Pub Date : 2019-01-01DOI: 10.1109/ICISC44355.2019.9036445
Piyush Kant, Jupitara Hazarika, S. Laskar
The Electroencephalogram (EEG) signals recorded during motor imagery (MI) tasks are often used as input in the brain-computer interface (BCI) applications. The adaptation of these EEG signals to control signals depend on the selection of an accurate feature that can provide good classification. The study compared various features of alpha frequency band adapting wavelet-based time-frequency analysis approach. The mean, variance, wavelet energy, Shannon entropy, log energy entropy, kurtosis, and skewness feature were extracted from the EEG signals recorded from symmetrical electrode locations of the motor cortex and their performance accuracies were evaluated using SVM and KNN classification algorithms. In results, the Shannon entropy showed the highest classification accuracy of 86.4 % with SVM classifier. Findings of this study establish Shannon entropy as a potential feature to use in EEG-based BCI analysis along with SVM classification algorithm.
{"title":"Wavelet transform based approach for EEG feature selection of motor imagery data for braincomputer interfaces","authors":"Piyush Kant, Jupitara Hazarika, S. Laskar","doi":"10.1109/ICISC44355.2019.9036445","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036445","url":null,"abstract":"The Electroencephalogram (EEG) signals recorded during motor imagery (MI) tasks are often used as input in the brain-computer interface (BCI) applications. The adaptation of these EEG signals to control signals depend on the selection of an accurate feature that can provide good classification. The study compared various features of alpha frequency band adapting wavelet-based time-frequency analysis approach. The mean, variance, wavelet energy, Shannon entropy, log energy entropy, kurtosis, and skewness feature were extracted from the EEG signals recorded from symmetrical electrode locations of the motor cortex and their performance accuracies were evaluated using SVM and KNN classification algorithms. In results, the Shannon entropy showed the highest classification accuracy of 86.4 % with SVM classifier. Findings of this study establish Shannon entropy as a potential feature to use in EEG-based BCI analysis along with SVM classification algorithm.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126970129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICISC44355.2019.9036345
K. Rajesh, G. Reddy
The design of Multiplier-Accumulator (MAC) unit can be implemented by using the Vedic multiplier along with the reversible logic gates. The designing of Vedic multiplier is designed by using the new sutra called “Urdhava Triyagbhayam”. The performance of the MAC operation depends on the multiplier unit and the adder units. Here the designing of a multiplier and an adder can be designed by using the reversible gates to get the high speed of operation and also a Vedic multiplier is used for the higher performance, lesser area and to reduce the partial products. Nowadays reversible computing will take a more preferable for low power dissipation, higher speed of operation. Here, we proposed an 8, 16, 32, 64-bit Vedic multiplier is designed by using the carry save adder(CSA), the kogge stone adder(KSA) and the DKG adder out of these the proposed DKG gate adder is having the high speed of operation. The comparative analysis is carried out among the ripple carry adder (RCA), carry save adder, kogge stone adder. Finally, it has been proved that the proposed DKG gate with Vedic multiplier-adder is having the high speed of operation. The overall Simulation and synthesis process is carried out with Xilinx ISE 14.7 and is dumped on the FPGA Zynq board.
利用吠陀乘法器和可逆逻辑门,可以实现乘数-累加器(MAC)单元的设计。吠陀乘数的设计是通过使用新的经典“Urdhava Triyagbhayam”来设计的。MAC操作的性能取决于乘法器和加法器。利用可逆门设计乘法器和加法器,可以获得较高的运算速度,同时利用吠陀乘法器获得更高的性能、更小的面积和更少的局部积。目前,可逆计算更倾向于低功耗、高运算速度。在这里,我们提出了一个8,16,32位的吠陀乘法器,通过使用进位保存加法器(CSA), kogge石加法器(KSA)和DKG加法器来设计,其中所提出的DKG门加法器具有较高的运行速度。对波纹进位加法器(RCA)、进位加法器、柯格石加法器进行了比较分析。最后,实验证明了所提出的带有吠陀乘加器的DKG门具有较高的运算速度。整个仿真和合成过程使用Xilinx ISE 14.7进行,并将其转储在FPGA Zynq板上。
{"title":"FPGA Implementation of Multiplier-Accumulator Unit using Vedic multiplier and Reversible gates","authors":"K. Rajesh, G. Reddy","doi":"10.1109/ICISC44355.2019.9036345","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036345","url":null,"abstract":"The design of Multiplier-Accumulator (MAC) unit can be implemented by using the Vedic multiplier along with the reversible logic gates. The designing of Vedic multiplier is designed by using the new sutra called “Urdhava Triyagbhayam”. The performance of the MAC operation depends on the multiplier unit and the adder units. Here the designing of a multiplier and an adder can be designed by using the reversible gates to get the high speed of operation and also a Vedic multiplier is used for the higher performance, lesser area and to reduce the partial products. Nowadays reversible computing will take a more preferable for low power dissipation, higher speed of operation. Here, we proposed an 8, 16, 32, 64-bit Vedic multiplier is designed by using the carry save adder(CSA), the kogge stone adder(KSA) and the DKG adder out of these the proposed DKG gate adder is having the high speed of operation. The comparative analysis is carried out among the ripple carry adder (RCA), carry save adder, kogge stone adder. Finally, it has been proved that the proposed DKG gate with Vedic multiplier-adder is having the high speed of operation. The overall Simulation and synthesis process is carried out with Xilinx ISE 14.7 and is dumped on the FPGA Zynq board.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114328293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICISC44355.2019.9036432
Pooja Kashyap, A. Renuka
Visual Cryptography Scheme, is even known as VCS. It is actually a cryptography method to encrypt an image by dividing it in parts called shares, where decryption is performed using Human Visual System (HVS), only by overlapping all these shares. The image to be encrypted is called a secret image. Visual Cryptography can be used for binary image, grayscale image as well as colour image. This paper implements visual cryptography technique for colour images, by using multilevel thresholding so as to enhance the obtained quality contrast of reconstructed image.
{"title":"Visual Cryptography for colour images using multilevel thresholding","authors":"Pooja Kashyap, A. Renuka","doi":"10.1109/ICISC44355.2019.9036432","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036432","url":null,"abstract":"Visual Cryptography Scheme, is even known as VCS. It is actually a cryptography method to encrypt an image by dividing it in parts called shares, where decryption is performed using Human Visual System (HVS), only by overlapping all these shares. The image to be encrypted is called a secret image. Visual Cryptography can be used for binary image, grayscale image as well as colour image. This paper implements visual cryptography technique for colour images, by using multilevel thresholding so as to enhance the obtained quality contrast of reconstructed image.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICISC44355.2019.9036393
D. J. Dolly, D. J. Jagannath, J. Dinesh Peter
Video compression is very important for the latest field of science and technology. This paper reports about seven different algorithms which were experimented for video compression. Investigations based on various frame assessment strategy for compressing video is statistically analyzed to demonstrate the best among the seven algorithms. With the purpose to confirm the result, Inter-group analysis in the midst of the some inspected algorithms was estimated using ANOVA test. Amid the verified algorithms, multiple comparisons were evaluated based on the statistical Tukey's honest significant difference analysis to decide the best method among seven algorithms.
{"title":"Statistical investigations on hybrid frame assessment tactics for video compression","authors":"D. J. Dolly, D. J. Jagannath, J. Dinesh Peter","doi":"10.1109/ICISC44355.2019.9036393","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036393","url":null,"abstract":"Video compression is very important for the latest field of science and technology. This paper reports about seven different algorithms which were experimented for video compression. Investigations based on various frame assessment strategy for compressing video is statistically analyzed to demonstrate the best among the seven algorithms. With the purpose to confirm the result, Inter-group analysis in the midst of the some inspected algorithms was estimated using ANOVA test. Amid the verified algorithms, multiple comparisons were evaluated based on the statistical Tukey's honest significant difference analysis to decide the best method among seven algorithms.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124218910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICISC44355.2019.9036365
Renjith V. Ravi, Amrutha N R, Amritha E, Haneena P., Jaseena T.
In this paper, we propose an android based restaurant automation system. The main aim of the project is to make the restaurant management easier. Recently in most of the restaurants, the ordering and delivery of food items are doing manually, the disadvantages are huge time consumption, and in some cases the customers arent delivered the right item at right time these cause many problems. Hence we thought of automating this procedure using modern electronic technology. Here the individual tables in the restaurant are provided with a touch screen, represent each individual digital menu, and it facilitates the ordering. The customer can see all the available food items with its cost in the digital menu and can select the item. The order from each table is received in the kitchen wirelessly by Bluetooth. The electronic menu system helps the people to select the food from the rolling screen of android touch screen and to see the cost and recent availability of food items, and showing table number also. By using a thermal printer taking bill from the kitchen and the hotel staff can read the items from each table. If the food is ready in the kitchen it can be indicated to corresponding customers table by an LED glow.
{"title":"An Android Based Restaurant Automation System with Touch Screen","authors":"Renjith V. Ravi, Amrutha N R, Amritha E, Haneena P., Jaseena T.","doi":"10.1109/ICISC44355.2019.9036365","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036365","url":null,"abstract":"In this paper, we propose an android based restaurant automation system. The main aim of the project is to make the restaurant management easier. Recently in most of the restaurants, the ordering and delivery of food items are doing manually, the disadvantages are huge time consumption, and in some cases the customers arent delivered the right item at right time these cause many problems. Hence we thought of automating this procedure using modern electronic technology. Here the individual tables in the restaurant are provided with a touch screen, represent each individual digital menu, and it facilitates the ordering. The customer can see all the available food items with its cost in the digital menu and can select the item. The order from each table is received in the kitchen wirelessly by Bluetooth. The electronic menu system helps the people to select the food from the rolling screen of android touch screen and to see the cost and recent availability of food items, and showing table number also. By using a thermal printer taking bill from the kitchen and the hotel staff can read the items from each table. If the food is ready in the kitchen it can be indicated to corresponding customers table by an LED glow.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121712296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICISC44355.2019.9036449
S. Sharma, Laxmi Ahuja, S. Som, S. Khatri
Internet of thing in retail should focus their assets and capacities to improve customer loyalty with the end goal to hold existing clients and pull in new clients. Because loyal customer is a good source of revenue. In any case, there are few studies on customer loyalty using Internet of Thing. The aim of this study is to use sensing device that examine customer loyalty and transmit that data to cloud for further study of customer satisfaction retail industries. To test the research model fuzzy logic approach is included. The result will help to launch loyalty programs, companies to improve the customer equity, to boost the clients' esteem and benefit of organizations
{"title":"Internet of Things in Retail Using Fuzzy Logic for Customer Loyalty","authors":"S. Sharma, Laxmi Ahuja, S. Som, S. Khatri","doi":"10.1109/ICISC44355.2019.9036449","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036449","url":null,"abstract":"Internet of thing in retail should focus their assets and capacities to improve customer loyalty with the end goal to hold existing clients and pull in new clients. Because loyal customer is a good source of revenue. In any case, there are few studies on customer loyalty using Internet of Thing. The aim of this study is to use sensing device that examine customer loyalty and transmit that data to cloud for further study of customer satisfaction retail industries. To test the research model fuzzy logic approach is included. The result will help to launch loyalty programs, companies to improve the customer equity, to boost the clients' esteem and benefit of organizations","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125341297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICISC44355.2019.9036335
Piyush Sharma, A. Vaish, Rajveer Singh Yadhuvanshi
This paper presents pyramid type of wide-band Dielectric Resonator Antenna(DRA). In this antenna pyramid type of structure is erected over Defective Ground Structure (DGS) to augment the bandwidth of antenna. Pyramid structure of different height of steps is merged. The wide improvement in bandwidth of the DRA is presented with the help of the proper mixing of several modes and is found to be in well agreement for Wide band applications.
{"title":"Design of Pyramid type Wide Band Dielectric Resonator Antenna Using DGS","authors":"Piyush Sharma, A. Vaish, Rajveer Singh Yadhuvanshi","doi":"10.1109/ICISC44355.2019.9036335","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036335","url":null,"abstract":"This paper presents pyramid type of wide-band Dielectric Resonator Antenna(DRA). In this antenna pyramid type of structure is erected over Defective Ground Structure (DGS) to augment the bandwidth of antenna. Pyramid structure of different height of steps is merged. The wide improvement in bandwidth of the DRA is presented with the help of the proper mixing of several modes and is found to be in well agreement for Wide band applications.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121356045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICISC44355.2019.9036471
Kunal Singh, A. Singh, S. Khatri, S. Som
Artificial Intelligence (AI) is one of the essential parts of gaming industry. In this paper, we have examined how Artificial intelligence technology is effectively used to solve the problems that arise while developing a game and integrate new features to the game. In this research paper, two algorithms are examined they are, path finding of the bots and bots decision making. Few AI techniques are discussed in this paper and how these techniques are used to provide solution to the problems that occur in the games. These techniques are also taken into consideration to provide new features into the computer games. This paper aims to discuss on the Finite State Machine and A* methodologies, which helps in the decision making of a bot and also to find the path towards the goal.
{"title":"Artificial Intelligence Based Path Finding and Decision Making in First Person Shooting Game","authors":"Kunal Singh, A. Singh, S. Khatri, S. Som","doi":"10.1109/ICISC44355.2019.9036471","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036471","url":null,"abstract":"Artificial Intelligence (AI) is one of the essential parts of gaming industry. In this paper, we have examined how Artificial intelligence technology is effectively used to solve the problems that arise while developing a game and integrate new features to the game. In this research paper, two algorithms are examined they are, path finding of the bots and bots decision making. Few AI techniques are discussed in this paper and how these techniques are used to provide solution to the problems that occur in the games. These techniques are also taken into consideration to provide new features into the computer games. This paper aims to discuss on the Finite State Machine and A* methodologies, which helps in the decision making of a bot and also to find the path towards the goal.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"87 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICISC44355.2019.9036450
K. Sivamani, R. Seetharaman, D. Nedumaran
This paper deals with real time gesture recognition and writing alphanumeric letters over the air using fingertip. The human and machine interaction lays an important role in gesture recognition. The proposed method contains two parts: First, a video camera is used to acquire the image for gesture recognition and then the fingertip is recognized from the live video frames. In this work, the Optical Character Recognition (OCR) algorithm is applied to plot the alphanumeric characters with respect to the finger movement. As a result, we can eliminate the requirements of the input devices like keypad, mouse, stylus, stick, and glove or pen and so on. Using Python language coding, we have obtained the text on the screen. Further, recognition of gesture does not require sensors or any hardware other than a camera. Since, the proposed work is a simulation based approach; hence the developed algorithm executes the recognition task in a simple, fast and lucid manner.
{"title":"Design and Implementation of Gesture Recognition and Writing Text Virtually Using Finger","authors":"K. Sivamani, R. Seetharaman, D. Nedumaran","doi":"10.1109/ICISC44355.2019.9036450","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036450","url":null,"abstract":"This paper deals with real time gesture recognition and writing alphanumeric letters over the air using fingertip. The human and machine interaction lays an important role in gesture recognition. The proposed method contains two parts: First, a video camera is used to acquire the image for gesture recognition and then the fingertip is recognized from the live video frames. In this work, the Optical Character Recognition (OCR) algorithm is applied to plot the alphanumeric characters with respect to the finger movement. As a result, we can eliminate the requirements of the input devices like keypad, mouse, stylus, stick, and glove or pen and so on. Using Python language coding, we have obtained the text on the screen. Further, recognition of gesture does not require sensors or any hardware other than a camera. Since, the proposed work is a simulation based approach; hence the developed algorithm executes the recognition task in a simple, fast and lucid manner.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116434999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/ICISC44355.2019.9036437
R. Anitha, C. Vidyaraj
Recently, cloud computing has come up as an evolving technology in various real-time computing field and widely adopted in several real-time computing systems. Due to its advantages of pay-as-you go services where users need not consider other factors such as hardware and platforms. Due to increasing demand of these applications, providing efficient resource and managing these resources is a crucial task because wastages of resources can lead towards the economic loss to the users and service providers. In order to deal with these issues, we focus on the workload prediction and SLA violation prediction approach for improving the overall performance. According to the proposed model, we develop a workload prediction model using clustering approach where similar workload patterns are grouped together to reduce the overhead and later SLA violation scheme is applied which is used for reducing the violations using Naïve Bayes classification approach. Finally, comparative experimental study is carried out which shows that the proposed approach archives better performance when compared with the state-of-art techniques.
{"title":"Workload and SLA Violation Prediction in Cloud Computing","authors":"R. Anitha, C. Vidyaraj","doi":"10.1109/ICISC44355.2019.9036437","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036437","url":null,"abstract":"Recently, cloud computing has come up as an evolving technology in various real-time computing field and widely adopted in several real-time computing systems. Due to its advantages of pay-as-you go services where users need not consider other factors such as hardware and platforms. Due to increasing demand of these applications, providing efficient resource and managing these resources is a crucial task because wastages of resources can lead towards the economic loss to the users and service providers. In order to deal with these issues, we focus on the workload prediction and SLA violation prediction approach for improving the overall performance. According to the proposed model, we develop a workload prediction model using clustering approach where similar workload patterns are grouped together to reduce the overhead and later SLA violation scheme is applied which is used for reducing the violations using Naïve Bayes classification approach. Finally, comparative experimental study is carried out which shows that the proposed approach archives better performance when compared with the state-of-art techniques.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126224378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}