2018 Eleventh International Conference on Contemporary Computing (IC3)最新文献

筛选
英文 中文
Extraction of Influencers Across Twitter Using Credibility and Trend Analysis 利用可信度和趋势分析提取推特上的影响者
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530462
Priyansh Sharma, A. Agarwal, Neetu Sardana
{"title":"Extraction of Influencers Across Twitter Using Credibility and Trend Analysis","authors":"Priyansh Sharma, A. Agarwal, Neetu Sardana","doi":"10.1109/IC3.2018.8530462","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530462","url":null,"abstract":"Influence maximization facilitates in selection of individuals that can help in diffusing the information to maximum people in least time. Credible individuals are selected based on twitter or influencer score. This paper proposes a novel method to find the influencers. Scoring is computed using the features of individuals. Generally these features are based on activity; authority and audience of a user on twitter. First, influence score of a person has been computed using the features like retweets, followers, posts etc. Second, tweet score is computed. For tweet score, user tweets are mined to find their opinion about the subject. Further, Trend score is computed using the opinion of public that are extracted by textual data mining to get better insight about the subject in context. Finally, both influence score and tweet score of a person are correlated with the trend score to infer the final influencers.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132363094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Multimedia Based Approach of Classification and Visualisation of Extremist Hotspots 一种基于多媒体的极端主义热点分类与可视化新方法
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530547
Naincy Saxena, M. Duggal, Aditya Mishra, S. Singh
{"title":"A Novel Multimedia Based Approach of Classification and Visualisation of Extremist Hotspots","authors":"Naincy Saxena, M. Duggal, Aditya Mishra, S. Singh","doi":"10.1109/IC3.2018.8530547","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530547","url":null,"abstract":"Cyber extremism has become a major predicament in recent years, increasing the amount of research being conducted on it. In this work, we propose a three-staged data and social network-oriented approach to classify videos on YouTube and identify cyber extremism hotspots and visualise their emergence over the years. The first stage consists of building up a corpus by using tweets and audio clips of extremist groups and refining it further using tf-idf. Second stage involves searching extremist videos on Y ouTube with the help of bigrams developed from the corpus made in the previous stage. At the last stage, these videos are manually tagged and later, classified and clustered using Naive Bayes classifier and hierarchical clustering. Finally, locations from the thus extremist labelled videos are identified.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131206289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrity Checking Using Third Party Auditor in Cloud Storage 云存储第三方审计完整性检查
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530649
Sutirtha Chakraborty, Shubham Singh, Surmila Thokchom
{"title":"Integrity Checking Using Third Party Auditor in Cloud Storage","authors":"Sutirtha Chakraborty, Shubham Singh, Surmila Thokchom","doi":"10.1109/IC3.2018.8530649","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530649","url":null,"abstract":"Cloud computing, nowadays, is one amongst the rapidly developing technologies around the world which provides a variety of services to its users. One of the salient services offered by the cloud to its users is Storage as a Service(STaaS). This service makes its user burden free from the task of storing and maintaining data by allowing him to transfer his data to a remote storage server and access it remotely. The user's data is maintained, managed and backed up by the cloud and is made available to him over the internet. But the main concern while using this type of service is the privacy and integrity of stored data. The data stored at remote locations may be accessed, modified or damaged by an attacker. Users require their data to be safe from all such unauthorized activities hence techniques for data integrity verification are needed to check whether the integrity of stored data is intact or not. Integrity verification is a challenging task because the user doesn't posses the data locally. The proposed scheme checks the integrity of data stored at remote location through a third party auditor using bilinear pairing. Later, aggregation is applied over the proposed scheme for further optimization.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129718090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and Development of Integrated Insole System for Gait Analysis 步态分析集成鞋垫系统的设计与开发
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530543
Abhinandan Aggarwal, Rohit Gupta, R. Agarwal
{"title":"Design and Development of Integrated Insole System for Gait Analysis","authors":"Abhinandan Aggarwal, Rohit Gupta, R. Agarwal","doi":"10.1109/IC3.2018.8530543","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530543","url":null,"abstract":"An insole system has been developed in this research, which is helpful in acquisition and analysis of gait parameters. Daily auditing is necessary to evaluate the quality of gait before, during and after rehabilitation. Footgear systems have been quite a popular choice for researchers as they are non-invasive with user friendly setup. The designed device analyses gait patterns using FSR type pressure sensors integrated within the shoe insole. The location of the sensors were identified by taking the footprint of the subject in a sandbox and then marking the depressions. The data was logged in each step and parameters were extracted through post processing of the acquired data. Experiments were performed to validate the reliability of the acquired data. The data showed symmetry for a healthy subj ect in terms of similar step length, stride length and velocity. A wireless pressure sensor-based insole system has been developed to monitor gait parameters and critical events. The device was used to calculate different parameters of one subj ect for 4 trials with different terrain/path lengths of 10 meter, 12 meter, 14 meter and 16 meter. The parameters worked out in this study were average stride length as 1.20±0.09 m, average step length as 0.60±0.05 m and average velocity as 0.67±0.03 mlsec along with heel strike and toe-off events for all trials.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127059980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
cKGSA Based Fuzzy Clustering Method for Image Segmentation of RGB-D Images 基于cKGSA的RGB-D图像模糊聚类分割方法
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530568
H. Mittal, M. Saraswat
{"title":"cKGSA Based Fuzzy Clustering Method for Image Segmentation of RGB-D Images","authors":"H. Mittal, M. Saraswat","doi":"10.1109/IC3.2018.8530568","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530568","url":null,"abstract":"With the introduction of low-cost depth image sensors, reliable image segmentation within RGB-D images is an ambitious goal of computer vision. However, in a cluttered scene, image segmentation has become a challenging problem. This paper presents a novel RGB-D image segmentation method, chaotic kbest gravitational search algorithm based fuzzy clustering (cKGSA-FC). First, the proposed method performs fuzzy clustering using cKGSA on different parameters and feature subsets to obtain multiple optimal clusters. Next, the proposed method combines the multiple clusters through the segmentation by aggregating superpixels (SAS) method on different combinations to generate the final segmentation result. The proposed method is evaluated on the standard RGB-D indoor image dataset namely; NYU depth v2 (NYUD2) and compared with the results obtained by performing fuzzy clustering through three existing clustering methods namely; gravitational search algorithm, fuzzy c-means, and kmeans. The evaluation of the results is done in terms of qualitative and quantitative. Experimental results confirm that the segmentation quality of the proposed method is superior than the compared methods.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127266065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Novel Approach to Solve Set-Theory Word Problems Automatically 一种自动求解集合论词问题的新方法
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530494
Arushi Gupta, Medha Sagar, Rishabh Kaushal
{"title":"A Novel Approach to Solve Set-Theory Word Problems Automatically","authors":"Arushi Gupta, Medha Sagar, Rishabh Kaushal","doi":"10.1109/IC3.2018.8530494","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530494","url":null,"abstract":"Mathematical Word Problems (MWPs) are verbal formulations of real-world scenarios representing an abstract mathematical idea. They aid us in demonstrating the relevance of mathematics in extrapolating everyday tasks. Set Theory is a field of mathematics that is used to discern the nature of sets and the relations between them. Set-theory operations are binary in nature. They are used to depict the type of association between two sets. In the current scenario, the difference in the levels of abstraction of deriving regular expressions and interpreting natural language poses a challenging task. In this paper, we present a novel approach to solve set-theory based word problems automatically using the semantics of the language. Our system analyzes set-theory questions obtained from various sources of informal text that are crowd sourced such as online forums, social media and competitive examination portals and computes the result by discerning the language of the problem. Our algorithm mimics the paradigm through which humans attempt to solve set-theory MWPs. We discretized our approach into two sub-tasks, information extraction and problem solving, implementing separate evaluation for each stage and subsequently ensuring that the error propagation from one phase to the next is curbed and efficiency for each stage can be individually determined. Our system uses language semantics to identify the set entities in a word problem, and subsequently maps these entities in an expression that embodies the problem. In the problem solving phase, we obtain the final result of the word problem by inferring the relation that is to be determined and implementing the corresponding set-theory function to compute the solution. We corroborated our result for the two phases individually using supervised learning. In the information extraction phase, our system exhibited an accuracy of 83.5% and its performance in the problem solving phase is 60%, which though needs improvement but is a good beginning.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126550025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Forensics Analysis of iOS Social Networking and Messaging Apps iOS社交网络和消息应用的网络取证分析
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530576
Arpita Jadhav Bhatt, Chetna Gupta, S. Mittal
{"title":"Network Forensics Analysis of iOS Social Networking and Messaging Apps","authors":"Arpita Jadhav Bhatt, Chetna Gupta, S. Mittal","doi":"10.1109/IC3.2018.8530576","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530576","url":null,"abstract":"What type of user data are the mobile applications sending? With the plethora of mobile applications available on the online stores, most of the users are unaware about the security risks they may pose. These include breaching end user's privacy by sharing unencrypted private and sensitive data to app's own server or third parties without user's approval. In this research, we tested 70 iOS applications dynamically through network penetration. Out of these, 20 apps were popular social networking and messaging applications. These were analyzed for their runtime behavior and their network traces were used for reconstruction of application layer payload. In about 15 apps out of 20, we were able to trace and reconstruct at least one of the entire message content, user's location, email credentials (including passwords), social networking credentials, profile images or tweeted messages. Apart from that, network traffic of 50 iOS applications was captured to check how end user's data is shared over the network. It was particularly found that many apps share authorized/unauthorized information of app user in unencrypted form. Apart from testing run-time behavior of applications proposed work can be used to warn app developers about unintentional security holes.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115153487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Singer Identification from Smaller Snippets of Audio Clips Using Acoustic Features and DNNs 利用声学特征和dnn从更小的音频片段中识别歌手
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530602
Vishnu Srinivasa Murthy Yarlagadda, T. K. R. Jeshventh, M. Zoeb, M. Saumyadip, S. Koolagudi
{"title":"Singer Identification from Smaller Snippets of Audio Clips Using Acoustic Features and DNNs","authors":"Vishnu Srinivasa Murthy Yarlagadda, T. K. R. Jeshventh, M. Zoeb, M. Saumyadip, S. Koolagudi","doi":"10.1109/IC3.2018.8530602","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530602","url":null,"abstract":"Singer identification (SID) is one of the crucial tasks of music information retrieval (MIR). The presence of background accompaniment makes the task little complicated. The performance of SID with the combination of the cepstral and chromagram features has been analyzed in this work. Mel-frequency cepstral coefficients (MFCCs) and linear prediction cepstral features (LPCCs) have been computed as cepstral features and added to 12-dimensional chroma vector which is obtained from chromagram. Two different datasets have been used for experimentation, of which one is standard artist-20 and the other one is Indian singers database, which is proposed by us, with 20 Indian singers. Two different classifiers, namely random forest (RF) and deep neural networks (DNNs) are considered based on their performance in estimating the singers. The proposed approach is found to be efficient even if the input clip is of length five seconds.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134287130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Enhanced Bag of Features Using AlexNet and Improved Biogeography-Based Optimization for Histopathological Image Analysis 使用AlexNet增强特征包和改进的基于生物地理的组织病理学图像分析优化
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530540
Raju Pal, M. Saraswat
{"title":"Enhanced Bag of Features Using AlexNet and Improved Biogeography-Based Optimization for Histopathological Image Analysis","authors":"Raju Pal, M. Saraswat","doi":"10.1109/IC3.2018.8530540","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530540","url":null,"abstract":"Bag of features is an efficacious method for image classification. However, its applicability on histopathological images is still an open ended research problem. In this paper, a novel bag of features based histopathological image classification method is presented. The proposed method involves three steps: (i) Feature extraction using AlexNet, (ii) Optimal visual vocabulary generation using improved biogeography-based optimization, and (iii) Classification using support vector machine. The experimental evaluation is conducted on the standard histopathological image dataset namely; Animal Diagnostics Lab (ADL) dataset having images of three organs as kidney, lung, and spleen. Each organ has inflamed and healthy tissue images. The performance of proposed method is compared with five state-of-the-art histopathological image classification methods in term of precision, recall, F1-score, and overall average accuracy. Simulation results show that the proposed method outperforms other considered state-of-the-art methods.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121168891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Application of Soft Computing on Localization in Wireless Sensor Networks 软计算在无线传感器网络定位中的应用
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530650
Amanpreet Kaur, Padam Kumar, Govind P. Gupta, Sangeeta Lal
{"title":"Application of Soft Computing on Localization in Wireless Sensor Networks","authors":"Amanpreet Kaur, Padam Kumar, Govind P. Gupta, Sangeeta Lal","doi":"10.1109/IC3.2018.8530650","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530650","url":null,"abstract":"Localization is identifying coordinates of nodes in Wireless Sensor Networks (WSNs). It is required for almost all kinds of applications. It is of two types-Ranges based and range free. Due to low cost, range free is most preferable solution. Distance-Vector Hop (DV-Hop) is most promising solution in range free algorithms because of its points of interest, however it has low precision. To enhance localization precision, this paper introduces a novel solution that merges soft computing approach such as Particle Swarm Optimization (PSO) and Grey-Wolf Algorithm (GWO) to optimize DV-Hop. The results demonstrate viability of the proposed solution over previous one.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121196894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信