{"title":"Evaluation and Customization of Community Detection Algorithms in Large Social Networks","authors":"Sanjay Kumar, Stuti Pandey, R. Gupta","doi":"10.1109/ICCMC.2018.8487507","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487507","url":null,"abstract":"Nowadays, social, natural, technological and information systems can be exhibited by complex networks having millions of nodes interconnected to each other. The extraction of comprehensive information from these massive networks call for computationally efficient methods. A promising approach to accomplish this task is to disintegrate the network into sub-units or communities and then using these identified communities to uncover relevant information. Thus, identifying communities in large scale networks plays a pivotal role in several scientific domains. In this paper, we extensively evaluate the functioning of two known algorithms and propose an improvement over one of them, in order to overcome its shortcomings to some extent, for optimal identification of community structure. We also present experimental results and evidences indicating that both the established algorithms, as well as our suggested approach, when applied to large social network datasets yields different results in terms of goodness and performance.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"30 1","pages":"1036-1040"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90977479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Khivsara, P. Gawande, Mayuri Dhanwate, Kishor R. Sonawane, Trupti N. Chaudhari
{"title":"IOT Based Railway Disaster Management System","authors":"B. Khivsara, P. Gawande, Mayuri Dhanwate, Kishor R. Sonawane, Trupti N. Chaudhari","doi":"10.1109/ICCMC.2018.8487802","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487802","url":null,"abstract":"Now a days train accidents is a major issue in all over the world due to increase in rash driving. Accidents are responsible for a large number of collision, derailment, fire in trains, level crossing accident each year. In some cases deaths are caused due to unavailability of immediate medical facility to the injured passengers which can be avoided with the help of an automated system that will reduce the time consumed in activities such as taking the victim to the nearest hospital completing formalities such as filling forms and also involving police in case of major crashes. So the proposed system is using motion (accelerometer) and smoke/fire detection sensor based on IOT application integrated with android (GSM technology) to send information about train accident location to local citizens and administration using google map/GSM location system.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"78 1","pages":"680-685"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90124039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Activity Detection from Wearable Electromyogram Sensors using Hidden Markov Model","authors":"Rinki Gupta, Karush Suri","doi":"10.1109/ICCMC.2018.8488070","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488070","url":null,"abstract":"Surface electromyography (sEMG) has gained significant importance during recent advancements in consumer electronics for healthcare systems, gesture analysis and recognition and sign language communication. For such a system, it is imperative to determine the regions of activity in a continuously recorded sEMG signal. The proposed work provides a novel activity detection approach based on Hidden Markov Models (HMM) using sEMG signals recorded when various hand gestures are performed. Detection procedure is designed based on a probabilistic outlook by making use of mathematical models. The requirement of a threshold for activity detection is obviated making it subject and activity independent. Correctness of the predicted outputs is asserted by classifying the signal segments around the detected transition regions as activity or rest. Classified outputs are compared with the transition regions in a stimulus given to the subject to perform the activity. The activity onsets are detected with an average of 96.25% accuracy whereas the activity termination regions with an average of 87.5% accuracy with the considered set of six activities and four subjects.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"29 1","pages":"340-345"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90152766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated and Cloud Enabling Cyber Security Improvement in Selected Institutions/Organizations","authors":"Tilahun Ayalew Tareke, Sujoy Datta","doi":"10.1109/ICCMC.2018.8487245","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487245","url":null,"abstract":"Advancements in an automated and cloud enabling cyber security have revolutionized the way in which cyber-criminal detection and remediation approaches are improved. Now a day, technological improvement increases even in fraction of time units such as seconds, micro seconds and Nano seconds. However, there is a parallel challenging of cyber-attack with attempting to access unauthorized resources over the cyber space. It obvious that the nature of cyber-attacker varies over time to cop up the already designed cyber security department policies, procedures and legal frame works at national and International level. It is therefore, compulsory to design and develop an automated and cloud enabling cyber security that ensures pre-securing the dynamic nature of cyber attackers attempting to penetrate any system. The purpose of this paper is therefore, to detect, monitor, process, forecast, and investigate by judiciary as per the prescribed cyber law with full of evidences stored in all physical and cloud server and with the selected Institutions/Organizations of Industries, commercial organizations, Educational Institutions and governmental institutions. The extent to which a cyber-attacker behaves including infrastructural defects, algorithms modifications and also malicious codes flooding over the key sources of industries, Institutions and other target organizations. And now the technology should be used in a form to strengthen the defensive techniques and tackling the cyber-criminals by introducing an automated, cloud enabling and improved cyber security systems. This is done by design and deployments of a predictive, automated, and dynamic and cloud enabling integration system on the focus of end user devices as an ultimate source. An improved cyber security in selected Institutions/Organizations address the storage and retrieval of cyber-attacker behavior, the implementation on an end users ultimate source, the communications in between the cyber security departments and target institutions while detecting cyber attackers and the legal criminal investigation processes.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"40 1","pages":"533-538"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80956838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intensity Threshold based Image Segmentation of Malaria Infected Cells","authors":"Prakriti Aggarwal, Ashish Khatter, Garima Vyas","doi":"10.1109/ICCMC.2018.8487494","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487494","url":null,"abstract":"Malaria is a perilous disease in charge for around 400 to 1000 deaths annually in India. The conventional technique to diagnose malaria is through microscopy. It takes few hours by an expert to examine and diagnose malarial parasites in the blood smear. The diagnosis report may vary when the blood smears are analyzed by different experts. In proposed work, an image processing based robust algorithm is designed to diagnose malarial parasites with minimal intervention of an expert. Initially, the images are enhanced by using green channel and histogram equalization, and the background subtraction is performed to get the clear vision of the region of interest. After preprocessing, a median filter is employed to eliminate the noise from the images. Then Otsu’s method for segmentation is implemented on the filtered images. The database from world health organization is used in this research. The experiments give encouraging results and an accuracy up to 93%.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"30 1","pages":"549-553"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81026882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anonymous User Authentication and Implicit Background Checks in Cloud Environment","authors":"Aashi Rastogi, Swadha Vanikar, N. Jeyanthi","doi":"10.1109/ICCMC.2018.8487857","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487857","url":null,"abstract":"Security threats faced by the customer, while storing information on the cloud, are on a continuous hike. Authentication is client's way to claim access to the data stored in the cloud. In our proposed system, we are taking anonymous authentication as an additional feature to the dynamic authentication policy which already exists. Along with the Attribute-Based Signature which serves as the first part of the granting-the-permission process, we use implicit authentication which includes periodic background checks, to ensure that the same legitimate user is using the account and that the account is not hacked or compromised after the login. This is based on a dynamically built user profile. The user profile consists of a set of vectors or features which are used to check whether the device is in the hands of a legitimate user.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"10 1","pages":"305-309"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82635232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-input Inverter for Hybrid Wind-Photovoltaic Standalone System","authors":"N. Archana, K. I. Anupamma","doi":"10.1109/ICCMC.2018.8488043","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488043","url":null,"abstract":"The rise in the use of alternate energy sources such as solar, wind, geothermal, fuel cell, etc. is due to the fast depletion of conventional energy sources. However these sources are less reliable due to their intermittent nature. To effectively utilise these energy sources, hybrid power systems with more than one renewable energy is used. One type of hybrid power system is a combination of PV energy and battery. The battery is utilized whenever the power from the solar panel is unavailable. Another type of hybrid system is the combination of photovoltaic and wind systems. This paper presents one such combination of hybrid power system with wind and solar energy as two inputs to a multi-input inverter which is supplying a load of 1kW. The simulation of the model is created using MATLAB/Simulink for input dc sources and for solar and wind sources.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"106 1","pages":"451-455"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75793946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kinjal N. Gharia, Palak V. Desai, Monali R. Gandhi
{"title":"Review Paper on Novel Recommendation","authors":"Kinjal N. Gharia, Palak V. Desai, Monali R. Gandhi","doi":"10.1109/ICCMC.2018.8487749","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487749","url":null,"abstract":"A recommendation system is broadly used to recommend products to the end users that are most appropriate. Online book selling websites now-a-days is competing with each other by considering many attributes. In this paper, we describe traditional approaches and explain what kind of modern approaches have been developed. We will also try to explain approaches and their problems for the book/novels recommendations. This paper also presents book/novels recommendation in which we are proposing hybrid algorithm, so it helps the recommendation system to recommend the books or novels based on the buyer’s interest.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"5 1","pages":"346-348"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77971599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. J. Mullani, M. Sankar, P. Khade, Snehal H Sonalkar, Nikita L Patil
{"title":"OCR BASED SPEECH SYNTHESIS SYSTEM USING LABVIEW : Text to Speech Conversion System using OCR","authors":"J. J. Mullani, M. Sankar, P. Khade, Snehal H Sonalkar, Nikita L Patil","doi":"10.1109/ICCMC.2018.8487731","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487731","url":null,"abstract":"Machine replication of human capacities, such as perusing, is an antiquated dream. Be that as it may, in the course of the most recent five decades, machine perusing has developed from a fantasy to reality. Discourse is likely the most proficient medium for correspondence between people. Optical character acknowledgment has turned out to be a standout amongst the best utilizations of innovation in the field of example acknowledgment and manmade brainpower. In current society, there is an awesome request to rapidly include expansive measure of printed and manually written data into the PC, along these lines everybody depend vigorously on PCs to process tremendous volumes of information. The essential goal is to enable vocally debilitated individuals to utilize the PC or to peruse archives in a simpler way. The framework is separated into two sections initially is Optical Character Recognition (OCR) and second part is content to discourse. In the initial segment, Virtual Instrument is produced in which a hued picture that contains the characters is changed over into grayscale picture and characters are prepared and in the second part; transformation from content to discourse is created. The mean of normal review time, standard deviation, least examination time and most extreme assessment time in ms is estimated. There are a few varieties in time parameters due to factors like number of characters perceived, line profile, histogram, shine, difference and gamma revision esteems.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"264 1","pages":"7-14"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90368123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of Duplicate Frame In CCTV DVR by Correlation Coefficient Factor","authors":"JavedAkhtar Khan","doi":"10.1109/ICCMC.2018.8487671","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487671","url":null,"abstract":"Unused frame or duplicate frame in DVR optimization reduction that capture by CCTV is a focus point of a research article. In the Current Era, all over world CCTV camera’s are widely utilized for security point of view.CCTV captures the video footage and store that footage in DVR that is called DigitalVideo Recorder its storage capacity start from 500gb to 1000 of TB depends on the specific area where this device is used, I am proposed the new frame architecture for this kind of device to reducing those footage frames that are unusable it means a frame does not record any movement during the recording. This idea is very helpful for removing unnecessary footage from the DVR those not have any kinds of movement it means that there is no further used of this unnecessary footage in DVR storage.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"126 5","pages":"235-239"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91487315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}