Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437901
Dipti Singh, Mohd. Aamir Khan, A. Bansal, Neha Bansal
Artificial intelligence, pattern recognition and computer vision has a significant importance in the field of electronics and image processing. Optical character recognition (OCR) is one of the main aspects of pattern recognition and has evolved greatly since its beginning. OCR is a system which recognized the readable characters from optical data and converts it into digital form. Various methodologies have been developed for this purpose using different approaches. In this paper, general architecture of modern OCR system with details of each module is discussed. We applied Moore neighborhood tracing for extracting boundary of characters and then chain rule for feature extraction. In the classification stage for character recognition, SVM is trained and is applied on suitable example.
{"title":"An application of SVM in character recognition with chain code","authors":"Dipti Singh, Mohd. Aamir Khan, A. Bansal, Neha Bansal","doi":"10.1109/CCINTELS.2015.7437901","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437901","url":null,"abstract":"Artificial intelligence, pattern recognition and computer vision has a significant importance in the field of electronics and image processing. Optical character recognition (OCR) is one of the main aspects of pattern recognition and has evolved greatly since its beginning. OCR is a system which recognized the readable characters from optical data and converts it into digital form. Various methodologies have been developed for this purpose using different approaches. In this paper, general architecture of modern OCR system with details of each module is discussed. We applied Moore neighborhood tracing for extracting boundary of characters and then chain rule for feature extraction. In the classification stage for character recognition, SVM is trained and is applied on suitable example.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124479011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437941
P. K. Verma, P. Jain
This paper presents the design and simulation of low noise amplifier (LNA) for wireless applications operating in the 2.4-2.5 GHz band. In this paper inductive source degeneration topology has been used to provide low noise figure, high forward gain and low power consumption. The simulation was made using Advance Design System (ADS) software. Proposed work emphasis on reduction in noise figure with increase in power gain at low power consumption as compared to previous results at 1.2V power supply.
{"title":"A low power high gain low noise amplifier for wireless applications","authors":"P. K. Verma, P. Jain","doi":"10.1109/CCINTELS.2015.7437941","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437941","url":null,"abstract":"This paper presents the design and simulation of low noise amplifier (LNA) for wireless applications operating in the 2.4-2.5 GHz band. In this paper inductive source degeneration topology has been used to provide low noise figure, high forward gain and low power consumption. The simulation was made using Advance Design System (ADS) software. Proposed work emphasis on reduction in noise figure with increase in power gain at low power consumption as compared to previous results at 1.2V power supply.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134250345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437886
A. Dhakne, P. Chatur
Security of wireless sensor network is always a major thing as it has widespread application in most of the major domains such as battlefield surveillance, healthcare, etc. Basically there are three main components that deal with security of wireless sensor network, prevention, detection and mitigation. But it is very difficult to prevent wireless sensor network always from malicious attacks so it is always important to detect them as early as possible so that we can react to the attack not harm to wireless sensor network., This paper proposes Distributed Trust based Intrusion Detection (DTBID) approach which considers several factors for establishing trust of sensor node. Most of the research work only considers the communication behavior to derive the trust. Our intrusion detection system will consider trust which is distributed among some other factors such as energy, reliability, data etc. We derive and formulate trust such as direct trust, recommendation trust, and indirect trust from these factors. We provide an approach to decide whether particular node is malicious node or not by comparing subjective trust derived from our intrusion detection technique to that of objective trust which is calculated based on the actual information of each node without considering any network dynamics such as node mobility, trust decay over time, and any malicious attacks. If there is a lot of difference between subjective trust derived from our model to that of objective trust then we consider sensor node as malicious node.
{"title":"Distributed Trust based Intrusion Detection approach in wireless sensor network","authors":"A. Dhakne, P. Chatur","doi":"10.1109/CCINTELS.2015.7437886","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437886","url":null,"abstract":"Security of wireless sensor network is always a major thing as it has widespread application in most of the major domains such as battlefield surveillance, healthcare, etc. Basically there are three main components that deal with security of wireless sensor network, prevention, detection and mitigation. But it is very difficult to prevent wireless sensor network always from malicious attacks so it is always important to detect them as early as possible so that we can react to the attack not harm to wireless sensor network., This paper proposes Distributed Trust based Intrusion Detection (DTBID) approach which considers several factors for establishing trust of sensor node. Most of the research work only considers the communication behavior to derive the trust. Our intrusion detection system will consider trust which is distributed among some other factors such as energy, reliability, data etc. We derive and formulate trust such as direct trust, recommendation trust, and indirect trust from these factors. We provide an approach to decide whether particular node is malicious node or not by comparing subjective trust derived from our intrusion detection technique to that of objective trust which is calculated based on the actual information of each node without considering any network dynamics such as node mobility, trust decay over time, and any malicious attacks. If there is a lot of difference between subjective trust derived from our model to that of objective trust then we consider sensor node as malicious node.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130532483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437955
Lalit, Anurag Sharma, A. Agarwal, V. Sharma, Amit Srivastava, Varun Maheshwari
USB data transfer is widely used in present scenario. But PC (Personal Computer)/Laptop is required to transfer USB data. It is not possible to carry PC/LAPTOP everywhere. In this paper we propose USB to USB data transfer without involving PC/LAPTOP. VDIP2 module with ATMEGA16 microcontroller is used for data transfer. The system is also capable for sending data on HyperTerminal for debugging. LCD (Liquid Crystal Display) is configured for displaying the result.
{"title":"Data transfer with the help of USB host controller without PC","authors":"Lalit, Anurag Sharma, A. Agarwal, V. Sharma, Amit Srivastava, Varun Maheshwari","doi":"10.1109/CCINTELS.2015.7437955","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437955","url":null,"abstract":"USB data transfer is widely used in present scenario. But PC (Personal Computer)/Laptop is required to transfer USB data. It is not possible to carry PC/LAPTOP everywhere. In this paper we propose USB to USB data transfer without involving PC/LAPTOP. VDIP2 module with ATMEGA16 microcontroller is used for data transfer. The system is also capable for sending data on HyperTerminal for debugging. LCD (Liquid Crystal Display) is configured for displaying the result.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131267480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437925
A. Deep, Jyoti Singh, Y. Narayan, S. Chatterji, L. Mathew
Three level inverter system produce voltage which consists of three different possible values. Inverter can be used to interface renewable energy sources with the grid. Temperature has significant effect on performance of power MOSFETs. Typically, MOSFET is used as power switch in such applications as it produce heat during operation, and the heat energy dissipated by these components must be carefully controlled if operating temperatures are to be maintained. So for the system to work efficiently, an intelligent cooling of MOSFET is required. This paper proposes an intelligent cooling for three level H-bridge inverter. The system consists of MOSFETs, LM 35 temperature sensor, Opto-couplers. Arduino is used to give trigger pulses to MOSFETs and control the on-off operation of fan. When temperature goes above the predefined level, fan turns on to cool the MOSFETs.
{"title":"Intelligent cooling system for three level inverter","authors":"A. Deep, Jyoti Singh, Y. Narayan, S. Chatterji, L. Mathew","doi":"10.1109/CCINTELS.2015.7437925","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437925","url":null,"abstract":"Three level inverter system produce voltage which consists of three different possible values. Inverter can be used to interface renewable energy sources with the grid. Temperature has significant effect on performance of power MOSFETs. Typically, MOSFET is used as power switch in such applications as it produce heat during operation, and the heat energy dissipated by these components must be carefully controlled if operating temperatures are to be maintained. So for the system to work efficiently, an intelligent cooling of MOSFET is required. This paper proposes an intelligent cooling for three level H-bridge inverter. The system consists of MOSFETs, LM 35 temperature sensor, Opto-couplers. Arduino is used to give trigger pulses to MOSFETs and control the on-off operation of fan. When temperature goes above the predefined level, fan turns on to cool the MOSFETs.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124539847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In Wireless Sensor Network (WSN) energy is the main concern while designing a WSN protocol. Clustering is one of the process to minimize the energy consumption in WSN. Local election of clustering head (CH) requires many communications such as hello message, advertising their chances and fuzzy logic process requires many CPU cycles, high power microcontrollers, high capacity of memories which increase the cost and reduces amount of energy of the sensor nodes. To conserve the energy in WSN when node is near to the base station, direct communication is far better than clustering technique and when node is far away from the base station, clustering is better choice than direct communication. In this paper, both direct communication and clustering techniques are considered and fuzzy logic is used at base station to elect cluster head directly. Direct communication along with cluster head election using fuzzy logic technique have been adopted in this paper in order to amount of energy consumption. Proposed algorithm has been compared with LEACH and SEP protocol. Simulation results shows that this proposed algorithm performs better than LEACH and SEP in terms of energy saving as well as network lifetime for wireless sensor networks as well as for mobile communication.
{"title":"Energy efficient protocol for mobile Wireless Sensor Networks","authors":"Mritunjay Kumar Chourasia, Manish Panchal, Anurag Shrivastav","doi":"10.1109/CCINTELS.2015.7437883","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437883","url":null,"abstract":"In Wireless Sensor Network (WSN) energy is the main concern while designing a WSN protocol. Clustering is one of the process to minimize the energy consumption in WSN. Local election of clustering head (CH) requires many communications such as hello message, advertising their chances and fuzzy logic process requires many CPU cycles, high power microcontrollers, high capacity of memories which increase the cost and reduces amount of energy of the sensor nodes. To conserve the energy in WSN when node is near to the base station, direct communication is far better than clustering technique and when node is far away from the base station, clustering is better choice than direct communication. In this paper, both direct communication and clustering techniques are considered and fuzzy logic is used at base station to elect cluster head directly. Direct communication along with cluster head election using fuzzy logic technique have been adopted in this paper in order to amount of energy consumption. Proposed algorithm has been compared with LEACH and SEP protocol. Simulation results shows that this proposed algorithm performs better than LEACH and SEP in terms of energy saving as well as network lifetime for wireless sensor networks as well as for mobile communication.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437962
Ritu, Nitin Verma, Shilpa Mishra, S. Shukla
Renewable energy plays a dominant role in electricity production with the increase in global warning. Advantages like ENVIRONMENTAL friendliness, expandability and flexibility have made its wider application. Nowadays, step up power conversion is widely used in many applications and power capability demands. The applications of step up power conversion may be seen in electric vehicles, photovoltaic (PV) system, uninterruptable power supplies (UPS), and fuel cell power system. Boost converter is one type of DC-DC step up power converter. Step up power converters is quite popular because it can produce higher DC voltage output from low voltage input. In this paper, the analysis of interleaved boost converter is done by controlling with interleaved switching signals, which are having same switching frequency but shifted in phase. By utilizing the parallel operation of converters, the input current can be shared among the inductors so that high reliability and efficiency in power electronic systems can be obtained. Simulation study for PWM fed two phases IBC for solar cell has been implemented using MATLAB/ SIMULINK. The simulation results show the reduction in ripple quantity up to zero, which makes the operation of IBC to be more reliable and stable when it is utilized with solar cell.
{"title":"Implementation of solar based PWM fed two phase interleaved boost converter","authors":"Ritu, Nitin Verma, Shilpa Mishra, S. Shukla","doi":"10.1109/CCINTELS.2015.7437962","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437962","url":null,"abstract":"Renewable energy plays a dominant role in electricity production with the increase in global warning. Advantages like ENVIRONMENTAL friendliness, expandability and flexibility have made its wider application. Nowadays, step up power conversion is widely used in many applications and power capability demands. The applications of step up power conversion may be seen in electric vehicles, photovoltaic (PV) system, uninterruptable power supplies (UPS), and fuel cell power system. Boost converter is one type of DC-DC step up power converter. Step up power converters is quite popular because it can produce higher DC voltage output from low voltage input. In this paper, the analysis of interleaved boost converter is done by controlling with interleaved switching signals, which are having same switching frequency but shifted in phase. By utilizing the parallel operation of converters, the input current can be shared among the inductors so that high reliability and efficiency in power electronic systems can be obtained. Simulation study for PWM fed two phases IBC for solar cell has been implemented using MATLAB/ SIMULINK. The simulation results show the reduction in ripple quantity up to zero, which makes the operation of IBC to be more reliable and stable when it is utilized with solar cell.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125443995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437866
D. Meena, R. Meena
A novel Triple band U-slot microstrip patch antenna is presented in this paper. U-slot technique is used to get the wide band width at three selected frequencies. The structure proposed antenna is different from conventional microstrip patch antenna. In this paper the structure is designed on FR-4 substrate, using CST Microwave studio, simulated return loss is greater than 10 dB at center frequencies 5.59 GHz, 6.1 GHz and 6.8 GHz. The return loss is achieved 30dB, 15dB and 36.8 dB at center frequencies 5.59 GHz, 6.1 GHz and 6.8 GHz respectively. The substrate height is 1.99mm and dielectric constant is 4.4. Good enough for WLAN at 5.59GHz and second & third band used for wireless sensor applications.
{"title":"Triple band U-slot microstrip patch antenna for WLAN and wireless sensor applications","authors":"D. Meena, R. Meena","doi":"10.1109/CCINTELS.2015.7437866","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437866","url":null,"abstract":"A novel Triple band U-slot microstrip patch antenna is presented in this paper. U-slot technique is used to get the wide band width at three selected frequencies. The structure proposed antenna is different from conventional microstrip patch antenna. In this paper the structure is designed on FR-4 substrate, using CST Microwave studio, simulated return loss is greater than 10 dB at center frequencies 5.59 GHz, 6.1 GHz and 6.8 GHz. The return loss is achieved 30dB, 15dB and 36.8 dB at center frequencies 5.59 GHz, 6.1 GHz and 6.8 GHz respectively. The substrate height is 1.99mm and dielectric constant is 4.4. Good enough for WLAN at 5.59GHz and second & third band used for wireless sensor applications.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115685078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437953
Avinash Kumar
Caches are configured at design time in such a way so as to produce a low average memory access time across a wide range of applications. This may result in a poor performance, because effectively, no single specific cache architecture can complement with the application's innate requirements over a wide range of applications. Also an application follows a unique sequence of patterns during its execution. These patterns called phases repeats themselves periodically. Some phases are stable and extend for billions of instructions. These stable phases constitute the majority of the applications' execution. In this paper, a novel reconfigurable architecture is designed for caches which dynamically discerns these phases and configures the caches based on the throughput. For the reconfiguration of the caches, we have proposed the change in its associativity while keeping the size constant. This change in associativity is made for the first level cache and is concluded that a decrease in associativity at the first level cache does not result in any increase in the cache misses at the second level cache. For this, we delineate the behavior of the level one cache misses which occurs because of the change in the associativity and confine these misses well within the second level cache. As a consequence we have successfully come up with a simple equation which arbitrates the threshold value for the cache reconfiguration decision. This decision for the threshold value is a contingent on the actual running time of the application and hence does not need to be trained for each application separately.
{"title":"Phase-based reconfiguration of level one cache for single-core processors without affecting second level cache","authors":"Avinash Kumar","doi":"10.1109/CCINTELS.2015.7437953","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437953","url":null,"abstract":"Caches are configured at design time in such a way so as to produce a low average memory access time across a wide range of applications. This may result in a poor performance, because effectively, no single specific cache architecture can complement with the application's innate requirements over a wide range of applications. Also an application follows a unique sequence of patterns during its execution. These patterns called phases repeats themselves periodically. Some phases are stable and extend for billions of instructions. These stable phases constitute the majority of the applications' execution. In this paper, a novel reconfigurable architecture is designed for caches which dynamically discerns these phases and configures the caches based on the throughput. For the reconfiguration of the caches, we have proposed the change in its associativity while keeping the size constant. This change in associativity is made for the first level cache and is concluded that a decrease in associativity at the first level cache does not result in any increase in the cache misses at the second level cache. For this, we delineate the behavior of the level one cache misses which occurs because of the change in the associativity and confine these misses well within the second level cache. As a consequence we have successfully come up with a simple equation which arbitrates the threshold value for the cache reconfiguration decision. This decision for the threshold value is a contingent on the actual running time of the application and hence does not need to be trained for each application separately.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126037391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437949
Praveen Kumar, Sanchita Kadambari, S. Rawat
The tremendous growth of web has resulted in overloaded servers and network congestion. Millions of users access the internet simultaneously and limited bandwidth causes a bottleneck to improved service. Fast response time is essential to keep the users at bay and thus techniques need to be improvised to reduce the latency of accessing web pages. Web caching, in this regard, offers an effective solution by temporarily storing files nearby, thereby reducing the access time, but limits the system to an extent. A more powerful solution, web prefetching, has been devised, that fetches pages in advance, further reducing the access latency. Numerous solutions to web prefetching have been proposed in the past, integrating various web and data mining techniques. In this paper, the techniques of Web Usage Mining have been integrated for analyzing the proxy server logs, to get an insight into the user access patterns and generate rules. Link analysis method has been proposed to be integrated with these rules in order to rank the pages to be prefetched.
{"title":"Prefetching web pages for improving user access latency using integrated Web Usage Mining","authors":"Praveen Kumar, Sanchita Kadambari, S. Rawat","doi":"10.1109/CCINTELS.2015.7437949","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437949","url":null,"abstract":"The tremendous growth of web has resulted in overloaded servers and network congestion. Millions of users access the internet simultaneously and limited bandwidth causes a bottleneck to improved service. Fast response time is essential to keep the users at bay and thus techniques need to be improvised to reduce the latency of accessing web pages. Web caching, in this regard, offers an effective solution by temporarily storing files nearby, thereby reducing the access time, but limits the system to an extent. A more powerful solution, web prefetching, has been devised, that fetches pages in advance, further reducing the access latency. Numerous solutions to web prefetching have been proposed in the past, integrating various web and data mining techniques. In this paper, the techniques of Web Usage Mining have been integrated for analyzing the proxy server logs, to get an insight into the user access patterns and generate rules. Link analysis method has been proposed to be integrated with these rules in order to rank the pages to be prefetched.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128416670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}