{"title":"Extraction of Influencers Across Twitter Using Credibility and Trend Analysis","authors":"Priyansh Sharma, A. Agarwal, Neetu Sardana","doi":"10.1109/IC3.2018.8530462","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530462","url":null,"abstract":"Influence maximization facilitates in selection of individuals that can help in diffusing the information to maximum people in least time. Credible individuals are selected based on twitter or influencer score. This paper proposes a novel method to find the influencers. Scoring is computed using the features of individuals. Generally these features are based on activity; authority and audience of a user on twitter. First, influence score of a person has been computed using the features like retweets, followers, posts etc. Second, tweet score is computed. For tweet score, user tweets are mined to find their opinion about the subject. Further, Trend score is computed using the opinion of public that are extracted by textual data mining to get better insight about the subject in context. Finally, both influence score and tweet score of a person are correlated with the trend score to infer the final influencers.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132363094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Multimedia Based Approach of Classification and Visualisation of Extremist Hotspots","authors":"Naincy Saxena, M. Duggal, Aditya Mishra, S. Singh","doi":"10.1109/IC3.2018.8530547","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530547","url":null,"abstract":"Cyber extremism has become a major predicament in recent years, increasing the amount of research being conducted on it. In this work, we propose a three-staged data and social network-oriented approach to classify videos on YouTube and identify cyber extremism hotspots and visualise their emergence over the years. The first stage consists of building up a corpus by using tweets and audio clips of extremist groups and refining it further using tf-idf. Second stage involves searching extremist videos on Y ouTube with the help of bigrams developed from the corpus made in the previous stage. At the last stage, these videos are manually tagged and later, classified and clustered using Naive Bayes classifier and hierarchical clustering. Finally, locations from the thus extremist labelled videos are identified.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131206289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrity Checking Using Third Party Auditor in Cloud Storage","authors":"Sutirtha Chakraborty, Shubham Singh, Surmila Thokchom","doi":"10.1109/IC3.2018.8530649","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530649","url":null,"abstract":"Cloud computing, nowadays, is one amongst the rapidly developing technologies around the world which provides a variety of services to its users. One of the salient services offered by the cloud to its users is Storage as a Service(STaaS). This service makes its user burden free from the task of storing and maintaining data by allowing him to transfer his data to a remote storage server and access it remotely. The user's data is maintained, managed and backed up by the cloud and is made available to him over the internet. But the main concern while using this type of service is the privacy and integrity of stored data. The data stored at remote locations may be accessed, modified or damaged by an attacker. Users require their data to be safe from all such unauthorized activities hence techniques for data integrity verification are needed to check whether the integrity of stored data is intact or not. Integrity verification is a challenging task because the user doesn't posses the data locally. The proposed scheme checks the integrity of data stored at remote location through a third party auditor using bilinear pairing. Later, aggregation is applied over the proposed scheme for further optimization.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129718090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Development of Integrated Insole System for Gait Analysis","authors":"Abhinandan Aggarwal, Rohit Gupta, R. Agarwal","doi":"10.1109/IC3.2018.8530543","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530543","url":null,"abstract":"An insole system has been developed in this research, which is helpful in acquisition and analysis of gait parameters. Daily auditing is necessary to evaluate the quality of gait before, during and after rehabilitation. Footgear systems have been quite a popular choice for researchers as they are non-invasive with user friendly setup. The designed device analyses gait patterns using FSR type pressure sensors integrated within the shoe insole. The location of the sensors were identified by taking the footprint of the subject in a sandbox and then marking the depressions. The data was logged in each step and parameters were extracted through post processing of the acquired data. Experiments were performed to validate the reliability of the acquired data. The data showed symmetry for a healthy subj ect in terms of similar step length, stride length and velocity. A wireless pressure sensor-based insole system has been developed to monitor gait parameters and critical events. The device was used to calculate different parameters of one subj ect for 4 trials with different terrain/path lengths of 10 meter, 12 meter, 14 meter and 16 meter. The parameters worked out in this study were average stride length as 1.20±0.09 m, average step length as 0.60±0.05 m and average velocity as 0.67±0.03 mlsec along with heel strike and toe-off events for all trials.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127059980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"cKGSA Based Fuzzy Clustering Method for Image Segmentation of RGB-D Images","authors":"H. Mittal, M. Saraswat","doi":"10.1109/IC3.2018.8530568","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530568","url":null,"abstract":"With the introduction of low-cost depth image sensors, reliable image segmentation within RGB-D images is an ambitious goal of computer vision. However, in a cluttered scene, image segmentation has become a challenging problem. This paper presents a novel RGB-D image segmentation method, chaotic kbest gravitational search algorithm based fuzzy clustering (cKGSA-FC). First, the proposed method performs fuzzy clustering using cKGSA on different parameters and feature subsets to obtain multiple optimal clusters. Next, the proposed method combines the multiple clusters through the segmentation by aggregating superpixels (SAS) method on different combinations to generate the final segmentation result. The proposed method is evaluated on the standard RGB-D indoor image dataset namely; NYU depth v2 (NYUD2) and compared with the results obtained by performing fuzzy clustering through three existing clustering methods namely; gravitational search algorithm, fuzzy c-means, and kmeans. The evaluation of the results is done in terms of qualitative and quantitative. Experimental results confirm that the segmentation quality of the proposed method is superior than the compared methods.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127266065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach to Solve Set-Theory Word Problems Automatically","authors":"Arushi Gupta, Medha Sagar, Rishabh Kaushal","doi":"10.1109/IC3.2018.8530494","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530494","url":null,"abstract":"Mathematical Word Problems (MWPs) are verbal formulations of real-world scenarios representing an abstract mathematical idea. They aid us in demonstrating the relevance of mathematics in extrapolating everyday tasks. Set Theory is a field of mathematics that is used to discern the nature of sets and the relations between them. Set-theory operations are binary in nature. They are used to depict the type of association between two sets. In the current scenario, the difference in the levels of abstraction of deriving regular expressions and interpreting natural language poses a challenging task. In this paper, we present a novel approach to solve set-theory based word problems automatically using the semantics of the language. Our system analyzes set-theory questions obtained from various sources of informal text that are crowd sourced such as online forums, social media and competitive examination portals and computes the result by discerning the language of the problem. Our algorithm mimics the paradigm through which humans attempt to solve set-theory MWPs. We discretized our approach into two sub-tasks, information extraction and problem solving, implementing separate evaluation for each stage and subsequently ensuring that the error propagation from one phase to the next is curbed and efficiency for each stage can be individually determined. Our system uses language semantics to identify the set entities in a word problem, and subsequently maps these entities in an expression that embodies the problem. In the problem solving phase, we obtain the final result of the word problem by inferring the relation that is to be determined and implementing the corresponding set-theory function to compute the solution. We corroborated our result for the two phases individually using supervised learning. In the information extraction phase, our system exhibited an accuracy of 83.5% and its performance in the problem solving phase is 60%, which though needs improvement but is a good beginning.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126550025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Forensics Analysis of iOS Social Networking and Messaging Apps","authors":"Arpita Jadhav Bhatt, Chetna Gupta, S. Mittal","doi":"10.1109/IC3.2018.8530576","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530576","url":null,"abstract":"What type of user data are the mobile applications sending? With the plethora of mobile applications available on the online stores, most of the users are unaware about the security risks they may pose. These include breaching end user's privacy by sharing unencrypted private and sensitive data to app's own server or third parties without user's approval. In this research, we tested 70 iOS applications dynamically through network penetration. Out of these, 20 apps were popular social networking and messaging applications. These were analyzed for their runtime behavior and their network traces were used for reconstruction of application layer payload. In about 15 apps out of 20, we were able to trace and reconstruct at least one of the entire message content, user's location, email credentials (including passwords), social networking credentials, profile images or tweeted messages. Apart from that, network traffic of 50 iOS applications was captured to check how end user's data is shared over the network. It was particularly found that many apps share authorized/unauthorized information of app user in unencrypted form. Apart from testing run-time behavior of applications proposed work can be used to warn app developers about unintentional security holes.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115153487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vishnu Srinivasa Murthy Yarlagadda, T. K. R. Jeshventh, M. Zoeb, M. Saumyadip, S. Koolagudi
{"title":"Singer Identification from Smaller Snippets of Audio Clips Using Acoustic Features and DNNs","authors":"Vishnu Srinivasa Murthy Yarlagadda, T. K. R. Jeshventh, M. Zoeb, M. Saumyadip, S. Koolagudi","doi":"10.1109/IC3.2018.8530602","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530602","url":null,"abstract":"Singer identification (SID) is one of the crucial tasks of music information retrieval (MIR). The presence of background accompaniment makes the task little complicated. The performance of SID with the combination of the cepstral and chromagram features has been analyzed in this work. Mel-frequency cepstral coefficients (MFCCs) and linear prediction cepstral features (LPCCs) have been computed as cepstral features and added to 12-dimensional chroma vector which is obtained from chromagram. Two different datasets have been used for experimentation, of which one is standard artist-20 and the other one is Indian singers database, which is proposed by us, with 20 Indian singers. Two different classifiers, namely random forest (RF) and deep neural networks (DNNs) are considered based on their performance in estimating the singers. The proposed approach is found to be efficient even if the input clip is of length five seconds.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134287130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Bag of Features Using AlexNet and Improved Biogeography-Based Optimization for Histopathological Image Analysis","authors":"Raju Pal, M. Saraswat","doi":"10.1109/IC3.2018.8530540","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530540","url":null,"abstract":"Bag of features is an efficacious method for image classification. However, its applicability on histopathological images is still an open ended research problem. In this paper, a novel bag of features based histopathological image classification method is presented. The proposed method involves three steps: (i) Feature extraction using AlexNet, (ii) Optimal visual vocabulary generation using improved biogeography-based optimization, and (iii) Classification using support vector machine. The experimental evaluation is conducted on the standard histopathological image dataset namely; Animal Diagnostics Lab (ADL) dataset having images of three organs as kidney, lung, and spleen. Each organ has inflamed and healthy tissue images. The performance of proposed method is compared with five state-of-the-art histopathological image classification methods in term of precision, recall, F1-score, and overall average accuracy. Simulation results show that the proposed method outperforms other considered state-of-the-art methods.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121168891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amanpreet Kaur, Padam Kumar, Govind P. Gupta, Sangeeta Lal
{"title":"Application of Soft Computing on Localization in Wireless Sensor Networks","authors":"Amanpreet Kaur, Padam Kumar, Govind P. Gupta, Sangeeta Lal","doi":"10.1109/IC3.2018.8530650","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530650","url":null,"abstract":"Localization is identifying coordinates of nodes in Wireless Sensor Networks (WSNs). It is required for almost all kinds of applications. It is of two types-Ranges based and range free. Due to low cost, range free is most preferable solution. Distance-Vector Hop (DV-Hop) is most promising solution in range free algorithms because of its points of interest, however it has low precision. To enhance localization precision, this paper introduces a novel solution that merges soft computing approach such as Particle Swarm Optimization (PSO) and Grey-Wolf Algorithm (GWO) to optimize DV-Hop. The results demonstrate viability of the proposed solution over previous one.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121196894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}