Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586337
P. Srivastava, Raghav Dogra, Ajay Sharma
Physical Uplink Control Channel (PUCCH) is a transmission channel used to transport acknowledgment responses and retransmission requests (Hybrid Automatic Repeat Request (HARQ ACK/NACK)) for Downlink (DL) data packets, send service scheduling requests (SR), transfer channel quality information (CQI) and Multiple Input Multiple Output (MIMO) feedback (such as Rank Indicator (RI) or Precoding Matrix Indicator (PMI) from one or more User Equipment (UE) that can transmit on the control channel to an Evolved Node-Base Station (eNB). In this paper we analyze an existing PUCCH design, which is a part of LTE Uplink Processing Chain and propose methods to optimize the performance of the Uplink Control Path with no incremental change in underlying hardware resources. The proposed design decreases the processor resource consumption by the PUCCH decoder by half (best case) and simplifies LTE Layer 1 Scheduler Design, thereby allowing the system to achieve higher throughput. The results are compared via black box testing over configuration supported by the system. The proposed improvements can be leveraged in other parts of LTE Uplink and Downlink Processing Chain for performance gains.
物理上行控制通道(Physical Uplink Control Channel, PUCCH)是一种传输通道,用于传输对下行(DL)数据包的确认响应和重传请求(HARQ ACK/NACK),发送业务调度请求(SR),传输信道质量信息(CQI)和多输入多输出(MIMO)反馈(如秩指标(RI)或预编码矩阵指标(PMI)),这些反馈信息可以从一个或多个用户设备(UE)在控制信道上传输到演进节点基站(eNB)。在本文中,我们分析了现有的PUCCH设计,它是LTE上行处理链的一部分,并提出了在不增加底层硬件资源变化的情况下优化上行控制路径性能的方法。提出的设计将PUCCH解码器的处理器资源消耗减少了一半(最佳情况),并简化了LTE第1层调度器设计,从而使系统能够实现更高的吞吐量。结果通过黑盒测试与系统支持的配置进行比较。所提出的改进可以用于LTE上行链路和下行链路处理链的其他部分,以获得性能提升。
{"title":"Performance enhancement via efficient buffer and cache utilization in Uplink Control Path for LTE","authors":"P. Srivastava, Raghav Dogra, Ajay Sharma","doi":"10.1109/ICACCS.2016.7586337","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586337","url":null,"abstract":"Physical Uplink Control Channel (PUCCH) is a transmission channel used to transport acknowledgment responses and retransmission requests (Hybrid Automatic Repeat Request (HARQ ACK/NACK)) for Downlink (DL) data packets, send service scheduling requests (SR), transfer channel quality information (CQI) and Multiple Input Multiple Output (MIMO) feedback (such as Rank Indicator (RI) or Precoding Matrix Indicator (PMI) from one or more User Equipment (UE) that can transmit on the control channel to an Evolved Node-Base Station (eNB). In this paper we analyze an existing PUCCH design, which is a part of LTE Uplink Processing Chain and propose methods to optimize the performance of the Uplink Control Path with no incremental change in underlying hardware resources. The proposed design decreases the processor resource consumption by the PUCCH decoder by half (best case) and simplifies LTE Layer 1 Scheduler Design, thereby allowing the system to achieve higher throughput. The results are compared via black box testing over configuration supported by the system. The proposed improvements can be leveraged in other parts of LTE Uplink and Downlink Processing Chain for performance gains.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586390
S. S. Balasreedharan, S. Thangavel
The recent high penetration of stationary renewable energy sources yielding DC output coupled with the increased interest in storage systems, electronic loads, machine drives and other components operating with DC input, require the development of new techniques for control and link integration. Faults in power distribution systems have high impact on continuous supply and quality service. If a contingency occurs in a system, instability and cascading failures blackout would be possible. Protection against such severe faults increases the transfer capabilities of the existing transmission systems. The literature survey shows various methods available for the fault identification and fault location. In the existing system each protection unit is able to autonomously identify the type of fault using the current derivative fault identification method. Then the event judgment is sent to other interconnected protection units through high level data communication. But in the existing system there is a limitation that it is possible to limit the load voltage drop up to 2.88%. A novel protective method is proposed to identify the fault, isolate the faulted area and restore the system quickly. The fault identification is based on voltage derivative method. In the voltage derivative protection method, the derivatives ∂V/∂t and ∂I/∂t are calculated from the dc voltages and currents measured locally at the relaying point to detect, locate and isolate the fault. The local voltage and current measurements are taken for each instance of time. It requires less data and doesn't require high speed communication and synchronization. The advantage of this method is that the first incident/reflected wave from the fault is used in the detection and, therefore, the response time is very fast, providing fault detection within 2-3ms than current derivative method. The expected results of the proposed system are to identify the fault, isolated the faulted area and restore the system quickly. The results of the proposed system are verified using MATLAB Simulink.
{"title":"An adaptive fault identification scheme for DC microgrid using event based classification","authors":"S. S. Balasreedharan, S. Thangavel","doi":"10.1109/ICACCS.2016.7586390","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586390","url":null,"abstract":"The recent high penetration of stationary renewable energy sources yielding DC output coupled with the increased interest in storage systems, electronic loads, machine drives and other components operating with DC input, require the development of new techniques for control and link integration. Faults in power distribution systems have high impact on continuous supply and quality service. If a contingency occurs in a system, instability and cascading failures blackout would be possible. Protection against such severe faults increases the transfer capabilities of the existing transmission systems. The literature survey shows various methods available for the fault identification and fault location. In the existing system each protection unit is able to autonomously identify the type of fault using the current derivative fault identification method. Then the event judgment is sent to other interconnected protection units through high level data communication. But in the existing system there is a limitation that it is possible to limit the load voltage drop up to 2.88%. A novel protective method is proposed to identify the fault, isolate the faulted area and restore the system quickly. The fault identification is based on voltage derivative method. In the voltage derivative protection method, the derivatives ∂V/∂t and ∂I/∂t are calculated from the dc voltages and currents measured locally at the relaying point to detect, locate and isolate the fault. The local voltage and current measurements are taken for each instance of time. It requires less data and doesn't require high speed communication and synchronization. The advantage of this method is that the first incident/reflected wave from the fault is used in the detection and, therefore, the response time is very fast, providing fault detection within 2-3ms than current derivative method. The expected results of the proposed system are to identify the fault, isolated the faulted area and restore the system quickly. The results of the proposed system are verified using MATLAB Simulink.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586341
John William Carey Medithe, U. R. Nelakuditi
Electroencephalogram (EEG) is the most efficient medical imaging tool to analyze and interpret the characteristics of the brain disorder which helps the physician to diagnose the brain disorder patient. EEG signal is a representation of electrical activity over the surface of the brain with respect to time, this electrical activity is caused by the firing of neurons. If these neurons fire in anomalous manner, results in sudden impulses which can be stated as Seizures. If this unusual firing of nerve cells occurs in severe, may result in a shake and loss of control in the subject sometime. EEG waveform information about frequency, amplitude and shape are entirely dependent on the subjects age, state of alertness and location on scalp where the EEG is drawn with electrodes. An EEG waveform is said to be abnormal when the EEG waveform exhibits unusual characteristics which does not match to the subject's state of alertness, age and other factors. In this article it is to study the different types of EEG waveforms both in the case of normal and abnormal and further concentrated on the abnormalities both in the foam of Epileptical and Non-Epileptical. These abnormalities are internally classified as focal and generalized seizures. The comparable tabular form is given to the each type of EEG waveform based on their characteristics.
{"title":"Study of normal and abnormal EEG","authors":"John William Carey Medithe, U. R. Nelakuditi","doi":"10.1109/ICACCS.2016.7586341","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586341","url":null,"abstract":"Electroencephalogram (EEG) is the most efficient medical imaging tool to analyze and interpret the characteristics of the brain disorder which helps the physician to diagnose the brain disorder patient. EEG signal is a representation of electrical activity over the surface of the brain with respect to time, this electrical activity is caused by the firing of neurons. If these neurons fire in anomalous manner, results in sudden impulses which can be stated as Seizures. If this unusual firing of nerve cells occurs in severe, may result in a shake and loss of control in the subject sometime. EEG waveform information about frequency, amplitude and shape are entirely dependent on the subjects age, state of alertness and location on scalp where the EEG is drawn with electrodes. An EEG waveform is said to be abnormal when the EEG waveform exhibits unusual characteristics which does not match to the subject's state of alertness, age and other factors. In this article it is to study the different types of EEG waveforms both in the case of normal and abnormal and further concentrated on the abnormalities both in the foam of Epileptical and Non-Epileptical. These abnormalities are internally classified as focal and generalized seizures. The comparable tabular form is given to the each type of EEG waveform based on their characteristics.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"9 47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130998481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586320
Arun Nandewal, D. Mahendra, K. Chandrasekaran
Denial of service is becoming a growing concern. As our systems communicate more and more with others that we know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the very protocols intended for the establishment and authentication of communication to tie up our resources and disable our servers. Since these attacks occur before parties are authenticated to each other, we cannot rely upon enforcement of the appropriate access control policy to protect us. Instead we must build our defenses, as much as possible, into the protocols themselves. This paper shows how some principles that have already been used to make protocols more resistant to denial of service can be specified and verified. We specify a protocol for distributed networks and specify, verify it using general formal methods.
{"title":"Security protocol for distributed networks using formal method specification","authors":"Arun Nandewal, D. Mahendra, K. Chandrasekaran","doi":"10.1109/ICACCS.2016.7586320","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586320","url":null,"abstract":"Denial of service is becoming a growing concern. As our systems communicate more and more with others that we know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the very protocols intended for the establishment and authentication of communication to tie up our resources and disable our servers. Since these attacks occur before parties are authenticated to each other, we cannot rely upon enforcement of the appropriate access control policy to protect us. Instead we must build our defenses, as much as possible, into the protocols themselves. This paper shows how some principles that have already been used to make protocols more resistant to denial of service can be specified and verified. We specify a protocol for distributed networks and specify, verify it using general formal methods.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116269902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586400
M. Valarmathi, L. Sumathi, G. Deepika
Internet of Things (IoT) paradigm is gaining immense importance in today's world of rapid connectivity. Mobile IoT scenario like Smart City is characterized by short and recurrent contact between IoT devices. The existence of contacts between the mobile and infrastructure devices is an enabler for nodes to discover their neighbors to relay data. A recent chapter in research aims at learning the mobility pattern of devices to improve efficiency of discovery. In this paper, various techniques that are available for neighbor discovery are discussed and it is shown that knowledge integration in the process of node discovery leads to efficient scheduling of resources.
{"title":"A survey on node discovery in Mobile Internet of Things(IoT) scenarios","authors":"M. Valarmathi, L. Sumathi, G. Deepika","doi":"10.1109/ICACCS.2016.7586400","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586400","url":null,"abstract":"Internet of Things (IoT) paradigm is gaining immense importance in today's world of rapid connectivity. Mobile IoT scenario like Smart City is characterized by short and recurrent contact between IoT devices. The existence of contacts between the mobile and infrastructure devices is an enabler for nodes to discover their neighbors to relay data. A recent chapter in research aims at learning the mobility pattern of devices to improve efficiency of discovery. In this paper, various techniques that are available for neighbor discovery are discussed and it is shown that knowledge integration in the process of node discovery leads to efficient scheduling of resources.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128798953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586314
S. R. Yadhuraj, Satheesh Babu G, Uttara Kumari M
The measurement of thickness and roughness parameters are prime importance in thin film technologies and SPM (Scanning Probe Microscopy) based measurements. Unfortunately data processing is neglected compared to the importance given to the scanning of the data. Many inbuilt softwares are made available to the user which are complex and need expertise user. In this regards gwyddion provides the user friendly and open sources software available for data processing and statistical analysis of the sampled data obtained from SPM measurements. In this work the SPM data are obtained through the database and its morphologies and meteorology are studied using gwyddion software. The results obtained shows software could able to detect with the resolution of nanometers and the software can be used to measure the thickness and roughness measurements with reliable accuracy.
{"title":"Measurement of thickness and roughness using gwyddion","authors":"S. R. Yadhuraj, Satheesh Babu G, Uttara Kumari M","doi":"10.1109/ICACCS.2016.7586314","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586314","url":null,"abstract":"The measurement of thickness and roughness parameters are prime importance in thin film technologies and SPM (Scanning Probe Microscopy) based measurements. Unfortunately data processing is neglected compared to the importance given to the scanning of the data. Many inbuilt softwares are made available to the user which are complex and need expertise user. In this regards gwyddion provides the user friendly and open sources software available for data processing and statistical analysis of the sampled data obtained from SPM measurements. In this work the SPM data are obtained through the database and its morphologies and meteorology are studied using gwyddion software. The results obtained shows software could able to detect with the resolution of nanometers and the software can be used to measure the thickness and roughness measurements with reliable accuracy.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128961096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586293
G. Karuppusami
The conference will look into the trends and leading-edge practices that are shaping the future in the fields of Information and Communication Technology (ICT). Sri Eshwar College of Engineering (SECE) has the tradition of hosting events in a unique and splendid international style. This was proved during the previous two conferences held during 2013 and 2015.
{"title":"Message from dean - research JL innovations","authors":"G. Karuppusami","doi":"10.1109/ICACCS.2016.7586293","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586293","url":null,"abstract":"The conference will look into the trends and leading-edge practices that are shaping the future in the fields of Information and Communication Technology (ICT). Sri Eshwar College of Engineering (SECE) has the tradition of hosting events in a unique and splendid international style. This was proved during the previous two conferences held during 2013 and 2015.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123917677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586370
N. Praveen, K. Kumar
An emerging technology of SDN plays a vital role in network reconfiguration. In an existing system, real word experiment on dynamic changing network topology lacks the ability to change the network configuration. The article works for dynamic reconfiguration in networking through high-level programmability via such C++ or python via SDN controller. In this paper, SDN enable an innovation performance for improving the network reconfigurability through three resources such as controller (Raspberry pi), switch and host nodes. The protocol of Openflow acts as an interface between controller and switch. As a result, the dynamic network reconfigurability solves the problem of manual configuration and reconfiguration to the network operator where the system deploys on campus network.
{"title":"Software-defined networking: Reconfigurable network systems in LAN topology","authors":"N. Praveen, K. Kumar","doi":"10.1109/ICACCS.2016.7586370","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586370","url":null,"abstract":"An emerging technology of SDN plays a vital role in network reconfiguration. In an existing system, real word experiment on dynamic changing network topology lacks the ability to change the network configuration. The article works for dynamic reconfiguration in networking through high-level programmability via such C++ or python via SDN controller. In this paper, SDN enable an innovation performance for improving the network reconfigurability through three resources such as controller (Raspberry pi), switch and host nodes. The protocol of Openflow acts as an interface between controller and switch. As a result, the dynamic network reconfigurability solves the problem of manual configuration and reconfiguration to the network operator where the system deploys on campus network.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586379
S. M. Farooq, S. H. Shabbeer Basha
many algorithms proposed to generate Fibonacci series introduced by a 12th century Italian mathematician Leonardo Bonacci [1]. The study paper gives insight into three different Fibonacci series generation algorithms. This paper compares and contrasts three different algorithms namely LINEAR_FIB, EXPO_FIB and MATRIX_FIB. Time complexities of these algorithms are computed. The results of our study show that the three algorithms gives linear, exponential and logarithmic time complexities. Finally we discussed application areas of Fibonacci numbers which are generated by the algorithms.
{"title":"A study on Fibonacci series generation algorithms","authors":"S. M. Farooq, S. H. Shabbeer Basha","doi":"10.1109/ICACCS.2016.7586379","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586379","url":null,"abstract":"many algorithms proposed to generate Fibonacci series introduced by a 12th century Italian mathematician Leonardo Bonacci [1]. The study paper gives insight into three different Fibonacci series generation algorithms. This paper compares and contrasts three different algorithms namely LINEAR_FIB, EXPO_FIB and MATRIX_FIB. Time complexities of these algorithms are computed. The results of our study show that the three algorithms gives linear, exponential and logarithmic time complexities. Finally we discussed application areas of Fibonacci numbers which are generated by the algorithms.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126070537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586377
Priyanka Joseph, J. C. Pamila
It has become increasingly popular to mine big data in order to gain insights to help business decisions or to provide more desirable personalized, higher quality services. They usually include data sets with sizes beyond the ability of commonly used software tools to retrieve, manage, and process data within an adequate elapsed time. So there is big demand for distributed computing framework. As new data and updates are constantly arriving, the results of data mining applications become incomplete over time. In such situations it is desirable to periodically refresh the mined data in order to keep it up-to-date. This paper describes the existing approaches to big data mining which uses these frameworks in an incremental approach that saves and reuses the previous states of computations. It also explores several enhancements introduced in this same framework with iterative mapping characteristics. Gaps in the current methods are identified in this literature review.
{"title":"Survey on incremental and iterative models in big data mining environment","authors":"Priyanka Joseph, J. C. Pamila","doi":"10.1109/ICACCS.2016.7586377","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586377","url":null,"abstract":"It has become increasingly popular to mine big data in order to gain insights to help business decisions or to provide more desirable personalized, higher quality services. They usually include data sets with sizes beyond the ability of commonly used software tools to retrieve, manage, and process data within an adequate elapsed time. So there is big demand for distributed computing framework. As new data and updates are constantly arriving, the results of data mining applications become incomplete over time. In such situations it is desirable to periodically refresh the mined data in order to keep it up-to-date. This paper describes the existing approaches to big data mining which uses these frameworks in an incremental approach that saves and reuses the previous states of computations. It also explores several enhancements introduced in this same framework with iterative mapping characteristics. Gaps in the current methods are identified in this literature review.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}