Pub Date : 2019-04-01DOI: 10.1109/ICIICT1.2019.8741422
T. Vishrutha, P. Chitra
Cloud usage increases with increase in computational demands. The number of tasks for execution in cloud increases which ends up in complexity of scheduling tasks to resources in an energy efficient manner and with reduction of computation time. To resolve this issue Bacterial Foraging Optimization (BFO) algorithm proves to handle energy and time consumption efficiently. Though Bacterial Foraging Optimization (BFO) is one of the widely known and robust algorithm for handling multi-objective optimization problems, the algorithm is basically static and is run for a fixed number of iterations. Due to the inflexibility of the algorithm, there exists a need for the improvement of the existing Bacterial Foraging Optimization (BFO) algorithm. This paper rolls out an improved version of Bacterial Foraging Optimization (BFO) called Intelligent Bacterial Foraging Optimization (IBFO) algorithm that is dynamic based on the problem. Intelligent Bacterial Foraging Optimization (IBFO) algorithm is found to be more efficient than the existing Bacterial Foraging Optimization (BFO) algorithm in task scheduling in cloud environment.
{"title":"Efficient Task Allocation Using Intelligent Bacterial Foraging Optimization (IBFO) Algorithm in Cloud","authors":"T. Vishrutha, P. Chitra","doi":"10.1109/ICIICT1.2019.8741422","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741422","url":null,"abstract":"Cloud usage increases with increase in computational demands. The number of tasks for execution in cloud increases which ends up in complexity of scheduling tasks to resources in an energy efficient manner and with reduction of computation time. To resolve this issue Bacterial Foraging Optimization (BFO) algorithm proves to handle energy and time consumption efficiently. Though Bacterial Foraging Optimization (BFO) is one of the widely known and robust algorithm for handling multi-objective optimization problems, the algorithm is basically static and is run for a fixed number of iterations. Due to the inflexibility of the algorithm, there exists a need for the improvement of the existing Bacterial Foraging Optimization (BFO) algorithm. This paper rolls out an improved version of Bacterial Foraging Optimization (BFO) called Intelligent Bacterial Foraging Optimization (IBFO) algorithm that is dynamic based on the problem. Intelligent Bacterial Foraging Optimization (IBFO) algorithm is found to be more efficient than the existing Bacterial Foraging Optimization (BFO) algorithm in task scheduling in cloud environment.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133185449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICIICT1.2019.8741490
P. Kumar, Fahad Iqbal
Due to rapid growth of internet, online buying product is an important part of everyone’s lifestyle most of the time MasterCard is employed to pay online for products. It's a straightforward thanks to looking, people will get their required product on your visual display unit or on sensible phone. For online purchase use of MasterCard will increase dramatically however still there's some loop holes in system of online looking that causes online frauds or credit card frauds. Thus, fraud detection systems became essential for all MasterCard supply banks to attenuate their losses. The foremost normally used fraud detection strategies are Neural Network (NN), rule-induction techniques, fuzzy system, call trees, Support Vector Machines (SVM), Logistic Regression, Local Outlier Factor (LOF), Isolation Forest, K-Nearest Neighbor, Genetic algorithms. These techniques are often used alone or unitedly mistreatment ensemble or meta-learning techniques to make classifiers. This paper presents a survey of various techniques utilized in MasterCard fraud detection and evaluates every methodology supported bound criterion
{"title":"Credit Card Fraud Identification Using Machine Learning Approaches","authors":"P. Kumar, Fahad Iqbal","doi":"10.1109/ICIICT1.2019.8741490","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741490","url":null,"abstract":"Due to rapid growth of internet, online buying product is an important part of everyone’s lifestyle most of the time MasterCard is employed to pay online for products. It's a straightforward thanks to looking, people will get their required product on your visual display unit or on sensible phone. For online purchase use of MasterCard will increase dramatically however still there's some loop holes in system of online looking that causes online frauds or credit card frauds. Thus, fraud detection systems became essential for all MasterCard supply banks to attenuate their losses. The foremost normally used fraud detection strategies are Neural Network (NN), rule-induction techniques, fuzzy system, call trees, Support Vector Machines (SVM), Logistic Regression, Local Outlier Factor (LOF), Isolation Forest, K-Nearest Neighbor, Genetic algorithms. These techniques are often used alone or unitedly mistreatment ensemble or meta-learning techniques to make classifiers. This paper presents a survey of various techniques utilized in MasterCard fraud detection and evaluates every methodology supported bound criterion","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132137884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICIICT1.2019.8741424
S. Ushaa, N. Sangeetha, E. Murugavalli, P. Velmurugan, M. Suresh
Satellite Spectrum is a very scarce and costly natural resource. The rapid development in satellite communications has increased the number of users, which in turn, created a demand for more spectral resources. Also due to the ever-increasing demand for bandwidth resulted from high data rate requirements, one of the main challenges for satellite communication is to continuously improve the utilization efficiency of the limited exclusive satellite spectrum (Ku-band). However, the available spectrum is also not utilized efficiently, which leads to spectrum under-utilization. Cognitive Radio (CR) technology has proved to be a promising option to address the spectrum scarcity. In CR, when a primary user (PU) is not utilizing the spectrum, the secondary users (SUs) are allowed to access the spectrum. This paper discusses the Spectrum Sensing in a Very Small Aperture Terminal (VSAT) network by using CR technology which is a new approach in this area. Also, this work will serve as a forerunner for future developments in this domain. VSATs are terminals that communicate with one another through satellite. Applying CR technology in VSATs, spectrum sensing can be performed to detect the spectrum holes where SUs can be accommodated. The spectrum holes are identified in the spectral domain using Fast Fourier Transform (FFT). The simulation results show the retrieved indices of spectrum holes, where SUs are to be accommodated.
{"title":"Spectrum Sensing in a VSAT Network Using Cognitive Radio Technology","authors":"S. Ushaa, N. Sangeetha, E. Murugavalli, P. Velmurugan, M. Suresh","doi":"10.1109/ICIICT1.2019.8741424","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741424","url":null,"abstract":"Satellite Spectrum is a very scarce and costly natural resource. The rapid development in satellite communications has increased the number of users, which in turn, created a demand for more spectral resources. Also due to the ever-increasing demand for bandwidth resulted from high data rate requirements, one of the main challenges for satellite communication is to continuously improve the utilization efficiency of the limited exclusive satellite spectrum (Ku-band). However, the available spectrum is also not utilized efficiently, which leads to spectrum under-utilization. Cognitive Radio (CR) technology has proved to be a promising option to address the spectrum scarcity. In CR, when a primary user (PU) is not utilizing the spectrum, the secondary users (SUs) are allowed to access the spectrum. This paper discusses the Spectrum Sensing in a Very Small Aperture Terminal (VSAT) network by using CR technology which is a new approach in this area. Also, this work will serve as a forerunner for future developments in this domain. VSATs are terminals that communicate with one another through satellite. Applying CR technology in VSATs, spectrum sensing can be performed to detect the spectrum holes where SUs can be accommodated. The spectrum holes are identified in the spectral domain using Fast Fourier Transform (FFT). The simulation results show the retrieved indices of spectrum holes, where SUs are to be accommodated.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121823568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICIICT1.2019.8741476
H. R, S. M.
Pollution or contamination plays a major part in dreadful health hazards. Water, the most essential entity for life is being consumed without the knowledge of contaminants. Arsenic (As III) above 10µg/L is regarded to be poisonous to life and causes lung or skin cancer and cardiovascular geotaxis, mutagenic &carcinogenicc effects. Contamination of As may not only occurs in under or drinking water but also in sea water which may be a health threat to aquatic lives. Arsenic decontamination need to be strictly adopted upon any form of water purification. A special technique for the determination by express sensing of arsenic ionic level in water was examined on a Smooth or Glassy carbon electrode (GCE) with nano Gold transformation in 0.5 M H2SO4. The nano Gold was setup using a cycling potential continuously ranging from 0.619 to-0.481 V (vs. HAuCl4.3H2O) Chloro Auric Acid in 0.5 M H2SO4 solution. The Gold nano particles are electro-deposited on GCE. The electrode was examined by Differential Pulse Voltammetry (DPV), Anodic Stripping Voltammetry (ASV), Linear Sweep Voltammetry (LSV) and cyclic Voltammetry (CV). After optimization, a LOD (Level Of Detection) of 0.9 parts per billion (ppb) was achieved with a 60s transformation at −0.94 V in 0.5 M H2SO4whereas the WHO’s (World Health Organization) maximum allowable arsenic level is 10 ppb, in drinking water. Mercury Mercurious Sulphate (MMS) was used as standard reference electrode. The developed sensor was evaluated for copper ion interference and was found to have no interfering effect due to ionic copper which is the most potential obstructing ionic species in ionic arsenic determination.
污染或污染在可怕的健康危害中起着重要作用。水,生命最基本的实体,在不知道污染物的情况下被消耗。砷(As III)超过10 μ g/L被认为是对生命有毒的,并导致肺癌或皮肤癌和心血管的地致性,致突变和致癌作用。砷污染不仅可能发生在地下水或饮用水中,也可能发生在海水中,这可能对水生生物的健康构成威胁。任何形式的水净化都需要严格采用砷净化。研究了在0.5 M H2SO4中纳米金转化的光滑碳或玻碳电极(GCE)上快速测定水中砷离子水平的特殊技术。在0.5 M H2SO4溶液中,使用0.619 ~ 0.481 V (vs. HAuCl4.3H2O)氯金酸连续循环电位建立纳米金。将金纳米颗粒电沉积在GCE上。采用差分脉冲伏安法(DPV)、阳极溶出伏安法(ASV)、线性扫描伏安法(LSV)和循环伏安法(CV)对电极进行检测。优化后,在- 0.94 V条件下,在0.5 M h2so4中进行60秒的转化,LOD(检测水平)达到了十亿分之0.9 (ppb),而WHO(世界卫生组织)在饮用水中允许的最大砷含量为10 ppb。以硫酸汞(MMS)为标准参比电极。对所研制的传感器进行了铜离子干扰评价,发现铜离子是离子砷测定中最潜在的阻碍离子,对传感器无干扰作用。
{"title":"Development, Analysis and Evaluation of Arsenic (III) Sensor","authors":"H. R, S. M.","doi":"10.1109/ICIICT1.2019.8741476","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741476","url":null,"abstract":"Pollution or contamination plays a major part in dreadful health hazards. Water, the most essential entity for life is being consumed without the knowledge of contaminants. Arsenic (As III) above 10µg/L is regarded to be poisonous to life and causes lung or skin cancer and cardiovascular geotaxis, mutagenic &carcinogenicc effects. Contamination of As may not only occurs in under or drinking water but also in sea water which may be a health threat to aquatic lives. Arsenic decontamination need to be strictly adopted upon any form of water purification. A special technique for the determination by express sensing of arsenic ionic level in water was examined on a Smooth or Glassy carbon electrode (GCE) with nano Gold transformation in 0.5 M H2SO4. The nano Gold was setup using a cycling potential continuously ranging from 0.619 to-0.481 V (vs. HAuCl4.3H2O) Chloro Auric Acid in 0.5 M H2SO4 solution. The Gold nano particles are electro-deposited on GCE. The electrode was examined by Differential Pulse Voltammetry (DPV), Anodic Stripping Voltammetry (ASV), Linear Sweep Voltammetry (LSV) and cyclic Voltammetry (CV). After optimization, a LOD (Level Of Detection) of 0.9 parts per billion (ppb) was achieved with a 60s transformation at −0.94 V in 0.5 M H2SO4whereas the WHO’s (World Health Organization) maximum allowable arsenic level is 10 ppb, in drinking water. Mercury Mercurious Sulphate (MMS) was used as standard reference electrode. The developed sensor was evaluated for copper ion interference and was found to have no interfering effect due to ionic copper which is the most potential obstructing ionic species in ionic arsenic determination.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICIICT1.2019.8741407
M. Shilpa, Er. Rahul Sharma, Ms. Sonam, Mr. Sartaj Singh
Today, a large number of transactions and data exchanged over internet through different data transaction layers among network. There is need to put a security or some patches to private data among military, commercial or financial sector. A number of cryptographic methods have recently proposed and implemented because of strong demand for encryption and decryption process against cyber-attacks. Most recent encrypting or encoding methods include many iterations and substitution processes to encounter some issues such as lack of robustness and valuable amount of time. In our proposed research, we introduce method based upon idea of encoding with programming to achieve cyber security. We use ASCII to build an encoding table with different way to enhance security and save cost and time.
{"title":"Reforming Cyber Security with Coding","authors":"M. Shilpa, Er. Rahul Sharma, Ms. Sonam, Mr. Sartaj Singh","doi":"10.1109/ICIICT1.2019.8741407","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741407","url":null,"abstract":"Today, a large number of transactions and data exchanged over internet through different data transaction layers among network. There is need to put a security or some patches to private data among military, commercial or financial sector. A number of cryptographic methods have recently proposed and implemented because of strong demand for encryption and decryption process against cyber-attacks. Most recent encrypting or encoding methods include many iterations and substitution processes to encounter some issues such as lack of robustness and valuable amount of time. In our proposed research, we introduce method based upon idea of encoding with programming to achieve cyber security. We use ASCII to build an encoding table with different way to enhance security and save cost and time.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICIICT1.2019.8741497
Zhiqiong Wangi, Hanyu Jiang
Extreme Learning Machine algorithm which it is an optimization based learning framework for compression, feature, clustering, regression and classification. It is an artificial hidden nodes and proposed to overcome these issues and offer better generalization performance by Unique minimum solution. In this paper Computer-aided diagnosis (CAD) based on Convolutional Neural Network (CNN) feature and they are based on deep, morphological, texture and density features. Mammography concept is been more used and to detect early stage of breast cancer and can helps out whether they are Malignant or Benign in CAD system they are classified by normal or abnormal tissue with the help of mammography images. The main objective of this paper is to detect the stage of breast cancer tissue is harmful or not in this algorithm.
{"title":"Survey on Breast Cancer Based on Extreme Learning Machine Features","authors":"Zhiqiong Wangi, Hanyu Jiang","doi":"10.1109/ICIICT1.2019.8741497","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741497","url":null,"abstract":"Extreme Learning Machine algorithm which it is an optimization based learning framework for compression, feature, clustering, regression and classification. It is an artificial hidden nodes and proposed to overcome these issues and offer better generalization performance by Unique minimum solution. In this paper Computer-aided diagnosis (CAD) based on Convolutional Neural Network (CNN) feature and they are based on deep, morphological, texture and density features. Mammography concept is been more used and to detect early stage of breast cancer and can helps out whether they are Malignant or Benign in CAD system they are classified by normal or abnormal tissue with the help of mammography images. The main objective of this paper is to detect the stage of breast cancer tissue is harmful or not in this algorithm.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"5 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117093989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICIICT1.2019.8741500
P. S, M. C, Esther Florence S
A current UWB antenna with compact-circular monopole UWB antenna support by a microstrip line with a semi-rectangular ground plane is given in this paper to realize an operating bandwidth from 3.3GHz to 12GHz. Low-cost FR4-lossy material with a dimension of 12mm×18mm×1.6mm has taken place used to design the antenna. The proposed antenna is incorporated with L-shape complimentary slots with discontinuities. The I-shape slots are placed in such that the discontinuities face in the feed line and it will generate a static resonance which is the reason for the dual notch bands covering the frequency ranges of WiMAX and WLAN.
{"title":"Design of Compact-Circular Monopole UWB Antenna with Dual Notch Bands","authors":"P. S, M. C, Esther Florence S","doi":"10.1109/ICIICT1.2019.8741500","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741500","url":null,"abstract":"A current UWB antenna with compact-circular monopole UWB antenna support by a microstrip line with a semi-rectangular ground plane is given in this paper to realize an operating bandwidth from 3.3GHz to 12GHz. Low-cost FR4-lossy material with a dimension of 12mm×18mm×1.6mm has taken place used to design the antenna. The proposed antenna is incorporated with L-shape complimentary slots with discontinuities. The I-shape slots are placed in such that the discontinuities face in the feed line and it will generate a static resonance which is the reason for the dual notch bands covering the frequency ranges of WiMAX and WLAN.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116635213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICIICT1.2019.8741414
S. Chandra, G. Sravanthi, B. Prasanthi, V. R
In the recent spans of years, Urbanization has inflated terribly nice in size and there's a rise in waste production. Waste management has been a typical issue to be thought of. during this paper, sensible bin is constructed with ARM microcontroller that is interfaced With UART and IR sensors. IR sensors square measure placed at each ends of trash bin. They work under AND operation. When the dust bin is filled message will be sent to the respective mobile displaying "Garbage is filled". It ceaselessly alerts the specified authority till the rubbish within the garbage can is press. Once the garbage can is press, individuals will recycle the garbage can. Once these dustbins are enforced on an outsized scale, by substitution ancient bins, waste will be re-used expeditiously and avoids gratuitous lumping of wastes on road aspect. Foul smell from these rotten wastes that remained untreated for while, because of neglectfulness of authorities and public could cause sturdy issues. Breeding of insects and mosquitoes will produce nuisance around promoting unclean atmosphere. this might even cause dreadful diseases.
{"title":"IoT Based Garbage Monitoring System","authors":"S. Chandra, G. Sravanthi, B. Prasanthi, V. R","doi":"10.1109/ICIICT1.2019.8741414","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741414","url":null,"abstract":"In the recent spans of years, Urbanization has inflated terribly nice in size and there's a rise in waste production. Waste management has been a typical issue to be thought of. during this paper, sensible bin is constructed with ARM microcontroller that is interfaced With UART and IR sensors. IR sensors square measure placed at each ends of trash bin. They work under AND operation. When the dust bin is filled message will be sent to the respective mobile displaying \"Garbage is filled\". It ceaselessly alerts the specified authority till the rubbish within the garbage can is press. Once the garbage can is press, individuals will recycle the garbage can. Once these dustbins are enforced on an outsized scale, by substitution ancient bins, waste will be re-used expeditiously and avoids gratuitous lumping of wastes on road aspect. Foul smell from these rotten wastes that remained untreated for while, because of neglectfulness of authorities and public could cause sturdy issues. Breeding of insects and mosquitoes will produce nuisance around promoting unclean atmosphere. this might even cause dreadful diseases.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124898452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICIICT1.2019.8741408
Pallab Banerjee, Vijendra Kumar, R. Raj
The rapid growth of electronic devices depending on the internet has solved many problems that the humans were facing. The major challenge is “To transmit secure data over the network and to assure its confidentiality, integrity and availability”. The solution is to transfer encrypted data over the network to prevent its unauthorized identification, modification, destruction etc. A new proposed encryption and decryption algorithm has been designed in this paper, in which the data is mathematically scrambled to a form such that the original data is surrounded by a set of randomly generated alphabets. The encrypted format is based on the collection of ASCII codes. This form is used to transfer the data over the insecure network channels.
{"title":"Enhanced Performance of Cryptographic Mechanism using Randomized Generation Technique for Secure Transmission of Data","authors":"Pallab Banerjee, Vijendra Kumar, R. Raj","doi":"10.1109/ICIICT1.2019.8741408","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741408","url":null,"abstract":"The rapid growth of electronic devices depending on the internet has solved many problems that the humans were facing. The major challenge is “To transmit secure data over the network and to assure its confidentiality, integrity and availability”. The solution is to transfer encrypted data over the network to prevent its unauthorized identification, modification, destruction etc. A new proposed encryption and decryption algorithm has been designed in this paper, in which the data is mathematically scrambled to a form such that the original data is surrounded by a set of randomly generated alphabets. The encrypted format is based on the collection of ASCII codes. This form is used to transfer the data over the insecure network channels.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128360394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICIICT1.2019.8741428
Shainee Jain, Tejaswi Pawar, Heth Shah, Omkar Morye, B. Patil
In today’s world watching online videos have become a popular trend and a daily habit of our new generation. Videos are a reliable source for gaining knowledge and it is easier to grasp information through videos than reading. The internet is flooded with billions of videos hence it is a time consuming task for user to find a relevant video. So to save time as well as efforts there is a necessity to build a strong, efficient and accurate recommendation system which will display appropriate videos for the users. Video recommendation system saves users from browsing lots of videos to choose the appropriate ones, and on the other hand, it also brings the video websites more network traffic and user stickiness. The main task of the system is to provide personalized recommendations using Web Crawler, Rating Factor Neural Network, Slope one, and Slope one based Map Reduce of two types, one is Content-based filtering, and the other is Collaborative Filtering. Presentation of recommendations is an important part of the overall user experience. Video recommendation algorithm is the core of the system. The proposed paper is about the system which allows user to search for their favorite videos and the system recommends videos relevant to their choice.
{"title":"Video Recommendation System Based on Human Interest","authors":"Shainee Jain, Tejaswi Pawar, Heth Shah, Omkar Morye, B. Patil","doi":"10.1109/ICIICT1.2019.8741428","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741428","url":null,"abstract":"In today’s world watching online videos have become a popular trend and a daily habit of our new generation. Videos are a reliable source for gaining knowledge and it is easier to grasp information through videos than reading. The internet is flooded with billions of videos hence it is a time consuming task for user to find a relevant video. So to save time as well as efforts there is a necessity to build a strong, efficient and accurate recommendation system which will display appropriate videos for the users. Video recommendation system saves users from browsing lots of videos to choose the appropriate ones, and on the other hand, it also brings the video websites more network traffic and user stickiness. The main task of the system is to provide personalized recommendations using Web Crawler, Rating Factor Neural Network, Slope one, and Slope one based Map Reduce of two types, one is Content-based filtering, and the other is Collaborative Filtering. Presentation of recommendations is an important part of the overall user experience. Video recommendation algorithm is the core of the system. The proposed paper is about the system which allows user to search for their favorite videos and the system recommends videos relevant to their choice.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130566049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}