{"title":"Bigdata analysis and comparison of bigdata analytic approches","authors":"S. Malhotra, M. Doja, Bashir Alam, Mansaf Alam","doi":"10.1109/CCAA.2017.8229821","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229821","url":null,"abstract":"Recent technological advancements in typical domains (e.g. internet, financial companies, health care, user generated data, supply chain systems etc.) have directed to inundate of data from these domains. Data outburst trend gave the insight meaning to the buzz word ‘Bigdata’. If we compare with traditional data, Bigdata exhibits some unique characteristics like it is commonly enormous and unstructured type of data that cannot be handled using traditional databases. Hence new system designs are required for the following processes i.e. data collection, data transmission, storage, and large-scale data processing mechanisms. The definition of Bigdata has been presented from many aspects in this paper. We analyzed Bigdata system architecture and various challenges of Bigdata. The prevalent Hadoop framework, Hive, No SQL, New SQL, MapReduce and HBase for addressing the biggest challenge of Bigdata i.e Data Analytic has also been analyzed and compared.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"58 1","pages":"309-314"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81623844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model predictive control of two area power system with superconducting magnetic energy storage system","authors":"S. Z. N. Dar, M. Mufti","doi":"10.1109/CCAA.2017.8230061","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230061","url":null,"abstract":"This work focuses on the incorporation of modelpredictive control based superconducting magnetic energy storage (SMES) within a two-area power system. In our work incorporation of governor dead band as well as generation rate constraint is taken into account. We have incorporated a custom made general self-tuning model predictive controller for single-input single output (SISO) system. Every area of power system is connected via this block. Which is further incorporated with the SMES. Simulation studies carried out in Matlab Simulink environment reflect significant improvement in frequency response and tie-power deviation of the system. The SMES current and power response is also depicted.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"39 1","pages":"1406-1411"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85071673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new 16-bit ALU using variable stage adder and PTL mux","authors":"Aradhana Uniyal, V. Niranjan","doi":"10.1109/CCAA.2017.8230050","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230050","url":null,"abstract":"ALU is an integral part of the processor. And it is also one of the highest power density location in the processor. Hence in order to optimize the performance of processor, it is important to optimize the ALU. In this paper, proposed ALU having 8 functions has been designed using optimized adder structure. Also, use of pass transistors based multiplexer reduces the transistor count to around 80%. The proposed 16-bit ALU is implemented using 90 nm CMOS technology in Cadence Virtuoso. The results shows improvement in delay by 23.48 % and power consumption has been reduced by 2.76 %. It is pertinent to mention that the delay improvement in the proposed circuits have been achieved without increase in any circuit complexity and power dissipation. The proposed circuits are suitable for low power and high speed VLSI based arithmetic circuits.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"130 1","pages":"1374-1378"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77230756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced encryption standard (AES) security enhancement using hybrid approach","authors":"Flevina D’souza, Dakshata M. Panchal","doi":"10.1109/CCAA.2017.8229881","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229881","url":null,"abstract":"Security is major concern in data handling, communication, message transmission and electronic transaction on public network. Cryptography (secret writing) is the encryption process of transformation of messages to make information secure and resistant to attack. AES is symmetric encryption standard recommended by NIST. AES is proved to be highly secure, faster and strong encryption algorithm. AES is used commonly because of its great competence and easiness. But in recent years cyber-attacks are continuously developing, therefore security specialists must stay busy in the lab inventing new schemes to keep attackers at bay. Possible attacks on symmetric algorithm can be Brute-force Attack, Differential Attack, Algebraic Attack and Linear Attack. So to provide strong security in message transmission, AES algorithm with hybrid approach of Dynamic Key Generation and Dynamic S-box Generation is proposed. In hybrid approach first we will add more complexity in data to increase Confusion and Diffusion in Cipher text by using Dynamic Key Generation and then by using Dynamic S-Box Generation we will make it difficult for attacker to do any down study of static set of S-box.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"206 1","pages":"647-652"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85520393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine learning and time series: Real world applications","authors":"P. Misra, Siddharth","doi":"10.1109/CCAA.2017.8229832","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229832","url":null,"abstract":"There are in-numerous applications that deal with real scenarios where data are captured over time making them potential candidates for time series analysis. Time series contain temporal dependencies that divide different points in time into different classes. This paper aims at reviewing marriage of a concept i.e. time series modeling with an approach i.e. Machine learning in tackling real life problems. Like time series is ubiquitous and has found extensive usage in our daily life, machine learning approaches have found its applicability in dealing with complex real world scenarios where approximation, uncertainty, chaotic data are prime characteristics.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"17 1","pages":"389-394"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78000094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sushant Sharma, Varij Panwar, S. C. Yadav, Sachin, Lokesh.
{"title":"Different sources of energy harvesting: A survey","authors":"Sushant Sharma, Varij Panwar, S. C. Yadav, Sachin, Lokesh.","doi":"10.1109/CCAA.2017.8230039","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230039","url":null,"abstract":"21st Century has seen a paradigm shift in use of technology and the thoughts of using the natural sources for energy has led to thinking of using the energy wasted around us, in technical term, we can say harvesting of the energy. The paper aims at covering various techniques used in harvesting energy with focus on cantilever based energy harvesting. Interestingly the vibrations can be captured and converted into electricity. Up until now researchers have been able to produce upto 66 μ-w electricity using cantilevers with different materials in fans and bridges. Sources for energy harvesting and techniques have been covered in the paper.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"1 1","pages":"1370-1373"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80444638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anita Thakur, Vishu Pargain, Pratul Singh, S. Chauhan, P. Khare, Prashant Mor
{"title":"An efficient fuzzy and morphology based approach to metal artifact reduction from dental CBCT image","authors":"Anita Thakur, Vishu Pargain, Pratul Singh, S. Chauhan, P. Khare, Prashant Mor","doi":"10.1109/CCAA.2017.8229985","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229985","url":null,"abstract":"New generation image modality which is low radiation dose is highly used in dentistry. In that category, Cone Beam Computed Tomography CBCT are in demand in dental medical application. Due to low radiation dose imaging technique, image reconstruction is prone to artifacts. Artifacts are the discrepancies between the original physical image to the mathematical modelling image process. In dental treatment, mostly metallic filling is done which produces metal artifact in imaging. Which metallic felling produces the reflection effect on imaging that mislead the diagnosis of treatment. Proposed research algorithm which is morphology based reduces the reflection effect of metal artifacts. Metal artifact also effect the visual contrast of CBCT image so that contrast enhancement method is compared which are histogram and fuzzy based method. The output image has been analysed and evaluated using structure of similarity index matrix (SSIM) and peak value ratio in term of Signal versus Noise (PSNR). Visual perception also shows the performance of the proposed work.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"58 1","pages":"1220-1223"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81254193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Noor, S. Yadav, S. Yadav, Monika Garg, Shweta Garg
{"title":"A triple BandStop frequency selective surface for escalation in the security of WiMax and WLAN application","authors":"D. Noor, S. Yadav, S. Yadav, Monika Garg, Shweta Garg","doi":"10.1109/CCAA.2017.8229857","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229857","url":null,"abstract":"A bandstop FSS has presented in this paper that works at 1.8GH, 3.5GHz and 5.5GHz. The dielectric constant of 4.4mm and dimension of substrate 0.24 X × 0.24X, tangential loss 0.025 and substrate FR-4 with thickness is 1.6mm is used. The structure consist of three elements Two Squares and a Decagon engraved on the substrate and provides three stable frequency response of 1.8GHz, 3.5GHz, and 5.5GHz. The proposed design is polarization independent and has stable frequency response at various angles of incidence for both perpendicular and parallel TE and TM wave modes respectively as the structure is symmetrical. The simulated results prove that a good insertion loss at desired resonant frequency was achieved in both TE and TM mode. Simulation is carried out in CST microwave studio that is based on FDTD method in frequency domain solver.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"617 1","pages":"524-528"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78964685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and detection of fake profile over social network","authors":"V. Tiwari","doi":"10.1109/CCAA.2017.8229795","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229795","url":null,"abstract":"Latest developments have seen exponential increase in clientele of social networks. Facebook has 1.5 billion users. More than 10 million likes and shares are executed daily. Many other networks like ‘linkedin’, ‘Instagram’, ‘Pinterest’, ‘Twitter’ etc are fast growing. Growth of social networks has given rise to a very high number of fake user profiles created out of ulterior motives. Fake profiles are also known as Sybils or social Bots. Many such profiles try and befriend the benign users with an ultimate aim of gaining access to privileged information. Social engineering is the primary cause of threats in any Online Social Network (OSN). This paper reviews many methods to detect the fake profiles and their online social bot. Multi agent perspective of online social networks has also been analysed. It also discusses the Machine learning methods useful in profile creation and analysis.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"41 1","pages":"175-179"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76365886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juhi Verma, Srichandan Sobhanayak, Suraj Sharma, A. K. Turuk, B. Sahoo
{"title":"Bacteria foraging based task scheduling algorithm in cloud computing environment","authors":"Juhi Verma, Srichandan Sobhanayak, Suraj Sharma, A. K. Turuk, B. Sahoo","doi":"10.1109/CCAA.2017.8229901","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229901","url":null,"abstract":"Cloud computing is a distributed system which gives the facilities of resource sharing and coordinates over different topographical areas. Because of its dynamic and heterogeneous nature of the virtual machine, the virtual machine scheduling is a complicated job in cloud computing. In recent past, bacterial foraging has come into views as a worldwide maximization algorithm for control and optimization. For cloud resource scheduling we propose an optimization technique for bacterial foraging. Effectively scheduling the tasks on an available physical machine in a cloud environment a unique resource scheduling hyper-heuristic based improved bacteria foraging algorithm (IBFA) has been proposed. Proposed scheduling algorithms performance is evaluated CloudSim toolkit and compared with existing algorithms. The exploratory results demonstrate that the proposed algorithms outplay the developed algorithm by reducing makespan and expense of client applications submitted to the cloud.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"139 1","pages":"777-782"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86555562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}