2017 International Conference on Computing, Communication and Automation (ICCCA)最新文献

筛选
英文 中文
Bigdata analysis and comparison of bigdata analytic approches 大数据分析和大数据分析方法的比较
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229821
S. Malhotra, M. Doja, Bashir Alam, Mansaf Alam
{"title":"Bigdata analysis and comparison of bigdata analytic approches","authors":"S. Malhotra, M. Doja, Bashir Alam, Mansaf Alam","doi":"10.1109/CCAA.2017.8229821","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229821","url":null,"abstract":"Recent technological advancements in typical domains (e.g. internet, financial companies, health care, user generated data, supply chain systems etc.) have directed to inundate of data from these domains. Data outburst trend gave the insight meaning to the buzz word ‘Bigdata’. If we compare with traditional data, Bigdata exhibits some unique characteristics like it is commonly enormous and unstructured type of data that cannot be handled using traditional databases. Hence new system designs are required for the following processes i.e. data collection, data transmission, storage, and large-scale data processing mechanisms. The definition of Bigdata has been presented from many aspects in this paper. We analyzed Bigdata system architecture and various challenges of Bigdata. The prevalent Hadoop framework, Hive, No SQL, New SQL, MapReduce and HBase for addressing the biggest challenge of Bigdata i.e Data Analytic has also been analyzed and compared.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81623844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Model predictive control of two area power system with superconducting magnetic energy storage system 超导磁储能两区电力系统的模型预测控制
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230061
S. Z. N. Dar, M. Mufti
{"title":"Model predictive control of two area power system with superconducting magnetic energy storage system","authors":"S. Z. N. Dar, M. Mufti","doi":"10.1109/CCAA.2017.8230061","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230061","url":null,"abstract":"This work focuses on the incorporation of modelpredictive control based superconducting magnetic energy storage (SMES) within a two-area power system. In our work incorporation of governor dead band as well as generation rate constraint is taken into account. We have incorporated a custom made general self-tuning model predictive controller for single-input single output (SISO) system. Every area of power system is connected via this block. Which is further incorporated with the SMES. Simulation studies carried out in Matlab Simulink environment reflect significant improvement in frequency response and tie-power deviation of the system. The SMES current and power response is also depicted.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85071673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new 16-bit ALU using variable stage adder and PTL mux 一种采用可变级加法器和PTL复用器的新型16位ALU
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230050
Aradhana Uniyal, V. Niranjan
{"title":"A new 16-bit ALU using variable stage adder and PTL mux","authors":"Aradhana Uniyal, V. Niranjan","doi":"10.1109/CCAA.2017.8230050","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230050","url":null,"abstract":"ALU is an integral part of the processor. And it is also one of the highest power density location in the processor. Hence in order to optimize the performance of processor, it is important to optimize the ALU. In this paper, proposed ALU having 8 functions has been designed using optimized adder structure. Also, use of pass transistors based multiplexer reduces the transistor count to around 80%. The proposed 16-bit ALU is implemented using 90 nm CMOS technology in Cadence Virtuoso. The results shows improvement in delay by 23.48 % and power consumption has been reduced by 2.76 %. It is pertinent to mention that the delay improvement in the proposed circuits have been achieved without increase in any circuit complexity and power dissipation. The proposed circuits are suitable for low power and high speed VLSI based arithmetic circuits.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77230756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Advanced encryption standard (AES) security enhancement using hybrid approach 采用混合方法增强高级加密标准(AES)的安全性
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229881
Flevina D’souza, Dakshata M. Panchal
{"title":"Advanced encryption standard (AES) security enhancement using hybrid approach","authors":"Flevina D’souza, Dakshata M. Panchal","doi":"10.1109/CCAA.2017.8229881","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229881","url":null,"abstract":"Security is major concern in data handling, communication, message transmission and electronic transaction on public network. Cryptography (secret writing) is the encryption process of transformation of messages to make information secure and resistant to attack. AES is symmetric encryption standard recommended by NIST. AES is proved to be highly secure, faster and strong encryption algorithm. AES is used commonly because of its great competence and easiness. But in recent years cyber-attacks are continuously developing, therefore security specialists must stay busy in the lab inventing new schemes to keep attackers at bay. Possible attacks on symmetric algorithm can be Brute-force Attack, Differential Attack, Algebraic Attack and Linear Attack. So to provide strong security in message transmission, AES algorithm with hybrid approach of Dynamic Key Generation and Dynamic S-box Generation is proposed. In hybrid approach first we will add more complexity in data to increase Confusion and Diffusion in Cipher text by using Dynamic Key Generation and then by using Dynamic S-Box Generation we will make it difficult for attacker to do any down study of static set of S-box.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85520393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Machine learning and time series: Real world applications 机器学习和时间序列:现实世界的应用
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229832
P. Misra, Siddharth
{"title":"Machine learning and time series: Real world applications","authors":"P. Misra, Siddharth","doi":"10.1109/CCAA.2017.8229832","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229832","url":null,"abstract":"There are in-numerous applications that deal with real scenarios where data are captured over time making them potential candidates for time series analysis. Time series contain temporal dependencies that divide different points in time into different classes. This paper aims at reviewing marriage of a concept i.e. time series modeling with an approach i.e. Machine learning in tackling real life problems. Like time series is ubiquitous and has found extensive usage in our daily life, machine learning approaches have found its applicability in dealing with complex real world scenarios where approximation, uncertainty, chaotic data are prime characteristics.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78000094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Different sources of energy harvesting: A survey 能源收集的不同来源:一项调查
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230039
Sushant Sharma, Varij Panwar, S. C. Yadav, Sachin, Lokesh.
{"title":"Different sources of energy harvesting: A survey","authors":"Sushant Sharma, Varij Panwar, S. C. Yadav, Sachin, Lokesh.","doi":"10.1109/CCAA.2017.8230039","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230039","url":null,"abstract":"21st Century has seen a paradigm shift in use of technology and the thoughts of using the natural sources for energy has led to thinking of using the energy wasted around us, in technical term, we can say harvesting of the energy. The paper aims at covering various techniques used in harvesting energy with focus on cantilever based energy harvesting. Interestingly the vibrations can be captured and converted into electricity. Up until now researchers have been able to produce upto 66 μ-w electricity using cantilevers with different materials in fans and bridges. Sources for energy harvesting and techniques have been covered in the paper.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80444638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient fuzzy and morphology based approach to metal artifact reduction from dental CBCT image 一种有效的基于模糊和形态学的牙齿CBCT图像金属伪影还原方法
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229985
Anita Thakur, Vishu Pargain, Pratul Singh, S. Chauhan, P. Khare, Prashant Mor
{"title":"An efficient fuzzy and morphology based approach to metal artifact reduction from dental CBCT image","authors":"Anita Thakur, Vishu Pargain, Pratul Singh, S. Chauhan, P. Khare, Prashant Mor","doi":"10.1109/CCAA.2017.8229985","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229985","url":null,"abstract":"New generation image modality which is low radiation dose is highly used in dentistry. In that category, Cone Beam Computed Tomography CBCT are in demand in dental medical application. Due to low radiation dose imaging technique, image reconstruction is prone to artifacts. Artifacts are the discrepancies between the original physical image to the mathematical modelling image process. In dental treatment, mostly metallic filling is done which produces metal artifact in imaging. Which metallic felling produces the reflection effect on imaging that mislead the diagnosis of treatment. Proposed research algorithm which is morphology based reduces the reflection effect of metal artifacts. Metal artifact also effect the visual contrast of CBCT image so that contrast enhancement method is compared which are histogram and fuzzy based method. The output image has been analysed and evaluated using structure of similarity index matrix (SSIM) and peak value ratio in term of Signal versus Noise (PSNR). Visual perception also shows the performance of the proposed work.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81254193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A triple BandStop frequency selective surface for escalation in the security of WiMax and WLAN application 一种用于WiMax和WLAN应用安全性提升的三重带阻频率选择表面
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229857
D. Noor, S. Yadav, S. Yadav, Monika Garg, Shweta Garg
{"title":"A triple BandStop frequency selective surface for escalation in the security of WiMax and WLAN application","authors":"D. Noor, S. Yadav, S. Yadav, Monika Garg, Shweta Garg","doi":"10.1109/CCAA.2017.8229857","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229857","url":null,"abstract":"A bandstop FSS has presented in this paper that works at 1.8GH, 3.5GHz and 5.5GHz. The dielectric constant of 4.4mm and dimension of substrate 0.24 X × 0.24X, tangential loss 0.025 and substrate FR-4 with thickness is 1.6mm is used. The structure consist of three elements Two Squares and a Decagon engraved on the substrate and provides three stable frequency response of 1.8GHz, 3.5GHz, and 5.5GHz. The proposed design is polarization independent and has stable frequency response at various angles of incidence for both perpendicular and parallel TE and TM wave modes respectively as the structure is symmetrical. The simulated results prove that a good insertion loss at desired resonant frequency was achieved in both TE and TM mode. Simulation is carried out in CST microwave studio that is based on FDTD method in frequency domain solver.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78964685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis and detection of fake profile over social network 社交网络虚假个人资料的分析与检测
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229795
V. Tiwari
{"title":"Analysis and detection of fake profile over social network","authors":"V. Tiwari","doi":"10.1109/CCAA.2017.8229795","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229795","url":null,"abstract":"Latest developments have seen exponential increase in clientele of social networks. Facebook has 1.5 billion users. More than 10 million likes and shares are executed daily. Many other networks like ‘linkedin’, ‘Instagram’, ‘Pinterest’, ‘Twitter’ etc are fast growing. Growth of social networks has given rise to a very high number of fake user profiles created out of ulterior motives. Fake profiles are also known as Sybils or social Bots. Many such profiles try and befriend the benign users with an ultimate aim of gaining access to privileged information. Social engineering is the primary cause of threats in any Online Social Network (OSN). This paper reviews many methods to detect the fake profiles and their online social bot. Multi agent perspective of online social networks has also been analysed. It also discusses the Machine learning methods useful in profile creation and analysis.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76365886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Bacteria foraging based task scheduling algorithm in cloud computing environment 云计算环境下基于细菌觅食的任务调度算法
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229901
Juhi Verma, Srichandan Sobhanayak, Suraj Sharma, A. K. Turuk, B. Sahoo
{"title":"Bacteria foraging based task scheduling algorithm in cloud computing environment","authors":"Juhi Verma, Srichandan Sobhanayak, Suraj Sharma, A. K. Turuk, B. Sahoo","doi":"10.1109/CCAA.2017.8229901","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229901","url":null,"abstract":"Cloud computing is a distributed system which gives the facilities of resource sharing and coordinates over different topographical areas. Because of its dynamic and heterogeneous nature of the virtual machine, the virtual machine scheduling is a complicated job in cloud computing. In recent past, bacterial foraging has come into views as a worldwide maximization algorithm for control and optimization. For cloud resource scheduling we propose an optimization technique for bacterial foraging. Effectively scheduling the tasks on an available physical machine in a cloud environment a unique resource scheduling hyper-heuristic based improved bacteria foraging algorithm (IBFA) has been proposed. Proposed scheduling algorithms performance is evaluated CloudSim toolkit and compared with existing algorithms. The exploratory results demonstrate that the proposed algorithms outplay the developed algorithm by reducing makespan and expense of client applications submitted to the cloud.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86555562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信