Android Applications have become an integral fraction of entwined contemporary subsistence. The entire sphere is employing diverse assortment of applications for distinguished intention. Among all the flamboyant assortment of applications, some applications have engrossed apiece individual and are unanimously accepted. With apiece fleeting instant, numerous applications are emerging in the market and are contending amid the contemporary applications in use.The proposed work is a pioneering approach to develop an application for message transference in a cosseted manner. The eminence of the work lies in ensuring that the messages send are in a coded structure, more precisely in encrypted form, formulated from the proposed Cryptographic modus operandi. The focal intention of the proposed work is to augment the status of safekeeping in data transference. The work is a multidisciplinary work and includes Biological principles in devising the Cryptographic modus operandi. Hormonal system is one of the most decisive fractions of human well-being and fundamental structure. There are numerous hormones meant for diverse purposes in human anatomy, more precisely, they are exclusively distinct for male and female. Although, the numeral quotient of hormones is colossal, but in the work, preferred male and female hormones have been employed.The hormones employed, their operational cycle and their way of illustration in the proposed work opens a unique mode to encrypt data and augment the safekeeping echelon. The augmented safekeeping could unearth its employment in numerous modes and in countless places, not only for personal purposes but could also be employed for organizational purpose.The Android Application for the said Cryptographic modus operandi is an initiative for safekeeping of apiece individual employing the Application as well as a universal mold for societal impact on the whole.
{"title":"Design and Implementation of Hormonal Cycle Based Cryptographic Modus Operandi and Android Application Development for Cosseted Transmission","authors":"Rajdeep Chowdhury, Paromita Mitra, Sukhwant Kumar, Satyam Singh, Aditya Singh","doi":"10.1109/ICGCIOT.2018.8753013","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753013","url":null,"abstract":"Android Applications have become an integral fraction of entwined contemporary subsistence. The entire sphere is employing diverse assortment of applications for distinguished intention. Among all the flamboyant assortment of applications, some applications have engrossed apiece individual and are unanimously accepted. With apiece fleeting instant, numerous applications are emerging in the market and are contending amid the contemporary applications in use.The proposed work is a pioneering approach to develop an application for message transference in a cosseted manner. The eminence of the work lies in ensuring that the messages send are in a coded structure, more precisely in encrypted form, formulated from the proposed Cryptographic modus operandi. The focal intention of the proposed work is to augment the status of safekeeping in data transference. The work is a multidisciplinary work and includes Biological principles in devising the Cryptographic modus operandi. Hormonal system is one of the most decisive fractions of human well-being and fundamental structure. There are numerous hormones meant for diverse purposes in human anatomy, more precisely, they are exclusively distinct for male and female. Although, the numeral quotient of hormones is colossal, but in the work, preferred male and female hormones have been employed.The hormones employed, their operational cycle and their way of illustration in the proposed work opens a unique mode to encrypt data and augment the safekeeping echelon. The augmented safekeeping could unearth its employment in numerous modes and in countless places, not only for personal purposes but could also be employed for organizational purpose.The Android Application for the said Cryptographic modus operandi is an initiative for safekeeping of apiece individual employing the Application as well as a universal mold for societal impact on the whole.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126243277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8752970
Ankita Gupta, Abhishek Singhal, A. Sabitha, T. Choudhury
Over the years the utility-customer relationship has rapidly transformed with vast number of factors affecting consumption including environmental factors like geography, weather, population, migration etc. Over the years the utility-customer relationship has rapidly transformed with vast number of factors affecting consumption including environmental factors like geography, weather, population, migration etc. The research work focuses on implementing a data driven approach towards understanding the water utility management, finding loopholes in demand supply patterns and customer base analysis using data analytics methods and geospatial approach. The first half focuses research work aims at understanding the water utility consumption in metropolitan city of parts of City of Delhi, using data analytics that aims at understanding per household consumption of consumers and segmentation of customers based on customer profiling.
{"title":"Water utility management using Data Analytics and Geospatial Analytics for state of Delhi","authors":"Ankita Gupta, Abhishek Singhal, A. Sabitha, T. Choudhury","doi":"10.1109/ICGCIOT.2018.8752970","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752970","url":null,"abstract":"Over the years the utility-customer relationship has rapidly transformed with vast number of factors affecting consumption including environmental factors like geography, weather, population, migration etc. Over the years the utility-customer relationship has rapidly transformed with vast number of factors affecting consumption including environmental factors like geography, weather, population, migration etc. The research work focuses on implementing a data driven approach towards understanding the water utility management, finding loopholes in demand supply patterns and customer base analysis using data analytics methods and geospatial approach. The first half focuses research work aims at understanding the water utility consumption in metropolitan city of parts of City of Delhi, using data analytics that aims at understanding per household consumption of consumers and segmentation of customers based on customer profiling.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125647555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753041
S. Nandyal, Soumya Mugali
Prisoners are very dangerous and it’s very difficult for the police department to monitor them because, there are chances that the prisoners can try to escape from the prison. To overcome this problem, the present work has been proposed. The work deals with design and development of an automated system to analyze the posture and behavior of the prisoners using the sensors namely, accelerometer sensors and smoke sensor. The sensors are placed on the body of the prisoner mainly, arm, leg and back part. The sensor values will be uploaded on to the cloud periodically. Whenever, the prisoner makes a movement to escape or any misbehavior activities are found, the updated sensor values alert the admin that the prisoner is trying to escape.
{"title":"An Automated System for Identification of Fire and Behaviour of Prisoners Through Posture Using IOT","authors":"S. Nandyal, Soumya Mugali","doi":"10.1109/ICGCIOT.2018.8753041","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753041","url":null,"abstract":"Prisoners are very dangerous and it’s very difficult for the police department to monitor them because, there are chances that the prisoners can try to escape from the prison. To overcome this problem, the present work has been proposed. The work deals with design and development of an automated system to analyze the posture and behavior of the prisoners using the sensors namely, accelerometer sensors and smoke sensor. The sensors are placed on the body of the prisoner mainly, arm, leg and back part. The sensor values will be uploaded on to the cloud periodically. Whenever, the prisoner makes a movement to escape or any misbehavior activities are found, the updated sensor values alert the admin that the prisoner is trying to escape.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133534658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753109
Pushpa Sk, Manjunath T.N, Gireesh Babu C N, Syed Furqan Azeez
Almost every application and web service you join, require you to come with a password which is robust and strong enough to evade attacks. Password strength is a measure of degree to which a password is effective to any random attack. The strength of a password is a combination of length, numbers, complexity and randomness.The need to analyse the strength of a password is to flag weak passwords in order to improve password security. Although, there is not any rule that states a good password but certain guidelines can be followed to differentiate bad passwords. This paper primarily focuses on various authentication threats, steps to mitigate the threats and analysis of password strengths.
{"title":"An Empirical Analysis of Passwords","authors":"Pushpa Sk, Manjunath T.N, Gireesh Babu C N, Syed Furqan Azeez","doi":"10.1109/ICGCIOT.2018.8753109","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753109","url":null,"abstract":"Almost every application and web service you join, require you to come with a password which is robust and strong enough to evade attacks. Password strength is a measure of degree to which a password is effective to any random attack. The strength of a password is a combination of length, numbers, complexity and randomness.The need to analyse the strength of a password is to flag weak passwords in order to improve password security. Although, there is not any rule that states a good password but certain guidelines can be followed to differentiate bad passwords. This paper primarily focuses on various authentication threats, steps to mitigate the threats and analysis of password strengths.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753096
P. S, Rohit Rayapeddi
Around the world, the telecommunications industry is rapidly expanding, as we are entering into a smartphone dominated era. Internet availability is now cited as a basic necessity and requirement for the generation today. With this, comes a competition amongst service providers to provide the best services to customers, along with the best prices to retain the already existing ones. Customers may choose to leave, for reasons known or unknown due to their experiences with a certain provider. Churn, simply put, is the process where a customer suspends or cancels his/her service with a provider. This paper presents a solution to this problem by recognizing those who may sway towards leaving, providing a vital solution to companies as retentive of existing customer is much easier than securing a new customer. Predictive, unsupervised models can organize and prevent such situations and can tell us what to expect in the near future. The research done here is an application of Logistic regression, Random Forests and K - Means clustering with the help of R - to predict churn. The data set consists of 3400 instances were considered in the dataset and 19 out of 22 attributes being decisive in the process of prediction.
{"title":"Predicting Customer Churn in the Telecom Industry Using Data Analytics","authors":"P. S, Rohit Rayapeddi","doi":"10.1109/ICGCIOT.2018.8753096","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753096","url":null,"abstract":"Around the world, the telecommunications industry is rapidly expanding, as we are entering into a smartphone dominated era. Internet availability is now cited as a basic necessity and requirement for the generation today. With this, comes a competition amongst service providers to provide the best services to customers, along with the best prices to retain the already existing ones. Customers may choose to leave, for reasons known or unknown due to their experiences with a certain provider. Churn, simply put, is the process where a customer suspends or cancels his/her service with a provider. This paper presents a solution to this problem by recognizing those who may sway towards leaving, providing a vital solution to companies as retentive of existing customer is much easier than securing a new customer. Predictive, unsupervised models can organize and prevent such situations and can tell us what to expect in the near future. The research done here is an application of Logistic regression, Random Forests and K - Means clustering with the help of R - to predict churn. The data set consists of 3400 instances were considered in the dataset and 19 out of 22 attributes being decisive in the process of prediction.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133178160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8752995
R. Kodali, Aditya Valdas
With rapidly developing technology and the Internet of Things taking the world by storm, easy-to-use and low-cost solutions are being provided to almost any and every application in the world. In a similar way, technological solutions are also now being applied to urban farming, a practice which has gained momentum especially in large cities, to help citizens grow vegetables and the like in their own homes or establishments. Urban farming is now more important than ever in the context of the rapid urbanization and development of smart cities all over the world. It is important that residents in urban areas grow their vegetables, and it is important that they do it the right way. Only then will it be possible, in the future, to sustain ourselves in large cities and places which are not quite accessible by villages where farming is done on a large scale. In this paper, we propose a process of growing and taking care of the plants, so that maximum efficiency is guaranteed in the growth process and also information is generated and shared by the whole community. This information will help us crunch the data and arrive at better decisions. The solution works on sensors monitoring the temperature, humidity, ambient light intensity and soil moisture levels pertaining to a certain plant. These sensors are connected to a device which makes understandable data out of these sensor outputs. This then communicates with a central device which collects information from all such sensors, and displays this on a locally hosted webpage. The content is also shown on a dashboard for comfortable visualization and understanding. It also stores a database which can be referred for future analytics. All the devices used are low-cost and consume low-power, which is ideally suited for IoT applications which focus more on communicating effectively at low costs.
{"title":"MQTT Based Monitoring System for Urban Farmers Using ESP32 and Raspberry Pi","authors":"R. Kodali, Aditya Valdas","doi":"10.1109/ICGCIOT.2018.8752995","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752995","url":null,"abstract":"With rapidly developing technology and the Internet of Things taking the world by storm, easy-to-use and low-cost solutions are being provided to almost any and every application in the world. In a similar way, technological solutions are also now being applied to urban farming, a practice which has gained momentum especially in large cities, to help citizens grow vegetables and the like in their own homes or establishments. Urban farming is now more important than ever in the context of the rapid urbanization and development of smart cities all over the world. It is important that residents in urban areas grow their vegetables, and it is important that they do it the right way. Only then will it be possible, in the future, to sustain ourselves in large cities and places which are not quite accessible by villages where farming is done on a large scale. In this paper, we propose a process of growing and taking care of the plants, so that maximum efficiency is guaranteed in the growth process and also information is generated and shared by the whole community. This information will help us crunch the data and arrive at better decisions. The solution works on sensors monitoring the temperature, humidity, ambient light intensity and soil moisture levels pertaining to a certain plant. These sensors are connected to a device which makes understandable data out of these sensor outputs. This then communicates with a central device which collects information from all such sensors, and displays this on a locally hosted webpage. The content is also shown on a dashboard for comfortable visualization and understanding. It also stores a database which can be referred for future analytics. All the devices used are low-cost and consume low-power, which is ideally suited for IoT applications which focus more on communicating effectively at low costs.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122644592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753063
S. Nandyal, Sabiya Sultana
Lately, there are expanding consequence in utilizing an inter-domain routing objects as Path Identifiers (PIDs). In any case, PIDs utilized in current methodologies are static, which makes simple for attackers to dispatch Distributed Denial-of Service (DDoS) flooding attacks. To deal with this consequence, it gives the consideration for the construction, performance and assessment of DPID, an architecture which utilizes PIDs negotiated amidst adjoining domains as inter-domain routing. In DPID, inter-domain route of PID bridging two domains is preserved as secret and varies dynamically. This system portrays exactly how adjoining domains handle PIDs, in what way it manages continuous communications while PIDs change. It builds 22-node model which holds three domains to authenticate DPID’s usefulness and leads comprehensive simulations to figure out its capability and cost. Outcomes from both experiments and simulations demonstrate that D-PID can effectively prohibit DDoS attacks. In D-PID, it gives the outcome as two contiguous domains frequently update the PIDs amidst them and install new PIDs for packet forwarding into the data plane. Hence, it concludes regardless of whether the attacker acquires PIDs of its destination and later forwards malicious packets successfully, after a particular time period these PIDs turn to be invalid and the following packets will be sent from other path to the destination. Besides, if any attacker strives to retrieve new PIDs and carries DDoS flooding attack, as a matter there will be increment in attacking cost, as well as makes it simple for detecting the attacker.
{"title":"An Approach for Prohibiting Distributed Denial-OF-Service Using Dynamic Path Identifiers through Inter-Domain Routing","authors":"S. Nandyal, Sabiya Sultana","doi":"10.1109/ICGCIOT.2018.8753063","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753063","url":null,"abstract":"Lately, there are expanding consequence in utilizing an inter-domain routing objects as Path Identifiers (PIDs). In any case, PIDs utilized in current methodologies are static, which makes simple for attackers to dispatch Distributed Denial-of Service (DDoS) flooding attacks. To deal with this consequence, it gives the consideration for the construction, performance and assessment of DPID, an architecture which utilizes PIDs negotiated amidst adjoining domains as inter-domain routing. In DPID, inter-domain route of PID bridging two domains is preserved as secret and varies dynamically. This system portrays exactly how adjoining domains handle PIDs, in what way it manages continuous communications while PIDs change. It builds 22-node model which holds three domains to authenticate DPID’s usefulness and leads comprehensive simulations to figure out its capability and cost. Outcomes from both experiments and simulations demonstrate that D-PID can effectively prohibit DDoS attacks. In D-PID, it gives the outcome as two contiguous domains frequently update the PIDs amidst them and install new PIDs for packet forwarding into the data plane. Hence, it concludes regardless of whether the attacker acquires PIDs of its destination and later forwards malicious packets successfully, after a particular time period these PIDs turn to be invalid and the following packets will be sent from other path to the destination. Besides, if any attacker strives to retrieve new PIDs and carries DDoS flooding attack, as a matter there will be increment in attacking cost, as well as makes it simple for detecting the attacker.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124963197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753033
Pramod Kumar Sagar, Kanika Garg, Chiranjit Dutta
Internet of Things (IoT) has its footsteps in almost each and every aspect of living, whether it being personal or professional. It aims to make living better by making physical devices smarter. With its immense applications in fields like agriculture, wearables, poultry, etc., it is also invading Fast Moving Consumer Goods (FMCG) sector. FMCG and IoT together can bring a revolution in the field of business marketing. IoT can help FMCG to increase productivity, improve product quality, generate revenues, maintain customer satisfaction and enhance visibility by measuring, analyzing and monitoring product quality with the help of sensors. IoT can be applied in each and every segment of FMCG sector like production, inventory management, sales and marketing, product management, customer relationship management (CRM), etc., this research paper aims to put forth the relationship between IoT and FMCG sector and also show how it can be used to gain business efficiency. The paper proposes a design on how IoT can be used in three primarily segments (production, distribution and marketing) of FMCG sector. Radio Frequency Identification (RFID) technology is the main methodology used for proposing the design of IoT based FMCG sector. The paper combines various innovation of IoT in different industries and concludes by proposing a theoretical and partially implemented model.
{"title":"Application of Internet of Things in Fast Moving Consumer Goods Sector to increase Business Efficiency","authors":"Pramod Kumar Sagar, Kanika Garg, Chiranjit Dutta","doi":"10.1109/ICGCIOT.2018.8753033","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753033","url":null,"abstract":"Internet of Things (IoT) has its footsteps in almost each and every aspect of living, whether it being personal or professional. It aims to make living better by making physical devices smarter. With its immense applications in fields like agriculture, wearables, poultry, etc., it is also invading Fast Moving Consumer Goods (FMCG) sector. FMCG and IoT together can bring a revolution in the field of business marketing. IoT can help FMCG to increase productivity, improve product quality, generate revenues, maintain customer satisfaction and enhance visibility by measuring, analyzing and monitoring product quality with the help of sensors. IoT can be applied in each and every segment of FMCG sector like production, inventory management, sales and marketing, product management, customer relationship management (CRM), etc., this research paper aims to put forth the relationship between IoT and FMCG sector and also show how it can be used to gain business efficiency. The paper proposes a design on how IoT can be used in three primarily segments (production, distribution and marketing) of FMCG sector. Radio Frequency Identification (RFID) technology is the main methodology used for proposing the design of IoT based FMCG sector. The paper combines various innovation of IoT in different industries and concludes by proposing a theoretical and partially implemented model.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114855950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIoT.2018.8753002
Shashikant Patil, V. Kulkarni, A. Bhise
Diagnosis of tooth caries or cavities are regarded as one of the promising research issues for the past two decades. Moreover, several techniques are established to diagnose the tooth demineralization, tooth decaying and re-mineralization. However, the complexity of tooth decaying diagnosis emerges when the surroundings are comparatively multifaceted. Hence, for solving such issues, this paper establishes caries diagnosing model. Here, the feature selection is dependent on Multilinear Principal Component Analysis (MPCA). In addition, the classification is performed by exploiting well-known classifier known as Neural Network (NN).
{"title":"Caries Detection with the Aid of Multilinear Principal Component Analysis and Neural Network","authors":"Shashikant Patil, V. Kulkarni, A. Bhise","doi":"10.1109/ICGCIoT.2018.8753002","DOIUrl":"https://doi.org/10.1109/ICGCIoT.2018.8753002","url":null,"abstract":"Diagnosis of tooth caries or cavities are regarded as one of the promising research issues for the past two decades. Moreover, several techniques are established to diagnose the tooth demineralization, tooth decaying and re-mineralization. However, the complexity of tooth decaying diagnosis emerges when the surroundings are comparatively multifaceted. Hence, for solving such issues, this paper establishes caries diagnosing model. Here, the feature selection is dependent on Multilinear Principal Component Analysis (MPCA). In addition, the classification is performed by exploiting well-known classifier known as Neural Network (NN).","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124019851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753091
Vidya S. Handur, Supriya Belkar, S. Deshpande, Prakash Marakumbi
The significance of distributed applications is constantly rising due to technological advancements such as increasing internetworking of various computing devices and widespread usage of smart phones. Cloud computing is an information technology paradigm that enables ubiquitous access to shared pools of configurable system resources. Load balancing is one among various challenging issues in cloud computing. It is a mechanism to distribute the user requests among the virtual machines so that the requests are assigned proportional to the capacity of each virtual machine. Balancing of requests prevents the virtual machines from being either overloaded or under loaded. This paper presents a comparison of performance of load balancing algorithms in cloud computing. The algorithms considered for study are Throttled and Equally Spread Current Execution. Particle swarm optimization is also simulated to solve load balancing dynamically. The proposed work compares response time of all the three techniques. The simulation results show that particle swarm optimization performs better for dynamic changes in the system.
{"title":"Study of load balancing algorithms for Cloud Computing","authors":"Vidya S. Handur, Supriya Belkar, S. Deshpande, Prakash Marakumbi","doi":"10.1109/ICGCIOT.2018.8753091","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753091","url":null,"abstract":"The significance of distributed applications is constantly rising due to technological advancements such as increasing internetworking of various computing devices and widespread usage of smart phones. Cloud computing is an information technology paradigm that enables ubiquitous access to shared pools of configurable system resources. Load balancing is one among various challenging issues in cloud computing. It is a mechanism to distribute the user requests among the virtual machines so that the requests are assigned proportional to the capacity of each virtual machine. Balancing of requests prevents the virtual machines from being either overloaded or under loaded. This paper presents a comparison of performance of load balancing algorithms in cloud computing. The algorithms considered for study are Throttled and Equally Spread Current Execution. Particle swarm optimization is also simulated to solve load balancing dynamically. The proposed work compares response time of all the three techniques. The simulation results show that particle swarm optimization performs better for dynamic changes in the system.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}