Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668115
J. Julia, M. Kanthimathi, R. Amutha
We construct a cooperative Multiple-Input Multiple-Output (MIMO) network using Differential Space Shift Keying (DSSK) technique in wireless sensor network (WSN). We derive the energy consumption per bit in fast fading environment. We also investigate the energy consumption of gray code and lexicographic way of antennas activation in DSSK. From the simulation results, it is evident that the gray code order of antenna activation provides significant energy saving compared to the lexicographic antenna activation technique.
{"title":"Energy Efficiency Analysis Of Differential Space Shift Keying Technique In Wireless Sensor Networks","authors":"J. Julia, M. Kanthimathi, R. Amutha","doi":"10.1109/IC3IOT.2018.8668115","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668115","url":null,"abstract":"We construct a cooperative Multiple-Input Multiple-Output (MIMO) network using Differential Space Shift Keying (DSSK) technique in wireless sensor network (WSN). We derive the energy consumption per bit in fast fading environment. We also investigate the energy consumption of gray code and lexicographic way of antennas activation in DSSK. From the simulation results, it is evident that the gray code order of antenna activation provides significant energy saving compared to the lexicographic antenna activation technique.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668146
Mousumi Mousam, Raunak chakarbaty, Nisha Kumari, A. Mukherjee
This paper deals with the one of the use of millimeter wave (mm wave) i.e. in automobile background. Vehicle-to-vehicle and vehicle-to-infrastructure is a challenging application of 5G (5th generation), as it provides and use higher data rates using sensors. The next generation of vehicles supports advance services, like object detection and recognition, risk identification and avoidance, which require high data transmission rate, per hour hence mm waves are used here. The effect of vehicle vibration on mm wave intra vehicular channel, produce severe Dopplers spreads which can be evaluated by using mm wave time domain correlative channel sounder assembled in the vehicle. At vehicular speed, the contact time during which a mobile node is in the range of a constant road side unit (RSU) is short. The work discusses the implementation aspects of high data rate communication using mm wave approach.
本文论述了毫米波(mm wave)在汽车背景中的应用。车对车和车对基础设施是5G(第5代)的一个具有挑战性的应用,因为它通过传感器提供和使用更高的数据速率。下一代车辆支持先进的服务,如目标检测和识别、风险识别和避免,这些服务需要每小时高数据传输速率,因此这里使用毫米波。车辆振动对车厢内毫米波通道的影响,产生严重的多普勒频散,可通过安装在车内的毫米波时域相关通道测深仪进行测量。在车速下,移动节点在恒路侧单元(constant road side unit, RSU)范围内的接触时间较短。本文讨论了采用毫米波方法实现高数据速率通信的几个方面。
{"title":"Millimeter Wave Vehicular Communications To Generate High Data Rates","authors":"Mousumi Mousam, Raunak chakarbaty, Nisha Kumari, A. Mukherjee","doi":"10.1109/IC3IOT.2018.8668146","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668146","url":null,"abstract":"This paper deals with the one of the use of millimeter wave (mm wave) i.e. in automobile background. Vehicle-to-vehicle and vehicle-to-infrastructure is a challenging application of 5G (5th generation), as it provides and use higher data rates using sensors. The next generation of vehicles supports advance services, like object detection and recognition, risk identification and avoidance, which require high data transmission rate, per hour hence mm waves are used here. The effect of vehicle vibration on mm wave intra vehicular channel, produce severe Dopplers spreads which can be evaluated by using mm wave time domain correlative channel sounder assembled in the vehicle. At vehicular speed, the contact time during which a mobile node is in the range of a constant road side unit (RSU) is short. The work discusses the implementation aspects of high data rate communication using mm wave approach.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134588582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668116
A. Srinivasulu, N. Sriraam
The detection of ventricular ectopic beats (VEB) in Electrocardiogram (ECG) plays a vital role in the diagnosis of cardiovascular diseases like ventricular tachycardia and ventricular fibrillation, which causes sudden death. This paper discusses the beat interval based features for the automated detection of ventricular ectopic beats. Five-time domain features, pre RR interval, post RR interval, QRS width, QR slope and RS slope are considered and a KNN classifier is employed to classify normal and ventricular ectopic beats. The proposed study make use of ECG signals derived from MIT-BIH arrhythmia database. The quantitative results are compared with qualitative assessment recorded already in the database. The overall classification accuracy achieved is 98.67% and the accuracy for normal & ventricular ectopic beats is 98.81% & 95.12% respectively with the Sensitivity of 95.12%, Specificity of 99.11% and Positive Predictivity of 92.85%.
{"title":"Ventricular Ectopic Beat Classification Using KNN Multi-Feature Classifier","authors":"A. Srinivasulu, N. Sriraam","doi":"10.1109/IC3IOT.2018.8668116","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668116","url":null,"abstract":"The detection of ventricular ectopic beats (VEB) in Electrocardiogram (ECG) plays a vital role in the diagnosis of cardiovascular diseases like ventricular tachycardia and ventricular fibrillation, which causes sudden death. This paper discusses the beat interval based features for the automated detection of ventricular ectopic beats. Five-time domain features, pre RR interval, post RR interval, QRS width, QR slope and RS slope are considered and a KNN classifier is employed to classify normal and ventricular ectopic beats. The proposed study make use of ECG signals derived from MIT-BIH arrhythmia database. The quantitative results are compared with qualitative assessment recorded already in the database. The overall classification accuracy achieved is 98.67% and the accuracy for normal & ventricular ectopic beats is 98.81% & 95.12% respectively with the Sensitivity of 95.12%, Specificity of 99.11% and Positive Predictivity of 92.85%.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116155119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668100
M. Anand, R. Venkataswamy
Numerous batteries are outfitted with a state ofcharge (SoC) demonstrating the relaxation about the charge. Building a beneficial BMS is to check while thinking about, to that amount regardless we work now not holds a reliable method in imitation of study condition state of-charge, the nearly imperative measurement concerning a battery. Perusing the relaxation about the vigour of a battery is more unpredictable than administering thin fuel as in automobiles. An electrochemical cell diminishes its greatness and the in-and-streaming coulombs are counted for SOC. The BMS together which offers commitment while charging yet releasing; that detaches the battery if the SOC is below certain percentage. Various laws like Peukerts Law for battery capacity have been employed to determine the discharge rate of the battery. Arduino Uno is used for the input parameters required for Peukerts Law and various other calculations for significant monitoring. To address the existing complicated BMS, a new approach has been provided using IoT platform and making the understanding of BMS in much similar perspective.
{"title":"Low Cost Energy Management For Demand Side Integration","authors":"M. Anand, R. Venkataswamy","doi":"10.1109/IC3IOT.2018.8668100","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668100","url":null,"abstract":"Numerous batteries are outfitted with a state ofcharge (SoC) demonstrating the relaxation about the charge. Building a beneficial BMS is to check while thinking about, to that amount regardless we work now not holds a reliable method in imitation of study condition state of-charge, the nearly imperative measurement concerning a battery. Perusing the relaxation about the vigour of a battery is more unpredictable than administering thin fuel as in automobiles. An electrochemical cell diminishes its greatness and the in-and-streaming coulombs are counted for SOC. The BMS together which offers commitment while charging yet releasing; that detaches the battery if the SOC is below certain percentage. Various laws like Peukerts Law for battery capacity have been employed to determine the discharge rate of the battery. Arduino Uno is used for the input parameters required for Peukerts Law and various other calculations for significant monitoring. To address the existing complicated BMS, a new approach has been provided using IoT platform and making the understanding of BMS in much similar perspective.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123934139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ic3iot.2018.8668192
L. Sindhuja
In the recent years, the mobile WSN pave attention of the researchers due to the mobility of the nodes in the network. The significant applications of mobile WSN [4] includes military, healthcare, robotics, vehicle monitoring and monitoring of environment and industries. Out of which, healthcare monitoring system has been paid attention because of tremendous growth in technology. Hence, security is the major challenge as the health care monitoring system is susceptible to various attacks. One such attack is the node replication attack which compromises the integrity and confidentiality of the data. In order to overcome the above problem, Artificial Immune System based detection method namely EHIP- HOP method is applied to the HCMS architecture. The proposed security architecture is capable of providing robust system with low cost.
{"title":"Security of Healthcare Monitoring System using EHIP-HOP method","authors":"L. Sindhuja","doi":"10.1109/ic3iot.2018.8668192","DOIUrl":"https://doi.org/10.1109/ic3iot.2018.8668192","url":null,"abstract":"In the recent years, the mobile WSN pave attention of the researchers due to the mobility of the nodes in the network. The significant applications of mobile WSN [4] includes military, healthcare, robotics, vehicle monitoring and monitoring of environment and industries. Out of which, healthcare monitoring system has been paid attention because of tremendous growth in technology. Hence, security is the major challenge as the health care monitoring system is susceptible to various attacks. One such attack is the node replication attack which compromises the integrity and confidentiality of the data. In order to overcome the above problem, Artificial Immune System based detection method namely EHIP- HOP method is applied to the HCMS architecture. The proposed security architecture is capable of providing robust system with low cost.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117107253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668104
Arpita Mishra, R. Giri
This research work has carried out a theoretical analysis on various subcarrier-intensity modulation (SIM) based modulation techniques employed for free space optical (FSO) wireless communication systems. A comprehensive analysis of several modulation schemes has been considered. Those are including binary phase shift keying subcarrier intensity modulation (BPSK-SIM), M-ary phase shift keying subcarrier intensity modulation (MPSK-SIM), differential phase shift keying subcarrier intensity modulation (DPSK-SIM) and M-ary quadrature amplitude modulation subcarrier intensity modulation (M-QAM-SIM), non-coherent frequency shift keying (NCFSK-SIM), etc. In FSO wireless communication both PIN and APD receivers are included to get a comparative analysis of the system bit error rate (BER) performance. Moreover in this work, a detailed investigation considering the link attenuation factor has been included. The BER expressions are theoretically derived for the case of weak and moderate turbulent conditions using log-normal channel modeling. A detailed analysis of BER performance for the aforementioned modulation techniques is observed by varying the link distance, strength of turbulence and bit rate. Also, a thorough observation of the capacity of the BPSK-SIM in the lognormal channel model is being taken for different turbulent states.
{"title":"Performance Analysis Of Different Modulation Techniques In SIM Based FSO Using Different Receivers Over Turbulent Channel","authors":"Arpita Mishra, R. Giri","doi":"10.1109/IC3IOT.2018.8668104","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668104","url":null,"abstract":"This research work has carried out a theoretical analysis on various subcarrier-intensity modulation (SIM) based modulation techniques employed for free space optical (FSO) wireless communication systems. A comprehensive analysis of several modulation schemes has been considered. Those are including binary phase shift keying subcarrier intensity modulation (BPSK-SIM), M-ary phase shift keying subcarrier intensity modulation (MPSK-SIM), differential phase shift keying subcarrier intensity modulation (DPSK-SIM) and M-ary quadrature amplitude modulation subcarrier intensity modulation (M-QAM-SIM), non-coherent frequency shift keying (NCFSK-SIM), etc. In FSO wireless communication both PIN and APD receivers are included to get a comparative analysis of the system bit error rate (BER) performance. Moreover in this work, a detailed investigation considering the link attenuation factor has been included. The BER expressions are theoretically derived for the case of weak and moderate turbulent conditions using log-normal channel modeling. A detailed analysis of BER performance for the aforementioned modulation techniques is observed by varying the link distance, strength of turbulence and bit rate. Also, a thorough observation of the capacity of the BPSK-SIM in the lognormal channel model is being taken for different turbulent states.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117062643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668202
Palak Makkar, T. Choudhury, Akash Nigam, Praveen Kumar
Big data emergence is forcing lots of changes in how big organizations operate and use their data and typically organizations opt for multiple software to manage Big data. Depending on which tool suite an organization has, they can use big data to empower the organization to operate close to real time have quick analysis and learn valuable insights from data. Big Data is slowly finding permanent place in all organization future strategy as more and more organizations are understanding importance of Big data and how it can improve their company’s business. Most of the organizations are scaling up their tool suite to better handle big data, and HADOOP is everybody’s first choice. Other options are also available like SQL databases, In-memory databases, etc.
{"title":"A Recent Trends and Techniques of Big Data Management","authors":"Palak Makkar, T. Choudhury, Akash Nigam, Praveen Kumar","doi":"10.1109/IC3IOT.2018.8668202","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668202","url":null,"abstract":"Big data emergence is forcing lots of changes in how big organizations operate and use their data and typically organizations opt for multiple software to manage Big data. Depending on which tool suite an organization has, they can use big data to empower the organization to operate close to real time have quick analysis and learn valuable insights from data. Big Data is slowly finding permanent place in all organization future strategy as more and more organizations are understanding importance of Big data and how it can improve their company’s business. Most of the organizations are scaling up their tool suite to better handle big data, and HADOOP is everybody’s first choice. Other options are also available like SQL databases, In-memory databases, etc.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122252641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668122
Sagar Verma, T. Choudhury, Praveen Kumar, S. Gupta
The gauge of following day share esteem execution is a brain boggling issue. Particular examination and key examination has helped outline purpose behind offer esteem want and fundamental initiative. The explanation behind this paper is to find and propel the rules of the framework appear. We impact a two overlay to consider. Immediately, we endeavor to dismember the results in amount of neuros show in neutral compose on the execution of the framework. It is watched that an arrange with 6 – 8 neuros give the better output for single offer esteem figure. Likewise, setting up the framework is a period and resources using task which endless supply of neuros what’s more, features.
{"title":"Emendation of Neural system for Stock Index Price Prediction","authors":"Sagar Verma, T. Choudhury, Praveen Kumar, S. Gupta","doi":"10.1109/IC3IOT.2018.8668122","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668122","url":null,"abstract":"The gauge of following day share esteem execution is a brain boggling issue. Particular examination and key examination has helped outline purpose behind offer esteem want and fundamental initiative. The explanation behind this paper is to find and propel the rules of the framework appear. We impact a two overlay to consider. Immediately, we endeavor to dismember the results in amount of neuros show in neutral compose on the execution of the framework. It is watched that an arrange with 6 – 8 neuros give the better output for single offer esteem figure. Likewise, setting up the framework is a period and resources using task which endless supply of neuros what’s more, features.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127514821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668201
Shashank Kumar, Aman Gupta, Kumar Shaurya, Sushant Kumar, A. Mukherjee
In a sensor network, the energy is consumed rapidly by the sensor nodes, and drains battery power quickly. Hence, resulting in short lifetime of the nodes around the sink because of high amount of traffic in the system, mentioned as bottleneck zone. The work studies to opt for a single-hop as nodes which are present in the bottleneck zone, acting as cluster head, communicating with base station. Based on different literature, the issues still lies with the proper implementation of heterogeneous sensor networks and thus, an overview perspective has been shown towards the constraints and some possible solutions in terms of energy efficient network.
{"title":"A study on SEP towards energy efficient wireless sensor networks","authors":"Shashank Kumar, Aman Gupta, Kumar Shaurya, Sushant Kumar, A. Mukherjee","doi":"10.1109/IC3IOT.2018.8668201","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668201","url":null,"abstract":"In a sensor network, the energy is consumed rapidly by the sensor nodes, and drains battery power quickly. Hence, resulting in short lifetime of the nodes around the sink because of high amount of traffic in the system, mentioned as bottleneck zone. The work studies to opt for a single-hop as nodes which are present in the bottleneck zone, acting as cluster head, communicating with base station. Based on different literature, the issues still lies with the proper implementation of heterogeneous sensor networks and thus, an overview perspective has been shown towards the constraints and some possible solutions in terms of energy efficient network.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116559047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668189
Vasanth Muralikrishnan, B. Janakiraman
the personalized web page recommendation for individuals is evident these days. Web servers are loaded with recommendation systems that analyze and recommend web pages to the users. They use data that are implicitly obtained as a result of web browsing patterns of the uses for recommending web pages. The cluster based association rule mining based system collects the web logs and generates a cluster of similar users and recommends pages to the users by actively analyzing them in the online. However, the time for analyzing it in online is more. To optimize this and increase the accuracy of the recommendation systems, a method that applies Naïve Bayes technique for clustering and firefly algorithm based similarity measure for optimization is designed. Web logs are initially clustered in offline by Naïve Bayes clustering technique. To find the similarity between the active user queries with other users in the same cluster in online, firefly algorithm based similarity measure is used. Firefly algorithm meticulously searches the generated cluster of web logs of the active user and recommends top pages. Firefly algorithm utilizes time efficiently, thus it is used for processing in online. When web pages are obtained, they are ranked and the top pages that are more relevant to the query are recommended. Efficiency of the system is evaluated using the measures like precision, recall, f – score, Matthews correlation and fallout rate. Experimental evaluation with real data set shows that the proposed system produced better recommendations and uses less time for computation in online.
{"title":"Firefly Based Optimization in Web Page Recommendation System","authors":"Vasanth Muralikrishnan, B. Janakiraman","doi":"10.1109/IC3IOT.2018.8668189","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668189","url":null,"abstract":"the personalized web page recommendation for individuals is evident these days. Web servers are loaded with recommendation systems that analyze and recommend web pages to the users. They use data that are implicitly obtained as a result of web browsing patterns of the uses for recommending web pages. The cluster based association rule mining based system collects the web logs and generates a cluster of similar users and recommends pages to the users by actively analyzing them in the online. However, the time for analyzing it in online is more. To optimize this and increase the accuracy of the recommendation systems, a method that applies Naïve Bayes technique for clustering and firefly algorithm based similarity measure for optimization is designed. Web logs are initially clustered in offline by Naïve Bayes clustering technique. To find the similarity between the active user queries with other users in the same cluster in online, firefly algorithm based similarity measure is used. Firefly algorithm meticulously searches the generated cluster of web logs of the active user and recommends top pages. Firefly algorithm utilizes time efficiently, thus it is used for processing in online. When web pages are obtained, they are ranked and the top pages that are more relevant to the query are recommended. Efficiency of the system is evaluated using the measures like precision, recall, f – score, Matthews correlation and fallout rate. Experimental evaluation with real data set shows that the proposed system produced better recommendations and uses less time for computation in online.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"62 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114023782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}