{"title":"Analyzing Titanic disaster using machine learning algorithms","authors":"Aakriti Singh, Shipra Saraswat, Neetu Faujdar","doi":"10.31142/ijtsrd7003","DOIUrl":"https://doi.org/10.31142/ijtsrd7003","url":null,"abstract":"Titanic disaster occurred 100 years ago on April 15, 1912, killing about 1500 passengers and crew members. The fateful incident still compel the researchers and analysts to understand what can have led to the survival of some passengers and demise of the others. With the use of machine learning methods and a dataset consisting of 891 rows in the train set and 418 rows in the test set, the research attempts to determine the correlation between factors such as age, sex, passenger class, fare etc. to the chance of survival of the passengers. These factors may or may not have impacted the survival rates of the passengers. In this research paper, various machine learning algorithms namely Logistic Regression, Naive Bayes, Decision Tree, Random Forest have been implemented to predict the survival of passengers. In particular, this research work compares the algorithm on the basis of the percentage of accuracy on a test dataset.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"1 1","pages":"406-411"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77095605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of different dielectric materials on enzyme field effect transistor","authors":"P. K. Sharma, Hiranya Ranjan Thakur, J. Dutta","doi":"10.1109/CCAA.2017.8230029","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230029","url":null,"abstract":"This paper presents the effects of different dielectrics used as gate insulating material in the enzyme field effect transistor (ENFET) device. Different insulating materials have different properties which put an impact on the device sensitivity. The acid and base equilibrium of the dielectrics bring changes to the ENFET sensitivity. The pHpzc (pH at point of zero charge) is different for different dielectric material which also results in variations in the surface potential. The device model was tested for substrate sample with pH varying from 2 to 12. The potential variation that occurs at the surface of the device due to change in gate insulator was recorded and compared. It was found that with different gate insulating materials, the sensitivity of the device also varies. Ta2O5 was recorded as the most sensitive device under certain assumptions as compared to other insulating materials like SiO2, Al2O3, ZrO2, HfO2 and TiO2. The sensitivity variation with temperature is also shown for different materials.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"167 1","pages":"1457-1560"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76384863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image encryption algorithm using chaotic sequences and flipping","authors":"Priyanka Takkar, Ashish Girdhar, V.P. Singh","doi":"10.1109/CCAA.2017.8229978","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229978","url":null,"abstract":"Image Encryption is a technique to make the image unreadable. This can be achieved by realigning the pixel value of image or by changing the pixel value of an image. In this paper, an image encryption algorithm has been proposed where pixel value is changed using logistic map (diffusion) and position of pixel value is changed using flipping (confusion). The simulation result shows that encryption algorithm is easy to implement, secure and time efficient.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"126 1","pages":"1188-1191"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75827571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of robust low cost and low power prototype for generic counting system","authors":"Deepshikha Yadav, Puneet Azad","doi":"10.1109/CCAA.2017.8230036","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230036","url":null,"abstract":"Alow-cost and low-power generic counting system prototype is proposed and designed in this paper for counting the occurrences of certain events. A sensor strip was developed on a rough acrylic sheet by placing a very thin film (50ßm) of PTFE on aluminium with a gap between them. This strip requires no input power and is efficient for long term use due to its robustness. On applying a lateral force on PTFE, voltage spikes were generated, which acted as input data for Arduino Uno controller. After successful reduction of noise, a legitimate input pulse was registered and counter value was incremented on a 7 segment display. System was put under test in real-time environment and results were verified in accordance with the actual data.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"1 1","pages":"1493-1498"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76054198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power and capacity optimization for wireless sensor network (WSN)","authors":"A. Basnet, S. Shakya, Mandira Thapa","doi":"10.1109/CCAA.2017.8229895","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229895","url":null,"abstract":"Latest technology requires increase in spectral efficiency by optimum utilization of the spectrum band with higher power efficiency. In this paper first, Altera FPGA for communication with FIR band pass filter has been analyzed and implemented in hardware and then maximum allowable total power that interferes below than limit is adaptively calculated. For power distribution, two power and capacity optimization algorithm; namely Water filling and Iterative water filling are used. The paper is also able to calculate and distribute power in different subcarrier for multiple nodes to maximize total system data rate or spectrum efficiency.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"8 1","pages":"434-439"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87821063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent advancements in facial expression recognition systems: A survey","authors":"Uzair Asad, Nirbhay Kashyap, Shailendra Narayan Singh","doi":"10.1109/CCAA.2017.8229981","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229981","url":null,"abstract":"A facial expression is exhibited by the movement of muscles underneath the face skin. Automatic Facial Expression Recognition comprises of three main phases: Feature Extraction, Feature Selection and Expression Classification. Facial Expression Recognition (FER) has a very important role in computer vision, human machine interaction and modern gaming. The objective of this research work is to explore the latest developments in Facial Expression Recognition domain. Our work identified the different models that are being utilized for feature extraction, the methods used for feature selection process and the classifiers employed for the purpose of expression classification. We gathered all the data like the methods used in different publications and their main contribution in this field and assembled the information in a tabulated form. We also tried to find out what could be the upcoming developments in Facial Expression Recognition Systems as future scope.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"2 3 1","pages":"1203-1208"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89944557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fit-Wit: Design and development of wearable healthcare device based on Intel Curie platform","authors":"N. Sharma, Zeenat Shareef, S. Reddy","doi":"10.1109/CCAA.2017.8230014","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230014","url":null,"abstract":"Many wearable devices have been developed with different technologies to track the fitness of human body. Smart watches, wrist bands, smart phones have been designed to support such applications. But many of them are unaffordable because of very high cost and high power consumption. This paper deals with the design and development of a smart wearable device called “Fit-Wit” as this device will witness the fitness of an individual. This device informs the user about their body temperature, heart-rate and motion. The device is based on Intel Genuino 101 development platform as it is specifically designed for wearable healthcare technology due to its small size and lower power dissipation. Effort is being taken to make this device simple, small size, portable and easy to use. Further, an analysis is conducted which ensures consistency and accuracy of the device.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"13 1","pages":"1271-1276"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90179427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bee colony inspired clustering protocol for wireless sensor networks","authors":"Zaheeruddin, A. Pathak","doi":"10.1109/CCAA.2017.8229865","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229865","url":null,"abstract":"A Wireless Sensor Network consists of enormous amount of sensor nodes. These sensor nodes sense the information from the sensing region and transmit to the sink. From the sink a client can access the required information. Essential part of the wireless sensor network is the sensor nodes that are driven with the batteries. Prolonging the network lifetime is very difficult and expensive in many conditions (eg. resource exploration in hostile locations, wildlife safety etc). Dividing the sensing area into clusters is advantages in wireless sensor network to enhance network lifetime. In this paper, Bee colony inspired clustering protocol is introduced which takes of inspiration for achieving high efficiency and stability performance from bee colonies. Experimental results demonstrate the efficiency of proposed protocol to strike the appropriate performance in the lifetime of the wireless sensor network.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"54 1","pages":"570-575"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84744666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of imperfect sensing on performance of adaptive back-off algorithm for contention window of CSMA","authors":"Surbhi Jain, Brahmjit Singh","doi":"10.1109/CCAA.2017.8229869","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229869","url":null,"abstract":"Adaptive contention window algorithms are most commonly used in CSMA/CA to improve the throughput, fairness and reduce the latency and the collision probabilities in today's applications. All the calculations are done with keeping perfect carrier sensing in mind. There is a huge role played by sensing errors like probability of false alarm and probability of miss detection, in the carrier sensing process. In this paper we tried to find out a relationship between these sensing errors and the number of stations. It is being found out by simulations that at lower number of stations probability of false alarm is prominent, whereas at higher density of stations, probability of miss detection is more exclusively visible.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"19 1","pages":"588-591"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83755465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient distribution of virtual machines using Honey bee windowing in cloud computing","authors":"A. Firos, Seema Khanum","doi":"10.1109/CCAA.2017.8229996","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229996","url":null,"abstract":"This paper presents an approach for developing virtual computing layer which is used by the cloud terminals during the virtual infrastructure downloading. The virtual computing layer is cable of image creation, maintenance and downloading on behalf of the cloud terminals. Using such virtual computing layer will considerably reduce the load maintained between the virtual computing client and the server. It also schedules the image downloading in the cloud infrastructure based on software image windows. The Honey bee foraging algorithm performs the work in different phases while creation of virtual images. The forage bees will search for the suitable image portion in the neighborhood and the scout bees will bring the found portion from the location indicated by the forage bees.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"19 1","pages":"1292-1295"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84378614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}