首页 > 最新文献

2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)最新文献

英文 中文
An approach to predict taxi-passenger demand using quantitative histogram on Uber data 基于Uber数据的定量直方图预测出租车乘客需求的方法
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079980
A. Bharathi, S. Prakash
The precise prediction of the day to day and monthly transactions is of great value for companies. This information can be beneficial for the companies in analyzing their ups and downs and draw other plans. Moreover, a precise prediction method can optimize the performance of a company. The branch of analytics that deals with prediction is known as predictive analytics. This paper presents the use of data analytics in analyzing the transaction dataset provided by Uber to predict the possible outcomes and the changes to be made. The histograms and heat maps drawn provide us a clear visualization of the dataset and we must predict the rest out of it.
对每天和每月交易的精确预测对公司有很大的价值。这些信息可以帮助公司分析他们的起起落落,并制定其他计划。此外,一个精确的预测方法可以优化公司的绩效。分析学中处理预测的分支被称为预测分析学。本文介绍了在分析Uber提供的交易数据集时使用数据分析来预测可能的结果和要做出的改变。绘制的直方图和热图为我们提供了数据集的清晰可视化,我们必须预测它的其余部分。
{"title":"An approach to predict taxi-passenger demand using quantitative histogram on Uber data","authors":"A. Bharathi, S. Prakash","doi":"10.1109/ICACCE46606.2019.9079980","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079980","url":null,"abstract":"The precise prediction of the day to day and monthly transactions is of great value for companies. This information can be beneficial for the companies in analyzing their ups and downs and draw other plans. Moreover, a precise prediction method can optimize the performance of a company. The branch of analytics that deals with prediction is known as predictive analytics. This paper presents the use of data analytics in analyzing the transaction dataset provided by Uber to predict the possible outcomes and the changes to be made. The histograms and heat maps drawn provide us a clear visualization of the dataset and we must predict the rest out of it.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124722587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Energy-Efficient Allocation Technique for Distributing Resources in a Heterogeneous Data Center 一种异构数据中心资源高效分配技术
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079973
Mohd Mursleen, Yogesh Kothyari
Now a days currently there is a lot of power consumption in data centers due to high demand in cloud services like online data storage services, software services on cloud like Google Apps, Sales force and platform as a service on cloud. Due to heavy usage of all these services over the Cloud, now a day's Data Centers are consuming a heavy amount of Energy. This heavy Energy Consumption by data centers is not only including the higher running cost of data centers but it is also effecting the environment inversely. There are basically two ways in which we can reduce energy consumption in Data Centers, first way is by minimising the parameter of data centers while the second method is by exercising an efficiently constructed asset allocation technique to get the optimal balance between energy consumption and performance of the data centers. In this paper, we are dealing with the second approach which is a software based approach i.e. designing an efficient resource allocation technique while the first approach is a hardware based approach. Furthermore, here we will not only deal with homogeneous data centers but we are also considering the heterogeneous data centers. So, our prime focus of this research work is to allocate the resources in homogeneous and heterogeneous data centers in such a manner that energy consumed by data centers usage becomes optimal and energy consumption is reduced without effecting in the performance of data centers. Therefore, for the above we have come up with a novel algorithm toward energy efficiency in such a way that it takes care of scheduling the algorithm fairly while allocating the resources of data centers.
现在,由于云服务(如在线数据存储服务)、云上软件服务(如Google Apps)、销售团队和平台即服务)的高需求,数据中心目前有大量的电力消耗。由于在云上大量使用所有这些服务,现在每天的数据中心都在消耗大量的能源。数据中心的大量能源消耗不仅包括数据中心较高的运行成本,而且还会对环境产生相反的影响。基本上有两种方法可以减少数据中心的能源消耗,第一种方法是通过最小化数据中心的参数,第二种方法是通过行使有效构建的资产分配技术来获得数据中心的能源消耗和性能之间的最佳平衡。在本文中,我们讨论了第二种方法,即基于软件的方法,即设计一种有效的资源分配技术,而第一种方法是基于硬件的方法。此外,这里我们不仅要处理同构数据中心,还要考虑异构数据中心。因此,本研究工作的主要重点是在不影响数据中心性能的情况下,将同构和异构数据中心的资源进行合理分配,使数据中心使用能耗达到最优,降低能耗。因此,针对上述问题,我们提出了一种针对能源效率的新算法,在分配数据中心资源的同时,它可以公平地调度算法。
{"title":"An Energy-Efficient Allocation Technique for Distributing Resources in a Heterogeneous Data Center","authors":"Mohd Mursleen, Yogesh Kothyari","doi":"10.1109/ICACCE46606.2019.9079973","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079973","url":null,"abstract":"Now a days currently there is a lot of power consumption in data centers due to high demand in cloud services like online data storage services, software services on cloud like Google Apps, Sales force and platform as a service on cloud. Due to heavy usage of all these services over the Cloud, now a day's Data Centers are consuming a heavy amount of Energy. This heavy Energy Consumption by data centers is not only including the higher running cost of data centers but it is also effecting the environment inversely. There are basically two ways in which we can reduce energy consumption in Data Centers, first way is by minimising the parameter of data centers while the second method is by exercising an efficiently constructed asset allocation technique to get the optimal balance between energy consumption and performance of the data centers. In this paper, we are dealing with the second approach which is a software based approach i.e. designing an efficient resource allocation technique while the first approach is a hardware based approach. Furthermore, here we will not only deal with homogeneous data centers but we are also considering the heterogeneous data centers. So, our prime focus of this research work is to allocate the resources in homogeneous and heterogeneous data centers in such a manner that energy consumed by data centers usage becomes optimal and energy consumption is reduced without effecting in the performance of data centers. Therefore, for the above we have come up with a novel algorithm toward energy efficiency in such a way that it takes care of scheduling the algorithm fairly while allocating the resources of data centers.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel study on EBG structured CPW- fed CoM antenna for WiMAX, WLAN applications 用于WiMAX、WLAN应用的EBG结构CPW馈电CoM天线的新研究
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079999
A. Raghavaraju, T. Ramakrishna, B. Madhav, T. Bhavani
CM antenna with coplanar wave guide feeding is constructed with the combination of EBG structure for the improvement of bandwidth. DGS is engraving on the ground plane to obtain the EBG features in the proposed antenna model. A complete analysis confers to reflection coefficient, VSWR, impedance radiation pattern, current distribution, gain and efficiency are presented in this work. The depicted model occupies the dimension of 50×50×1.60 mm on FR4 substrate with dielectric constant of 4.3. Aerial operating in the dual band of 1.5-3.6 GHz (GPS, LTE, Bluetooth and Wi-Fi applications) and 4.8-15 GHz (WLAN, X-Band and Satellite communication applications) with bandwidth of 2.10 and 10.20 GHz respectively. To meet gain for this is about 4.80 db and peak Efficiency additional amount of 80% are the key marks of designed model.
为了提高带宽,结合EBG结构构造了共面波导馈电CM天线。在地平面上雕刻DGS以获得天线模型中的EBG特征。本文对反射系数、驻波比、阻抗辐射方向图、电流分布、增益和效率进行了全面的分析。所述模型在介电常数为4.3的FR4衬底上的尺寸为50×50×1.60 mm。空中工作在1.5-3.6 GHz (GPS、LTE、蓝牙和Wi-Fi应用)和4.8-15 GHz (WLAN、X-Band和卫星通信应用)双频段,带宽分别为2.10 GHz和10.20 GHz。为了满足4.80 db左右的增益和80%的峰值效率附加量是设计模型的关键标志。
{"title":"A novel study on EBG structured CPW- fed CoM antenna for WiMAX, WLAN applications","authors":"A. Raghavaraju, T. Ramakrishna, B. Madhav, T. Bhavani","doi":"10.1109/ICACCE46606.2019.9079999","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079999","url":null,"abstract":"CM antenna with coplanar wave guide feeding is constructed with the combination of EBG structure for the improvement of bandwidth. DGS is engraving on the ground plane to obtain the EBG features in the proposed antenna model. A complete analysis confers to reflection coefficient, VSWR, impedance radiation pattern, current distribution, gain and efficiency are presented in this work. The depicted model occupies the dimension of 50×50×1.60 mm on FR4 substrate with dielectric constant of 4.3. Aerial operating in the dual band of 1.5-3.6 GHz (GPS, LTE, Bluetooth and Wi-Fi applications) and 4.8-15 GHz (WLAN, X-Band and Satellite communication applications) with bandwidth of 2.10 and 10.20 GHz respectively. To meet gain for this is about 4.80 db and peak Efficiency additional amount of 80% are the key marks of designed model.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130183748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supplier Management and Selection System considering Sustainability for a Thermal Power Heavy Industry 考虑可持续性的火电重工供应商管理与选择系统
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079966
P. Kathirvel, P. Parthiban
An Indian thermal power heavy industry has to focus more on sustainable supply chain activities. To increase the sustainable recitation of a supply chain, the SSCM experts should select their suppliers prudently in relation to their own stratagem. Sustainability supply chain management can be maintained by reducing the influence of the barriers of Economic stability, Social Ethics, and Environmental Conservation. These three factors are called the Triple Bottom Line (TBL) concept of the sustainable supply chain management. The factor is considered from the previous research and the team of experts evaluate the factors and factors are given weights accordingly. The barriers of the economic social and environmental are the cost of implementation, lack of potential to save money, Infrastructure, Absence of incentive policies and lack of preparation, understanding & knowledge, Organizational culture also lack awareness of existing environmental regulations, expertise, and understanding of strategies to address environmental issues etc. This research helps to assess an assortment of the suppliers of the thermal power heavy industry based on their performance of The MCDM tool TOPSIS is used to rank the suppliers in thermal power heavy industry. The research also developing healthy competition among the suppliers and improving performance.
印度的火电重工业必须更多地关注可持续供应链活动。为了提高供应链的可持续性,供应链管理专家应该根据自己的战略谨慎地选择供应商。可持续供应链管理可以通过减少经济稳定、社会伦理和环境保护障碍的影响来维持。这三个因素被称为可持续供应链管理的三重底线(TBL)概念。该因素从以往的研究中考虑,由专家团队对各因素进行评价,并赋予各因素相应的权重。经济、社会和环境的障碍是实施成本,缺乏节省资金的潜力,基础设施,缺乏激励政策和缺乏准备,理解和知识,组织文化也缺乏对现有环境法规的认识,专业知识,以及对解决环境问题的战略的理解等。本研究有助于评估基于其性能的火力重工业供应商的分类。MCDM工具TOPSIS用于对火力重工业供应商进行排名。研究还包括促进供应商之间的良性竞争,提高绩效。
{"title":"Supplier Management and Selection System considering Sustainability for a Thermal Power Heavy Industry","authors":"P. Kathirvel, P. Parthiban","doi":"10.1109/ICACCE46606.2019.9079966","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079966","url":null,"abstract":"An Indian thermal power heavy industry has to focus more on sustainable supply chain activities. To increase the sustainable recitation of a supply chain, the SSCM experts should select their suppliers prudently in relation to their own stratagem. Sustainability supply chain management can be maintained by reducing the influence of the barriers of Economic stability, Social Ethics, and Environmental Conservation. These three factors are called the Triple Bottom Line (TBL) concept of the sustainable supply chain management. The factor is considered from the previous research and the team of experts evaluate the factors and factors are given weights accordingly. The barriers of the economic social and environmental are the cost of implementation, lack of potential to save money, Infrastructure, Absence of incentive policies and lack of preparation, understanding & knowledge, Organizational culture also lack awareness of existing environmental regulations, expertise, and understanding of strategies to address environmental issues etc. This research helps to assess an assortment of the suppliers of the thermal power heavy industry based on their performance of The MCDM tool TOPSIS is used to rank the suppliers in thermal power heavy industry. The research also developing healthy competition among the suppliers and improving performance.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Bidirectional Converter for PV System with Battery Storage 电池储能光伏系统的改进型双向变换器
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079982
J. Lakshmi, N. Shankar, K. Maheswari, S. Manivannan
Solar energy is the most popular renewable energy source in the recent times. The use of solar energy for electricity generation is limited and it's non- continuous availability makes the solar power unreliable for critical applications. These problems can be overcome by using other resources in parallel with the solar energy and making it to operate when the solar power is not available. One such solution includes the usage of Hybrid Energy Storage System along with solar power. HESS has different configurations and includes different resources. Here the battery is used as a backup source along with solar. The battery gets charged during the time when solar power is available and the load is supplied by the battery storage while the solar power is unavailable. This system is discussed in detail in this paper. The power flow in both the direction will be controlled by the bidirectional converter. This paper also discusses the simulated results of this proposed system in detail.
太阳能是近年来最受欢迎的可再生能源。太阳能发电的利用是有限的,它的非连续可用性使得太阳能在关键应用中不可靠。这些问题可以通过与太阳能并行不悖的使用其他资源来克服,并使其在太阳能不可用时运行。其中一个解决方案包括使用混合能源存储系统和太阳能。HESS有不同的配置,包含不同的资源。在这里,电池和太阳能一起被用作备用电源。电池在太阳能可用的时候充电,当太阳能不可用的时候,负载由电池存储提供。本文对该系统进行了详细的论述。两个方向的功率流将由双向变换器控制。文中还详细讨论了该系统的仿真结果。
{"title":"Improved Bidirectional Converter for PV System with Battery Storage","authors":"J. Lakshmi, N. Shankar, K. Maheswari, S. Manivannan","doi":"10.1109/ICACCE46606.2019.9079982","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079982","url":null,"abstract":"Solar energy is the most popular renewable energy source in the recent times. The use of solar energy for electricity generation is limited and it's non- continuous availability makes the solar power unreliable for critical applications. These problems can be overcome by using other resources in parallel with the solar energy and making it to operate when the solar power is not available. One such solution includes the usage of Hybrid Energy Storage System along with solar power. HESS has different configurations and includes different resources. Here the battery is used as a backup source along with solar. The battery gets charged during the time when solar power is available and the load is supplied by the battery storage while the solar power is unavailable. This system is discussed in detail in this paper. The power flow in both the direction will be controlled by the bidirectional converter. This paper also discusses the simulated results of this proposed system in detail.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129198056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Detection of Lung Cancer Identification using ENNPSO Classification 基于nnpso分类的肺癌识别自动检测
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079963
B. Hemalatha, S. Yuvaraj, K. Kiruthikaa, V. Viswanathan
The main source of lung cancer is to gasping the tobacco smoke regularly, which affects around 90% of lung cancers. Cancer cells are to be carried to and from the lungs within the blood or lymph fluid ambience the lung tissue. Early diagnosis and treatment can save life. In this, the image processing techniques have been utilized to identify the lung cancer. Initially, the CT scan image is pre-processed for removing the unwanted signals and smoothing them by employing Improved Kaun Filter (IKF). Subsequently, the preprocessed image is portioned by an Active contour method to get exactness of segmented results. Next, specific features are extracted to raise the anticipated accuracy. At last, the tumour has been categorized by Elman Neural Network (ENN) and weights are optimized with PSO and compared the accuracy results with SVM, RBFN and ANFIS.
肺癌的主要来源是经常吸烟,约90%的肺癌是由吸烟引起的。癌细胞在肺组织的血液或淋巴液环境中进出肺部。早期诊断和治疗可以挽救生命。在这方面,图像处理技术已被用于肺癌的识别。首先,对CT扫描图像进行预处理,去除不需要的信号,并采用改进的考恩滤波器(IKF)对其进行平滑处理。然后,利用主动轮廓法对预处理后的图像进行分割,以保证分割结果的准确性。接下来,提取特定的特征以提高预期的准确性。最后,利用Elman神经网络(ENN)对肿瘤进行分类,利用粒子群算法(PSO)对权重进行优化,并与SVM、RBFN和ANFIS进行准确率比较。
{"title":"Automatic Detection of Lung Cancer Identification using ENNPSO Classification","authors":"B. Hemalatha, S. Yuvaraj, K. Kiruthikaa, V. Viswanathan","doi":"10.1109/ICACCE46606.2019.9079963","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079963","url":null,"abstract":"The main source of lung cancer is to gasping the tobacco smoke regularly, which affects around 90% of lung cancers. Cancer cells are to be carried to and from the lungs within the blood or lymph fluid ambience the lung tissue. Early diagnosis and treatment can save life. In this, the image processing techniques have been utilized to identify the lung cancer. Initially, the CT scan image is pre-processed for removing the unwanted signals and smoothing them by employing Improved Kaun Filter (IKF). Subsequently, the preprocessed image is portioned by an Active contour method to get exactness of segmented results. Next, specific features are extracted to raise the anticipated accuracy. At last, the tumour has been categorized by Elman Neural Network (ENN) and weights are optimized with PSO and compared the accuracy results with SVM, RBFN and ANFIS.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robustness Evaluation of Cyber Physical Systems through Network Protocol Fuzzing 基于网络协议模糊的网络物理系统鲁棒性评估
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079995
T. Ananda, Gitanjali Simran T, S. T, S. D, R. P.
With the technological explosion of Internet of Things(IoT) and the conception of every particle being tied to the Internet, the “security” of these globally connected nodes is critical. The availability and reliability of these networked nodes can be guaranteed by securing the physical nodes and the data associated with them but more importantly by ensuring the network security associated with their communication stack. Thus, in this paper we evaluate the security robustness of the Network protocols associated with these networking capable devices through Fuzzing or corner case checks. Through the Fuzz assessments, we can assess the node behavior when the various applications are under fuzz and establish the security damage/robustness associated with it. This supplies a point of node vulnerability to be fixed before the node connects with a global network.
随着物联网(IoT)技术的爆炸式发展,以及每个粒子都与互联网相连的概念,这些全球连接节点的“安全”至关重要。这些网络节点的可用性和可靠性可以通过保护物理节点和与之相关的数据来保证,但更重要的是通过确保与其通信堆栈相关的网络安全性来保证。因此,在本文中,我们通过模糊或角落案例检查来评估与这些具有网络功能的设备相关的网络协议的安全稳健性。通过模糊评估,我们可以评估节点在各种应用处于模糊状态时的行为,并建立与之相关的安全损害/鲁棒性。这提供了一个节点漏洞点,在节点连接到全局网络之前进行修复。
{"title":"Robustness Evaluation of Cyber Physical Systems through Network Protocol Fuzzing","authors":"T. Ananda, Gitanjali Simran T, S. T, S. D, R. P.","doi":"10.1109/ICACCE46606.2019.9079995","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079995","url":null,"abstract":"With the technological explosion of Internet of Things(IoT) and the conception of every particle being tied to the Internet, the “security” of these globally connected nodes is critical. The availability and reliability of these networked nodes can be guaranteed by securing the physical nodes and the data associated with them but more importantly by ensuring the network security associated with their communication stack. Thus, in this paper we evaluate the security robustness of the Network protocols associated with these networking capable devices through Fuzzing or corner case checks. Through the Fuzz assessments, we can assess the node behavior when the various applications are under fuzz and establish the security damage/robustness associated with it. This supplies a point of node vulnerability to be fixed before the node connects with a global network.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114357215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
E-learning services: Insights from Twitter Analytics 电子学习服务:来自Twitter分析的见解
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9080001
P. Vanitha, Sreejith Alathur
Electronic learning is a formalized teaching-learning service using electronic resources. With the help of Information and Communication Technologies (ICTs), knowledge can be shared via the Internet anywhere, anytime. Although, the massive growth of technologies available, e-learning service may not distribute equally in developing countries like India. The objective of the study is to explore the technological challenges of e-learning services in the Indian context. In the present study, the real-time feedback about the technological challenges is collected directly from Twitter social media. Initially, the tweets were extracted based on the hashtags, and the location-based analysis is performed using geocoding. In this study, various types of technological challenges are identified, and the most influential factor is determined. It gives better results when this research is carried on developing countries like India. The suggestion provided in this research will help to decrease the technological challenges in the e-learning service.
电子学习是利用电子资源进行形式化的教学服务。在信息通信技术(ict)的帮助下,知识可以随时随地通过互联网共享。尽管可用技术的大量增长,但电子学习服务在印度等发展中国家的分布可能并不均衡。本研究的目的是探讨印度环境下电子学习服务的技术挑战。在本研究中,直接从Twitter社交媒体收集有关技术挑战的实时反馈。最初,根据标签提取推文,并使用地理编码执行基于位置的分析。在本研究中,识别了各种类型的技术挑战,并确定了最具影响力的因素。如果在印度这样的发展中国家进行这项研究,结果会更好。本研究提供的建议将有助于减少电子学习服务的技术挑战。
{"title":"E-learning services: Insights from Twitter Analytics","authors":"P. Vanitha, Sreejith Alathur","doi":"10.1109/ICACCE46606.2019.9080001","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9080001","url":null,"abstract":"Electronic learning is a formalized teaching-learning service using electronic resources. With the help of Information and Communication Technologies (ICTs), knowledge can be shared via the Internet anywhere, anytime. Although, the massive growth of technologies available, e-learning service may not distribute equally in developing countries like India. The objective of the study is to explore the technological challenges of e-learning services in the Indian context. In the present study, the real-time feedback about the technological challenges is collected directly from Twitter social media. Initially, the tweets were extracted based on the hashtags, and the location-based analysis is performed using geocoding. In this study, various types of technological challenges are identified, and the most influential factor is determined. It gives better results when this research is carried on developing countries like India. The suggestion provided in this research will help to decrease the technological challenges in the e-learning service.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121931085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trigger Event and Hate Content: Insights from Twitter Analytics 触发事件和仇恨内容:来自Twitter分析的见解
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079952
Naganna Chetty, Sreejith Alathur
The problematic act damages the target and seeds the fear in the neighborhood. Social media sites are used for planning and coordinating problematic acts. The problematic act is a trigger event which influences hatred feeling. The objective of the paper is to analyze the aftermath of a recent problematic incident in the southern part of the Asian continent from Twitter content. After the problematic incident, citizens used to share their views over social media sites. A total of 48,819 opinions shared through Twitter social media are collected and analyzed using the software developed in the R programming language. The results show hatred against the problematic act through different related emotions. Results also contain more negative tweets which are almost thrice the positive tweets. Fear and anger emotions exhibit a high degree of emotions than the other.
这种有问题的行为会损害目标,并在社区中播下恐惧的种子。社交媒体网站被用来策划和协调有问题的行为。问题行为是影响仇恨情绪的触发事件。本文的目的是从推特内容分析亚洲大陆南部最近发生的问题事件的后果。在这一问题事件发生后,市民们过去常常在社交媒体网站上分享他们的观点。使用R编程语言开发的软件,收集并分析了Twitter社交媒体上分享的48,819条意见。结果表明,对问题行为的憎恨是通过不同的相关情绪表现出来的。结果也包含更多的负面推文,几乎是正面推文的三倍。恐惧和愤怒情绪比其他情绪表现出更高的情绪程度。
{"title":"Trigger Event and Hate Content: Insights from Twitter Analytics","authors":"Naganna Chetty, Sreejith Alathur","doi":"10.1109/ICACCE46606.2019.9079952","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079952","url":null,"abstract":"The problematic act damages the target and seeds the fear in the neighborhood. Social media sites are used for planning and coordinating problematic acts. The problematic act is a trigger event which influences hatred feeling. The objective of the paper is to analyze the aftermath of a recent problematic incident in the southern part of the Asian continent from Twitter content. After the problematic incident, citizens used to share their views over social media sites. A total of 48,819 opinions shared through Twitter social media are collected and analyzed using the software developed in the R programming language. The results show hatred against the problematic act through different related emotions. Results also contain more negative tweets which are almost thrice the positive tweets. Fear and anger emotions exhibit a high degree of emotions than the other.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132773171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of E-Mail Spam Classification using different Machine Learning Techniques 使用不同机器学习技术的垃圾邮件分类性能分析
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9080000
V. Vinitha, D. Renuka
Most of the business and general communication is done through email because of its cost effectiveness. This efficiency leads email exposed to various attacks including spamming. Nowadays spam email is the foremost concern for email users. These spams are used for sending fake proposals, advertisements, and harmful contents in the form of executable file to attack user systems or the link to the malicious websites resulting in the unessential consumption of network bandwidth. This paper elucidates the different Machine Learning Techniques such as J48 classifier, Adaboost, K-Nearest Neighbor, Naive Bayes, Artificial Neural Network, Support Vector Machine, and Random Forests algorithm for filtering spam emails using different email dataset. However, here the comparison of different spam email classification technique is presented and summarizes the overall scenario regarding accuracy rate of different existing approaches.
大多数业务和一般通信都是通过电子邮件完成的,因为它的成本效益。这种效率导致电子邮件暴露于各种攻击,包括垃圾邮件。如今,垃圾邮件是电子邮件用户最关心的问题。这些垃圾邮件以可执行文件的形式发送虚假提案、广告和有害内容,攻击用户系统或恶意网站的链接,造成不必要的网络带宽消耗。本文阐述了J48分类器、Adaboost、k近邻、朴素贝叶斯、人工神经网络、支持向量机和随机森林算法等不同的机器学习技术在过滤垃圾邮件时使用的不同的电子邮件数据集。然而,本文对不同的垃圾邮件分类技术进行了比较,并总结了不同现有方法的准确率总体情况。
{"title":"Performance Analysis of E-Mail Spam Classification using different Machine Learning Techniques","authors":"V. Vinitha, D. Renuka","doi":"10.1109/ICACCE46606.2019.9080000","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9080000","url":null,"abstract":"Most of the business and general communication is done through email because of its cost effectiveness. This efficiency leads email exposed to various attacks including spamming. Nowadays spam email is the foremost concern for email users. These spams are used for sending fake proposals, advertisements, and harmful contents in the form of executable file to attack user systems or the link to the malicious websites resulting in the unessential consumption of network bandwidth. This paper elucidates the different Machine Learning Techniques such as J48 classifier, Adaboost, K-Nearest Neighbor, Naive Bayes, Artificial Neural Network, Support Vector Machine, and Random Forests algorithm for filtering spam emails using different email dataset. However, here the comparison of different spam email classification technique is presented and summarizes the overall scenario regarding accuracy rate of different existing approaches.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134398170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1