Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933791
S. Jain, Roopam K. Gupta, Asmita A. Moghe
The price of a stock is volatile and complex in nature which makes its prediction a difficult task. This paper plans to predict the prices of Tata Consultancy Services (TCS) and Madras Rubber Factory Limited (MRF) stocks on a short-term basis. In this paper, a comparative analysis of various Deep Neural Network techniques applied for a stock price prediction application is done. The networks used are pertinent to the problem include Convolutional Neural Networks, Long Short-Term Memory Networks and Conv1D-LSTM. The different neural network models are trained on daily stock price data which includes Open High, Low, and Close price values. These are used to predict the next day closing price. From the last 5 days of data, the prediction is made. Results of different models a recompared with each other. In this paper, a deep neural network Conv1D-LSTM is proposed which is based on the combining of layers of two different techniques – CNN and LSTM top redict the price of a stock. The performance of the models is evaluated using RMSE, MAE and MAPE. These errors in Conv1D-LSTM model are found to be very low compared to CNN & LSTM. For stock price prediction, Conv1DLSTMnetworkisfoundtobeeffective,depending on the nature of stock hyper-parameters may require some variations.
{"title":"Stock Price Prediction on Daily Stock Data using Deep Neural Networks","authors":"S. Jain, Roopam K. Gupta, Asmita A. Moghe","doi":"10.1109/ICACAT.2018.8933791","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933791","url":null,"abstract":"The price of a stock is volatile and complex in nature which makes its prediction a difficult task. This paper plans to predict the prices of Tata Consultancy Services (TCS) and Madras Rubber Factory Limited (MRF) stocks on a short-term basis. In this paper, a comparative analysis of various Deep Neural Network techniques applied for a stock price prediction application is done. The networks used are pertinent to the problem include Convolutional Neural Networks, Long Short-Term Memory Networks and Conv1D-LSTM. The different neural network models are trained on daily stock price data which includes Open High, Low, and Close price values. These are used to predict the next day closing price. From the last 5 days of data, the prediction is made. Results of different models a recompared with each other. In this paper, a deep neural network Conv1D-LSTM is proposed which is based on the combining of layers of two different techniques – CNN and LSTM top redict the price of a stock. The performance of the models is evaluated using RMSE, MAE and MAPE. These errors in Conv1D-LSTM model are found to be very low compared to CNN & LSTM. For stock price prediction, Conv1DLSTMnetworkisfoundtobeeffective,depending on the nature of stock hyper-parameters may require some variations.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"110 1","pages":"1-13"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81449181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933776
Mario Ligwa, V. Balyan, B. Groenewald
The paper is focused on railway wireless communication reliability. Along with the review of the available work, the paper proposes use of 3G interface of eNodeB for fast moving trains with LTE interface. The LTE-R is the key technology which assigns resource blocks (RBs) to users. Due to the frequent handovers, the reliability is a key issue in fast moving trains. The railway communication is not limited to urban areas; in rural areas, LTE interface is available using public communication systems mostly which raises serious concerns of connectivity. In this paper, the eNodeB which is equipped with 3G interface is considered as an alternative of LTE resources in areas with 3G connectivity only and is used mostly for voice communication in areas where LTE resources are available. The proposed 3G interface uses orthogonal variable spreading factor (OVSF) codes as radio resources which suffer from code blocking problem with reduced interference. The work is compared in both scenarios when 3G interface is used and when it is uses only LTE-R. The throughput increases and calls drop out decreases considerably.
{"title":"Utilization of OVSF codes for service Enhancement of LTE-R","authors":"Mario Ligwa, V. Balyan, B. Groenewald","doi":"10.1109/ICACAT.2018.8933776","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933776","url":null,"abstract":"The paper is focused on railway wireless communication reliability. Along with the review of the available work, the paper proposes use of 3G interface of eNodeB for fast moving trains with LTE interface. The LTE-R is the key technology which assigns resource blocks (RBs) to users. Due to the frequent handovers, the reliability is a key issue in fast moving trains. The railway communication is not limited to urban areas; in rural areas, LTE interface is available using public communication systems mostly which raises serious concerns of connectivity. In this paper, the eNodeB which is equipped with 3G interface is considered as an alternative of LTE resources in areas with 3G connectivity only and is used mostly for voice communication in areas where LTE resources are available. The proposed 3G interface uses orthogonal variable spreading factor (OVSF) codes as radio resources which suffer from code blocking problem with reduced interference. The work is compared in both scenarios when 3G interface is used and when it is uses only LTE-R. The throughput increases and calls drop out decreases considerably.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89924206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933643
R. Jha, P. D. Swami, Dhanpratap Singh
The vabartion signals carries the dynamic informations of the machine, which is useful for fault identification of the machine. The practical raw signals suffer from heavy noise, it is essential to retrieve the original signal from noisy raw signals. The signal processing techniques are very effective in such situations. The presence of noise in vibration signal is so large that its elimination results in information loss. In the proposed work noisy vibration signals corrupted by AWGN noise of faulty gear box faulty gear box are denoised using many wavelets and the results are compared. Stationary Wavelet Transform (SWT) is time invariant transform due to this property it is free from the aliasing problem. In this work SWT has been employed for vibration signal denoising and the results have been compared to the discrete wavelet Transfrom(DWT). The fault detection becomes easy for denoised signal and the analysis of its spectrum predicts the actual condition of the machine. The denoised results are compared on the basis of kurtosis.
{"title":"Comparison and Selection of Wavelets for Vibration Signals Denoising and Fault Detection of Rotating Machines using Neighborhood Correlation of SWT Coefficients","authors":"R. Jha, P. D. Swami, Dhanpratap Singh","doi":"10.1109/ICACAT.2018.8933643","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933643","url":null,"abstract":"The vabartion signals carries the dynamic informations of the machine, which is useful for fault identification of the machine. The practical raw signals suffer from heavy noise, it is essential to retrieve the original signal from noisy raw signals. The signal processing techniques are very effective in such situations. The presence of noise in vibration signal is so large that its elimination results in information loss. In the proposed work noisy vibration signals corrupted by AWGN noise of faulty gear box faulty gear box are denoised using many wavelets and the results are compared. Stationary Wavelet Transform (SWT) is time invariant transform due to this property it is free from the aliasing problem. In this work SWT has been employed for vibration signal denoising and the results have been compared to the discrete wavelet Transfrom(DWT). The fault detection becomes easy for denoised signal and the analysis of its spectrum predicts the actual condition of the machine. The denoised results are compared on the basis of kurtosis.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"12 12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79564251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933743
Divya Shukla, Ayoush Johari
MIPS abbreviation for Microprocessor without Interlocked Pipeline Stages it is an efficient version of RISC reduced instruction set computer. The MIPS processor is practiced and used often in because it has moderate level of complexity to comprise of features of futurist computational units, but isn’t highly complex. The latest version of MIPS processor is MIPS32/64 Release 6.In the previous to previous decade it is the most widely used processing unit that the predictions were made that it will be used each and every electronic designs and systems in the future and the area of application it will cover will be very vast like in Gaming Consoles to advance defense technologies. In this paper a brief study of 8-bit MIPS processor is carried out with few basic simulations. The design software used for implementation is Electric CAD and simulations are carried out using LTSpice.
{"title":"Study, Design and Analysis of 8 bit MIPS Processor using deepsubmicron CMOS C5 process","authors":"Divya Shukla, Ayoush Johari","doi":"10.1109/ICACAT.2018.8933743","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933743","url":null,"abstract":"MIPS abbreviation for Microprocessor without Interlocked Pipeline Stages it is an efficient version of RISC reduced instruction set computer. The MIPS processor is practiced and used often in because it has moderate level of complexity to comprise of features of futurist computational units, but isn’t highly complex. The latest version of MIPS processor is MIPS32/64 Release 6.In the previous to previous decade it is the most widely used processing unit that the predictions were made that it will be used each and every electronic designs and systems in the future and the area of application it will cover will be very vast like in Gaming Consoles to advance defense technologies. In this paper a brief study of 8-bit MIPS processor is carried out with few basic simulations. The design software used for implementation is Electric CAD and simulations are carried out using LTSpice.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"515 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77357432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933774
Ruchi Katare, Dheresh Soni
The role of smart and talented tutoring system have necessary role in today scenario where every student wants to learn and calculate their subject performance through newly invented proposed system similar as smart and talented tutoring system, whereas less chance of error in comparison of human being. In this system student can check his exam performance through the test of his desired subjects calculate his performance after giving the test. This system has great importance for poor students because they give their test once again after watching some intelligent video and tutorials by these poor students can easily improve their performance. This new concept which is not provided in base paper. Newly invented proposed system using (DM) data mining algorithm with the concept of Fuzzy system (DMFS) to improve the percentage of the result in comparison of previous algorithm by 9%. These concept shows that proposed methodology similar as smart and talented tutoring system is very effective, powerful and efficient in comparison of existing system.
{"title":"Evaluate Performance of student by using Normalized data set, Fuzzy and A-priori Like Algorithm","authors":"Ruchi Katare, Dheresh Soni","doi":"10.1109/ICACAT.2018.8933774","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933774","url":null,"abstract":"The role of smart and talented tutoring system have necessary role in today scenario where every student wants to learn and calculate their subject performance through newly invented proposed system similar as smart and talented tutoring system, whereas less chance of error in comparison of human being. In this system student can check his exam performance through the test of his desired subjects calculate his performance after giving the test. This system has great importance for poor students because they give their test once again after watching some intelligent video and tutorials by these poor students can easily improve their performance. This new concept which is not provided in base paper. Newly invented proposed system using (DM) data mining algorithm with the concept of Fuzzy system (DMFS) to improve the percentage of the result in comparison of previous algorithm by 9%. These concept shows that proposed methodology similar as smart and talented tutoring system is very effective, powerful and efficient in comparison of existing system.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"82 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74089000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933581
Yakuta Tayyebi, D. Bhilare
Security is one of the top concerns in the adoption of Cloud Computing. Due to the distributed architecture, assessed through the internet cloud architecture are exposed to critical network attacks. Intrusion Detection System is used to ensure network security and early detection of possible attacks. When deployed in Cloud architecture, Intrusion Detection System has to confront issues like high amounts of data to be processed due to high network traffic and high false alarm rates due to dynamic nature of cloud. This paper will provide overview of working of IDS and its deployment in cloud. We propose a novel algorithm that works in accordance with the Virtual Machine’s feature and network behavior to select signatures for configuring intrusion detection system at virtual machine level. This system aims at providing high detection accuracy with low false positive rate at affordable computational cost. We will use snort, a signature based detection tool to detect the known attacks. IDS at each instance will be configured with selected signatures in the cloud environment. The system developed is evaluated for IDS accuracy and resources required.
{"title":"Security solutions in Cloud through customized IDS configuration at VM level","authors":"Yakuta Tayyebi, D. Bhilare","doi":"10.1109/ICACAT.2018.8933581","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933581","url":null,"abstract":"Security is one of the top concerns in the adoption of Cloud Computing. Due to the distributed architecture, assessed through the internet cloud architecture are exposed to critical network attacks. Intrusion Detection System is used to ensure network security and early detection of possible attacks. When deployed in Cloud architecture, Intrusion Detection System has to confront issues like high amounts of data to be processed due to high network traffic and high false alarm rates due to dynamic nature of cloud. This paper will provide overview of working of IDS and its deployment in cloud. We propose a novel algorithm that works in accordance with the Virtual Machine’s feature and network behavior to select signatures for configuring intrusion detection system at virtual machine level. This system aims at providing high detection accuracy with low false positive rate at affordable computational cost. We will use snort, a signature based detection tool to detect the known attacks. IDS at each instance will be configured with selected signatures in the cloud environment. The system developed is evaluated for IDS accuracy and resources required.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"199 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74224956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933780
Aman Sharma, Anjana Goen
Now Technology has spread in every field of our lives. In present era, Everybody is having some kind of connectivity with technology whether in form of mobile, laptop or others. Here we are going to discuss the use of technology in field of home security. In this system, we are using ARDUINO UNO microcontroller board. This system is based on door lock security with the help of 2 high level security passwords and simultaneously the system would be connected with owner’s mobile phone through GSM Module So that the owner could open the door from remote location also. When any authorized would try to open the door, he would have to enter 2 passwords when asked to do so. If he enters right passwords then the door will get open. But in case, he enters any of the two or both passwords wrong then the system would get alert and send a message to the owner to ask him whether it is he or not and work accordingly. This system will be guard to Homes, Shops, Banks and institutions etc.
{"title":"Smart Home Security System","authors":"Aman Sharma, Anjana Goen","doi":"10.1109/ICACAT.2018.8933780","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933780","url":null,"abstract":"Now Technology has spread in every field of our lives. In present era, Everybody is having some kind of connectivity with technology whether in form of mobile, laptop or others. Here we are going to discuss the use of technology in field of home security. In this system, we are using ARDUINO UNO microcontroller board. This system is based on door lock security with the help of 2 high level security passwords and simultaneously the system would be connected with owner’s mobile phone through GSM Module So that the owner could open the door from remote location also. When any authorized would try to open the door, he would have to enter 2 passwords when asked to do so. If he enters right passwords then the door will get open. But in case, he enters any of the two or both passwords wrong then the system would get alert and send a message to the owner to ask him whether it is he or not and work accordingly. This system will be guard to Homes, Shops, Banks and institutions etc.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74550697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933685
K. Ritu, A. Wadhwani, A. Rajoria
This paper focuses on the economical feasibility of grid connected hybrid(PV/Wind turbine) power system for rural area application in India, Madhya Pradesh Satna District $(24^{circ}34$' 46.9776'' N and $80^{circ}49$' 55.8336'' E).The Hybrid PV/Wind power system which is the best renewable system has been chosen due to its complementary nature. The investigation was carried out by studying the potential of wind and solar energy and collecting data from different sources. Hybrid Optimization Model for Electrical Renewable (HOMER) software is used to design the system for giving an optimized result of the available data. A comparative analysis was performed by designing an off grid and on grid Hybrid system for the same location. A sensitivity analysis was also carried out to get a better understanding of which model is best suited from both efficiency and economy point of view. Generation and storage units for each system where properly sized in order to meet the yearly load and minimize the total annual cost to the customer. Simulation results indicates the feasibility and improved functionality of the system which makes it most cost effective for the proposed region.
{"title":"Techno-Economic Comparison of On Grid and Off Grid Hybrid WT / Solar Photo Voltaic Connected Power Generating Unit Using HOMER","authors":"K. Ritu, A. Wadhwani, A. Rajoria","doi":"10.1109/ICACAT.2018.8933685","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933685","url":null,"abstract":"This paper focuses on the economical feasibility of grid connected hybrid(PV/Wind turbine) power system for rural area application in India, Madhya Pradesh Satna District $(24^{circ}34$' 46.9776'' N and $80^{circ}49$' 55.8336'' E).The Hybrid PV/Wind power system which is the best renewable system has been chosen due to its complementary nature. The investigation was carried out by studying the potential of wind and solar energy and collecting data from different sources. Hybrid Optimization Model for Electrical Renewable (HOMER) software is used to design the system for giving an optimized result of the available data. A comparative analysis was performed by designing an off grid and on grid Hybrid system for the same location. A sensitivity analysis was also carried out to get a better understanding of which model is best suited from both efficiency and economy point of view. Generation and storage units for each system where properly sized in order to meet the yearly load and minimize the total annual cost to the customer. Simulation results indicates the feasibility and improved functionality of the system which makes it most cost effective for the proposed region.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"141 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78320655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933733
Vaibhav Gupta, Kukdeep Singh, S. Arjaria, Bhaskar Biswas
In this work, we developed a hybrid model using data clustering and regression techniques to introduce a dynamic pricing scheme for booking online movie tickets. The model is based on different types of uncertainties in the given scenario. We study the performance of our model on four different regression techniques to maximize revenue generation
{"title":"Dynamic Pricing in Movie Tickets using Regression Techniques","authors":"Vaibhav Gupta, Kukdeep Singh, S. Arjaria, Bhaskar Biswas","doi":"10.1109/ICACAT.2018.8933733","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933733","url":null,"abstract":"In this work, we developed a hybrid model using data clustering and regression techniques to introduce a dynamic pricing scheme for booking online movie tickets. The model is based on different types of uncertainties in the given scenario. We study the performance of our model on four different regression techniques to maximize revenue generation","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"89 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77050767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933660
Ankush Verma, N. Sethi, Neelesh Jai
Analysis of big data is a challenging task as it involves large distributed file systems. The infrastructure require for analyzing big data is different from Amazon analysis technology and data mining on various types of data. Mapreduce is widely popular for analysis of big data. Mapreduce is working with mapping, sorting, shuffling and reducing using Master/Slave architecture. Similarly Amazon MapReduce programming model over large data set is introduced by Amazon, on the web especially used for ecommerce. In this paper Amazon EC2 cloud computing model used for central part of designed web and for collection and storing of large data Amazon uses S3. Amazon clusters is a group of servers which is working together to perform any type of tasks on distributed database on different servers in parallel. Amazon services are used in analysis of big data and to increase business efficiency
{"title":"Beyond Hadoop for e-commerce Big Data Analysis through Amazon","authors":"Ankush Verma, N. Sethi, Neelesh Jai","doi":"10.1109/ICACAT.2018.8933660","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933660","url":null,"abstract":"Analysis of big data is a challenging task as it involves large distributed file systems. The infrastructure require for analyzing big data is different from Amazon analysis technology and data mining on various types of data. Mapreduce is widely popular for analysis of big data. Mapreduce is working with mapping, sorting, shuffling and reducing using Master/Slave architecture. Similarly Amazon MapReduce programming model over large data set is introduced by Amazon, on the web especially used for ecommerce. In this paper Amazon EC2 cloud computing model used for central part of designed web and for collection and storing of large data Amazon uses S3. Amazon clusters is a group of servers which is working together to perform any type of tasks on distributed database on different servers in parallel. Amazon services are used in analysis of big data and to increase business efficiency","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"84 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77359972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}