MANET is a collection of computational devices that creates random topology for communication. The beauty of MANET is that it not required any central controller or base station. The devices used in MANET may be fixed or mobile. MANET is only a network in which devices worked as a host as well as router. The routing protocol used in mobile ad hoc network is broadly classified in three category-proactive, reactive and hybrid routing protocol. In this thesis work performance of AODV, AODVDR and ZRP is compared in the presence of different number of connection, different pause time and different number of communicating devices. In this work, network simulator tool NS2.35 is used for simulation. Simulation result shows the AODVDR is perform better than AODV and ZRP routing protocol.
{"title":"Performance Comparison of AODV, ZRP and AODVDR Routing Protocols in MANET","authors":"A. Sharma, M. Trivedi","doi":"10.1109/CICT.2016.53","DOIUrl":"https://doi.org/10.1109/CICT.2016.53","url":null,"abstract":"MANET is a collection of computational devices that creates random topology for communication. The beauty of MANET is that it not required any central controller or base station. The devices used in MANET may be fixed or mobile. MANET is only a network in which devices worked as a host as well as router. The routing protocol used in mobile ad hoc network is broadly classified in three category-proactive, reactive and hybrid routing protocol. In this thesis work performance of AODV, AODVDR and ZRP is compared in the presence of different number of connection, different pause time and different number of communicating devices. In this work, network simulator tool NS2.35 is used for simulation. Simulation result shows the AODVDR is perform better than AODV and ZRP routing protocol.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122944823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the processor speed is increasing day by day with the advancement in technology, memory vendors are forced to come-up with newer solutions which could match the processor speed without impacting the overall system efficiency. That's why industry has moved from SDRAM era to DDR4 era where memory is running at a speed more than 3GHz. DDR memory devices have been optimized for maximum speed and minimum power possible by the manufacturers, but are these enough to get the best out of any SOC? There are several parameters present at memory controller and SOC level which could impact the performance in a greater way and if they are not taken care appropriately, it could result into an inefficient system. Without optimizing those parameters, it is impossible to get the best outcome from the memory it is designed for. This paper throws light on those parameters and shows some result that how significantly DDR performance improves by optimizing those parameters. This paper also talks about system level scenarios where graphic controller is accessing DDR3 memory and how its read/write performance was increased within given cycles. It also describes different profilers used in hardware to measure the performance in an efficient manner.
{"title":"Tackling Roadblocks to Achieve Optimum DDR Performance","authors":"Amit Pal, A. Sinha, Abhinav Gaur","doi":"10.1109/CICT.2016.67","DOIUrl":"https://doi.org/10.1109/CICT.2016.67","url":null,"abstract":"As the processor speed is increasing day by day with the advancement in technology, memory vendors are forced to come-up with newer solutions which could match the processor speed without impacting the overall system efficiency. That's why industry has moved from SDRAM era to DDR4 era where memory is running at a speed more than 3GHz. DDR memory devices have been optimized for maximum speed and minimum power possible by the manufacturers, but are these enough to get the best out of any SOC? There are several parameters present at memory controller and SOC level which could impact the performance in a greater way and if they are not taken care appropriately, it could result into an inefficient system. Without optimizing those parameters, it is impossible to get the best outcome from the memory it is designed for. This paper throws light on those parameters and shows some result that how significantly DDR performance improves by optimizing those parameters. This paper also talks about system level scenarios where graphic controller is accessing DDR3 memory and how its read/write performance was increased within given cycles. It also describes different profilers used in hardware to measure the performance in an efficient manner.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116148384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years antennas operating on millimeter-wave frequencies have generated a considerable demand. The various unique applications of millimeter wave antennas along with the availability of the bandwidth makes them a very promising area which is yet to be explored. This paper is for designing of conventional antennas which can work for millimeter wave frequencies. This work includes mathematical analysis and designing of Horn and Yagi-uda antennas for mm-wave and simulation of basic parameters using HFSS. A rectangular shaped slot is incorporated into patch, and antenna structure is used as a patch with coplanar waveguide (CPW) as a feeding structure. A brief mathematical theory of both antennas, software introduction, design, applications and variations between calculated and observed values will be discussed along the result of our design. Our results and analysis show that the antennas are showing significant gain, so they can be applied for the applications we are aiming for.
{"title":"Design and Analysis of Conventional Antennas for the Applications in Millimeter-Waves","authors":"Priti Singh, A. Chakraborty, Ashok Yadav","doi":"10.1109/CICT.2016.107","DOIUrl":"https://doi.org/10.1109/CICT.2016.107","url":null,"abstract":"In recent years antennas operating on millimeter-wave frequencies have generated a considerable demand. The various unique applications of millimeter wave antennas along with the availability of the bandwidth makes them a very promising area which is yet to be explored. This paper is for designing of conventional antennas which can work for millimeter wave frequencies. This work includes mathematical analysis and designing of Horn and Yagi-uda antennas for mm-wave and simulation of basic parameters using HFSS. A rectangular shaped slot is incorporated into patch, and antenna structure is used as a patch with coplanar waveguide (CPW) as a feeding structure. A brief mathematical theory of both antennas, software introduction, design, applications and variations between calculated and observed values will be discussed along the result of our design. Our results and analysis show that the antennas are showing significant gain, so they can be applied for the applications we are aiming for.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126731305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prachi Dutta, Uzval Sai Gopinadha Varma Dontiboyina
Due to growing demands of water in the upcoming years and with many countries severely impacted by water crises today, we would need a more efficient system than traditional techniques of domestic water management. This paper aims at developing an efficient and cost effective method of placing an upper limit on the amount of water used daily. Our prototype is a faucet device which has two modes of operation: running mode and filling mode. User is pre-alarmed when more than optimum water amount is being dispensed. In order to do this, we have embedded an algorithm that integrates functions such as data acquisition and data management in a microcontroller that dynamically computes and compares the amount of water being dispensed through the flow sensor, with ideally required water amount for the two modes of operation. The proposed design is a strategy which will also help the user to keep a check on the amount of water leaking from the faucet, promoting smart planning for healthy and sustainable water management. This novel monitoring approach is inexpensive which also saves affluent quantity of water.
{"title":"Faucet Add-On Water Supply Management System Using Smart Sensors","authors":"Prachi Dutta, Uzval Sai Gopinadha Varma Dontiboyina","doi":"10.1109/CICT.2016.99","DOIUrl":"https://doi.org/10.1109/CICT.2016.99","url":null,"abstract":"Due to growing demands of water in the upcoming years and with many countries severely impacted by water crises today, we would need a more efficient system than traditional techniques of domestic water management. This paper aims at developing an efficient and cost effective method of placing an upper limit on the amount of water used daily. Our prototype is a faucet device which has two modes of operation: running mode and filling mode. User is pre-alarmed when more than optimum water amount is being dispensed. In order to do this, we have embedded an algorithm that integrates functions such as data acquisition and data management in a microcontroller that dynamically computes and compares the amount of water being dispensed through the flow sensor, with ideally required water amount for the two modes of operation. The proposed design is a strategy which will also help the user to keep a check on the amount of water leaking from the faucet, promoting smart planning for healthy and sustainable water management. This novel monitoring approach is inexpensive which also saves affluent quantity of water.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121635115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Supply Chain Management based organizations need to focus on development of strategies based on the services provided by them to stakeholders. To improve supplier chain value, optimal services need to be selected which may become agile based on the organizational factors. Agility can be differentiated at different levels of execution in SCM organization. Agility and leanness philosophies based on the range of products and services are provided by the organization. This paper focuses on the agility for services provided by SCM based organization. Since in every system there is fuzziness in its structure and function. The functional fuzziness can be easily reduced and compared to structural fuzziness. In this paper different methods based on fuzzy decision methods are compared for strategy development. Each service provided by organization is mapped with SCM strategies. From this set of services, optimal service is selected. This paper explains a case study of an organization working on SCM strategies. To find optimal service, different decision methods like Saaty's method, minimization of maximal regret method, AHP method, ranking method, and fuzzy average weighted method are compared to measure relativity of fuzziness in multiple objective frameworks by structuring the system hierarchically. This paper also shows advantages and disadvantage of these method as well as mathematical operation for selection of optimal services based on SCM strategies.
{"title":"Selection of Optimal Services Working on SCM Strategies Using Fuzzy Decision Making Methods","authors":"Aarti M. Karande, D. Kalbande","doi":"10.1109/CICT.2016.97","DOIUrl":"https://doi.org/10.1109/CICT.2016.97","url":null,"abstract":"Supply Chain Management based organizations need to focus on development of strategies based on the services provided by them to stakeholders. To improve supplier chain value, optimal services need to be selected which may become agile based on the organizational factors. Agility can be differentiated at different levels of execution in SCM organization. Agility and leanness philosophies based on the range of products and services are provided by the organization. This paper focuses on the agility for services provided by SCM based organization. Since in every system there is fuzziness in its structure and function. The functional fuzziness can be easily reduced and compared to structural fuzziness. In this paper different methods based on fuzzy decision methods are compared for strategy development. Each service provided by organization is mapped with SCM strategies. From this set of services, optimal service is selected. This paper explains a case study of an organization working on SCM strategies. To find optimal service, different decision methods like Saaty's method, minimization of maximal regret method, AHP method, ranking method, and fuzzy average weighted method are compared to measure relativity of fuzziness in multiple objective frameworks by structuring the system hierarchically. This paper also shows advantages and disadvantage of these method as well as mathematical operation for selection of optimal services based on SCM strategies.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131618697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In today's digital world scenario, digital data is coming in and going out faster than ever before. This data is of no use until we extract some useful content from it. But, it is impractical and inefficient to use traditional database management techniques on big data. That's why, big data technologies like Hadoop comes to existence. Hadoop is an open source framework, which can be used to process the huge amount of data in parallel. To extract useful information, data mining techniques can be used. Among many techniques of data mining, clustering is most popular technique. Clustering bind together the similar data in same group, whereas, dissimilar data is scattered in different groups. K Means clustering algorithm is one of the clustering technique. Traditional K Means clustering tries to assign n data objects to k clusters starting with random initial centers. Experiments show that data mining results are inefficient and unstable, if we use random initial centers. In this paper, we have modified traditional K Means clustering algorithm by using improved initial centers. We have proposed various methods to calculate the initial centers and compared their results.
{"title":"MapReduce Model of Improved K-Means Clustering Algorithm Using Hadoop MapReduce","authors":"N. Akthar, Mohd Vasim Ahamad, Shahbaaz Ahmad","doi":"10.1109/CICT.2016.46","DOIUrl":"https://doi.org/10.1109/CICT.2016.46","url":null,"abstract":"In today's digital world scenario, digital data is coming in and going out faster than ever before. This data is of no use until we extract some useful content from it. But, it is impractical and inefficient to use traditional database management techniques on big data. That's why, big data technologies like Hadoop comes to existence. Hadoop is an open source framework, which can be used to process the huge amount of data in parallel. To extract useful information, data mining techniques can be used. Among many techniques of data mining, clustering is most popular technique. Clustering bind together the similar data in same group, whereas, dissimilar data is scattered in different groups. K Means clustering algorithm is one of the clustering technique. Traditional K Means clustering tries to assign n data objects to k clusters starting with random initial centers. Experiments show that data mining results are inefficient and unstable, if we use random initial centers. In this paper, we have modified traditional K Means clustering algorithm by using improved initial centers. We have proposed various methods to calculate the initial centers and compared their results.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130526356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A clustering problem occurs when an object needs to be assigned into a predefined group or class based on a number of observed attributes related to that object. The existing Competitive Learning (CL) algorithm and its variants (Frequency Sensitive Competitive Learning (FSCL), Rival Penalized Competitive Learning (RPCL), and Rival Penalized Controlled Competitive Learning (RPCCL)) have provided an appealing way to perform data clustering without knowing the exact number of clusters prior to clustering. This paper studies and analyzes the performance of these algorithms. The experimental results have been analyzed on the 2-D Gaussian data with the learning rate parameter kept same for all algorithms. The result showed that if number of output clusters is chosen equal to the number of clusters present in the input data then the performance for all the algorithms remains almost equal but when this number is chosen larger than the clusters present, then the RPCCL outperforms the other algorithms. Thus RPCCL gives the best performance in automatic cluster selection and we can use this feature of RPCCL algorithm in various useful applications like cluster analysis, curve detection, image segmentation, medical data analysis etc.
{"title":"Performance Analysis of the Competitive Learning Algorithms on Gaussian Data in Automatic Cluster Selection","authors":"Harsh Khatter, V. Aggarwal, A. Ahlawat","doi":"10.1109/CICT.2016.19","DOIUrl":"https://doi.org/10.1109/CICT.2016.19","url":null,"abstract":"A clustering problem occurs when an object needs to be assigned into a predefined group or class based on a number of observed attributes related to that object. The existing Competitive Learning (CL) algorithm and its variants (Frequency Sensitive Competitive Learning (FSCL), Rival Penalized Competitive Learning (RPCL), and Rival Penalized Controlled Competitive Learning (RPCCL)) have provided an appealing way to perform data clustering without knowing the exact number of clusters prior to clustering. This paper studies and analyzes the performance of these algorithms. The experimental results have been analyzed on the 2-D Gaussian data with the learning rate parameter kept same for all algorithms. The result showed that if number of output clusters is chosen equal to the number of clusters present in the input data then the performance for all the algorithms remains almost equal but when this number is chosen larger than the clusters present, then the RPCCL outperforms the other algorithms. Thus RPCCL gives the best performance in automatic cluster selection and we can use this feature of RPCCL algorithm in various useful applications like cluster analysis, curve detection, image segmentation, medical data analysis etc.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124721707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Ahuja, S. Sharma, G. Singh, Arvind Sharma, Arika Singh
Wind technology is one of the fastest developing renewable technologies. Squirrel cage induction generator (SCIG) with back to back fully rated converter used for wind energy conversion systems (WECS) is a meritorious option among its class. SCIG's offer advantages of being robust, suitable for any harsh environment, cheaply available and unsophisticated than the other types available. To enable increased share of wind energy in the grid without compromising power system stability, the generator ought to stay connected and continue to feed the grid even in case of disturbances such as voltage sag. This paper presents a coordinated control scheme to address the fault ride through of SCIG based WECS. A WECS based on SCIG having back to back connected voltage source converters involving Rotor flux oriented vector controlled drive at machine side and hysteresis current controlled inverter for grid interface has been simulated in MATLAB/SIMULINK. Abnormal rise in dc link voltage during symmetrical faults is controlled by de-loading control while positive-negative sequence control is used for real and reactive power control during symmetrical and unsymmetrical faults. During this work, coordinated performance of all the above stated control strategies during most severe symmetrical (LLL) and most frequently occurring unsymmetrical (LG) fault has been examined.
{"title":"Coordinated Fault Ride through Strategy for SCIG Based WECS","authors":"H. Ahuja, S. Sharma, G. Singh, Arvind Sharma, Arika Singh","doi":"10.1109/CICT.2016.90","DOIUrl":"https://doi.org/10.1109/CICT.2016.90","url":null,"abstract":"Wind technology is one of the fastest developing renewable technologies. Squirrel cage induction generator (SCIG) with back to back fully rated converter used for wind energy conversion systems (WECS) is a meritorious option among its class. SCIG's offer advantages of being robust, suitable for any harsh environment, cheaply available and unsophisticated than the other types available. To enable increased share of wind energy in the grid without compromising power system stability, the generator ought to stay connected and continue to feed the grid even in case of disturbances such as voltage sag. This paper presents a coordinated control scheme to address the fault ride through of SCIG based WECS. A WECS based on SCIG having back to back connected voltage source converters involving Rotor flux oriented vector controlled drive at machine side and hysteresis current controlled inverter for grid interface has been simulated in MATLAB/SIMULINK. Abnormal rise in dc link voltage during symmetrical faults is controlled by de-loading control while positive-negative sequence control is used for real and reactive power control during symmetrical and unsymmetrical faults. During this work, coordinated performance of all the above stated control strategies during most severe symmetrical (LLL) and most frequently occurring unsymmetrical (LG) fault has been examined.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116523780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the advent of MIMO, more utilization of scarce spectrum could be achieved by using lesser power consumption. In some situations, results of practical implementations are lower as compared to simulation results. The implementation of dual antenna array architectures to create multiple-input multiple-output (MIMO) configurations has attracted considerable interest in wireless communication technology to improve the overall system performance. This article provides an experimental analysis to these MIMO communication systems and explains how such capacity gains can be achieved using this technology. This paper provides a detailed performance analysis for open loop (OL) MIMO schemes for the mobile broadband radio access technology like 3GPP. In this work, practical results are analyzed using USRPs 2920. The coding technique used in the work is space time block code that creates capacity gain and helps in improvement of robustness of the link. The results presented in this paper are based on experimental MIMO set-up(2*2) using USRP 2920 (Universal Software Radio Peripheral). The antennas used for experimental investigation is 7 inch vertical tri-band antenna.
{"title":"Implementation & BER Analysis of 2×2 MIMO Using USRP 2920- Universal Software Radio Peripheral","authors":"G. Soni, G. Kaur, V. Banga","doi":"10.1109/CICT.2016.109","DOIUrl":"https://doi.org/10.1109/CICT.2016.109","url":null,"abstract":"With the advent of MIMO, more utilization of scarce spectrum could be achieved by using lesser power consumption. In some situations, results of practical implementations are lower as compared to simulation results. The implementation of dual antenna array architectures to create multiple-input multiple-output (MIMO) configurations has attracted considerable interest in wireless communication technology to improve the overall system performance. This article provides an experimental analysis to these MIMO communication systems and explains how such capacity gains can be achieved using this technology. This paper provides a detailed performance analysis for open loop (OL) MIMO schemes for the mobile broadband radio access technology like 3GPP. In this work, practical results are analyzed using USRPs 2920. The coding technique used in the work is space time block code that creates capacity gain and helps in improvement of robustness of the link. The results presented in this paper are based on experimental MIMO set-up(2*2) using USRP 2920 (Universal Software Radio Peripheral). The antennas used for experimental investigation is 7 inch vertical tri-band antenna.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent research work shows that feature fusion technique is not widely used in computer virus detection. Viruses generated from kits like NGVCK are detected effectively using feature fusion approach. Our purpose is to examine various flavours of feature fusion approach in virus detection.
{"title":"Analysis of Computer Virus Using Feature Fusion","authors":"A. Bist, A. Sharma","doi":"10.1109/CICT.2016.127","DOIUrl":"https://doi.org/10.1109/CICT.2016.127","url":null,"abstract":"Recent research work shows that feature fusion technique is not widely used in computer virus detection. Viruses generated from kits like NGVCK are detected effectively using feature fusion approach. Our purpose is to examine various flavours of feature fusion approach in virus detection.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133195783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}