar","doi":"10.1109/ICACAT.2018.8933732","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933732","url":null,"abstract":"This paper proposes a novel Sixth Sense Teaching Aid (SSTA) which incorporates sixth sense technology in projectors for educational purpose. The Projector-PC system was earlier used only for displaying the presentations but with the aid of the proposed system, users can touch on any projected surfaces for interaction purpose. In the SSTA system, the graphical user interface (GUI) buttons are projected on any flat surface like wall and it deals with touch detection of the projected screen using red color parameter both for still image and real time images. The algorithm to perform touch detection is executed in two stages: 1) Feature extraction and button’s touch detection using red color thresholding algorithm which reduces the computational complexity of the processing module; and 2) Performance of assigned operation according to touch action judgment. New born technology named Sixth Sense technology is also implemented in SSTAfor getting relevant information from the internet, whenever we touch any projected Figure or headline. The proposed SSTA system is able to do real time touch detection with 97 percent accuracy which is demonstrated through projected GUI and using a data set collected under different settings of illumination variation, hand orientation and occlusion.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"19 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87245861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Secure Data Aggregation in IoT using Particle Swarm Optimization Algorithm","authors":"Neeraj Chandnani, C. N. Khairnar","doi":"10.1109/ICACAT.2018.8933784","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933784","url":null,"abstract":"Internet of Things (IoT) is a network paradigm in which data aggregation and data security plays a vital role. Data aggregation in IoT describes collection of information from different users and data security means encryption of collected data using cryptography method. The proposed work comprises of devices and gateway to perform data aggregation and data encryption. Data aggregation is performed using clustering in which data are clustered and secured by Particle Swarm Optimization (PSO) algorithm which finds the cluster head. After finding cluster head, nodes requests to join as cluster member. PSO computes fitness function using metrics i.e. energy, end-to-end delay, scoring factor, packet drops and successful packet transformation. After completion of clustering process, data encryption process is held in which, cluster head collects data from the cluster members and encrypts it using Elliptic Curve Cryptography (ECC) method. Finally, encrypted data are dispatched to gateway device. Experimental result shows, the proposed work on Secure Particle Swarm Optimization (SPSO)prompts better performance in following metrics i.e. delay, throughput and energy consumption.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"112 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86758220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced Differential Evolution through Memory Based Mechanism","authors":"Raghav Prasad Parouha","doi":"10.1109/ICACAT.2018.8933676","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933676","url":null,"abstract":"This article is to presents an enhanced DE (differential evolution) through memory based mechanism of PSO (particle swarm optimization). Because of uses the memory concept of PSO, the proposed DE is termed as ‘MBDE (memory based differential evolution)’ where new mutation and crossover operators are introduced. This proposed technique is implemented on four typical benchmark functions available in literature. Experimental results prove that the proposed technique produce faster and more accurate solutions than classical DE, traditional PSO and PSODE (an effective hybrid variant of PSO and DE).","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"1 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89727820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contemplation of Machine Learning Algorithm under Distinct Datasets","authors":"Kushagra Shah, P. Chaturvedi, Akagra Jain","doi":"10.1109/ICACAT.2018.8933753","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933753","url":null,"abstract":"The paper analyses machine learning and statistics classification under supervised learning approach. The grail of this study is collation of Machine Learning on variegated datasets that are contemplated and compared on the basis of two important parameters viz. time and accuracy. For the purpose of study, 6 different supervised Machine Learning algorithms are implemented on datasets in WEKA tools by percentage splitting method in which 66% of the total data have been used to train the model and 34% is used to test the efficiency of the model. As an out-turn, general comparison is produced, guiding researchers in their area of interest and to choose best available algorithm depending on the dataset classification. The main objective of this paper is to provide the general comparison between variegated machine learning algorithms and which is best suitable and efficient for a particular situation as every algorithm varies according to the area of application and single algorithm is not surpassing in every scenario.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"100 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80355542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}