Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586320
Arun Nandewal, D. Mahendra, K. Chandrasekaran
Denial of service is becoming a growing concern. As our systems communicate more and more with others that we know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the very protocols intended for the establishment and authentication of communication to tie up our resources and disable our servers. Since these attacks occur before parties are authenticated to each other, we cannot rely upon enforcement of the appropriate access control policy to protect us. Instead we must build our defenses, as much as possible, into the protocols themselves. This paper shows how some principles that have already been used to make protocols more resistant to denial of service can be specified and verified. We specify a protocol for distributed networks and specify, verify it using general formal methods.
{"title":"Security protocol for distributed networks using formal method specification","authors":"Arun Nandewal, D. Mahendra, K. Chandrasekaran","doi":"10.1109/ICACCS.2016.7586320","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586320","url":null,"abstract":"Denial of service is becoming a growing concern. As our systems communicate more and more with others that we know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the very protocols intended for the establishment and authentication of communication to tie up our resources and disable our servers. Since these attacks occur before parties are authenticated to each other, we cannot rely upon enforcement of the appropriate access control policy to protect us. Instead we must build our defenses, as much as possible, into the protocols themselves. This paper shows how some principles that have already been used to make protocols more resistant to denial of service can be specified and verified. We specify a protocol for distributed networks and specify, verify it using general formal methods.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116269902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586293
G. Karuppusami
The conference will look into the trends and leading-edge practices that are shaping the future in the fields of Information and Communication Technology (ICT). Sri Eshwar College of Engineering (SECE) has the tradition of hosting events in a unique and splendid international style. This was proved during the previous two conferences held during 2013 and 2015.
{"title":"Message from dean - research JL innovations","authors":"G. Karuppusami","doi":"10.1109/ICACCS.2016.7586293","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586293","url":null,"abstract":"The conference will look into the trends and leading-edge practices that are shaping the future in the fields of Information and Communication Technology (ICT). Sri Eshwar College of Engineering (SECE) has the tradition of hosting events in a unique and splendid international style. This was proved during the previous two conferences held during 2013 and 2015.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123917677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586370
N. Praveen, K. Kumar
An emerging technology of SDN plays a vital role in network reconfiguration. In an existing system, real word experiment on dynamic changing network topology lacks the ability to change the network configuration. The article works for dynamic reconfiguration in networking through high-level programmability via such C++ or python via SDN controller. In this paper, SDN enable an innovation performance for improving the network reconfigurability through three resources such as controller (Raspberry pi), switch and host nodes. The protocol of Openflow acts as an interface between controller and switch. As a result, the dynamic network reconfigurability solves the problem of manual configuration and reconfiguration to the network operator where the system deploys on campus network.
{"title":"Software-defined networking: Reconfigurable network systems in LAN topology","authors":"N. Praveen, K. Kumar","doi":"10.1109/ICACCS.2016.7586370","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586370","url":null,"abstract":"An emerging technology of SDN plays a vital role in network reconfiguration. In an existing system, real word experiment on dynamic changing network topology lacks the ability to change the network configuration. The article works for dynamic reconfiguration in networking through high-level programmability via such C++ or python via SDN controller. In this paper, SDN enable an innovation performance for improving the network reconfigurability through three resources such as controller (Raspberry pi), switch and host nodes. The protocol of Openflow acts as an interface between controller and switch. As a result, the dynamic network reconfigurability solves the problem of manual configuration and reconfiguration to the network operator where the system deploys on campus network.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586401
Gardhariya Smit Rajeshbhai, Rachna Jani, Jignesh J. Patoliya, Ekta Mehul
Wireless energy management and analysis is an embedded system implemented for smart metering. In Country like India energy management is done mostly with door-to-door billing system or User have to pay online at only Gram-Panchayat or municipality where authorized person will do payment procedure for User and take the amount. Here pre-Paid scheme is implemented for the user-end. User will get the electricity equivalent to balance in his account. All the activity done by the server implemented over here and some illegal activity at the user-end like stealing of electricity, meter-box's lock broken can be determined etc. Online recharge also can be done as per your need. For security purpose 3AES encryption algorithm is implemented on TCP/IP as well as Xbee communication. 3AES is mixture of AES and 3DES algorithm used in networking for encryption of data.
{"title":"Wireless energy management and analysis system(WEMAS)","authors":"Gardhariya Smit Rajeshbhai, Rachna Jani, Jignesh J. Patoliya, Ekta Mehul","doi":"10.1109/ICACCS.2016.7586401","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586401","url":null,"abstract":"Wireless energy management and analysis is an embedded system implemented for smart metering. In Country like India energy management is done mostly with door-to-door billing system or User have to pay online at only Gram-Panchayat or municipality where authorized person will do payment procedure for User and take the amount. Here pre-Paid scheme is implemented for the user-end. User will get the electricity equivalent to balance in his account. All the activity done by the server implemented over here and some illegal activity at the user-end like stealing of electricity, meter-box's lock broken can be determined etc. Online recharge also can be done as per your need. For security purpose 3AES encryption algorithm is implemented on TCP/IP as well as Xbee communication. 3AES is mixture of AES and 3DES algorithm used in networking for encryption of data.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121309082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586379
S. M. Farooq, S. H. Shabbeer Basha
many algorithms proposed to generate Fibonacci series introduced by a 12th century Italian mathematician Leonardo Bonacci [1]. The study paper gives insight into three different Fibonacci series generation algorithms. This paper compares and contrasts three different algorithms namely LINEAR_FIB, EXPO_FIB and MATRIX_FIB. Time complexities of these algorithms are computed. The results of our study show that the three algorithms gives linear, exponential and logarithmic time complexities. Finally we discussed application areas of Fibonacci numbers which are generated by the algorithms.
{"title":"A study on Fibonacci series generation algorithms","authors":"S. M. Farooq, S. H. Shabbeer Basha","doi":"10.1109/ICACCS.2016.7586379","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586379","url":null,"abstract":"many algorithms proposed to generate Fibonacci series introduced by a 12th century Italian mathematician Leonardo Bonacci [1]. The study paper gives insight into three different Fibonacci series generation algorithms. This paper compares and contrasts three different algorithms namely LINEAR_FIB, EXPO_FIB and MATRIX_FIB. Time complexities of these algorithms are computed. The results of our study show that the three algorithms gives linear, exponential and logarithmic time complexities. Finally we discussed application areas of Fibonacci numbers which are generated by the algorithms.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126070537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586314
S. R. Yadhuraj, Satheesh Babu G, Uttara Kumari M
The measurement of thickness and roughness parameters are prime importance in thin film technologies and SPM (Scanning Probe Microscopy) based measurements. Unfortunately data processing is neglected compared to the importance given to the scanning of the data. Many inbuilt softwares are made available to the user which are complex and need expertise user. In this regards gwyddion provides the user friendly and open sources software available for data processing and statistical analysis of the sampled data obtained from SPM measurements. In this work the SPM data are obtained through the database and its morphologies and meteorology are studied using gwyddion software. The results obtained shows software could able to detect with the resolution of nanometers and the software can be used to measure the thickness and roughness measurements with reliable accuracy.
{"title":"Measurement of thickness and roughness using gwyddion","authors":"S. R. Yadhuraj, Satheesh Babu G, Uttara Kumari M","doi":"10.1109/ICACCS.2016.7586314","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586314","url":null,"abstract":"The measurement of thickness and roughness parameters are prime importance in thin film technologies and SPM (Scanning Probe Microscopy) based measurements. Unfortunately data processing is neglected compared to the importance given to the scanning of the data. Many inbuilt softwares are made available to the user which are complex and need expertise user. In this regards gwyddion provides the user friendly and open sources software available for data processing and statistical analysis of the sampled data obtained from SPM measurements. In this work the SPM data are obtained through the database and its morphologies and meteorology are studied using gwyddion software. The results obtained shows software could able to detect with the resolution of nanometers and the software can be used to measure the thickness and roughness measurements with reliable accuracy.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128961096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586390
S. S. Balasreedharan, S. Thangavel
The recent high penetration of stationary renewable energy sources yielding DC output coupled with the increased interest in storage systems, electronic loads, machine drives and other components operating with DC input, require the development of new techniques for control and link integration. Faults in power distribution systems have high impact on continuous supply and quality service. If a contingency occurs in a system, instability and cascading failures blackout would be possible. Protection against such severe faults increases the transfer capabilities of the existing transmission systems. The literature survey shows various methods available for the fault identification and fault location. In the existing system each protection unit is able to autonomously identify the type of fault using the current derivative fault identification method. Then the event judgment is sent to other interconnected protection units through high level data communication. But in the existing system there is a limitation that it is possible to limit the load voltage drop up to 2.88%. A novel protective method is proposed to identify the fault, isolate the faulted area and restore the system quickly. The fault identification is based on voltage derivative method. In the voltage derivative protection method, the derivatives ∂V/∂t and ∂I/∂t are calculated from the dc voltages and currents measured locally at the relaying point to detect, locate and isolate the fault. The local voltage and current measurements are taken for each instance of time. It requires less data and doesn't require high speed communication and synchronization. The advantage of this method is that the first incident/reflected wave from the fault is used in the detection and, therefore, the response time is very fast, providing fault detection within 2-3ms than current derivative method. The expected results of the proposed system are to identify the fault, isolated the faulted area and restore the system quickly. The results of the proposed system are verified using MATLAB Simulink.
{"title":"An adaptive fault identification scheme for DC microgrid using event based classification","authors":"S. S. Balasreedharan, S. Thangavel","doi":"10.1109/ICACCS.2016.7586390","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586390","url":null,"abstract":"The recent high penetration of stationary renewable energy sources yielding DC output coupled with the increased interest in storage systems, electronic loads, machine drives and other components operating with DC input, require the development of new techniques for control and link integration. Faults in power distribution systems have high impact on continuous supply and quality service. If a contingency occurs in a system, instability and cascading failures blackout would be possible. Protection against such severe faults increases the transfer capabilities of the existing transmission systems. The literature survey shows various methods available for the fault identification and fault location. In the existing system each protection unit is able to autonomously identify the type of fault using the current derivative fault identification method. Then the event judgment is sent to other interconnected protection units through high level data communication. But in the existing system there is a limitation that it is possible to limit the load voltage drop up to 2.88%. A novel protective method is proposed to identify the fault, isolate the faulted area and restore the system quickly. The fault identification is based on voltage derivative method. In the voltage derivative protection method, the derivatives ∂V/∂t and ∂I/∂t are calculated from the dc voltages and currents measured locally at the relaying point to detect, locate and isolate the fault. The local voltage and current measurements are taken for each instance of time. It requires less data and doesn't require high speed communication and synchronization. The advantage of this method is that the first incident/reflected wave from the fault is used in the detection and, therefore, the response time is very fast, providing fault detection within 2-3ms than current derivative method. The expected results of the proposed system are to identify the fault, isolated the faulted area and restore the system quickly. The results of the proposed system are verified using MATLAB Simulink.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586337
P. Srivastava, Raghav Dogra, Ajay Sharma
Physical Uplink Control Channel (PUCCH) is a transmission channel used to transport acknowledgment responses and retransmission requests (Hybrid Automatic Repeat Request (HARQ ACK/NACK)) for Downlink (DL) data packets, send service scheduling requests (SR), transfer channel quality information (CQI) and Multiple Input Multiple Output (MIMO) feedback (such as Rank Indicator (RI) or Precoding Matrix Indicator (PMI) from one or more User Equipment (UE) that can transmit on the control channel to an Evolved Node-Base Station (eNB). In this paper we analyze an existing PUCCH design, which is a part of LTE Uplink Processing Chain and propose methods to optimize the performance of the Uplink Control Path with no incremental change in underlying hardware resources. The proposed design decreases the processor resource consumption by the PUCCH decoder by half (best case) and simplifies LTE Layer 1 Scheduler Design, thereby allowing the system to achieve higher throughput. The results are compared via black box testing over configuration supported by the system. The proposed improvements can be leveraged in other parts of LTE Uplink and Downlink Processing Chain for performance gains.
物理上行控制通道(Physical Uplink Control Channel, PUCCH)是一种传输通道,用于传输对下行(DL)数据包的确认响应和重传请求(HARQ ACK/NACK),发送业务调度请求(SR),传输信道质量信息(CQI)和多输入多输出(MIMO)反馈(如秩指标(RI)或预编码矩阵指标(PMI)),这些反馈信息可以从一个或多个用户设备(UE)在控制信道上传输到演进节点基站(eNB)。在本文中,我们分析了现有的PUCCH设计,它是LTE上行处理链的一部分,并提出了在不增加底层硬件资源变化的情况下优化上行控制路径性能的方法。提出的设计将PUCCH解码器的处理器资源消耗减少了一半(最佳情况),并简化了LTE第1层调度器设计,从而使系统能够实现更高的吞吐量。结果通过黑盒测试与系统支持的配置进行比较。所提出的改进可以用于LTE上行链路和下行链路处理链的其他部分,以获得性能提升。
{"title":"Performance enhancement via efficient buffer and cache utilization in Uplink Control Path for LTE","authors":"P. Srivastava, Raghav Dogra, Ajay Sharma","doi":"10.1109/ICACCS.2016.7586337","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586337","url":null,"abstract":"Physical Uplink Control Channel (PUCCH) is a transmission channel used to transport acknowledgment responses and retransmission requests (Hybrid Automatic Repeat Request (HARQ ACK/NACK)) for Downlink (DL) data packets, send service scheduling requests (SR), transfer channel quality information (CQI) and Multiple Input Multiple Output (MIMO) feedback (such as Rank Indicator (RI) or Precoding Matrix Indicator (PMI) from one or more User Equipment (UE) that can transmit on the control channel to an Evolved Node-Base Station (eNB). In this paper we analyze an existing PUCCH design, which is a part of LTE Uplink Processing Chain and propose methods to optimize the performance of the Uplink Control Path with no incremental change in underlying hardware resources. The proposed design decreases the processor resource consumption by the PUCCH decoder by half (best case) and simplifies LTE Layer 1 Scheduler Design, thereby allowing the system to achieve higher throughput. The results are compared via black box testing over configuration supported by the system. The proposed improvements can be leveraged in other parts of LTE Uplink and Downlink Processing Chain for performance gains.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586342
P. M. James, Jaimol Thomas
Multilevel inverter is a very popular converter in many areas including renewable energy integration, HVDC systems, FACTS devices, industrial drives and numerous other power system and power electronic applications. It has many advantages like low power loss, lesser harmonics, low electromagnetic interference, reduced stress on switches etc. Many configurations have been developed over the last few decades like the neutral clamped inverter, flying capacitor inverter, advanced H bridge inverter etc. New configurations capable of reducing the number of switches and increasing the efficiency of inverter are always welcome. This paper considers an efficient topology with reduced number of switches and evaluates harmonic limiting capability. The control used is sinusoidal pulse width modulation. Simulation platform is MATLAB-Simulink. Total harmonics distortion (THD) values are calculated to find out the harmonic limiting capability.
{"title":"Analysis of an efficient cascaded inverter with different loads","authors":"P. M. James, Jaimol Thomas","doi":"10.1109/ICACCS.2016.7586342","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586342","url":null,"abstract":"Multilevel inverter is a very popular converter in many areas including renewable energy integration, HVDC systems, FACTS devices, industrial drives and numerous other power system and power electronic applications. It has many advantages like low power loss, lesser harmonics, low electromagnetic interference, reduced stress on switches etc. Many configurations have been developed over the last few decades like the neutral clamped inverter, flying capacitor inverter, advanced H bridge inverter etc. New configurations capable of reducing the number of switches and increasing the efficiency of inverter are always welcome. This paper considers an efficient topology with reduced number of switches and evaluates harmonic limiting capability. The control used is sinusoidal pulse width modulation. Simulation platform is MATLAB-Simulink. Total harmonics distortion (THD) values are calculated to find out the harmonic limiting capability.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134147883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586377
Priyanka Joseph, J. C. Pamila
It has become increasingly popular to mine big data in order to gain insights to help business decisions or to provide more desirable personalized, higher quality services. They usually include data sets with sizes beyond the ability of commonly used software tools to retrieve, manage, and process data within an adequate elapsed time. So there is big demand for distributed computing framework. As new data and updates are constantly arriving, the results of data mining applications become incomplete over time. In such situations it is desirable to periodically refresh the mined data in order to keep it up-to-date. This paper describes the existing approaches to big data mining which uses these frameworks in an incremental approach that saves and reuses the previous states of computations. It also explores several enhancements introduced in this same framework with iterative mapping characteristics. Gaps in the current methods are identified in this literature review.
{"title":"Survey on incremental and iterative models in big data mining environment","authors":"Priyanka Joseph, J. C. Pamila","doi":"10.1109/ICACCS.2016.7586377","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586377","url":null,"abstract":"It has become increasingly popular to mine big data in order to gain insights to help business decisions or to provide more desirable personalized, higher quality services. They usually include data sets with sizes beyond the ability of commonly used software tools to retrieve, manage, and process data within an adequate elapsed time. So there is big demand for distributed computing framework. As new data and updates are constantly arriving, the results of data mining applications become incomplete over time. In such situations it is desirable to periodically refresh the mined data in order to keep it up-to-date. This paper describes the existing approaches to big data mining which uses these frameworks in an incremental approach that saves and reuses the previous states of computations. It also explores several enhancements introduced in this same framework with iterative mapping characteristics. Gaps in the current methods are identified in this literature review.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}