2016 International Conference on Computing Communication Control and automation (ICCUBEA)

12-13 Aug. 2016

Filter Results

Displaying Results 1 - 25 of 179
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • [Title page ii]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (34 KB)

    After the successful organization of The First International Conference on Computing, Communication, Control and Automation (ICCUBEA 2015), The ICCUBEA 2016 is another milestone in the success story. We felt the need of an active platform through which would have qualitative deliberations on the work carried out in domains not limited to computing, communication automation and control. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Our inspiration

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (87 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from chairman

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the principal

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (148 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (193 KB) | HTML iconHTML
    Freely Available from IEEE
  • Patron

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Advisory committee

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • Technical program committee

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Acknowledgement

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (29 KB)

    The Second International Conference on Computing, Communication, Control And Automation-ICCUBEA-2016, organized by Pimpri Chinchwad College of Engineering, Pune has concluded with a huge success. The quality of paper selection process and deliberations, systematic organization and presence of eminent personalities were few highlights of this story. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric authentication using Software as a Service (SaaS) architecture with real-time insights

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (925 KB) | HTML iconHTML

    Passwords are like a shared symmetric secret which the user know and the online service to whom the user needs to authenticate knows. And as a user subscribes to more and more online service, he reuses the secret to authenticate itself. Due to this, now it's not only two who knows the secret, anyone who intercepts the secret, can then reuse into all the online services the user has subscribed. Mor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel communication library for TCP stack

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Message Passing Interface (MPI) has been the predominant standard for writing parallel applications. MPI allows programmers to write a parallel application by handling the communication between a set of processes. The proprietary high performance network, along with the basic functionalities, may provide additional functionalities or may be able to handle some of the MPI functionalities. There is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross Platform C Compiler

    Publication Year: 2016, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    C has always been a preferred language for students entering programming domain. Thus C compiler is an essential utility to be present in a system. As we many times work with cross platform or mobility constraints, traditional C compilers fail to work along. “Cross Platform C Compiler (CPCC)” is a Web-based application which aims to overcome these limitations. Unlike other online compilers, CPCC u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data parallelism for distributed streaming applications

    Publication Year: 2016, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Streaming applications can analyze vast data streams and requires both high throughput and low latency. They are comprised of operator graphs which produce and consume data tuples where operators are stateful, selective and user-defined. The streaming programming model logically exposes task and pipeline parallelism, enabling it to develop parallel systems. Naturally it does not expose data parall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time processing of IoT events using a Software as a Service (SaaS) architecture with graph database

    Publication Year: 2016, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB) | HTML iconHTML

    IoT is a computational notion where each of the tangible objects around are termed as things, which will be connected to other things through the web and will communicate or transfer data between each other. But if the focus is just on the things or devices, than there may be a key ingredient missing, that is all these internet of things are connected to each other. What this entitled is that all ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Division and replication for data with public auditing scheme for cloud storage

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Data Outsourcing in cloud computing, require high security measures as the data may be tampered by illegal users or attackers. This may affect the performance of cloud, as an increase in retrieval time of data. While applying the security measures it is required to take under consideration the retrieval time of data. In this paper, both the issues are tried to overcome by scattering the data file ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Priority based task scheduling by mapping conflict-free resources and Optimized workload utilization in cloud computing

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    Scheduling of task and resources using an efficient task scheduling algorithm improvise the efficiency and throughput of the cloud server. Scheduling in cloud is based on selection of best suitable resources for task execution, by considering various QoS parameters. Priority based task scheduling by mapping conflict-free resources and workload in cloud computing environment is the proposed schedul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction of chemical bond formation using efficient CUDA based HPC framework

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    High Performance Computing (HPC) is now days a keyword which talks about efficient and cost effective computing systems or frameworks. Applications with huge computations are dependent upon the hardware support and the parallel algorithms designed and executing on this hardware. Research in the domain of parallel computing obtain the parallel algorithm which efficiently use the now days available ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Router architecture for the interconnection network: A review

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (666 KB) | HTML iconHTML

    High performance computing are useful in performing colossal amount of computation. Interconnect network is crucial when such a tremendous calculation is happening. In order to perform high speed computation, nodes in the system must be connected with a high speed interconnection network. HPC systems have computation and communication parts and performance is limited by communication network rathe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving data storage security in cloud environment using public auditing and threshold cryptography scheme

    Publication Year: 2016, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    Cloud Computing is a framework where services are provided to the clients on pay per use basis. Many of the organizations uses cloud servers for outsourcing their sensitive data. Along with all the advantages of cloud computing there comes a threat of security of sensitive outsourced data. Cloud users cannot rely only on cloud service provider for the security reasons of the outsourced data. On th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.