Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753094
Mahith M, Darshan Kumar S B, Prajwal K C, M. Dakshayini
Wireless technologies are rapidly growing, also becoming very illustrious and extensively being used everywhere and the clients appreciate the convenient and easy lifestyle of being wireless. Nowadays with the engrained Bluetooth technology, various digital devices build a system in which the appliances and the devices are interconnected with each other. The Bluetooth technology could be used as one of the significant communication attribute in automation system. The range of communication is 10 to 100mts depending on the version of Bluetooth technology and operates on freely available 2.4GHz bandwidth spectrum. With this capability of Bluetooth; in this paper, a Bluetooth technology based home automation system is proposed enabling elderly and physically disabled people to control the home appliances through their voice commands. Implementation of this proposed automation system has proved its efficiency.
{"title":"Bluetooth Home Automation","authors":"Mahith M, Darshan Kumar S B, Prajwal K C, M. Dakshayini","doi":"10.1109/ICGCIOT.2018.8753094","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753094","url":null,"abstract":"Wireless technologies are rapidly growing, also becoming very illustrious and extensively being used everywhere and the clients appreciate the convenient and easy lifestyle of being wireless. Nowadays with the engrained Bluetooth technology, various digital devices build a system in which the appliances and the devices are interconnected with each other. The Bluetooth technology could be used as one of the significant communication attribute in automation system. The range of communication is 10 to 100mts depending on the version of Bluetooth technology and operates on freely available 2.4GHz bandwidth spectrum. With this capability of Bluetooth; in this paper, a Bluetooth technology based home automation system is proposed enabling elderly and physically disabled people to control the home appliances through their voice commands. Implementation of this proposed automation system has proved its efficiency.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127817258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753091
Vidya S. Handur, Supriya Belkar, S. Deshpande, Prakash Marakumbi
The significance of distributed applications is constantly rising due to technological advancements such as increasing internetworking of various computing devices and widespread usage of smart phones. Cloud computing is an information technology paradigm that enables ubiquitous access to shared pools of configurable system resources. Load balancing is one among various challenging issues in cloud computing. It is a mechanism to distribute the user requests among the virtual machines so that the requests are assigned proportional to the capacity of each virtual machine. Balancing of requests prevents the virtual machines from being either overloaded or under loaded. This paper presents a comparison of performance of load balancing algorithms in cloud computing. The algorithms considered for study are Throttled and Equally Spread Current Execution. Particle swarm optimization is also simulated to solve load balancing dynamically. The proposed work compares response time of all the three techniques. The simulation results show that particle swarm optimization performs better for dynamic changes in the system.
{"title":"Study of load balancing algorithms for Cloud Computing","authors":"Vidya S. Handur, Supriya Belkar, S. Deshpande, Prakash Marakumbi","doi":"10.1109/ICGCIOT.2018.8753091","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753091","url":null,"abstract":"The significance of distributed applications is constantly rising due to technological advancements such as increasing internetworking of various computing devices and widespread usage of smart phones. Cloud computing is an information technology paradigm that enables ubiquitous access to shared pools of configurable system resources. Load balancing is one among various challenging issues in cloud computing. It is a mechanism to distribute the user requests among the virtual machines so that the requests are assigned proportional to the capacity of each virtual machine. Balancing of requests prevents the virtual machines from being either overloaded or under loaded. This paper presents a comparison of performance of load balancing algorithms in cloud computing. The algorithms considered for study are Throttled and Equally Spread Current Execution. Particle swarm optimization is also simulated to solve load balancing dynamically. The proposed work compares response time of all the three techniques. The simulation results show that particle swarm optimization performs better for dynamic changes in the system.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/icgciot.2018.8752984
{"title":"[Front matter]","authors":"","doi":"10.1109/icgciot.2018.8752984","DOIUrl":"https://doi.org/10.1109/icgciot.2018.8752984","url":null,"abstract":"","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128968702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753063
S. Nandyal, Sabiya Sultana
Lately, there are expanding consequence in utilizing an inter-domain routing objects as Path Identifiers (PIDs). In any case, PIDs utilized in current methodologies are static, which makes simple for attackers to dispatch Distributed Denial-of Service (DDoS) flooding attacks. To deal with this consequence, it gives the consideration for the construction, performance and assessment of DPID, an architecture which utilizes PIDs negotiated amidst adjoining domains as inter-domain routing. In DPID, inter-domain route of PID bridging two domains is preserved as secret and varies dynamically. This system portrays exactly how adjoining domains handle PIDs, in what way it manages continuous communications while PIDs change. It builds 22-node model which holds three domains to authenticate DPID’s usefulness and leads comprehensive simulations to figure out its capability and cost. Outcomes from both experiments and simulations demonstrate that D-PID can effectively prohibit DDoS attacks. In D-PID, it gives the outcome as two contiguous domains frequently update the PIDs amidst them and install new PIDs for packet forwarding into the data plane. Hence, it concludes regardless of whether the attacker acquires PIDs of its destination and later forwards malicious packets successfully, after a particular time period these PIDs turn to be invalid and the following packets will be sent from other path to the destination. Besides, if any attacker strives to retrieve new PIDs and carries DDoS flooding attack, as a matter there will be increment in attacking cost, as well as makes it simple for detecting the attacker.
{"title":"An Approach for Prohibiting Distributed Denial-OF-Service Using Dynamic Path Identifiers through Inter-Domain Routing","authors":"S. Nandyal, Sabiya Sultana","doi":"10.1109/ICGCIOT.2018.8753063","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753063","url":null,"abstract":"Lately, there are expanding consequence in utilizing an inter-domain routing objects as Path Identifiers (PIDs). In any case, PIDs utilized in current methodologies are static, which makes simple for attackers to dispatch Distributed Denial-of Service (DDoS) flooding attacks. To deal with this consequence, it gives the consideration for the construction, performance and assessment of DPID, an architecture which utilizes PIDs negotiated amidst adjoining domains as inter-domain routing. In DPID, inter-domain route of PID bridging two domains is preserved as secret and varies dynamically. This system portrays exactly how adjoining domains handle PIDs, in what way it manages continuous communications while PIDs change. It builds 22-node model which holds three domains to authenticate DPID’s usefulness and leads comprehensive simulations to figure out its capability and cost. Outcomes from both experiments and simulations demonstrate that D-PID can effectively prohibit DDoS attacks. In D-PID, it gives the outcome as two contiguous domains frequently update the PIDs amidst them and install new PIDs for packet forwarding into the data plane. Hence, it concludes regardless of whether the attacker acquires PIDs of its destination and later forwards malicious packets successfully, after a particular time period these PIDs turn to be invalid and the following packets will be sent from other path to the destination. Besides, if any attacker strives to retrieve new PIDs and carries DDoS flooding attack, as a matter there will be increment in attacking cost, as well as makes it simple for detecting the attacker.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124963197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753020
Vijeta V. Barathe, S. S. Dhamse
The power quality problem increase due to the non-linear load which affect the power system. To overcome power quality issues this paper described design and simulation study of hybrid filter. The hybrid filter was explained in this paper which is based on series topology. The hybrid filter is operation of both type of passive filter (PF) and active filter (AF). Where the active filter is formed by three phase voltage source inverter (VSI) with self supported DC link capacitor. The active filter is solving power quality problem like sag, swell, harmonics which is connected in series with source. Passive filter are designed to drain harmonics current which is generated by RL load, so that the passive filter is connected in the across the load. The synchronous reference frame (SRF) theory is control strategy is used for to get reference signal. So that Hybrid filter has advantage that it compensates both type of voltage problem and current harmonics. The proposed system simulation runs in MATLAB / simulink tool were presented to verify the performance of the shunt passive filters (SPH) and active series filters (ASF).
{"title":"Design and Simulation Study of Hybrid Filter for Power Quality Improvement","authors":"Vijeta V. Barathe, S. S. Dhamse","doi":"10.1109/ICGCIOT.2018.8753020","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753020","url":null,"abstract":"The power quality problem increase due to the non-linear load which affect the power system. To overcome power quality issues this paper described design and simulation study of hybrid filter. The hybrid filter was explained in this paper which is based on series topology. The hybrid filter is operation of both type of passive filter (PF) and active filter (AF). Where the active filter is formed by three phase voltage source inverter (VSI) with self supported DC link capacitor. The active filter is solving power quality problem like sag, swell, harmonics which is connected in series with source. Passive filter are designed to drain harmonics current which is generated by RL load, so that the passive filter is connected in the across the load. The synchronous reference frame (SRF) theory is control strategy is used for to get reference signal. So that Hybrid filter has advantage that it compensates both type of voltage problem and current harmonics. The proposed system simulation runs in MATLAB / simulink tool were presented to verify the performance of the shunt passive filters (SPH) and active series filters (ASF).","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128171257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753051
Deepa Gupta, Vaibhav Sharma, Praveen Kumar
In the current scenario, ninety percent of the data present in the world right now is created in past two years only. As the world relentlessly turns out to be more associated with a consistently expanding number of electronic gadgets, which also results in exponential growth of data created, this is just set to become over the coming years. All in all, the Internet populace has developed by 7.5 percent since 2016 and now incorporates more than 3.75 billion people. As far as information utilization, that is one serious strain. By and large, the only us releases 2,657,700 gigabytes of Internet information consistently. The advancement of Internet-based media stages and organizations are having their day in the sun, yet not all. Amazon, YouTube, and Netflix are a segment of the best customers of Internet information transmission. While Amazon is getting a charge out of record benefits (around 258,751 deals every moment, up from 222,283 a year ago) and YouTube is gushing like never before (4.14 million recordings viewed every moment), Netflix has seen a 20 percent diminish in the quantity of "hours" their watchers watched demonstrates every moment contrasted with 2016.
{"title":"Beast to Beauty data in Virtual Analytics","authors":"Deepa Gupta, Vaibhav Sharma, Praveen Kumar","doi":"10.1109/ICGCIOT.2018.8753051","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753051","url":null,"abstract":"In the current scenario, ninety percent of the data present in the world right now is created in past two years only. As the world relentlessly turns out to be more associated with a consistently expanding number of electronic gadgets, which also results in exponential growth of data created, this is just set to become over the coming years. All in all, the Internet populace has developed by 7.5 percent since 2016 and now incorporates more than 3.75 billion people. As far as information utilization, that is one serious strain. By and large, the only us releases 2,657,700 gigabytes of Internet information consistently. The advancement of Internet-based media stages and organizations are having their day in the sun, yet not all. Amazon, YouTube, and Netflix are a segment of the best customers of Internet information transmission. While Amazon is getting a charge out of record benefits (around 258,751 deals every moment, up from 222,283 a year ago) and YouTube is gushing like never before (4.14 million recordings viewed every moment), Netflix has seen a 20 percent diminish in the quantity of \"hours\" their watchers watched demonstrates every moment contrasted with 2016.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129339525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753111
Bhavesh N. Gohil, D. Patel
Cloud computing dynamically allocates virtual resources as per the demands of users. The rapid increase of data computation and storage in cloud computing environment results in uneven distribution of workload on its heterogeneous resources. As a result of that, overloaded servers will have a higher job completion time compared to the corresponding time taken by under loaded servers in the same environment. Distributing balanced workload over the available resources is a key challenge in cloud computing environment. Traditionally, load balancing is used to distribute the workload among multiple servers and to avoid overloading and under loading of servers. It also helps to improve system performance and fair utilization of resources. In this paper, we present a novel hybrid load balancing approach in cloud computing environment using Grey Wolf Optimization based Particle Swarm Optimization and compare it with Harmony Search, Artificial Bee Colony, Particle Swarm Optimization and Grey Wolf Optimization algorithms. It also helps to improve system performance and fair utilization of resources. Results of research experiments are very encouraging with improved convergence and simplicity.
{"title":"A hybrid GWO-PSO Algorithm for Load Balancing in Cloud Computing Environment","authors":"Bhavesh N. Gohil, D. Patel","doi":"10.1109/ICGCIOT.2018.8753111","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753111","url":null,"abstract":"Cloud computing dynamically allocates virtual resources as per the demands of users. The rapid increase of data computation and storage in cloud computing environment results in uneven distribution of workload on its heterogeneous resources. As a result of that, overloaded servers will have a higher job completion time compared to the corresponding time taken by under loaded servers in the same environment. Distributing balanced workload over the available resources is a key challenge in cloud computing environment. Traditionally, load balancing is used to distribute the workload among multiple servers and to avoid overloading and under loading of servers. It also helps to improve system performance and fair utilization of resources. In this paper, we present a novel hybrid load balancing approach in cloud computing environment using Grey Wolf Optimization based Particle Swarm Optimization and compare it with Harmony Search, Artificial Bee Colony, Particle Swarm Optimization and Grey Wolf Optimization algorithms. It also helps to improve system performance and fair utilization of resources. Results of research experiments are very encouraging with improved convergence and simplicity.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121396690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753075
S. Siddesha, S. Niranjan, V. N. Manjunath Aradhya
Arecanut is one of the important cash crops of Southern India. Classification of raw arecanut is one of the major tasks in grading, which is a vital part of crop management. In this work we proposed a model which classifies the raw arecanut. We used color histogram and color moments as features with K-NN classifier. Experiment is conducted on a dataset of 800 images of four classes using two color features and four distance measures with K-NN. A classification accuracy of 98.13% is achieved for 20% training with K value of 3 and Euclidean distance measure for color histogram features.
{"title":"Color Features and KNN in Classification of Raw Arecanut images","authors":"S. Siddesha, S. Niranjan, V. N. Manjunath Aradhya","doi":"10.1109/ICGCIOT.2018.8753075","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753075","url":null,"abstract":"Arecanut is one of the important cash crops of Southern India. Classification of raw arecanut is one of the major tasks in grading, which is a vital part of crop management. In this work we proposed a model which classifies the raw arecanut. We used color histogram and color moments as features with K-NN classifier. Experiment is conducted on a dataset of 800 images of four classes using two color features and four distance measures with K-NN. A classification accuracy of 98.13% is achieved for 20% training with K value of 3 and Euclidean distance measure for color histogram features.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127189272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753060
Prasun Chowdhury, R. Sen, D. Ray, Purushottam Roy, Souradeep Sarkar
India’s garbage generation stands at 0.2 to 0.6 kilograms of garbage per head per day. Also, it is a well-known fact that land in India is scarce. The garbage collector who comes to our house every morning to empty our dustbins inside his truck, takes all the garbage from our neighbourhood and dumps it on an abandoned piece of land. Garbage collectors from all parts of the city meet there to do the same. Such a land is called a landfill. India’s per capita waste generation is so high, that it creates a crisis if the garbage collector doesn’t visit a neighbourhood for a couple of days. As the procedure is purely manual, we need to implement a smart way of garbage monitoring and disposal. This paper proposes anIoT (Internet of Things) based approach for garbage monitoring and its disposal using ultrasonic and MQ4 sensors. Ultrasonic sensor checks the level of garbage filled in the biodegradable and non-biodegradable "smart bins".MQ4 sensors check the level of odour in the biodegradable garbage bin.After the threshold level is crossed in the non-biodegradable smart bin, theinformation is sent to the municipal corporation (with the help of an application) for the disposal of the garbage. If the threshold level is crossed in the biodegradable bin, a lid slides and the wastes are dumped in the underlying chamber. This method is more convenient than the manual one and is an initiative towards ‘smart city’. It ensures proper disposal of garbage and a restoration of a green and healthy environment.
{"title":"Garbage Monitoring and Disposal System for Smart City Using Iot","authors":"Prasun Chowdhury, R. Sen, D. Ray, Purushottam Roy, Souradeep Sarkar","doi":"10.1109/ICGCIOT.2018.8753060","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753060","url":null,"abstract":"India’s garbage generation stands at 0.2 to 0.6 kilograms of garbage per head per day. Also, it is a well-known fact that land in India is scarce. The garbage collector who comes to our house every morning to empty our dustbins inside his truck, takes all the garbage from our neighbourhood and dumps it on an abandoned piece of land. Garbage collectors from all parts of the city meet there to do the same. Such a land is called a landfill. India’s per capita waste generation is so high, that it creates a crisis if the garbage collector doesn’t visit a neighbourhood for a couple of days. As the procedure is purely manual, we need to implement a smart way of garbage monitoring and disposal. This paper proposes anIoT (Internet of Things) based approach for garbage monitoring and its disposal using ultrasonic and MQ4 sensors. Ultrasonic sensor checks the level of garbage filled in the biodegradable and non-biodegradable \"smart bins\".MQ4 sensors check the level of odour in the biodegradable garbage bin.After the threshold level is crossed in the non-biodegradable smart bin, theinformation is sent to the municipal corporation (with the help of an application) for the disposal of the garbage. If the threshold level is crossed in the biodegradable bin, a lid slides and the wastes are dumped in the underlying chamber. This method is more convenient than the manual one and is an initiative towards ‘smart city’. It ensures proper disposal of garbage and a restoration of a green and healthy environment.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125559874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753079
T. Sandeep, K. Manoj, N. Reddy, R. R. Kumar
Effective patient line organization to constrain tolerance hold-up deferrals and patient overcrowdings is one of the genuine troubles increased by mending offices. Senseless and irritating sitting tight for long extends result in imperative human asset and time wastage and improvement of the oversight continued by patients. For every patient in the line, the aggregate therapy time of the indispensable number of patients before him is the time that he should hold-up. It would be significant and best if the patients could get the fit treatment design and know the standard holding up time through an adaptable application that updates endlessly. Consequently, we propose a patient enduring therapy time forecast to imagine the sitting tight time for each treatment undertaking for a patient. We use sensible patient data from various workplaces to get a patient therapy time show up for each endeavor. In setting of this widescale, sensible dataset, the therapy time for each patient in the present line of every errand is ordinary. In setting of the ordinary holding up time, a healing facility echelon recommendation structure is made. Healing facility echelon recommendation finds and predicts a fit and obliging therapy design proposed for the patient. By virtue of the monstrous scale, achievable data set and the necessity for resolute response, the patient enduring therapy time forecast estimation and healing facility echelon recommendation structure sort out plentifulness and low-lethargy response. We use an Apache Spark execution to fulfill the starting and ending targets. Wide experimentation and reenactment work outs as expected demonstrate the sensibility and congruity of our proposed model to recommend preparation of a practical treatment for patients to confine their hold-up times in recouping center interests.
{"title":"Big Data Ensure Homologous Patient Enduring Therapy Time Forecast Algorithm by Healing Facility Echelon Recommendation","authors":"T. Sandeep, K. Manoj, N. Reddy, R. R. Kumar","doi":"10.1109/ICGCIOT.2018.8753079","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753079","url":null,"abstract":"Effective patient line organization to constrain tolerance hold-up deferrals and patient overcrowdings is one of the genuine troubles increased by mending offices. Senseless and irritating sitting tight for long extends result in imperative human asset and time wastage and improvement of the oversight continued by patients. For every patient in the line, the aggregate therapy time of the indispensable number of patients before him is the time that he should hold-up. It would be significant and best if the patients could get the fit treatment design and know the standard holding up time through an adaptable application that updates endlessly. Consequently, we propose a patient enduring therapy time forecast to imagine the sitting tight time for each treatment undertaking for a patient. We use sensible patient data from various workplaces to get a patient therapy time show up for each endeavor. In setting of this widescale, sensible dataset, the therapy time for each patient in the present line of every errand is ordinary. In setting of the ordinary holding up time, a healing facility echelon recommendation structure is made. Healing facility echelon recommendation finds and predicts a fit and obliging therapy design proposed for the patient. By virtue of the monstrous scale, achievable data set and the necessity for resolute response, the patient enduring therapy time forecast estimation and healing facility echelon recommendation structure sort out plentifulness and low-lethargy response. We use an Apache Spark execution to fulfill the starting and ending targets. Wide experimentation and reenactment work outs as expected demonstrate the sensibility and congruity of our proposed model to recommend preparation of a practical treatment for patients to confine their hold-up times in recouping center interests.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116122758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}