Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974460
Anand Prakash, Y. S. Chungkham, Mohd. Yousuf Ansari
Clustering is a method to discover hidden natural structure in a dataset of a phenomenon. In this study, we have extended K-Means algorithm for spatiotemporal dataset by introducing attribute-based mass function to calculate center of mass of cluster instead of calculating geometry-based centroid in the dataset. The proposed modification in traditional K-Means algorithm produces more meaningful clusters and converges faster than traditional K-Means. In our study, we have used a real ‘fire dataset’ to conduct experiments on the proposed approach for clustering.
{"title":"Attribute-Based K-Means Algorithm","authors":"Anand Prakash, Y. S. Chungkham, Mohd. Yousuf Ansari","doi":"10.1109/ICCCIS48478.2019.8974460","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974460","url":null,"abstract":"Clustering is a method to discover hidden natural structure in a dataset of a phenomenon. In this study, we have extended K-Means algorithm for spatiotemporal dataset by introducing attribute-based mass function to calculate center of mass of cluster instead of calculating geometry-based centroid in the dataset. The proposed modification in traditional K-Means algorithm produces more meaningful clusters and converges faster than traditional K-Means. In our study, we have used a real ‘fire dataset’ to conduct experiments on the proposed approach for clustering.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974556
S. Singh, Rishabh Aggarwal
Optical Wireless Communication (OWC) channel is for inter-satellite communication. It is used as a subsystem of two telescopes or the wireless communication between two satellites. It is best suited for the modeling of satellite-satellite and earth-satellite links. The OWC channels are used for zero attenuation loss caused by atmospheric effects and no propagation delay Signal propagation delay. In this paper we basically deal with the designing of OWC link system. Further, comparative study has been made to ascertain which modulation technique proves better for communication. This paper investigates the transmission of signal through multiple number of OWC channel for better transmission of signal and better use of channel bandwidth. It also shows that as the channel diversity increase the efficiency of the system and thereby decreasing bit error rate (BER).The BER for different numbers of channels and get the accurate result at the receiver side with the high Q factor, accurate eye diagram and high data rate with proper signal and minimum bit error rate and result is shown in BER analyzer.
{"title":"Multi-Channel Transmission of Signal using Optical Wireless Communication (OWC) Channel : Channel Diversity Using OWC","authors":"S. Singh, Rishabh Aggarwal","doi":"10.1109/ICCCIS48478.2019.8974556","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974556","url":null,"abstract":"Optical Wireless Communication (OWC) channel is for inter-satellite communication. It is used as a subsystem of two telescopes or the wireless communication between two satellites. It is best suited for the modeling of satellite-satellite and earth-satellite links. The OWC channels are used for zero attenuation loss caused by atmospheric effects and no propagation delay Signal propagation delay. In this paper we basically deal with the designing of OWC link system. Further, comparative study has been made to ascertain which modulation technique proves better for communication. This paper investigates the transmission of signal through multiple number of OWC channel for better transmission of signal and better use of channel bandwidth. It also shows that as the channel diversity increase the efficiency of the system and thereby decreasing bit error rate (BER).The BER for different numbers of channels and get the accurate result at the receiver side with the high Q factor, accurate eye diagram and high data rate with proper signal and minimum bit error rate and result is shown in BER analyzer.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123705818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974462
S. Rajput, Nidhi
Road accidents have become a major problem across the world today. According to Global Status Report on road safety, launched by WHO in December 2018,the number of annual road traffic deaths has reached 1.35 million [1]. VANET (Vehicular Adhoc Network) is a sub-category of MANET (Mobile Ad-hoc Network) which focuses on safety of people on the road and reducing the number of deaths due to accidents.In this paper, we are going to present the performance requirements of VANET, its characteristics, safety and non-safety applications, and security aspects.
{"title":"A Study of Vehicular Adhoc Networks","authors":"S. Rajput, Nidhi","doi":"10.1109/ICCCIS48478.2019.8974462","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974462","url":null,"abstract":"Road accidents have become a major problem across the world today. According to Global Status Report on road safety, launched by WHO in December 2018,the number of annual road traffic deaths has reached 1.35 million [1]. VANET (Vehicular Adhoc Network) is a sub-category of MANET (Mobile Ad-hoc Network) which focuses on safety of people on the road and reducing the number of deaths due to accidents.In this paper, we are going to present the performance requirements of VANET, its characteristics, safety and non-safety applications, and security aspects.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123789165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974535
Shubham Sinha, Sahil Gupta, Amit Kumar
Hadoop is a framework which manages and stores structured or unstructured big data on clusters in a known environment. But the data gets vulnerable due to the lack of default potent security tools in Hadoop. Many security issues which were not given preference earlier emerge due to its flexibility. These issues are dangerous for our data and could lead to an attack. The users are forced to install various external security tools to protect their data clusters. The security of Hadoop framework is getting better in the versions but it has a very little effect. The goals of this paper are to provide an in-depth survey of Hadoop framework, to provide some information about Hadoop security threats, to outline their challenges and resolve the issues. Further, we acknowledge the challenges associated based on security services of Hadoop to spur the further analysis.
{"title":"Emerging Data Security Solutions in HADOOP based Systems: Vulnerabilities and Their Countermeasures","authors":"Shubham Sinha, Sahil Gupta, Amit Kumar","doi":"10.1109/ICCCIS48478.2019.8974535","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974535","url":null,"abstract":"Hadoop is a framework which manages and stores structured or unstructured big data on clusters in a known environment. But the data gets vulnerable due to the lack of default potent security tools in Hadoop. Many security issues which were not given preference earlier emerge due to its flexibility. These issues are dangerous for our data and could lead to an attack. The users are forced to install various external security tools to protect their data clusters. The security of Hadoop framework is getting better in the versions but it has a very little effect. The goals of this paper are to provide an in-depth survey of Hadoop framework, to provide some information about Hadoop security threats, to outline their challenges and resolve the issues. Further, we acknowledge the challenges associated based on security services of Hadoop to spur the further analysis.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115494697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/icccis48478.2019.8974508
{"title":"ICCCIS 2019 Advisory Committee","authors":"","doi":"10.1109/icccis48478.2019.8974508","DOIUrl":"https://doi.org/10.1109/icccis48478.2019.8974508","url":null,"abstract":"","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116031256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/icccis48478.2019.8974459
{"title":"ICCCIS 2019 Technical Program Committee","authors":"","doi":"10.1109/icccis48478.2019.8974459","DOIUrl":"https://doi.org/10.1109/icccis48478.2019.8974459","url":null,"abstract":"","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116224324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974554
Sushant Bakshi, I. Javid, M. Rajoriya, S. Naz, Pallavi Gupta, Mohit Sahni, Munendra Singh
Digital filters are one of the most fundamental and cardinal components in the area of digital signal processing. They eliminate either partially or completely the noise or other undesirable components present in the signal. In this paper we have designed and studied the IIR filters using Butterworth and Chebyshev algorithms, and compared them with each other for further analysis. The requisite parameters for designing IIR filters are pass band frequency, sampling frequency, pass band ripples and stop band ripples. We have used MATLAB Simulink and filter design and analysis (FDA) tool which gives accurate pole zero plot to verify the stability of system (filter).
{"title":"Designand Comparison Between IIR Butterwoth and Chebyshev Digital Filters Using Matlab","authors":"Sushant Bakshi, I. Javid, M. Rajoriya, S. Naz, Pallavi Gupta, Mohit Sahni, Munendra Singh","doi":"10.1109/ICCCIS48478.2019.8974554","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974554","url":null,"abstract":"Digital filters are one of the most fundamental and cardinal components in the area of digital signal processing. They eliminate either partially or completely the noise or other undesirable components present in the signal. In this paper we have designed and studied the IIR filters using Butterworth and Chebyshev algorithms, and compared them with each other for further analysis. The requisite parameters for designing IIR filters are pass band frequency, sampling frequency, pass band ripples and stop band ripples. We have used MATLAB Simulink and filter design and analysis (FDA) tool which gives accurate pole zero plot to verify the stability of system (filter).","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122625510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974541
Tewelde Tekeste, Pallavi Gupta
Sensor nodes in wireless multimedia sensor networks have very limited resources like low memory capacity, low processing capability, and low data rate. Most of the applications in WMSN require image data which is naturally large in size and it has to be compressed before transmission in WMSN with very small bandwidth. Lifting scheme for computing discrete wavelet transform and SPIHT image coding algorithm are suitable to implement in wireless sensor nodes which have some limitations in power consumption, processing capability, memory and bandwidth. This paper addresses selection of suitable wavelet filter type for image compression using SPIHT coding algorithm. In this paper we have implemented SPIHT algorithm based on the lifting scheme of different wavelets (Haar, Daubechies 4 (DB4), Daubechies 6 (DB6), Cohen-Daubechies-Feveau wavelet (CDF 9/7), and Cubic B-splines) in MATLAB. The experimental subjective and objective results show the lifting CDF 9/7 wavelet filter gives excellent results for bit rates 0.1 bpp, 0. 2 bpp, 0.5 bpp, 0. 8 bpp, and 1 bpp. CDF 9/7 wavelet filter gives an acceptable image quality even for very low bit rates which makes it peferrable for implementation in low data rate applications of WMSN.
{"title":"Selection of Lifting Scheme based Wavelet Filters for Image Compression in Resource Constrained Wireless Multimedia Sensor Networks","authors":"Tewelde Tekeste, Pallavi Gupta","doi":"10.1109/ICCCIS48478.2019.8974541","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974541","url":null,"abstract":"Sensor nodes in wireless multimedia sensor networks have very limited resources like low memory capacity, low processing capability, and low data rate. Most of the applications in WMSN require image data which is naturally large in size and it has to be compressed before transmission in WMSN with very small bandwidth. Lifting scheme for computing discrete wavelet transform and SPIHT image coding algorithm are suitable to implement in wireless sensor nodes which have some limitations in power consumption, processing capability, memory and bandwidth. This paper addresses selection of suitable wavelet filter type for image compression using SPIHT coding algorithm. In this paper we have implemented SPIHT algorithm based on the lifting scheme of different wavelets (Haar, Daubechies 4 (DB4), Daubechies 6 (DB6), Cohen-Daubechies-Feveau wavelet (CDF 9/7), and Cubic B-splines) in MATLAB. The experimental subjective and objective results show the lifting CDF 9/7 wavelet filter gives excellent results for bit rates 0.1 bpp, 0. 2 bpp, 0.5 bpp, 0. 8 bpp, and 1 bpp. CDF 9/7 wavelet filter gives an acceptable image quality even for very low bit rates which makes it peferrable for implementation in low data rate applications of WMSN.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129726435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974522
Sudeep Varshney, P. K. Rajput, Ashutosh Kumar Singh, Gunjan Varshney
In recent years, the range of sensing technologies has prolonged rapidly, whereas the sensing devices are getting cheaper day by day. This has led to a fast expansion in condition monitoring of different systems, structures, vehicles, and machinery using these sensing devices. There are special kind of structures, which are linear in nature and these structures includes roads, bridges, pipelines (Air Conditioner/ Oil/ Gas/Water etc.) can be over ground or underground and Electric power distribution lines. Most of these structures use a static topology and deploy the sensors in a straight line named as a Linear Wireless Sensor Network (LWSN). The LWSN has attracted the researchers due to their numerous positive features including easy placement of sensors and robustness in diverse environments. In the presented article, an attempt has been made to study and analyze the various routing techniques and their parameters used in various applications, used by Linear Wireless Sensor networks (LWSN) for monitoring the condition of these linear structures. In addition, recent LWSN are categorized according to the matches found in the routing protocols, which would help as a landmark for other investigators so that they could further discover the LWSN routing techniques more intensely.
{"title":"Routing Techniques used for Monitoring the Linear Structures using Linear Wireless Sensor Networks: An Overview","authors":"Sudeep Varshney, P. K. Rajput, Ashutosh Kumar Singh, Gunjan Varshney","doi":"10.1109/ICCCIS48478.2019.8974522","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974522","url":null,"abstract":"In recent years, the range of sensing technologies has prolonged rapidly, whereas the sensing devices are getting cheaper day by day. This has led to a fast expansion in condition monitoring of different systems, structures, vehicles, and machinery using these sensing devices. There are special kind of structures, which are linear in nature and these structures includes roads, bridges, pipelines (Air Conditioner/ Oil/ Gas/Water etc.) can be over ground or underground and Electric power distribution lines. Most of these structures use a static topology and deploy the sensors in a straight line named as a Linear Wireless Sensor Network (LWSN). The LWSN has attracted the researchers due to their numerous positive features including easy placement of sensors and robustness in diverse environments. In the presented article, an attempt has been made to study and analyze the various routing techniques and their parameters used in various applications, used by Linear Wireless Sensor networks (LWSN) for monitoring the condition of these linear structures. In addition, recent LWSN are categorized according to the matches found in the routing protocols, which would help as a landmark for other investigators so that they could further discover the LWSN routing techniques more intensely.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124593045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCCIS48478.2019.8974543
J. Awatramani, Nitasha Hasteer
Cancer is a collection of diseases, which is driven by change in cells of the body by increasing the normal growth and control. Its prevalence is increasing year by year, and is accordingly advancing along with it to counter the occurrences and provide solution. Breast Cancer is considered to be a deadly disease and is one of the crucial reasons of demise among the women globally. Early detection of breast cancer increases the probability of better treatment and viability. Research has been done mostly on mammogram images. Although, sometimes these images are inaccurate and may show fallacious detection. Thus, it can risk the patient’s well-being. It is, therefore, important to obtain substitutes that are trouble-free, economical, secure, and can generate a more genuine prediction. Presently, Machine Learning approaches are being widely used in breast cancer detection. Machine Learning enables the system to master based on former occurrences and decide using a variety of statistical and probabilistic techniques with a minimum human intrusion. This research work showcase the use of five machine learning methods, which are SVM (Support Vector Machine), KNN (K-Nearest Neighbor), K-SVM (Kernel Support Vector Machine), Random Forest Tree, Decision Tree and the accuracy achieved for breast cancer detection has been 97.20%, 95.10%, 96.50%, 98.60%, 95.80% respectively. As per the results, Random Forest Tree offers the highest accuracy in comparison with other algorithms when applied to the Wisconsin breast cancer detection dataset which has been taken from a machine learning repository.
{"title":"Early Stage Detection of Malignant Cells: A Step Towards Better Life","authors":"J. Awatramani, Nitasha Hasteer","doi":"10.1109/ICCCIS48478.2019.8974543","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974543","url":null,"abstract":"Cancer is a collection of diseases, which is driven by change in cells of the body by increasing the normal growth and control. Its prevalence is increasing year by year, and is accordingly advancing along with it to counter the occurrences and provide solution. Breast Cancer is considered to be a deadly disease and is one of the crucial reasons of demise among the women globally. Early detection of breast cancer increases the probability of better treatment and viability. Research has been done mostly on mammogram images. Although, sometimes these images are inaccurate and may show fallacious detection. Thus, it can risk the patient’s well-being. It is, therefore, important to obtain substitutes that are trouble-free, economical, secure, and can generate a more genuine prediction. Presently, Machine Learning approaches are being widely used in breast cancer detection. Machine Learning enables the system to master based on former occurrences and decide using a variety of statistical and probabilistic techniques with a minimum human intrusion. This research work showcase the use of five machine learning methods, which are SVM (Support Vector Machine), KNN (K-Nearest Neighbor), K-SVM (Kernel Support Vector Machine), Random Forest Tree, Decision Tree and the accuracy achieved for breast cancer detection has been 97.20%, 95.10%, 96.50%, 98.60%, 95.80% respectively. As per the results, Random Forest Tree offers the highest accuracy in comparison with other algorithms when applied to the Wisconsin breast cancer detection dataset which has been taken from a machine learning repository.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121375438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}