Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1
- 2018
- Buch
- Herausgegeben von
- Prof. Dr. Suresh Chandra Satapathy
- Amit Joshi
- Verlag
- Springer International Publishing
Über dieses Buch
This volume includes 74 papers presented at ICTIS 2017: Second International Conference on Information and Communication Technology for Intelligent Systems. The conference was held on 25th and 26th March 2017, in Ahmedabad, India and organized jointly by the Associated Chambers of Commerce and Industry of India (ASSOCHAM) Gujarat Chapter, the G R Foundation, the Association of Computer Machinery, Ahmedabad Chapter and supported by the Computer Society of India Division IV – Communication and Division V – Education and Research. The papers featured mainly focus on information and communications technology (ICT) for computation, algorithms and data analytics. The fundamentals of various data analytics and algorithms discussed are useful to researchers in the field.
Inhaltsverzeichnis
-
Frontmatter
-
Survey on Online Social Media Networks Facebook Forensics
V. Paul SelwinAbstractIn this paper monitoring and surveying of data along with its protection and security parameters through the continuous evaluation of different OSNs are performed sequentially to identify any focused persons availability and activity in multiple OSN channels. A real time scenario in OSNs domain is initially monitored for data extraction of publicly available data. The available data is matched using semantic matching algorithm to ensure the link establishments, data consolidation and the data segregation which could possibly reveal some details and also used for the purpose of study, research and strategic report making. The main theme is the forensic evidence gathering and also enlisting the security parameters of different OSNs. -
Cooperative Biometric Multimodal Approach for Identification
Shaleen BhatnagarAbstractPossibly the ultimate valuable utility of accurate personal detection is, providing security to authorized access systems from awful security attacks. Within all the currently present biometric schemes, fingerprint identification is most widely used from past few decades. Fingerprint identification scheme is very popular but there are some complexities in recognizing the patterns. Like: Greater dislocation or rotation in image which can causes overlap between fingerprint and create problem during matching, Distortion in fingerprint image, Skin condition and amount of pressure at the time of enrollment and matching, Feature extraction problems. This research paper proposes a cooperative biometric multimodal for fingerprint identification based on minutiae matching by addressing above mentioned problems. This research paper proposes a design a fingerprint identification technique which is expected to give better accuracy and acceptance rate. Main aim of this research work is to decrease False Acceptance Rate (FAR). -
A Hardware Based Technique with an Android Application to Avoid Road Accidents
Nikhat Ikram, Shilpa MahajanAbstractWith the ever-increasing population of the world, increase the accidents at an alarming rate. Accidents are the most uninvited and unintentional miss-happening that causes a lot of injury and loss to human life. So there is an urgent need to stop these accidents to save mankind from destruction. Deaths by accidents have increased and have become the second largest reason for death in the world. Keeping in mind the status of accidents, a working hardware prototype has been proposed along with android based application to avoid road accident. A technique has been suggested where collision of vehicles can be avoided by alerting the driver with a buzzer and a message. Position of the approaching vehicles can be seen on an android application installed on a mobile device that aims to depict the exact location of the vehicles on Google map This whole proposed method is different from other methods as the methods that have been invented until date are mostly in-built techniques while the method proposed here is a prototype that can be implemented in real world. -
Hidden Decision Tree Based Pattern Evaluation Using Regression Models for Health Diagnosis
K. Chandra Shekar, K. Venugopala Rao, Priti ChandraAbstractRegression Models evolved since in Health Diagnosis contributes to predict the health condition through various approaches and analysis. These analytical approaches require statistical methodology for the better diagnosis in data mining applications, utilizing numerical predictions through regression coefficients’ approximations. Here, we propose a model to diagnose the Health condition through error pattern discovery from the known and unknown databases; by designing a hidden layer to extract hidden patterns through Hidden Decision Tree approach. Our proposed model evaluates the database for (a) resulting the different health diagnosis, (b) patternising these to optimized queries based on returned results, (c) effective implementation and extraction of data being supplied by the end users, to handle data regularities and irregularities and (d) evaluate the pattern through HDT approach for the accuracy of the knowledge discovery. Proposed model can be implemented on a medical data to evaluate the error pattern for numeric additive quantities to obtain a better health diagnosis model. -
A Security Approach and Prevention Technique against ARP Poisoning
Sudhakar, R. K. AggarwalAbstractTenderfoot, presently clients who are utilizing the web however do not worry about the security issues. The information that is being transmitted on the system is not thought to be protected. There is such a variety of dangers like sniffing, ridiculing, phishing exits. With the assistance of a few devices like Wireshark, firewall and Microsoft disk operating framework, we can counter quantify the assaults. Here, in this paper we proposed an answer, which is greatly, improved the other proposed solutions based on the ARPWATCH and ARP central server (ACS). -
A High-Speed Image Fusion Method Using Hardware and Software Co-Simulation
Rudra Pratap Singh Chauhan, Rajiva Dwivedi, Rishi AsthanaAbstractThe process of adding significant information of two source images obtained from various sources into one image is called image fusion. Large volumes of data informations are obtained from various remote sensors. These informations are useful for image diagnosis through image fusion. Thus image fusion is the promising area of research. Many methods of image fusion have been suggested by the previous authors to produce a fused image having higher spatial resolution, but due to large amounts of data calculations, it is a time-consuming process. Therefore, a reconfigurable hardware system having high speed such as Field-programmable Gate Array (FPGA) is used for solving complex algorithm with reduced computation time to achieve parallel operation with high-speed characteristics. This paper describe the design and implementation of improved speed discrete wavelet transform based multisensor image fusion process with its implementation on hardware. MATLAB 2016a Simulink tools are used to integrate the Xilinx System generator with averaging method for image fusion. Algorithm design has been synthesized in Xilinx ISE 14.1and the same is implemented on ML 605 Virtex-6 FPGA kit. From the result, it is observed that the design consumes a total power of 4.36 W and operates at a maximum frequency of 851. 06 MHz. -
Personalized Indian Bschool Counsellor System: A Rational Approach
Prajwal Eachempati, Praveen Ranjan SrivastavaAbstractWith the proliferation of so many Bschools in India, it is becoming more and more difficult to choose a good Bschool. Over the decades since management education rankings first appeared, numerous debates have surfaced about their methodologies and objectivity. Although there has been significant research, especially by the various coaching institution magazines, about the ways in which rankings might be improved, there has been less research on providing the rankings according to the preferences of a person. In addition, there has been scant research on how rankings may impact students’ access to industry interaction, and their selection of particular colleges. The objective of this paper is to provide a general ranking and a preferential ranking of top 28 Bschools in India. The approach is to provide accurate rankings by researching on a lot of existing data and by taking students preferences into consideration. -
Proposed Model for an Expert System for Diagnosing Degenerative Diseases – Using Digital Image Processing with Neural Network
Mittal N. Desai, Vishal Dahiya, A. K. SinghAbstractIn the era of any information on fingertip or on one click, medical diagnosis is context in which wrong diagnosis should be avoided using extensive information related to patients and symptoms. There should be an efficient system in diagnosis in terms of expert diagnostic opinion within short span of time, so that disease should be prevented to become chronic. To streamline this expert diagnostic opinion process to the patients, in daily routine, Expert System (ES) using artificial neural network can be employed. It is the method which can simulate two very important characteristics of humans, learning and generalization. Using ANN algorithms various types of medical data are handled and output is achieved with defining various relations between that data. Radiology is one of the branches of medical science in which various medical imaging techniques are used to diagnose difference internal medical problems. Digital Image Processing is the science of processing various digital images: such that important information will be generated. An Expert System is also an efficient tool from which diagnosis can be made. Integrating outcomes of neural network from diseased X-ray, to the knowledge based expert system; an expert opinion of diagnosing disease can be generated. In this paper a model is proposed for diagnosing, seven lower lumbar problems as degenerative diseases. -
An Obscure Method for Clustering in Android Using k-Medoid and Apriori Algorithm
Amar Lalwani, Sriparna Banerjee, Manisha Mouly Kindo, Syed Zishan AliAbstractIn today’s scenario, there is quick evolution in each field which contains majority and distinctive sorts of information. In order to differentiate sample data from the other, the amalgamation of data mining techniques with other useful algorithms is done. Android development is one of the major arena where there is tremendous need to execute these calculations. Combining frequent pattern calculation with clustering is extremely efficacious for android. In this paper the work is done in two levels, initial stage concentrates on generation of clusters and final stage deals with finding the frequent patterns. -
Extended BB84 Protocol Using Lucas Series and Identity Based Encryption
AmrinBanu M. Shaikh, Parth D. ShahAbstractIn 1984 Bennett and Brassard proposed a Quantum Key Distribution (QKD) protocol known as BB84 protocol to distribute a random and frequently changed key using quantum mechanism. A major problem in this Protocol is to prove authentication. One of a solution of this problem has already been proposed in [4]. But in presence of Hardware Fault or Interception, above protocol is not applicable. In This paper Proposed System, Key Distillation has been added to overcome Hardware Fault or Interception with minor changes were not available in [4] and was available in original algorithm. It may increase performance of the Proposed System. -
Performance Analysis of WSN Routing Protocols with Effective Buffer Management Technique
T. Padmashree, N. K. Cauvery, Soniya ChavanAbstractRouting in WSN has dependably been a serious issue of concern mainly because of a few case studies which extend from unfriendly deployment conditions, network topology that change over and over, network failures, resource constraints at each sensor hub to issues in designing of routing protocols. Accordingly, the implementation of routing protocol is influenced by a few fundamental elements which must be thought of before any attempt at designed routing are implemented. Two major protocols used in WSN are Dynamic-Source Routing (DSR) and Destination Sequenced Distance Vector Routing (DSDV). DSR protocol is mainly source based routing protocol and implemented to limit the bandwidth utilized by packets in WSN by avoiding the regular messages transmitted to update table in table-driven approach. The proposed system is Multilayer Buffer Management DSR (MBMDSR) where multilayer buffer management mechanism is implemented in existing DSR protocol and a considerable increase in performance was noted. -
Comparison of Accelerator Coherency Port (ACP) and High Performance Port (HP) for Data Transfer in DDR Memory Using Xilinx ZYNQ SoC
Rikin J. Nayak, Jaiminkumar B. ChavdaAbstractZYNQ 7000 Embedded Processing Platform SOC is chips includes ARM dual core A9-MPCore Processor Processing System-(PS-Microprocessor) along with Xilinx Programmable Logic (PL)-Artix 7 FPGA on a single die. ZYNQ SoC provides the high performance and computing throughput at low power using PS along with the flexibility of PL. ZYNQ SoC incorporates independent interfaces for communication of data control signals between PL and PS in various configurations to access the system resources. This paper describes the performance evaluation of such interfaces in terms of resource utilization and power consumption. Here, in this paper, data transfer from PL to PS using low speed AXI GP port and high speed bus like AXI HP port and ACP (Accelerator Coherency) port is discussed. The paper includes design, implementation and testing results on Zynq-7000 SoC based Avnet Zed board. -
Matrix Factorization and Regression-Based Approach for Multi-Criteria Recommender System
Gouri Sankar Majumder, Pragya Dwivedi, Vibhor KantAbstractRecommender systems (RS) try to solve information overload problem by providing the most relevant items to users from a large set of items. Collaborative filtering (CF), a popular approach in building RS, generates recommendations to users based on explicit ratings provided by the community of users. Currently many online platforms allow users to evaluate items based on multiple criteria along with an overall rating instead of single overall rating. Previous research work has shown that considering these multiple criteria ratings for recommendations improved the predictive accuracy of recommender systems.In this paper, we propose a novel approach to increase predictive accuracy of multi-criteria recommender systems (MCRS). Firstly, we use matrix factorization to predict individual criteria ratings and then compute weights of individual criteria ratings through linear regression. Finally we predict overall rating using a weighted function of multiple criteria ratings. Through experiments on Yahoo! Movies dataset, we compare our proposed approach to baseline approaches and demonstrate its effectiveness in terms of predictive accuracy measures. -
Motivation to a Deadlock Detection in Mobile Agents with Pseudo-Code
Rashmi Priya, R. BelwalAbstractThe solution presented locates locality of reference during the deadlock detection process by migrating detector agents to query multiple blocked agents. To message each blocked agent individually and gather their responses at the shadow agent itself is an alternative to this single migration. The pseudo code provides a context for the solution and insight into the responsibilities and activities performed by each entity. -
An Ontology Based Recommender System to Mitigate the Cold Start Problem in Personalized Web Search
Kamlesh Makwana, Jay Patel, Parth ShahAbstractWith the increase in the diversity of data available on the web, excellence of various searches and the need for personalizing the search results arises. The densely distributed web and heterogeneous information environment creates challenges for search engines such as Storage space, crawling speed, computational speed and retrieval of most relevant documents. It becomes difficult to identify the relevancy of the result due to instability in the search query context. In this paper, the framework to personalize web search through modeling user profile by content based analysis and recommendation model is proposed. The framework will use knowledgebase in form of query hierarchy which is specified for individual user to filter discovered results. The proposed approach is also used to discover current search context of particular user by alluding useful links through item-item collaborative filtering techniques. Due to integration of content based analysis and item to item collaborative filtering algorithm, the proposed framework will retrieved the results of user context on query and also suggest links that had been already clicked by the users within same context. -
A Study on e-Marketing and e-Commerce for Tourism Development in Hadoti Region of Rajasthan
Anukrati Sharma, O. P. RishiAbstractTravel, Tourism and Hospitality industry is growing day by day. It is providing immense opportunities of growth and development to a destination, region, state and Nation. The rapid changes in Information Communication Technologies generated the demand of e-marketing, e-commerce and content marketing in travel, tourism and hospitality industry. No doubts that ICT developments are impacting the demand and growth of tourism and its products phenomenally on the globe. On the other hand the region like Hadoti of Rajasthan state which is highly rich in tourism is lacking behind in the usages of e-commerce-marketing and content marketing in promotion of the attractions and other itineraries. The paper tries to explore the benefits of using e-commerce-marketing and e-business model for the destination image building and promotion of tourism of the region. The paper showcasing the benefits of shifting from the traditional promotional techniques to adapt e-commerce tools and techniques for travel, tourism and hospitality industry of Hadoti region. -
A Survey on Issues of Data Stream Mining in Classification
Ritika Jani, Nirav Bhatt, Chandni ShahAbstractAs Data Stream Mining is trending topic for Research nowadays and more users increases day by day with online stuff, the size of big data is also getting larger. In traditional data mining extracting knowledge is done mostly using offline phase. While in data stream, Extracting data is from the continuous arriving data or we can say from the online streams. Due to continuously arriving data, it cannot be stored in the memory for processing permanently. So examining of data as fast as possible is important. In this paper we would be interested to discuss about the data stream mining and the issues of stream classification, like Single scan, Load shedding, Memory Space, Class imbalance problem, Concept drift, and possible ways to solve those issues.
- Titel
- Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1
- Herausgegeben von
-
Prof. Dr. Suresh Chandra Satapathy
Amit Joshi
- Copyright-Jahr
- 2018
- Electronic ISBN
- 978-3-319-63673-3
- Print ISBN
- 978-3-319-63672-6
- DOI
- https://doi.org/10.1007/978-3-319-63673-3
Informationen zur Barrierefreiheit für dieses Buch folgen in Kürze. Wir arbeiten daran, sie so schnell wie möglich verfügbar zu machen. Vielen Dank für Ihre Geduld.