Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541227
K. Muninathan, R. R. Thirumaniraj, M. A. Suryanarayanan
Exhaust diffusers are critical components of gas turbines in both propulsion and power system applications. The factors influencing their performance are predominantly the area ratio, divergence angle and the length of the flow path over which diffusion occurs. Pressure recovery and pressure loss coefficients, relationships between static and total pressure and performance maps are generally used to determine diffuser’s performance. The main aim of the present work is to make a detailed analysis on various flow characteristics of the annular diffuser and determine the effect of struts on both the flow parameters and the overall performance of the exhaust diffuser. The cases under consideration are the annular diffuser with two different strut configuration namely the baseline and the tapered struts, and their comparison with the same diffuser model without any strut in the flow path. The diffuser is modeled and meshed using the pre-processor tool CATIA. In the present investigation, numerical simulation is carried out using STAR−CCM+, computational fluid dynamics software, which is based on the finite volume method and solves the three-dimensional Reynolds averaged Navier-Stokes equations, to predict the flow characteristics inside the diffuser and analyses the effect of struts. The details of the numerical simulation, solution procedure, turbulence model, boundary conditions, results obtained and the conclusions arrived at the results were discussed in detail.
{"title":"Heat Transfer Modeling And Analysis of Annular Diffuser With and Without Double Tapered Struts","authors":"K. Muninathan, R. R. Thirumaniraj, M. A. Suryanarayanan","doi":"10.1109/ICSCAN.2018.8541227","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541227","url":null,"abstract":"Exhaust diffusers are critical components of gas turbines in both propulsion and power system applications. The factors influencing their performance are predominantly the area ratio, divergence angle and the length of the flow path over which diffusion occurs. Pressure recovery and pressure loss coefficients, relationships between static and total pressure and performance maps are generally used to determine diffuser’s performance. The main aim of the present work is to make a detailed analysis on various flow characteristics of the annular diffuser and determine the effect of struts on both the flow parameters and the overall performance of the exhaust diffuser. The cases under consideration are the annular diffuser with two different strut configuration namely the baseline and the tapered struts, and their comparison with the same diffuser model without any strut in the flow path. The diffuser is modeled and meshed using the pre-processor tool CATIA. In the present investigation, numerical simulation is carried out using STAR−CCM+, computational fluid dynamics software, which is based on the finite volume method and solves the three-dimensional Reynolds averaged Navier-Stokes equations, to predict the flow characteristics inside the diffuser and analyses the effect of struts. The details of the numerical simulation, solution procedure, turbulence model, boundary conditions, results obtained and the conclusions arrived at the results were discussed in detail.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115662554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541172
M. Thilagavathi, S. Abirami
Tremendous improvements in Flower image description induced much interest in image based plant species identification. Rare species of desert plants are at risk and it is necessary to maintain record for their existence, which can be done by applying image processing techniques for object classification. This paper focuses on the automatic recognition of plant species from Sonoran desert regions through their flower images. The dataset contains 609 individuals of 25 species. The image preprocessing begins with median filter to remove the noise. The color and texture features are obtained from the flower images for classification. HSV color space is used to extract the color features and Center-Symmetric Local Binary Pattern (CS-LBP) for texture features. The extracted features are incorporated in Cascade-Forward Neural Network to classify the species which outperforms an accuracy of 96.8%.
{"title":"Cascade-Forward Neural Network in Identification of Plant Species of Desert Based on Wild Flowers","authors":"M. Thilagavathi, S. Abirami","doi":"10.1109/ICSCAN.2018.8541172","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541172","url":null,"abstract":"Tremendous improvements in Flower image description induced much interest in image based plant species identification. Rare species of desert plants are at risk and it is necessary to maintain record for their existence, which can be done by applying image processing techniques for object classification. This paper focuses on the automatic recognition of plant species from Sonoran desert regions through their flower images. The dataset contains 609 individuals of 25 species. The image preprocessing begins with median filter to remove the noise. The color and texture features are obtained from the flower images for classification. HSV color space is used to extract the color features and Center-Symmetric Local Binary Pattern (CS-LBP) for texture features. The extracted features are incorporated in Cascade-Forward Neural Network to classify the species which outperforms an accuracy of 96.8%.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124781749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541258
S. Prianga, R. Sagana, E. Sharon
In recent times, data has become an inevitable factor in cloud computing. The word data eventually seeks its issue on privacy and security. With the rise of new technologies, the need for data storage has increased. Massive increase in the datasets has led to the evolution of cloud storage. The benefits of cloud computing are immense, but on the contrary there is an increasing risk to the security of the data stored in the cloud. This paper deals with a survey on the security issues which highlights the effectiveness of security that has been implied in the forms of cloud computing and blockchain technologies. The survey also includes a deep understanding of a PoW–based blockchain model using the blockchain technology. The idea behind this work is to provide a detailed survey about the blockchain technology which is growing tremendously.
{"title":"Evolutionary Survey On Data Security In Cloud Computing Using Blockchain","authors":"S. Prianga, R. Sagana, E. Sharon","doi":"10.1109/ICSCAN.2018.8541258","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541258","url":null,"abstract":"In recent times, data has become an inevitable factor in cloud computing. The word data eventually seeks its issue on privacy and security. With the rise of new technologies, the need for data storage has increased. Massive increase in the datasets has led to the evolution of cloud storage. The benefits of cloud computing are immense, but on the contrary there is an increasing risk to the security of the data stored in the cloud. This paper deals with a survey on the security issues which highlights the effectiveness of security that has been implied in the forms of cloud computing and blockchain technologies. The survey also includes a deep understanding of a PoW–based blockchain model using the blockchain technology. The idea behind this work is to provide a detailed survey about the blockchain technology which is growing tremendously.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123423657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541175
S. Panda, D. Bandopadhya
Recent developments in smart materials gained attention for developing underwater micro robots for various applications like scanning, surveillance and defense. Polypyrrole, ionic electro-active polymer (EAP) actuators has shown its effectiveness in miniaturized bio-inspired robots because of its incompetent characteristics like light weight, flexibility, large strain and bending deformation with low input voltage, high work density and natural muscle like behavior and performances. However, low operational life and bending displacement limits its underwater application, in this paper, we have fabricated a low cost PPy bimorph actuator and demonstrated its underwater performances and application by developing a PPy actuator based tadpole robot. The actuator is fabricated by using multi-layer electrochemical polymerization and performance evaluation by underwater bending experiment followed by the prototype development and operations. The actuator tip displacement, force and generated thrust are evaluated from the bending of actuator in quiescent water. It has been seen that the actuator can bend upto 5.4mm with 4.2mN of tip force upon applying a low voltage of nearly 1.3V. Further the response of the actuator is significantly fast and can continuously work upto 12 hrs without reporting any significant failure. Then the prototype is developed similar to natural tadpole by considering its morphological parameters and conduct further experiment for its swimming capabilities in terms of thrust, speed and efficiency. The performance parameters of the current robot are compared with the natural tadpole and existing models for validation of the present model. It can be believes that the present actuator can be used for real time underwater robotics applications like scanning and surveillance.
{"title":"Gold/Polypyrrole (Au/PPy) Bimorph Actuator for Underwater Robotic Motion","authors":"S. Panda, D. Bandopadhya","doi":"10.1109/ICSCAN.2018.8541175","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541175","url":null,"abstract":"Recent developments in smart materials gained attention for developing underwater micro robots for various applications like scanning, surveillance and defense. Polypyrrole, ionic electro-active polymer (EAP) actuators has shown its effectiveness in miniaturized bio-inspired robots because of its incompetent characteristics like light weight, flexibility, large strain and bending deformation with low input voltage, high work density and natural muscle like behavior and performances. However, low operational life and bending displacement limits its underwater application, in this paper, we have fabricated a low cost PPy bimorph actuator and demonstrated its underwater performances and application by developing a PPy actuator based tadpole robot. The actuator is fabricated by using multi-layer electrochemical polymerization and performance evaluation by underwater bending experiment followed by the prototype development and operations. The actuator tip displacement, force and generated thrust are evaluated from the bending of actuator in quiescent water. It has been seen that the actuator can bend upto 5.4mm with 4.2mN of tip force upon applying a low voltage of nearly 1.3V. Further the response of the actuator is significantly fast and can continuously work upto 12 hrs without reporting any significant failure. Then the prototype is developed similar to natural tadpole by considering its morphological parameters and conduct further experiment for its swimming capabilities in terms of thrust, speed and efficiency. The performance parameters of the current robot are compared with the natural tadpole and existing models for validation of the present model. It can be believes that the present actuator can be used for real time underwater robotics applications like scanning and surveillance.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125358437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541152
Rishabh Jamar, Aditi Sogani, S. Mudgal, Yash Bhadra, Prathamesh P. Churi
This paper holds the essence of preventing a system from attacks using honeypot integrated IDS in detail. Security breaches have soared high at an accelerating rate with the growing technological changes. Only detection cannot help solve the problem that the websites face. Eliminating the attacks is very paramount. The paper talks about how E-Shield (a system created to identify, intercept and eject the attacks) occuring on a website works. A system does not know whether the user is a good user or a bad user. A bad user, that is an attacker could harm the system, its resources, and misuse it in multiple ways. While there exist a variety of attacks, the paper focuses only on the 5 frequent attacks, besides listing all the major attributes of the user such as the source of attack, the status of the system’s security. Starting with the basic signup and logging in feature, to storing the credentials along with solving the intricacies related to it, to the ultimate step of preventing and avoiding the hazardous threat of data loss, all the system’s needs are catered to. The paper also discusses how the system tracks the user’s activities over a specified period of time and analyses and records them. Henceforth, leading to the betterment of cyber security, creating a pathway for online investments.
{"title":"Website Attack Prevention Using E-Shield as a IDPS Tool","authors":"Rishabh Jamar, Aditi Sogani, S. Mudgal, Yash Bhadra, Prathamesh P. Churi","doi":"10.1109/ICSCAN.2018.8541152","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541152","url":null,"abstract":"This paper holds the essence of preventing a system from attacks using honeypot integrated IDS in detail. Security breaches have soared high at an accelerating rate with the growing technological changes. Only detection cannot help solve the problem that the websites face. Eliminating the attacks is very paramount. The paper talks about how E-Shield (a system created to identify, intercept and eject the attacks) occuring on a website works. A system does not know whether the user is a good user or a bad user. A bad user, that is an attacker could harm the system, its resources, and misuse it in multiple ways. While there exist a variety of attacks, the paper focuses only on the 5 frequent attacks, besides listing all the major attributes of the user such as the source of attack, the status of the system’s security. Starting with the basic signup and logging in feature, to storing the credentials along with solving the intricacies related to it, to the ultimate step of preventing and avoiding the hazardous threat of data loss, all the system’s needs are catered to. The paper also discusses how the system tracks the user’s activities over a specified period of time and analyses and records them. Henceforth, leading to the betterment of cyber security, creating a pathway for online investments.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121403264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541204
G. Amuthavalli, R. Gunasundari
Low power consumption is the ultimate goal of the circuit designers of any application and specifically, the life time of event-driven nature of low duty cycle applications like Wireless Sensor Networks (WSN) relies on the design of power-stringent battery-operated devices. At all the hierarchical level of the sensor nodes, low duty cycling is the practicing solution in saving the unwanted power consumption. However, the rapid power squanderer at the sleep state of the circuit is the subthreshold leakage. The exact saving of the leakage can be done by suppressing the short-channel effects of the transistors only at the circuit-level and the two techniques Modified Power Gating (MPG) and Short-pulse POwer Gated Approach (SPOGA, hereafter called as SPOGA_old) are proposed and implemented in the combinational circuits in the previous works of the research. In spite of good subthreshold leakage reduction, the limitations of the proposed techniques are loading effect, state-retention and leakage estimation method. In order to provide an efficient sleep state subthreshold leakage reduction in combinational circuits of low duty cycle application, the limitations are addressed with a revisited design of SPOGA_old, called as SPOGA technique. The illustration of the proposed SPOGA technique with CMOS inverter is done using Cadence GPDK090. From the simulation results, it is clearly seen that the Subthreshold Leakage Reduction Ratio (SLRR) is high and proved the efficacy of the SPOGA technique in subthreshold leakage reduction.
{"title":"Revisited Design of Short-pulse Power Gated Approach of Subthreshold Leakage Reduction Technique in Combinational Circuits","authors":"G. Amuthavalli, R. Gunasundari","doi":"10.1109/ICSCAN.2018.8541204","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541204","url":null,"abstract":"Low power consumption is the ultimate goal of the circuit designers of any application and specifically, the life time of event-driven nature of low duty cycle applications like Wireless Sensor Networks (WSN) relies on the design of power-stringent battery-operated devices. At all the hierarchical level of the sensor nodes, low duty cycling is the practicing solution in saving the unwanted power consumption. However, the rapid power squanderer at the sleep state of the circuit is the subthreshold leakage. The exact saving of the leakage can be done by suppressing the short-channel effects of the transistors only at the circuit-level and the two techniques Modified Power Gating (MPG) and Short-pulse POwer Gated Approach (SPOGA, hereafter called as SPOGA_old) are proposed and implemented in the combinational circuits in the previous works of the research. In spite of good subthreshold leakage reduction, the limitations of the proposed techniques are loading effect, state-retention and leakage estimation method. In order to provide an efficient sleep state subthreshold leakage reduction in combinational circuits of low duty cycle application, the limitations are addressed with a revisited design of SPOGA_old, called as SPOGA technique. The illustration of the proposed SPOGA technique with CMOS inverter is done using Cadence GPDK090. From the simulation results, it is clearly seen that the Subthreshold Leakage Reduction Ratio (SLRR) is high and proved the efficacy of the SPOGA technique in subthreshold leakage reduction.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130720694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541197
G. Shanmugasundaram, S. Balaji, T. Mugilan
Smartphones are rapidly becoming a necessity in our life’s and Android is one of the most popular operating system. Android operating system is widespread in today’s smart phone market due to its open source model, its easy functionality and huge number of apps. There is a tendency of app user to trust on Android OS is for securing the data but it has been proved that Android OS is more vulnerable. Malware detection for Android OS has becoming an upcoming research problem of interest. The objective of this article is to investigate about the various attributes involved in malware detection. Further it explores about the malware detection techniques. Existing detection mechanism uses algorithms such as Naïve bayes algorithm, Bayesian algorithm, Hybrid algorithm, Ada grad algorithm and other machine learning algorithms to train the sets and to detect the malware This article concludes with challenges which are not yet addressed.
{"title":"Investigation of Malware Detection Techniques on Smart Phones","authors":"G. Shanmugasundaram, S. Balaji, T. Mugilan","doi":"10.1109/ICSCAN.2018.8541197","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541197","url":null,"abstract":"Smartphones are rapidly becoming a necessity in our life’s and Android is one of the most popular operating system. Android operating system is widespread in today’s smart phone market due to its open source model, its easy functionality and huge number of apps. There is a tendency of app user to trust on Android OS is for securing the data but it has been proved that Android OS is more vulnerable. Malware detection for Android OS has becoming an upcoming research problem of interest. The objective of this article is to investigate about the various attributes involved in malware detection. Further it explores about the malware detection techniques. Existing detection mechanism uses algorithms such as Naïve bayes algorithm, Bayesian algorithm, Hybrid algorithm, Ada grad algorithm and other machine learning algorithms to train the sets and to detect the malware This article concludes with challenges which are not yet addressed.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541196
M. Swatha, K. Pooja
Nowadays, the total amount of traffic is increased rapidly and parking space getting smaller. It’s to design a drive less car by using RTOS (Real Time Operating System) and a smartphone. It is motivated to configure the guidance system of a flexible (Automated Guided Vehicle) AGV. The driver finds very difficult to park their vehicle in a narrow garage, so it helps to park the vehicle using smartphone via Bluetooth with the range of 100 m, ranges between the car and the smartphone and GPS (Global Positioning System) is also used to know the location. This GPS system will help the user to easily identify the car location. "Car Assist" technology is used to monitor the car driving path and the things happening around the car can be viewed in the smartphone via GPS. It supports live time preview to monitor the car parking garage. The users need not to be present inside the car like some previous generation systems. The proposed work is compared with bench work results and yield very less time to monitor and park the vehicles against the existing system.
{"title":"Smart Car Parking with Monitoring System","authors":"M. Swatha, K. Pooja","doi":"10.1109/ICSCAN.2018.8541196","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541196","url":null,"abstract":"Nowadays, the total amount of traffic is increased rapidly and parking space getting smaller. It’s to design a drive less car by using RTOS (Real Time Operating System) and a smartphone. It is motivated to configure the guidance system of a flexible (Automated Guided Vehicle) AGV. The driver finds very difficult to park their vehicle in a narrow garage, so it helps to park the vehicle using smartphone via Bluetooth with the range of 100 m, ranges between the car and the smartphone and GPS (Global Positioning System) is also used to know the location. This GPS system will help the user to easily identify the car location. \"Car Assist\" technology is used to monitor the car driving path and the things happening around the car can be viewed in the smartphone via GPS. It supports live time preview to monitor the car parking garage. The users need not to be present inside the car like some previous generation systems. The proposed work is compared with bench work results and yield very less time to monitor and park the vehicles against the existing system.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134385016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541242
Shiva Shankar Reddy, J. Rajanikanth, V. Sivaramaraju, K. VSSR Murthy
Now a day’s Employee Attrition prediction become a major problem in the organizations. Employee Attrition is a big issue for the organizations specially when trained, technical and key employees leave for a better opportunity from the organization. This results in financial loss to replace a trained employee. Therefore, we use the current and past employee data to analyze the common reasons for employee attrition or attrition. For the prevention of employee attrition, we applied a well known classification methods, that is, Decision tree, Logistic Regression, SVM, KNN, Random Forest, Naive bayes methods on the human resource data. For this we implement feature selection method on the data and analysis the results to prevent employee attrition. This is helpful to companies to predict employee attrition, and also helpful to their economic growth by reducing their human resource cost.
{"title":"PREDICTION OF EMPLOYEE ATTRITION USING DATAMINING","authors":"Shiva Shankar Reddy, J. Rajanikanth, V. Sivaramaraju, K. VSSR Murthy","doi":"10.1109/ICSCAN.2018.8541242","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541242","url":null,"abstract":"Now a day’s Employee Attrition prediction become a major problem in the organizations. Employee Attrition is a big issue for the organizations specially when trained, technical and key employees leave for a better opportunity from the organization. This results in financial loss to replace a trained employee. Therefore, we use the current and past employee data to analyze the common reasons for employee attrition or attrition. For the prevention of employee attrition, we applied a well known classification methods, that is, Decision tree, Logistic Regression, SVM, KNN, Random Forest, Naive bayes methods on the human resource data. For this we implement feature selection method on the data and analysis the results to prevent employee attrition. This is helpful to companies to predict employee attrition, and also helpful to their economic growth by reducing their human resource cost.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132235830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541263
M. Suraj, Nikhil Kumar Singh, D. Tomar
Cyber crime over big data is expand with unprecedented rate that badly affects the Internet industry and the global data. Progressively sophisticated attack and offensive methods used by cyber attacker and the growing role of data-driven and intelligence-driven adversaries demonstrate that traditional approaches to mitigate cyber threats are becoming ineffective. Big Data in wide areas also freely available for Marketing, Criminal activities and Fraud detection, Epidemic Intelligence etc. It is tedious job to analysis big data on traditional database, NoSQL have been developed as a scalable platform to store and process large amount of data. In this paper, different types of attacks on big data, its storage mechanism and real time analytics approaches are discussed.Also taking social media data as a big data, studies different social network attacks and provided a problem statement based on the study.
{"title":"Big data Analytics of cyber attacks: a review","authors":"M. Suraj, Nikhil Kumar Singh, D. Tomar","doi":"10.1109/ICSCAN.2018.8541263","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541263","url":null,"abstract":"Cyber crime over big data is expand with unprecedented rate that badly affects the Internet industry and the global data. Progressively sophisticated attack and offensive methods used by cyber attacker and the growing role of data-driven and intelligence-driven adversaries demonstrate that traditional approaches to mitigate cyber threats are becoming ineffective. Big Data in wide areas also freely available for Marketing, Criminal activities and Fraud detection, Epidemic Intelligence etc. It is tedious job to analysis big data on traditional database, NoSQL have been developed as a scalable platform to store and process large amount of data. In this paper, different types of attacks on big data, its storage mechanism and real time analytics approaches are discussed.Also taking social media data as a big data, studies different social network attacks and provided a problem statement based on the study.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}