Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824842
R. Karthikeyan, P. Geetha, E. Ramaraj
A rule-based system [RBS] is used in the field of artificial intelligence to store, manipulate, and interpret the information in various ways. It is also a combination of human knowledge and machine intelligence together to get the exact information in the field of medicine. Today number of medical data’s is generated based on patient information in various formats with missing values. In existing data mining techniques such as clustering and classification, the role of missing values plays vital role for the prediction of disease. By considering missing values may cause wrong prediction of disease in humans. To improve the accuracy of prediction in the medical data set, this paper proposes the Rule Based Classification (RBC) technique by considering the best classifier. The concept proposed RBC technique implements diabetic data set. The major drawback of diabetes is, its symptoms are not common in all humans and they have to undergo diabetic testing. Rule-based systems can be adapted and applied to a large kind of problems. RBC technique can be used to predict diabetes in patients by applying various steps, facts, symptoms to make suitable rules and decide the best rule related to disease. This paper also provides the comparative analysis of various classifiers pertaining to diabetic data set.
{"title":"Rule Based System for Better Prediction of Diabetes","authors":"R. Karthikeyan, P. Geetha, E. Ramaraj","doi":"10.1109/ICCCT2.2019.8824842","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824842","url":null,"abstract":"A rule-based system [RBS] is used in the field of artificial intelligence to store, manipulate, and interpret the information in various ways. It is also a combination of human knowledge and machine intelligence together to get the exact information in the field of medicine. Today number of medical data’s is generated based on patient information in various formats with missing values. In existing data mining techniques such as clustering and classification, the role of missing values plays vital role for the prediction of disease. By considering missing values may cause wrong prediction of disease in humans. To improve the accuracy of prediction in the medical data set, this paper proposes the Rule Based Classification (RBC) technique by considering the best classifier. The concept proposed RBC technique implements diabetic data set. The major drawback of diabetes is, its symptoms are not common in all humans and they have to undergo diabetic testing. Rule-based systems can be adapted and applied to a large kind of problems. RBC technique can be used to predict diabetes in patients by applying various steps, facts, symptoms to make suitable rules and decide the best rule related to disease. This paper also provides the comparative analysis of various classifiers pertaining to diabetic data set.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116617325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824837
Mubarak Kaldeen
The aim of this research was to examine the factors affect the use of social media tools, applications and networks by tourists. In the tourism market, tourism products and service have found fertile ground in the internet due to their specific characteristics. Social media and networks as facebook, instagram, travel networks like trip advisor, agoda, air bnb are playing an increasingly important role as information sources for travelers. Though travel planning is a complex processwhich requires a considerable investment of time and money the social media contribute to reduce time and effort that tourist spend on searching for information and to plan their trip. Mean time there are some factors that hindering the use of social media by tourist and forced to choose traditional way to plan their trips. PEOU, PU and PT were some of those key factors that mostly influence the use of social media. 430 tourists responded to this survey in Sri Lanka. The questionnaire was used in collecting data and data were analyzed using SPSS. PT had most significant impact on tourist intention to use social media following the PEOU and PU. The websites, networks and tools, applications must be developed according to the ease of use of tourists. Ease of navigation, ease access to information, ease of sharing, and enquiring information help to develop effective social media and tools and that ultimately lead to improve the effective use. Tourism suppliers have to make use of this opportunity to promote the use of social media and networks that contribute them to promote their businesses and play a vital role in gaining customers with low cost, and less effort.
{"title":"Factors That Trigger The Use Of Social Media Tools, Applications And Networks Of Tourist","authors":"Mubarak Kaldeen","doi":"10.1109/ICCCT2.2019.8824837","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824837","url":null,"abstract":"The aim of this research was to examine the factors affect the use of social media tools, applications and networks by tourists. In the tourism market, tourism products and service have found fertile ground in the internet due to their specific characteristics. Social media and networks as facebook, instagram, travel networks like trip advisor, agoda, air bnb are playing an increasingly important role as information sources for travelers. Though travel planning is a complex processwhich requires a considerable investment of time and money the social media contribute to reduce time and effort that tourist spend on searching for information and to plan their trip. Mean time there are some factors that hindering the use of social media by tourist and forced to choose traditional way to plan their trips. PEOU, PU and PT were some of those key factors that mostly influence the use of social media. 430 tourists responded to this survey in Sri Lanka. The questionnaire was used in collecting data and data were analyzed using SPSS. PT had most significant impact on tourist intention to use social media following the PEOU and PU. The websites, networks and tools, applications must be developed according to the ease of use of tourists. Ease of navigation, ease access to information, ease of sharing, and enquiring information help to develop effective social media and tools and that ultimately lead to improve the effective use. Tourism suppliers have to make use of this opportunity to promote the use of social media and networks that contribute them to promote their businesses and play a vital role in gaining customers with low cost, and less effort.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"28 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824994
Firas Abdallah, S. Khawandi, Anis Ismail
Prior to 1980’s computers had a limited function. The use of computer systems by advocate in the domain of laws was very limited and just for office issues. On the contrary, nowadays, the practice of law is parallel to the speed of life and Information and Communication Technology. Lawyers need more creative and fast tools to help them stay up to date in their work. This paper describes a theoretical and empirical study to design and develop an Advocate Office Management System
{"title":"Advocate Office Management System","authors":"Firas Abdallah, S. Khawandi, Anis Ismail","doi":"10.1109/ICCCT2.2019.8824994","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824994","url":null,"abstract":"Prior to 1980’s computers had a limited function. The use of computer systems by advocate in the domain of laws was very limited and just for office issues. On the contrary, nowadays, the practice of law is parallel to the speed of life and Information and Communication Technology. Lawyers need more creative and fast tools to help them stay up to date in their work. This paper describes a theoretical and empirical study to design and develop an Advocate Office Management System","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121075151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824985
DS Tejendra, C.R Varunkumar, S. Sriram, V. Sumathy, CK. Thejeshwari
As technology is developing exponentially and the world is moving towards automation, the resources have to be transferred through the internet which requires routers to connect networks and forward bundles (information). Due to the vulnerability of routers the data and resources have been hacked. The vulnerability of routers is due to minimum authentication to the network shared, some technical attacks on routers, leaking of passwords to others, single passwords. Based on the study, the solution is to maximize authentication of the router by embedding an application that monitors the user entry based on MAC address of the device, the password is frequently changed and that encrypted password is sent to a user and notifies the admin about the changes. Thus, these routers provide high-level security to the forward data through the internet.
{"title":"A Novel Approach to reduce Vulnerability on Router by Zero vulnerability Encrypted password in Router (ZERO) Mechanism","authors":"DS Tejendra, C.R Varunkumar, S. Sriram, V. Sumathy, CK. Thejeshwari","doi":"10.1109/ICCCT2.2019.8824985","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824985","url":null,"abstract":"As technology is developing exponentially and the world is moving towards automation, the resources have to be transferred through the internet which requires routers to connect networks and forward bundles (information). Due to the vulnerability of routers the data and resources have been hacked. The vulnerability of routers is due to minimum authentication to the network shared, some technical attacks on routers, leaking of passwords to others, single passwords. Based on the study, the solution is to maximize authentication of the router by embedding an application that monitors the user entry based on MAC address of the device, the password is frequently changed and that encrypted password is sent to a user and notifies the admin about the changes. Thus, these routers provide high-level security to the forward data through the internet.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824892
S V Juno Bella Gracia, D. Raghav, R. Santhoshkumar, B. Velprakash
Blockchain Based Aadhaar uses Blockchain platform for securing Aadhaar information. The system stores the Aadhaar data in a group of computers interconnected to each other. The Blockchain uses a hashing function to transform the data and produces a hash code. The hash code ensures the identity of user is kept secure. The data is stored in blocks in the nodes. The system also uses Ethereum Smart Contracts to ensure to only the authenticated data is accessed by the third parties. The Blockchain based Aadhaar uses distributed databases (decentralized databases) math and cryptography to record transactions, transactional data is secured and the data is stored in distributed small chunks and spreads across the entire network of computers, and so it is difficult to hack these systems than hacking the centralized or traditional servers.
{"title":"Blockchain Based Aadhaar","authors":"S V Juno Bella Gracia, D. Raghav, R. Santhoshkumar, B. Velprakash","doi":"10.1109/ICCCT2.2019.8824892","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824892","url":null,"abstract":"Blockchain Based Aadhaar uses Blockchain platform for securing Aadhaar information. The system stores the Aadhaar data in a group of computers interconnected to each other. The Blockchain uses a hashing function to transform the data and produces a hash code. The hash code ensures the identity of user is kept secure. The data is stored in blocks in the nodes. The system also uses Ethereum Smart Contracts to ensure to only the authenticated data is accessed by the third parties. The Blockchain based Aadhaar uses distributed databases (decentralized databases) math and cryptography to record transactions, transactional data is secured and the data is stored in distributed small chunks and spreads across the entire network of computers, and so it is difficult to hack these systems than hacking the centralized or traditional servers.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824864
R. Kausalya, E. Priya
This work aim to present a simple and reliable method of measuring the pulse rate directly from face images obtained using a webcam. Video sequences from a webcam are captured and are converted into frames. The frames are decomposed into their constituent colour channels. The red component signals from the RGB images of the face and the forehead region (region of interest) are extracted. The heart rate is obtained by further processing the red channel signal and finding the maximum of power spectral density. To validate whether the resultant pulse rate are related to the heart rate, the results thus obtained from the video sequences are compared with pulse rate measured from an Electrocardiogram (ECG) signal acquired for the same subject. The red channel component of the face image contains most information pertaining to the pulse rate. The maximum of power spectral density of the red channel component gives the heart rate. The ECG circuit implemented to validate the results obtained through this method shows that the deviation is about ± 4 bpm. Thus as a surrogate to the conventional ECG measurement technique the method implemented in this work could be used for continuous monitoring of patients especially the elderly persons at home.
{"title":"Implementation and Validation of a Non-Contact Measurement of Cardiac Activity","authors":"R. Kausalya, E. Priya","doi":"10.1109/ICCCT2.2019.8824864","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824864","url":null,"abstract":"This work aim to present a simple and reliable method of measuring the pulse rate directly from face images obtained using a webcam. Video sequences from a webcam are captured and are converted into frames. The frames are decomposed into their constituent colour channels. The red component signals from the RGB images of the face and the forehead region (region of interest) are extracted. The heart rate is obtained by further processing the red channel signal and finding the maximum of power spectral density. To validate whether the resultant pulse rate are related to the heart rate, the results thus obtained from the video sequences are compared with pulse rate measured from an Electrocardiogram (ECG) signal acquired for the same subject. The red channel component of the face image contains most information pertaining to the pulse rate. The maximum of power spectral density of the red channel component gives the heart rate. The ECG circuit implemented to validate the results obtained through this method shows that the deviation is about ± 4 bpm. Thus as a surrogate to the conventional ECG measurement technique the method implemented in this work could be used for continuous monitoring of patients especially the elderly persons at home.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132258965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824809
Jesna Catherine, Bindu Sebastian
The aeronautical communication system has an influential role in future because the air traffic is increasing day by day. The Future Communication Infrastructure(FCI) for aeronautical communication is seeking for a better transmission scheme. As the demand for frequency spectrum for aeronautical communication is raising up, and the VHF spectrum utilization is almost saturated, FCI has developed two candidates for communication; L-DACS1 and L-DACS2 which are operating in L-band frequencies. These systems are inserted in L-band in an inlay approach. The majority part of L- band is occupied by DME(Distance Measuring Equipment) which induces interference to the communication candidates. So, for a better communication in L-band, we have to combat against the DME interference. Here presenting a survey on several methods to mitigate DME interference.
{"title":"A survey on DME interference mitigation techniques for L-band aeronautical communication","authors":"Jesna Catherine, Bindu Sebastian","doi":"10.1109/ICCCT2.2019.8824809","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824809","url":null,"abstract":"The aeronautical communication system has an influential role in future because the air traffic is increasing day by day. The Future Communication Infrastructure(FCI) for aeronautical communication is seeking for a better transmission scheme. As the demand for frequency spectrum for aeronautical communication is raising up, and the VHF spectrum utilization is almost saturated, FCI has developed two candidates for communication; L-DACS1 and L-DACS2 which are operating in L-band frequencies. These systems are inserted in L-band in an inlay approach. The majority part of L- band is occupied by DME(Distance Measuring Equipment) which induces interference to the communication candidates. So, for a better communication in L-band, we have to combat against the DME interference. Here presenting a survey on several methods to mitigate DME interference.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133104437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824863
N. Mathan, S. Jayashri
Very Large-Scale Integration (VLSI) rapidly grew when the Transistor-Transistor Logic (TTL) has much higher power consumption than the Metal-Oxide Semiconductor (MOS) family. The development in the field of electronics have been tremendous since the advent of VLSI. Due to the disadvantages like tunnelling, scaling in Metal Oxide Semiconductor Field Effect Transistors, Carbon nanotubes can be considered as the promising candidate for future devices. Carbon nanotubes are considered as the next generation Field Effect Transistors that can sustain the scalability while increasing its performance. The artificial neural networks are depicted as a structure of interconnected neurons that can figure out values from inputs and are capable of pattern recognition as well as machine learning. The prime aim of this paper is to assimilate techniques that reduce the architecture size using CNTFET technology and decrease the power consumption which leads to higher efficiency and augmented performance of the device. To satisfy the pre-requisites the circuit is designed using 32nm CNTFET technology. The proposed neuron architecture concentrates on the modification of flip flop by replacing the transmission gates with pass transistor by restructuring and reorganisation method to achieve significant delay, power and power delay product utilization. Circuit level simulation for D Flip Flop and neuron Architecture has been performed. The simulation results show that the performance of neuron architecture is improved power by 24.02% with the use of CNTFET, which means the stability is vital than that of MOSFET.
{"title":"SPICE Modelling of CNTFET based Neuron Architecture for Low Power and High Speed applications","authors":"N. Mathan, S. Jayashri","doi":"10.1109/ICCCT2.2019.8824863","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824863","url":null,"abstract":"Very Large-Scale Integration (VLSI) rapidly grew when the Transistor-Transistor Logic (TTL) has much higher power consumption than the Metal-Oxide Semiconductor (MOS) family. The development in the field of electronics have been tremendous since the advent of VLSI. Due to the disadvantages like tunnelling, scaling in Metal Oxide Semiconductor Field Effect Transistors, Carbon nanotubes can be considered as the promising candidate for future devices. Carbon nanotubes are considered as the next generation Field Effect Transistors that can sustain the scalability while increasing its performance. The artificial neural networks are depicted as a structure of interconnected neurons that can figure out values from inputs and are capable of pattern recognition as well as machine learning. The prime aim of this paper is to assimilate techniques that reduce the architecture size using CNTFET technology and decrease the power consumption which leads to higher efficiency and augmented performance of the device. To satisfy the pre-requisites the circuit is designed using 32nm CNTFET technology. The proposed neuron architecture concentrates on the modification of flip flop by replacing the transmission gates with pass transistor by restructuring and reorganisation method to achieve significant delay, power and power delay product utilization. Circuit level simulation for D Flip Flop and neuron Architecture has been performed. The simulation results show that the performance of neuron architecture is improved power by 24.02% with the use of CNTFET, which means the stability is vital than that of MOSFET.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115894541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824871
Priyanka Prabakaran, Deva Priya Isravel, S. Silas
Today’s network infrastructure have grown dramatically due to the advancement of IT technologies. Many enterprise service providers have shifted their focus to operate the network infrastructure using open source technologies to build a customer-provider friendly platform. One of the recent technology that has captured the interest of many service providers is the software defined networking (SDN). This paper presents a detailed study on how next-generation networks are influenced and orchestrated by SDN technologies. The challenges that are encountered in various applications and the benefits of integrating SDN to realize the full potential in various application domains are discussed. Further, the scope of research is also presented.
{"title":"A Review of SDN-Based Next Generation Smart Networks","authors":"Priyanka Prabakaran, Deva Priya Isravel, S. Silas","doi":"10.1109/ICCCT2.2019.8824871","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824871","url":null,"abstract":"Today’s network infrastructure have grown dramatically due to the advancement of IT technologies. Many enterprise service providers have shifted their focus to operate the network infrastructure using open source technologies to build a customer-provider friendly platform. One of the recent technology that has captured the interest of many service providers is the software defined networking (SDN). This paper presents a detailed study on how next-generation networks are influenced and orchestrated by SDN technologies. The challenges that are encountered in various applications and the benefits of integrating SDN to realize the full potential in various application domains are discussed. Further, the scope of research is also presented.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126748924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824800
N. Kumar, M. Nagalakshmi, Tanya Sharma, S. Ambati, Vibha Satyanarayana
Many a time, a user might not remember the exact Linux commands to apply while using the Linux shell. The programmer ends up searching for the correct solution. Having a natural language interface (like English) to a shell would help programmers’ in performing their desired tasks without having to think much about the particular command or option that needs to be used. We present a tool that can convert natural language into executable Linux commands. This paper covers the related work done in this field and our approach to solving this problem. Research in this field is fairly new and there are two tools in this domain, Tellina[1] and Betty. Tellina is a powerful tool which covers file operations with high complexity. Apart from file utilities, our tool also covers a wider scope of commands including awk and sed. A novel approach is used to find the structure of the command. This paper includes the comparisons between Neural Machine Translation (NMT), Statistical Machine Translation(SMT), similarity models and machine learning models.
{"title":"Natural Language Interface to Linux Shell – Report","authors":"N. Kumar, M. Nagalakshmi, Tanya Sharma, S. Ambati, Vibha Satyanarayana","doi":"10.1109/ICCCT2.2019.8824800","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824800","url":null,"abstract":"Many a time, a user might not remember the exact Linux commands to apply while using the Linux shell. The programmer ends up searching for the correct solution. Having a natural language interface (like English) to a shell would help programmers’ in performing their desired tasks without having to think much about the particular command or option that needs to be used. We present a tool that can convert natural language into executable Linux commands. This paper covers the related work done in this field and our approach to solving this problem. Research in this field is fairly new and there are two tools in this domain, Tellina[1] and Betty. Tellina is a powerful tool which covers file operations with high complexity. Apart from file utilities, our tool also covers a wider scope of commands including awk and sed. A novel approach is used to find the structure of the command. This paper includes the comparisons between Neural Machine Translation (NMT), Statistical Machine Translation(SMT), similarity models and machine learning models.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122973299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}