2017 International Conference on Computing, Communication and Automation (ICCCA)最新文献

筛选
英文 中文
Health monitoring based on IoT using Raspberry PI 基于物联网的健康监测使用树莓派
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230004
A. Kaur, Ashish Jasuja
{"title":"Health monitoring based on IoT using Raspberry PI","authors":"A. Kaur, Ashish Jasuja","doi":"10.1109/CCAA.2017.8230004","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230004","url":null,"abstract":"The world of medical science is an emerging area that has accelerated with new technologies and this is the time when the vision of “The internet of things (IoT)” has turned into reality. IoT can play a significant role in healthcare domain by managing chronic diseases at one end as well as preventing diseases on the other hand. People demand more care at reduced clinical costs, remote health monitoring (using IoT) is one of the possible solutions to this demand. Remote health monitoring can be best utilized provided the device is wearable to facilitate self-monitoring. In this paper, we propose a system for monitoring of pulse rate, body temperature (vital body parameters) of the person with dedicated sensors along with Raspberry pi and IoT. A system is wearable and also supports remote health monitoring. Remote Health monitoring is attained by storing the collected data to Bluemix cloud, this data can be retrieved by the doctor for analysis anywhere and any aberrancy will be timely detected. Bluemixuses MQTT(Message Queuing Telemetry Transport) protocol. Along with remote monitoring and wearability of system, accuracy and cost cannot be ignored. A perfect tradeoff between accuracy and cost of the system is accomplished by choosing appropriate sensors which are DS18B20 (temperature sensor) and KG011 (heart rate sensor). The pulse rate and temperature of a person at different time instants are measured by the sensors. The readings are shown in the form of graphs at IBM Watson IoT platform.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84980234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Scope and challenges of visual analytics: A survey 视觉分析的范围和挑战:调查
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229987
C. Mehrotra, Nayan Chitransh, A. Singh
{"title":"Scope and challenges of visual analytics: A survey","authors":"C. Mehrotra, Nayan Chitransh, A. Singh","doi":"10.1109/CCAA.2017.8229987","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229987","url":null,"abstract":"Visual analytics is a newly emerging field. It is progressing at a high pace around the world. There are a lot of domains and areas where this field has shown the presence in the last decade. It has improved business and has helped technology grow in a better way. So here in this paper we would highlight the application areas of visual analytics. Although the growth is rapid but still many of the challenges still remain in visual analytics where more research is required so that visual analytics grows and helps the users in a better way.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85055225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Learning the student's sufferings using Social Networks 学习学生使用社交网络的痛苦
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229824
M. Upreti, Vishal Kumar
{"title":"Learning the student's sufferings using Social Networks","authors":"M. Upreti, Vishal Kumar","doi":"10.1109/CCAA.2017.8229824","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229824","url":null,"abstract":"In the past two decades, due to the advancement in mobile, computing, internet and electronics technology the young generation has turned smart along with the smart cities and villages. People are adapting the globalized changes and these changes are not part of everyone's life. The number of Facebook users fall or rise in every three months. Due to excessive usage of the above mention technology people are now suffering from various disorders. The problem of mental distraction and disturbance has increased among the engineering students due to their affection towards online social networks. In this paper, we are covering the impact of social networks on teenagers and engineering students to identify and understand the causes behind it. We have analyzed the collected data with the experimental work carried out on teens between the age group of 12–18 years. In this paper we are covering certain changes in the expressions and emotions in the life of teenagers opted engineering as their career. We are focusing on application and drawbacks of online social networks as the most popular way of connectivity among the young generations.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83986534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Trust-based fault tolerance in mobile ad-hoc networks using adaptive monitoring 基于信任的自适应监控移动自组织网络容错
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229885
Madhavi, I. Kaur
{"title":"Trust-based fault tolerance in mobile ad-hoc networks using adaptive monitoring","authors":"Madhavi, I. Kaur","doi":"10.1109/CCAA.2017.8229885","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229885","url":null,"abstract":"Mobile ad hoc networks (MANETs) is the collection of wireless nodes. The wireless nodes communicate with each other without any fixed infrastructure. One of the major challenges in ad hoc network is to make the network fault tolerant and provide the trustworthiness to the mobile nodes. Nowadays, the MANETs is widely used in the different field's applications, but the failure of these nodes is the main concern. So currently the researchers are focusing on designing a model which provides trustworthiness to the mobile nodes. In this paper, we modified the existing AODV routing protocol incorporating the enhanced trust value to deal with the faulty node detection and correction and ensure secure routing in mobile ad-hoc networks. This paper proposed a trust-based model which provides the trust value to every node on the basis of their energy, hop count and number of packets sent, here we also introduce a normalizing constant which normalizes the trust value. The performance of trust based model evaluated by throughput and packet delivery ratio, packet delay through the simulation set, which evidence better performance if load or traffic in the network increases. Proposed work shows enhancement over standard AODV protocol in terms of diverse network performance parameters.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80707992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying concavity laws of attractiveness character for composite regions: Application through geo-tagged media check-ins 识别复合区域吸引力特征的凹凸性规律:通过地理标记媒体签到的应用
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229994
A. Jain, S. Singh
{"title":"Identifying concavity laws of attractiveness character for composite regions: Application through geo-tagged media check-ins","authors":"A. Jain, S. Singh","doi":"10.1109/CCAA.2017.8229994","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229994","url":null,"abstract":"In this era of social networking sites, people's behavior online could help us have an idea about their offline lives as well. Social check-ins, which store geo-tagged information about users, can be utilized by researchers to investigate the tastes and preferences of individuals for the places they live in or travel to. In this paper, I introduce one possible research direction that can be taken using Yahoo Flickr Creative Commons 100M dataset of publically available geo-tagged media objects. I intended to focus this study on investigating the attractiveness character of most checked-in countries and large-scale composite regions, like the states of US, for foreign tourists. The attractiveness character is specified as the total amount of media check-ins done by the visitors compared to the population size of the country or state. In addition to this, I utilize International migrations dataset, made available publically by UN, to analyze the attractiveness potential of destination countries/states from a long-term perspective too. As most studies show that the attractiveness of cities follows a super-linear trend, my study is about identifying if the same trend is applicable to the attractiveness of large-scale composite regions too. In the end, the explanation of the results is discussed.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82241333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative analysis of frequent pattern mining algorithms used for streaming data 流数据频繁模式挖掘算法的比较分析
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229809
Shalini, Sanjay Kumar Jain
{"title":"A comparative analysis of frequent pattern mining algorithms used for streaming data","authors":"Shalini, Sanjay Kumar Jain","doi":"10.1109/CCAA.2017.8229809","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229809","url":null,"abstract":"Frequent pattern mining across streaming data i s a challenging task. It require real time response and incurs great computational complexity. In this paper, we discuss challenges of developing frequent pattern mining algorithms for streaming data, compare three algorithms proposed in literature and explore scope of improvement in the algorithms. We discuss the suitability of these algorithms according to applications.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81453961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SCRUM model for agile methodology 敏捷方法的SCRUM模型
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229928
Apoorva Srivastava, S. Bhardwaj, Shipra Saraswat
{"title":"SCRUM model for agile methodology","authors":"Apoorva Srivastava, S. Bhardwaj, Shipra Saraswat","doi":"10.1109/CCAA.2017.8229928","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229928","url":null,"abstract":"Software now rules the world and its development is integral to all the IT companies. Software development is very complex process and requires multidimensional growth. Having a single model like waterfall or prototype for development is not enough for the product requirements and thus agile development is most useful for customized product development. With adaptive nature and early delivery and flexible life cycle, Agile is best suited for quick and effective development of software. The researchers also suggest that agile adaptation gives maturity to the organization and helps in the CMM levels achievement. There are various frameworks for agile but some can be more complex or overwhelming to agile beginner and so amongst all, scrum provides an easy method to implement agile. Scrum is currently the top most technique used in development not only for software but even in the fields of finance, research etc. If we are able to address the few backlogs it has, Scrum can undoubtedly become the most sought after method to be chosen for development with no hassles.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78777593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
An exploratory study on perception of Indian crowd towards crowdsourcing software development 印度人群对众包软件开发认知的探索性研究
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229934
Shruti Sharma, Nitasha Hasteer, Jean Paul Van-Belle
{"title":"An exploratory study on perception of Indian crowd towards crowdsourcing software development","authors":"Shruti Sharma, Nitasha Hasteer, Jean Paul Van-Belle","doi":"10.1109/CCAA.2017.8229934","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229934","url":null,"abstract":"Evolution in the approaches to develop software has been rapid, continuous and tremendous. Crowdsourcing is the phenomenon of outsouring a problem to the public in order to get diverse solutions to that problem. Crowdsouring Software Development is a contest based activity in which organizations use crowdsourcing platforms to float a problem related to any phase of Software Development Life Cycle. Volunteers participate and compete for this activity and best solution provider gets the reward. This approach proves to be beneficial in reducing the overall cost of the project, getting more innovative solutions, high and good quality of software and many more. The benefits of Crowdsourcing Software Development motivated us to investigate the perception of Indian crowd towards this way of software development. A questionnaire-based survey was used and responses from 144 respondents who practice software development were analyzed through Exploratory Factor Analysis to understand the behavior of the crowd. Our study reveals that, although more than half of our respondents had participated in crowdsourcing, their experiences displayed quite a diversity. The developers tend to show positive attitude and they are motivated to earn money and learn. Lack of time to participate in such activity appears to be a concern.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90459298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A relative survey of various LEACH based routing protocols in wireless sensor networks 无线传感器网络中各种基于LEACH的路由协议的相关综述
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229878
Rishikesh, Abhijeet Das, Parmanand Astya
{"title":"A relative survey of various LEACH based routing protocols in wireless sensor networks","authors":"Rishikesh, Abhijeet Das, Parmanand Astya","doi":"10.1109/CCAA.2017.8229878","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229878","url":null,"abstract":"A WSN (Wireless Sensor Network) is made out of various number of hubs each of which comprise of detecting gadgets or sensing device to gather information from environment. These detecting gadgets are given processing unit to perform operations on information. These gadgets are conveyed arbitrarily in remote environment, because of which battery charging or substitution is not viewed as down to earth. Because of the progression in wireless environment, WSN is being utilized as a part of various zones like: military, civilian, and modern applications. A Wireless Sensor Network is a type of network which is shaped by expansive number of various sensor hubs which are arbitrarily a locale conveyed. An issue of constrained wellspring of energy as the source of power in the hub and due to the fact battery of hub cannot be supplanted or displaced. Lifespan of the WSN is especially subject to the battery life of every sensor hub. As hub does the detection and sends the information to the sink node from surrounding environment, thus in the WSN routing plans which is used for information sending needs to be productive as well as effectively use the force in battery of sensor hub that should be used to build the system lifespan. An energy optimistic routing protocol is the real worry in field of WSN. In this paper, a recent study of the Low Energy Adaptive Clustering Hierarchy abbreviated as LEACH and its various routing protocols with pros as well as cons. Researchers and Specialists have been attempting in create routing systems which improves the lifetime of WSN. Furthermore, correlation of these routing protocols on different assumptions is done.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86478293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Comparative study of tools for big data analytics: An analytical study 大数据分析工具的比较研究:一项分析研究
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229827
Sanjib Kumar Sahu, M. M. Jacintha, A. Singh
{"title":"Comparative study of tools for big data analytics: An analytical study","authors":"Sanjib Kumar Sahu, M. M. Jacintha, A. Singh","doi":"10.1109/CCAA.2017.8229827","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229827","url":null,"abstract":"Data sets grow rapidly in different forms due to digitalization. When the data or information sets which are too large and are complex in nature in which traditional data processing techniques are not able to deal with those complex data, then that data is called B ig data. Researchers, scientists, business organizations, government agencies, advertising agencies, medical researchers often come across more difficulty in dealing with data for any decision making. The data available for research has to be processed by using various techniques of data analytics which is called Big Data Analytics. These techniques helps in getting benefits in dealing with massive volume of either unstructured, structured or semi-structured data content that is fast changing nature, also not possible to process using conventional database techniques. This paper discusses the major utilization of big data analytics by comparing different tools available for big data validation. Furthermore, this paper discusses the case study conducted to overcome the big data challenges and needs.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88109644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信