Deepti Gupta, Shubham Singh, Shivam Gupta, P. Singhal
In this present work, a microstrip low pass filter has been developed with wide stop band. In this work, in order to achieve sharp cut-off and high attenuation in stop band, two techniques namely CSRR (Complementary Split Ring Resonator) and SRR. (Split Ring Resonator) are used. In this work both of the above mentioned techniques are used at a time in the same patch. Comparison between normal and enhanced responses have been shown.
{"title":"Design of Microstrip Lowpass Filter with High Attenuation in Wide Stop Band","authors":"Deepti Gupta, Shubham Singh, Shivam Gupta, P. Singhal","doi":"10.1109/CICT.2016.119","DOIUrl":"https://doi.org/10.1109/CICT.2016.119","url":null,"abstract":"In this present work, a microstrip low pass filter has been developed with wide stop band. In this work, in order to achieve sharp cut-off and high attenuation in stop band, two techniques namely CSRR (Complementary Split Ring Resonator) and SRR. (Split Ring Resonator) are used. In this work both of the above mentioned techniques are used at a time in the same patch. Comparison between normal and enhanced responses have been shown.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132240047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is a novel paradigm where resources are provisioned on demand. The ever-increasing status of cloud hypothesis and the budding concept of federated cloud computing have enthused research efforts towards intellectual cloud service selection. Due to the improving status of cloud computing there are a deluge of enterprises that are using cloud environment. In the recent years cloud has acquired impetus in different organizations, therefore cloud performance evaluation and its proper analysis is of utmost importance and can help users make right decisions. Certain key performance factors in cloud include latency, bandwidth, recovery, availability, scalability, security and storage. Latency occurs in cloud due to delay in network because of congestion. If an application takes a larger amount of time to wait for a response from a data centre, performance will suffer due lack of proper bandwidth utilization. Thus, in this paper we present a view on the other major cloud performance factors and also discuss the dependency of cloud performance on these factors. We also discuss different approaches for reducing latency for performance optimization in cloud computing.
{"title":"A Survey on Latency Reduction Approaches for Performance Optimization in Cloud Computing","authors":"Sonam Srivastava, S. Singh","doi":"10.1109/CICT.2016.30","DOIUrl":"https://doi.org/10.1109/CICT.2016.30","url":null,"abstract":"Cloud computing is a novel paradigm where resources are provisioned on demand. The ever-increasing status of cloud hypothesis and the budding concept of federated cloud computing have enthused research efforts towards intellectual cloud service selection. Due to the improving status of cloud computing there are a deluge of enterprises that are using cloud environment. In the recent years cloud has acquired impetus in different organizations, therefore cloud performance evaluation and its proper analysis is of utmost importance and can help users make right decisions. Certain key performance factors in cloud include latency, bandwidth, recovery, availability, scalability, security and storage. Latency occurs in cloud due to delay in network because of congestion. If an application takes a larger amount of time to wait for a response from a data centre, performance will suffer due lack of proper bandwidth utilization. Thus, in this paper we present a view on the other major cloud performance factors and also discuss the dependency of cloud performance on these factors. We also discuss different approaches for reducing latency for performance optimization in cloud computing.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115318080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
From the past few years, vehicle plate recognition is becoming the most challenging and interesting topic of surveillance. It is challenging because number plate comes in different size, shape and written in different font style. It is interesting because of its use in security applications. In this paper we have proposed a robust and simple approach based on edge detection and segmentation with morphological operations. Our suggested approach is performed in three steps: In first step detection of license plate is performed. In second step, segmentation of character is done from detected number plate. While in the third step, recognition of segmented character is performed. We have tested several images taken under different weather condition to check the validity, robustness and efficiency of our algorithm. The result of our experiments is very satisfactory and opens the track of our algorithm to be used in many real life applications.
{"title":"An Efficient Algorithm for Automatic Car Plate Detection & Recognition","authors":"Anubhav Agarwal, Sudhir Goswami","doi":"10.1109/CICT.2016.133","DOIUrl":"https://doi.org/10.1109/CICT.2016.133","url":null,"abstract":"From the past few years, vehicle plate recognition is becoming the most challenging and interesting topic of surveillance. It is challenging because number plate comes in different size, shape and written in different font style. It is interesting because of its use in security applications. In this paper we have proposed a robust and simple approach based on edge detection and segmentation with morphological operations. Our suggested approach is performed in three steps: In first step detection of license plate is performed. In second step, segmentation of character is done from detected number plate. While in the third step, recognition of segmented character is performed. We have tested several images taken under different weather condition to check the validity, robustness and efficiency of our algorithm. The result of our experiments is very satisfactory and opens the track of our algorithm to be used in many real life applications.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123872531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Position based routing scheme uses the location information of nodes for communication. Position based routing scheme is also known as location based or geographic based routing protocols. These schemes reduce the consumption of the energy and improve the networks lifetime. In this paper, we have explained the different position based routing schemes and analyze the some significant position based routing schemes such asMECN, SMECN, TBF, GAF, and GEAR. For good understanding, the comparison of these protocols with few other routing protocols on the basis of different parameters is given. In the last section of this paper, we have also presented the applications, advantages, and drawbacks of these routing schemes.
{"title":"Position Based Routing Schemes in Wireless Sensor Networks: A Review","authors":"A. Yadav, Poonam Rana","doi":"10.1109/CICT.2016.69","DOIUrl":"https://doi.org/10.1109/CICT.2016.69","url":null,"abstract":"Position based routing scheme uses the location information of nodes for communication. Position based routing scheme is also known as location based or geographic based routing protocols. These schemes reduce the consumption of the energy and improve the networks lifetime. In this paper, we have explained the different position based routing schemes and analyze the some significant position based routing schemes such asMECN, SMECN, TBF, GAF, and GEAR. For good understanding, the comparison of these protocols with few other routing protocols on the basis of different parameters is given. In the last section of this paper, we have also presented the applications, advantages, and drawbacks of these routing schemes.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121623743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enterprise Resource Planning along with Business Intelligence, if implemented effectively can provide several benefits such as improved visibility, real time data access, fast interdepartmental communications etc. In paper presented, a depth studies is carried out over ERP implementation and their issues. Some of the identified issues can be categorized into Misalignment and security aspects. Misalignment can be defined as probability of mismatch between ERP and company needs in which it is implemented.
{"title":"Applicability and Impact of ERP: A Survey","authors":"P. S. Bhati, M. Trivedi","doi":"10.1109/CICT.2016.15","DOIUrl":"https://doi.org/10.1109/CICT.2016.15","url":null,"abstract":"Enterprise Resource Planning along with Business Intelligence, if implemented effectively can provide several benefits such as improved visibility, real time data access, fast interdepartmental communications etc. In paper presented, a depth studies is carried out over ERP implementation and their issues. Some of the identified issues can be categorized into Misalignment and security aspects. Misalignment can be defined as probability of mismatch between ERP and company needs in which it is implemented.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116024467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Modern high performance cluster systems for parallel processing are employing multi-core processors and high speed interconnection networks. Efficient mapping of the processes of a parallel application onto cores of such a cluster system, plays a vital role in improving the performance of that application. Parallel application can be modelled as a weighted graph showing the communication among the processes of that application. Such a graph can be constructed with the help of profiling tools. Cluster hardware also can be modelled as a graph, by collecting hardware details using HWLOC tool. Maximum weight matching based approach can be used to embed the application graph into cluster hardware graph. The proposed approach is implemented under a cluster system and tested using benchmark MPI parallel application. The performance of the parallel application, which is mapped using the proposed approach is better than, that is mapped using the legacy packed and round robin approaches of MPI library.
{"title":"Process Assignment in Multi-core Clusters Using Job Assignment Algorithm","authors":"Ch. Sudhakar, Pankaj Adhikari, T. Ramesh","doi":"10.1109/CICT.2016.58","DOIUrl":"https://doi.org/10.1109/CICT.2016.58","url":null,"abstract":"Modern high performance cluster systems for parallel processing are employing multi-core processors and high speed interconnection networks. Efficient mapping of the processes of a parallel application onto cores of such a cluster system, plays a vital role in improving the performance of that application. Parallel application can be modelled as a weighted graph showing the communication among the processes of that application. Such a graph can be constructed with the help of profiling tools. Cluster hardware also can be modelled as a graph, by collecting hardware details using HWLOC tool. Maximum weight matching based approach can be used to embed the application graph into cluster hardware graph. The proposed approach is implemented under a cluster system and tested using benchmark MPI parallel application. The performance of the parallel application, which is mapped using the proposed approach is better than, that is mapped using the legacy packed and round robin approaches of MPI library.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127171063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tenzin Doleck, Amanda Jarrell, E. Poitras, Maher Chaouachi, Susanne P. Lajoie
This paper is motivated by two observations on computer-supported education: First, there has been growing availability, rapid proliferation, and increased diversity of learner-system educational data. Second, advances in learning analytics and data mining have facilitated and spawned a variety of novel investigations using such data. Driven by these complementary trends, the present work is geared towards exploring knowledge-based discovery approaches in understanding learner-system usage data. More specifically, with an eye toward tracing and comprehending learner behaviors in a medical intelligent tutoring system, we explore the utility of Process Mining, in understanding the problem solving trajectories of students in a medical computer-based learning environment.
{"title":"Examining Diagnosis Paths: A Process Mining Approach","authors":"Tenzin Doleck, Amanda Jarrell, E. Poitras, Maher Chaouachi, Susanne P. Lajoie","doi":"10.1109/CICT.2016.137","DOIUrl":"https://doi.org/10.1109/CICT.2016.137","url":null,"abstract":"This paper is motivated by two observations on computer-supported education: First, there has been growing availability, rapid proliferation, and increased diversity of learner-system educational data. Second, advances in learning analytics and data mining have facilitated and spawned a variety of novel investigations using such data. Driven by these complementary trends, the present work is geared towards exploring knowledge-based discovery approaches in understanding learner-system usage data. More specifically, with an eye toward tracing and comprehending learner behaviors in a medical intelligent tutoring system, we explore the utility of Process Mining, in understanding the problem solving trajectories of students in a medical computer-based learning environment.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"C-19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126770112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research paper gives a comparison on energy parameters for Cloud based Mobile Applications in android and iOS platform. The difference between the Online i.e. Cloud Based Mode of a mobile application and offline i.e. non-cloud based mode exists of same mobile application in Android platform leads to idea of generation of energy calculation parameters. Here, we showed simulation results on difference of CPU and 3G parameters of energy saving capabilities of mobile application in both cloud and non-cloud modes using tools available in android sdk. Further energy paradigm of iOS platforms is calculated and comparison is performed between these two platforms.
{"title":"Proof Based Analytical Comparison of Energy Parameters between Android and iOS Platform for Heterogeneous Cloud Based Application","authors":"Payal Mittal, S. Rawat, Praveen Kumar","doi":"10.1109/CICT.2016.71","DOIUrl":"https://doi.org/10.1109/CICT.2016.71","url":null,"abstract":"This research paper gives a comparison on energy parameters for Cloud based Mobile Applications in android and iOS platform. The difference between the Online i.e. Cloud Based Mode of a mobile application and offline i.e. non-cloud based mode exists of same mobile application in Android platform leads to idea of generation of energy calculation parameters. Here, we showed simulation results on difference of CPU and 3G parameters of energy saving capabilities of mobile application in both cloud and non-cloud modes using tools available in android sdk. Further energy paradigm of iOS platforms is calculated and comparison is performed between these two platforms.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121521143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today, technology is growing rapidly and providingall essential and effective solutions for every requirement. Nowa day's child security is an important area of concern. Thismodel is developed to rectify the worries of parents regardingtheir child security. In this scenario, Our system ensuresmaximum security and ensures live tracking for their kidsbecause parent worries are genuine. This paper proposed amodel for child safety through smart phones that provides theoption to track the location of their children as well as in caseof emergency children is able to send a quick message and itscurrent location via Short Message services. This proposedsystem is validated by testing on the Android platform.
{"title":"Child Safety & Tracking Management System by Using GPS, Geo-Fencing & Android Application: An Analysis","authors":"Aditi Gupta, Vibhor Harit","doi":"10.1109/CICT.2016.141","DOIUrl":"https://doi.org/10.1109/CICT.2016.141","url":null,"abstract":"Today, technology is growing rapidly and providingall essential and effective solutions for every requirement. Nowa day's child security is an important area of concern. Thismodel is developed to rectify the worries of parents regardingtheir child security. In this scenario, Our system ensuresmaximum security and ensures live tracking for their kidsbecause parent worries are genuine. This paper proposed amodel for child safety through smart phones that provides theoption to track the location of their children as well as in caseof emergency children is able to send a quick message and itscurrent location via Short Message services. This proposedsystem is validated by testing on the Android platform.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134056721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Unsupervised classification creates clusters by grouping pixels based on the reflectance properties of pixels. This paper presents a new approach to classify multi-spectral remotely sensed image using pixels' density in N-dimensional scatterplot. It first finds the densely populated clusters in N-dimensional scatter plot and then finds gravity centers of these densely populated clusters. Later, multispectral image is classified using minimum distance to gravity classifier. At the beginning of classification, this approach neither makes extreme assumption of considering each pixel as a different cluster nor goes to the other extreme by considering all the pixels in a single cluster. It follows the middle path by making assumption of some pixels as gravity centers of different clusters before classifying the image. It creates clusters of equal size in N-dimensional scatter plot and picks up the densely populated clusters. All these clusters are recursively iterated for self-adjustment of gravity centers using mathematical algorithm. The approach uses gravitational force for merging two nearby clusters. Here, gravity center of a cluster is calculated by summing up the spectral bands' values and dividing it by number of pixels within that cluster. When two nearby clusters are merged, their gravity centers are also adjusted accordingly. This provides the most densely populated clusters and their gravity centers. Now, these gravity centers can be used to classify the remotely sensed image using minimum distance to gravity center classifier.
{"title":"Unsupervised Classification Using Gravity Centers from Scatter Plot","authors":"A. Khare","doi":"10.1109/CICT.2016.36","DOIUrl":"https://doi.org/10.1109/CICT.2016.36","url":null,"abstract":"Unsupervised classification creates clusters by grouping pixels based on the reflectance properties of pixels. This paper presents a new approach to classify multi-spectral remotely sensed image using pixels' density in N-dimensional scatterplot. It first finds the densely populated clusters in N-dimensional scatter plot and then finds gravity centers of these densely populated clusters. Later, multispectral image is classified using minimum distance to gravity classifier. At the beginning of classification, this approach neither makes extreme assumption of considering each pixel as a different cluster nor goes to the other extreme by considering all the pixels in a single cluster. It follows the middle path by making assumption of some pixels as gravity centers of different clusters before classifying the image. It creates clusters of equal size in N-dimensional scatter plot and picks up the densely populated clusters. All these clusters are recursively iterated for self-adjustment of gravity centers using mathematical algorithm. The approach uses gravitational force for merging two nearby clusters. Here, gravity center of a cluster is calculated by summing up the spectral bands' values and dividing it by number of pixels within that cluster. When two nearby clusters are merged, their gravity centers are also adjusted accordingly. This provides the most densely populated clusters and their gravity centers. Now, these gravity centers can be used to classify the remotely sensed image using minimum distance to gravity center classifier.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"332 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133919242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}