Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824949
K. Anitha, V. Saraswathy, K. Gayathri, S. Priya
Social media became prevalent in our day to day life. People express their views, feelings, emotion via comments. Those comments entered by the user is analyzed. The Naïve Bayes Algorithm is used to detect the offensive and sarcastic comment, thus preventing them from being uploaded in social media.
{"title":"An Approach To Comment Analysis In Online Social Media","authors":"K. Anitha, V. Saraswathy, K. Gayathri, S. Priya","doi":"10.1109/ICCCT2.2019.8824949","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824949","url":null,"abstract":"Social media became prevalent in our day to day life. People express their views, feelings, emotion via comments. Those comments entered by the user is analyzed. The Naïve Bayes Algorithm is used to detect the offensive and sarcastic comment, thus preventing them from being uploaded in social media.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132664560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824988
D. Prabakaran, R. Shyamala
In the digital era, the computing applications are to be secured from anonymous attacks by strengthening the authentication credentials. Numerous methodologies and algorithms have been proposed implementing human biometric as unique identity and one such identity is human voice print. The human voice print is a unique characteristic of the individual and has a wide variety of techniques in representing and extracting the features from the digital speech signals. The voice recognition techniques were executed on different platforms and exploit different mathematical tools in voice feature extraction, leading to dissimilarity in performance and results. In this paper, we investigate, analyze and present a review on performance of numerous voice recognition techniques.
{"title":"A Review On Performance Of Voice Feature Extraction Techniques","authors":"D. Prabakaran, R. Shyamala","doi":"10.1109/ICCCT2.2019.8824988","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824988","url":null,"abstract":"In the digital era, the computing applications are to be secured from anonymous attacks by strengthening the authentication credentials. Numerous methodologies and algorithms have been proposed implementing human biometric as unique identity and one such identity is human voice print. The human voice print is a unique characteristic of the individual and has a wide variety of techniques in representing and extracting the features from the digital speech signals. The voice recognition techniques were executed on different platforms and exploit different mathematical tools in voice feature extraction, leading to dissimilarity in performance and results. In this paper, we investigate, analyze and present a review on performance of numerous voice recognition techniques.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824857
S. Subha, S. Priya
In the domain of E-learning, hundreds of dimensions can be taken and predictions can be made based on the browsing history of the users. Nowadays, web-based learning becomes an alternate to face to face education and E-learning becomes an effective tool in the learning process. E-Learning paves way for the learners to interact with the digitally delivered content and services. It focuses on making the learners to become more interested and efficient in their study process. This paper aims at designing strategies that will improvise the structure, assessment criteria and course completion rate in an e-learning environment. To achieve this aim, the following sub-objectives have been framed. The first objective is to provide a well-defined structure of the course whereas the second objective focuses on designing an e-learning system with specific assessment criteria. The third objective aims at achieving high completion rates for the registered students. By framing a defined structure, various assessment criteria can be fixed and calculated for a given student data set. Finally the active participation of enrolled candidates can be examined frequently. Machine Learning algorithms can be used efficiently in order to handle data in large amount.
{"title":"A Model For Enhancing The Structure And Strategy In An E-Learning Environment","authors":"S. Subha, S. Priya","doi":"10.1109/ICCCT2.2019.8824857","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824857","url":null,"abstract":"In the domain of E-learning, hundreds of dimensions can be taken and predictions can be made based on the browsing history of the users. Nowadays, web-based learning becomes an alternate to face to face education and E-learning becomes an effective tool in the learning process. E-Learning paves way for the learners to interact with the digitally delivered content and services. It focuses on making the learners to become more interested and efficient in their study process. This paper aims at designing strategies that will improvise the structure, assessment criteria and course completion rate in an e-learning environment. To achieve this aim, the following sub-objectives have been framed. The first objective is to provide a well-defined structure of the course whereas the second objective focuses on designing an e-learning system with specific assessment criteria. The third objective aims at achieving high completion rates for the registered students. By framing a defined structure, various assessment criteria can be fixed and calculated for a given student data set. Finally the active participation of enrolled candidates can be examined frequently. Machine Learning algorithms can be used efficiently in order to handle data in large amount.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824931
S. Priyanka, T. Lakshmi, S. Sakthy
The proposed system uses a smart street light which are weather adaptive. The project is implemented by embedding a smart system which controls the automatic switching of the street lights. The system switches ON the street light automatically during the night time and is switched OFF during the day time. Manual work is not done here since the ON/OFF is done automatically. The authorized person can access the switch through internet anywhere and at anytime. At the top of the street a camera is placed in order to capture the footages and track the actions that are been taking place. These footages are sent to the server through internet. In addition to the camera, a panic button is being placed on the pole, in case of any emergencies the person can press the panic button which triggers an alarm to the nearby police stations about the current situation. Whenever the panic button is pressed, the current footages that are taken by the camera are sent immediately to the nearby police station, for them to view the incident’s spot. All the area street lights are connected to the nearby police station which can be accessed through the cloud services. Thus, this system ensures safety and energy consumption.
{"title":"Web –Based Street Light System","authors":"S. Priyanka, T. Lakshmi, S. Sakthy","doi":"10.1109/ICCCT2.2019.8824931","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824931","url":null,"abstract":"The proposed system uses a smart street light which are weather adaptive. The project is implemented by embedding a smart system which controls the automatic switching of the street lights. The system switches ON the street light automatically during the night time and is switched OFF during the day time. Manual work is not done here since the ON/OFF is done automatically. The authorized person can access the switch through internet anywhere and at anytime. At the top of the street a camera is placed in order to capture the footages and track the actions that are been taking place. These footages are sent to the server through internet. In addition to the camera, a panic button is being placed on the pole, in case of any emergencies the person can press the panic button which triggers an alarm to the nearby police stations about the current situation. Whenever the panic button is pressed, the current footages that are taken by the camera are sent immediately to the nearby police station, for them to view the incident’s spot. All the area street lights are connected to the nearby police station which can be accessed through the cloud services. Thus, this system ensures safety and energy consumption.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127225782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824831
Bharath Ravi Prakash, S. S. Kulkarni
There is always a need for improvement in the scope of technology used in our daily life. This paper consists of one such aspect that mainly concentrates on location updates of user. This is made possible by using the concept of Fused location API. The Location APIs theoretical path points of interest in the area innovations, Fused Location Provider is utilized for obtaining area data with as decreased power use as could be expected under the circumstances and action acknowledgment for enabling applications to adjust to the present activity of the Client.One advantage of using Fused Location is the ability to connect friends even if they are from different locations at different periods of time.The main concept was to design and develop an application which helps to keep track of friends. The proposed application is able to gather information of the phone’s GPS locations from the phone and present the information in a simple and convenient way.
{"title":"Navigation Technology to meet new people using Fused Location API","authors":"Bharath Ravi Prakash, S. S. Kulkarni","doi":"10.1109/ICCCT2.2019.8824831","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824831","url":null,"abstract":"There is always a need for improvement in the scope of technology used in our daily life. This paper consists of one such aspect that mainly concentrates on location updates of user. This is made possible by using the concept of Fused location API. The Location APIs theoretical path points of interest in the area innovations, Fused Location Provider is utilized for obtaining area data with as decreased power use as could be expected under the circumstances and action acknowledgment for enabling applications to adjust to the present activity of the Client.One advantage of using Fused Location is the ability to connect friends even if they are from different locations at different periods of time.The main concept was to design and develop an application which helps to keep track of friends. The proposed application is able to gather information of the phone’s GPS locations from the phone and present the information in a simple and convenient way.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133090780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824905
V. Narmadha, K. Aparna, J. Kamaleshwari, K. Tharny
Optimal energy management in smart spaces requires intelligent and reliable energy-aware-based context sensing and technologies that are capable of recognizing and analyzing the power consumption. In this system, we propose a efficient and reliable power management system with inclusion of automated attendance. The main objective is to automatically control the fan and lights inside any space involving number of people. The next objective is automated attendance. ID cards containing barcode data is sufficient for their identity, show case their real time data, their usage additional fine system for being late. Priority of this work, is made to ensure that this system is affordable to all with assurance of data integrity and authority.
{"title":"Integrated Power Management with Automated Attendance System","authors":"V. Narmadha, K. Aparna, J. Kamaleshwari, K. Tharny","doi":"10.1109/ICCCT2.2019.8824905","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824905","url":null,"abstract":"Optimal energy management in smart spaces requires intelligent and reliable energy-aware-based context sensing and technologies that are capable of recognizing and analyzing the power consumption. In this system, we propose a efficient and reliable power management system with inclusion of automated attendance. The main objective is to automatically control the fan and lights inside any space involving number of people. The next objective is automated attendance. ID cards containing barcode data is sufficient for their identity, show case their real time data, their usage additional fine system for being late. Priority of this work, is made to ensure that this system is affordable to all with assurance of data integrity and authority.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824848
M. Parthasarathy, R. Aniruth, M. SureshKumar
Power transmission is one of the vital process in distribution of power in the widespread power supplying system. Even though various measures have been taken to discover a new consistent material with minimal power loss there are other ways to save and prevent loss of power and current by modifying the production and usage system in a sophisticated and efficient manner. There is a statistical need to collect the data in order to modify the system to distribute the generated power in a efficient way.The overall losses that we are facing according to the data collected by world bank the quantity of loss is aggregated near 8.25% all over the world. After conducting essential research and survey on the loses that we are facing during transmission and usage we have come up with a proposal that provides a initiative to develop a more efficient solution regarding this problem using IoT, Database, Machine learning, Embedded Systems and Sensor Components.
{"title":"Power Efficiency and Automation Based on IoT","authors":"M. Parthasarathy, R. Aniruth, M. SureshKumar","doi":"10.1109/ICCCT2.2019.8824848","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824848","url":null,"abstract":"Power transmission is one of the vital process in distribution of power in the widespread power supplying system. Even though various measures have been taken to discover a new consistent material with minimal power loss there are other ways to save and prevent loss of power and current by modifying the production and usage system in a sophisticated and efficient manner. There is a statistical need to collect the data in order to modify the system to distribute the generated power in a efficient way.The overall losses that we are facing according to the data collected by world bank the quantity of loss is aggregated near 8.25% all over the world. After conducting essential research and survey on the loses that we are facing during transmission and usage we have come up with a proposal that provides a initiative to develop a more efficient solution regarding this problem using IoT, Database, Machine learning, Embedded Systems and Sensor Components.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124957635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824873
M. Kiranmayi, N. Maheswari, M. Sivagami
Social Network is one of the most desired platform where an immense amount of data are available from many different social platforms. Publishing data without hiding sensitive data or diplomatic data about individuals is a crucial problem which cannot guarantees the privacy. Therefore published data needs to remove identifying particulars of the individuals (anonymized) before the data is released. Anonymizing data is more challenging and a popular privacy preserving model for data publishing in social networks. However even after anonymizing the data sets, attackers try to find new methods to derive private information of individuals with some background knowledge and identify them. One of such method is attribute couplet attack where the attacker has some background information about the data and derive the identity using a pair of node attributes. In the existing approach, the k-couplet anonymity achieves the privacy under the attribute couplet attack by using edge modification approach. This will change the distance properties between nodes and might also introduce undesirable and misleading fake relations. In this paper, we design an algorithm named Couplet Anonymization by using node addition approach. Adding new nodes and connecting them to some of the nodes in the original network can avoid this attribute couplet attack and gives a better chance to preserve the network properties. This node addition helps to reduce the misleading fake relations and also preserves the utility of the social networks.
{"title":"Preservation of Attribute Couplet Attack by Node Addition in Social Networks","authors":"M. Kiranmayi, N. Maheswari, M. Sivagami","doi":"10.1109/ICCCT2.2019.8824873","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824873","url":null,"abstract":"Social Network is one of the most desired platform where an immense amount of data are available from many different social platforms. Publishing data without hiding sensitive data or diplomatic data about individuals is a crucial problem which cannot guarantees the privacy. Therefore published data needs to remove identifying particulars of the individuals (anonymized) before the data is released. Anonymizing data is more challenging and a popular privacy preserving model for data publishing in social networks. However even after anonymizing the data sets, attackers try to find new methods to derive private information of individuals with some background knowledge and identify them. One of such method is attribute couplet attack where the attacker has some background information about the data and derive the identity using a pair of node attributes. In the existing approach, the k-couplet anonymity achieves the privacy under the attribute couplet attack by using edge modification approach. This will change the distance properties between nodes and might also introduce undesirable and misleading fake relations. In this paper, we design an algorithm named Couplet Anonymization by using node addition approach. Adding new nodes and connecting them to some of the nodes in the original network can avoid this attribute couplet attack and gives a better chance to preserve the network properties. This node addition helps to reduce the misleading fake relations and also preserves the utility of the social networks.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824913
C. L. Krishna, P. V. Reddy
The amount of data being stored in various repositories has been growing rapidly. In order to uncover hidden information from such data, there is a need for information extraction techniques. This resulted in the use of Data Mining and Machine Learning tasks such as Classification. One among the industries producing huge number of records on a daily basis is the Healthcare system. Data associated with medical field deal with the diagnosis of patients, higher accuracy in decision making is expected. In this work, we deal with the analysis of Cleveland Heart Disease data which contains 303 instances of patients records. Four classifiers are applied on the processed data to measure the accuracy of classification. Our results show that Deep Neural Net MLP classifier is able to diagnose the status of a patient with more accuracy.
{"title":"An Efficient Deep Neural Network Multilayer Perceptron Based Classifier in Healthcare System","authors":"C. L. Krishna, P. V. Reddy","doi":"10.1109/ICCCT2.2019.8824913","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824913","url":null,"abstract":"The amount of data being stored in various repositories has been growing rapidly. In order to uncover hidden information from such data, there is a need for information extraction techniques. This resulted in the use of Data Mining and Machine Learning tasks such as Classification. One among the industries producing huge number of records on a daily basis is the Healthcare system. Data associated with medical field deal with the diagnosis of patients, higher accuracy in decision making is expected. In this work, we deal with the analysis of Cleveland Heart Disease data which contains 303 instances of patients records. Four classifiers are applied on the processed data to measure the accuracy of classification. Our results show that Deep Neural Net MLP classifier is able to diagnose the status of a patient with more accuracy.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116990255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824813
Sugandha Bhatia, J. Malhotra
The technology of cloud computing has been growing at an enormous speed. It is considered as one of the most prominent area of research in computer engineering and information technology. Cloud computing provides platforms, software, virtual machine, security and analytical services on the basis of pay as per usage policy. Hence, it furnishes economic advantage to cloud computing users and service providers. This new paradigm of information technology is very useful, even then, the privacy, security and forensic issues are the primary obstacles in the growth of cloud computing systems. It is need of the hour that cloud architecture should support and compatible with tools or techniques of digital forensics. Therefore, in this research paper an architecture is being proposed to support forensic accession and investigation of cloud based system which is required for the sustainable growth of the cloud computing applications and services.
{"title":"Forensic Based Cloud Computing Architecture – Exploration and Implementation","authors":"Sugandha Bhatia, J. Malhotra","doi":"10.1109/ICCCT2.2019.8824813","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824813","url":null,"abstract":"The technology of cloud computing has been growing at an enormous speed. It is considered as one of the most prominent area of research in computer engineering and information technology. Cloud computing provides platforms, software, virtual machine, security and analytical services on the basis of pay as per usage policy. Hence, it furnishes economic advantage to cloud computing users and service providers. This new paradigm of information technology is very useful, even then, the privacy, security and forensic issues are the primary obstacles in the growth of cloud computing systems. It is need of the hour that cloud architecture should support and compatible with tools or techniques of digital forensics. Therefore, in this research paper an architecture is being proposed to support forensic accession and investigation of cloud based system which is required for the sustainable growth of the cloud computing applications and services.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114641771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}