ICCAE 2018- International conference on Computational and Automation Engineering
"ICCAE-2018 Conference Papers "
Pages
[1]
A Comparative Study on Various Data Mining Tools for Intrusion Detection[Full-Text ]
Prithvi Bisht, Neeraj Negi, Preeti Mishra, Pushpanjali ChauhanInternet world is expanding day by day and so are the threats related to it. Nowadays, cyber attacks are happening more frequently than a decade before. Intrusion detection is one of the most popular research area which provides various security tools and techniques to detect cyber attacks. There are many ways to detect anomaly in any system but the most flexible and efficient way is through data mining. Data mining tools provide various machine learning algorithms which are helpful for implementing machine-learning based IDS.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Literature Survey on Page Rank Algorithm[Full-Text ]
Ritu Sachdeva (Sharma), Dr. Sachin GuptaThere is a mass of web data available in the form of web pages on the World Wide Web (WWW). So whenever a user makes a query, a lot of search results having different web links corresponding to user’s query are generated. Out of generated results, only some are relevant while the rest are irrelevant. The relevancy of a web page is calculated by search engines using page ranking algorithms. These algorithms are either based on web structure mining or web content mining to calculate the relevancy of a web page
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SURVEY ON WIRELESS SENSOR NETWORK SECURITY[Full-Text ]
Shriya RajanWireless Sensor Network (WSN) is a progressive technology that shows great promise for various futuristic applications. It is already in use in critical monitoring and control applications around the world. However, security is crucial to the success of applying WSN. While the deployment of sensor nodes in unattended environment and the inherently unsecure nature of wireless medium challenge the integrity of transmitted data, the power and processing constraints of sensor nodes make conventional security solution impractical. This paper tends to outline various aspects of wireless sensor network security. The introductory section gives brief overview of WSN and outlines the basic security goals. It then discusses various attacks in WSN and highlights the importance of symmetric cryptographic primitives for providing security in WSN.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Oozie: Run & Manage jobs in HADOOP[Full-Text ]
Manish Gupta, Dr. Anish Gupta, Prateek ChaturvediThe size of data has been growing day by day in rapid way. Using traditional approach, it make expensive to process large set of data. Hadoop is a popular framework written in java, being used by company like Yahoo, facebook, Youtube etc. to store and process large set of data on commodity hardware. Processing of data is a tough task when we do not know format of data (Structured, Semi Structured and Unstructured). To process structured types of data we used HIVE and for semi structured and unstructured types of data we use PIG.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SURFACE ROUGHNESS EVALUATION OF AA 3003 ALLOY IN SINGLE POINT INCREMENTAL FORMING TECHNIQUE[Full-Text ]
Manish OraonSingle point Incremental forming (SPIF) is an innovative manufacturing process in the area of sheet metal forming process. The technicality of this process is to form a desired shape without dedicated dies and especially advantageous for low volume production or customized parts or rapid prototyping. The present study aims to find the significance of input variables on the surface roughness of the formed part. Six process variables with two levels are considered for deformation of AA3003-O alloy. The experimental runs conducted according to Design of experiment (DOE) Taguchi L8 orthogonal array. The nano scale surface roughness is measured by using atomic force microscopy (AFM).
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
WATER PUMP USING GEAR ARRANGEMENT[Full-Text ]
Mr.A.Kishor, Mr.J.ArunThe major problem for the agriculturists at the present scenario is the Energy crisis. The major source of water for the fields is wells and bore wells. People use pumps to pump out water from wells and bore wells. This process involves lot of energy consumption every day. Our project deals with the process of pumping out water from wells and bore wells using a specially designed gear arrangement and crank mechanism. Our setup does not require any electrical devices and thus thereby the losses are avoided.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparison of Lagrange Method& SPH Method of Numerical Simulation of KFRP Plate Impact by 9mm Projectile[Full-Text ]
Arunesh Kumar Srivastava, K.N.PandeyPresent paper deals with theComparison ofLagrange Method& SPH Method of Numerical Simulation impact of 9mm round nose steel projectile on KFRP (Kevlar fiber reinforced plastic)armour plate using explicit finite element analysis as implemented in ansysautodyn 14.0. This numerical simulation evaluates finite element modeling using both Lagrange and SPH method for representing 6 mm thick KFRP target plate. The impact on KFRP plate has been subjected to a high velocity range of 400- 700m/s. The result concludes that residual velocity and reduction in kinetic energy of Lagrange method is better than SPH method in the contact of projectile impact on KFRP Plate.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Development of Virtual lab Equipment on Cavitation of Centrifugal Pump[Full-Text ]
Dipti Prakash Behera, Vallayil N.A NaikanWeb-based learning process is an essential part in the present education framework. As experimental study is important part of education in science and technology, the concept of E-labs has become part of such frame work. This paper presents the concept of an Elab for understanding the problem of cavitation and for diagnosing the same by vibration monitoring. Cavitation is a typical problem of fluid handling systems such as centrifugal pumps leading to metal erosion and associated problems. A student can do the experiment and interpret the results using the virtual lab in the web.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Assessing the Impact of innovation on growth& economy: A comparative study of India, China and US[Full-Text ]
Bisma Mannan, Dr.Abid HaleemInnovation has driven the United States and now US become most dominant and powerful economy, but due to the globalization, there is a swift growth in the economies in the other part of the world—particularly in China and India. Also, both India and China are gradually becoming engines of growth and global economy and become the highestemergent economies having high GDP rates. This paper is a detailed study of the seven factors (like the economy, culture, government policies, infrastructure, education, demography, and market structure) that drive growth and innovation of India, China and US. In most of the cases the US leads followed by China and then India but in the case of demography, the US and China are both ageings, and especially from an age viewpoint, the plus point go to India. Still, both India and China have vast challenges with the education quality and literacy levels of the personnel in general.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Execution Challenges in Cloud Computing[Full-Text ]
Neha Tyagi, Ajay Rana, Vineet KansalDistributed computing is vital for the present requesting business necessities. The distributed computing idea, with its remarkable highlights, and the three Cloud Service conveyance models are clarified here. The three cloud conveyance models of Software as a Service (SaaS), Platform as an administration (PaaS) and Infrastructure as a Service (IaaS) are investigated with their Inter-conditions and execution contemplations. Cloud reception in the business has execution deterrents, and proposals to defeat these impediments are given while recommending execution matters to the three cloud conveyance models. Execution contemplations are imperative for the general achievement of distributed computing, including the ideal cost of cloud administrations, unwavering quality and adaptability. They require a ton of consideration and attempts by the distributed computing suppliers, integrators and administration buyers.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Bot - God of Tetris[Full-Text ]
Sachin Kumar SahuThis research is an implementation of Artificial Intelligence in a game called Tetris which is done by the use of Reinforcement Learning Specifically Genetic Algorithm. This research provides an overview of the future related developments related to artificial intelligence with the integrated use of genetic algorithm used for wide use or commercial use coming into the real picture. This algorithm focuses developing itself or furthering itself towards the point of perfection. It can also pave the way for revolutionizing existing technology and creating efficient machines through the implementation of genetic algorithms and the data collected by them.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
[1]