2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)最新文献

筛选
英文 中文
Learning needs for special needs learners: A graph based adaptive approach for content sequencing 特殊需求学习者的学习需求:基于图的内容排序自适应方法
J. Roman, Devarshi Mehta, P. Sajja
{"title":"Learning needs for special needs learners: A graph based adaptive approach for content sequencing","authors":"J. Roman, Devarshi Mehta, P. Sajja","doi":"10.1109/ICSOFTCOMP.2017.8280090","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280090","url":null,"abstract":"This paper considers a graph based adaptive approach for sequencing of learning objects for Special Needs Learners (SNL) in customized manner. The proposed algorithm traverses the nodes of the graph containing learning content topics in effective manner. This approach ensures not only customized learning for special needs learners, but also imparts some level of intelligence in the process of learning. The SNL goes through the necessary nodes on the graph form the first node of the learning module (priority based) to the last learning module considering the priorities and needs of the learners and obtains the optimal solution for the SNL. The algorithm is designed in such a way that the learning process and outcome are inline with the predefined curriculum. The curriculum is a tailor made collaboration of various independent and reusable learning modules as per the personalized requirements and the learning ability of the SNL. The paper also proposes the parameters that would contribute for the personalized learning of the SNL.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132911248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure and efficient group based data retrieval from cloud storage using obfuscation and data mining techniques 使用混淆和数据挖掘技术从云存储中安全高效的基于组的数据检索
K. Suthar, Hiral B. Patel
{"title":"Secure and efficient group based data retrieval from cloud storage using obfuscation and data mining techniques","authors":"K. Suthar, Hiral B. Patel","doi":"10.1109/ICSOFTCOMP.2017.8280087","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280087","url":null,"abstract":"In current era of Computer world everyone wants a quick access of data from anywhere and on anytime. Cloud computing provides lots of benefits to user at cheaper cost and whenever required. On one side thousand number of users information become available on central premises and able to achieve location independency where as on other side this generate issues related to data security as well as quick retrieval of information by analyzing user documents. These issues are not directly under the control of user. If we don't take proper care while retrieving of relevant information from the document of thousands of users then it becomes very tedious process. It is also crucial to secure user information on cloud storage from unauthorized access. When user needs to search something, it will be searched in every available document which takes large amount of time making user job wearisome. Hence to accost revealed important issues, here we proposed an efficient secure searching mechanism in which user can get require details quickly without getting any type of burden. Our proposed scheme deals with efficient searching and securing user information in Cloud environment which increase trust level as well as adoption of Cloud.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117324898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image segmentation improvement by reversible segment merging 基于可逆段合并的图像分割改进
I. Khanykov, M. Kharinov, Chirag Patel
{"title":"Image segmentation improvement by reversible segment merging","authors":"I. Khanykov, M. Kharinov, Chirag Patel","doi":"10.1109/ICSOFTCOMP.2017.8280096","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280096","url":null,"abstract":"The paper focuses on image segmentation by means of approaching by piecewise-constant approximations. The objective is the improvement of the segmented image, expressed in the noticeable drop of image approximation error (total squared error). The proposed method involves segment dividing into two in some image part and merge of a pair of adjacent segments in another image part, keeping a total segment number constant. For further enhancement of the segmentation, the proposed method is used in combination with advanced K-means method. The steep decline of the approximation error is provided along with obvious increase of perceptual quality of image segmentation. The effect is achieved owing to binary adaptive hierarchy of nested segments, generated for each segment. The segmentation improvement method is usable for the advancement of the computer vision systems using conventional segmentation by partitioning image into connected segments.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129059161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Analysis of dimensionality reduced local directional pattern on different scales 不同尺度下的降维局部方向图分析
R. Perumal, P. Mouli
{"title":"Analysis of dimensionality reduced local directional pattern on different scales","authors":"R. Perumal, P. Mouli","doi":"10.1109/ICSOFTCOMP.2017.8280095","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280095","url":null,"abstract":"This paper affords an analysis of a novel local descriptor-dimensionality reduced local directional Pattern (DR-LDP) on different scales. DR-LDP extracts the features of the face by partitioning the image into 3 χ 3 sub-regions and the sub-region was convoluted with a set of eight Kirsch masks. The single eight-bit code generated for each sub-region. The histogram features are extracted by partitioning the resultant DR-LDP encoded image into 8 × 8 regions. The features of each regions are combined to form a feature vector for the given facial image. For any query image, the same process is carried out to extract the feature vector. A chi-square test is used to measure the dissimilarity of the feature, the dissimilarity of feature vector in the database with the feature vector of query image was determined to recognize the face. The experiments had been accomplished on well-known benchmark databases. In this paper, an analysis of DR-LDP on 3 χ 3, 5 χ 5, 7 χ 7 regions and convultes each region with 3 × 3, 5 × 5, 7 × 7 eight Kirsch masks are performed to test the robustness of it. From the analysis, it is evident that the DR-LDP performs the best for the scale 3 χ 3.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133270770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of motion based and feature based algorithms for object detection and tracking 基于运动和基于特征的目标检测和跟踪算法的比较分析
Bhaumik Vaidya, C. Paunwala
{"title":"Comparative analysis of motion based and feature based algorithms for object detection and tracking","authors":"Bhaumik Vaidya, C. Paunwala","doi":"10.1109/ICSOFTCOMP.2017.8280088","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280088","url":null,"abstract":"Object detection and tracking in the video sequence is a challenging task and time consuming process. Intrinsic factors like pose, appearance, variation in scale and extrinsic factors like variation in illumination, occlusion and clutter are major factors effecting this task. The main aim of this work is to implement and compare different algorithms in challenging conditions and find the algorithm that performs very efficiently on real time videos. In this paper, two motion based algorithms Zivkovic Adaptive Gaussian Mixture Model (ADGMM) and Grimson Gaussian Mixture Models (GGMM) and two feature based algorithms Speeded up Robust features (SURF) and Haar Cascade are implemented. The comparison of these algorithms in real life challenges and application is done to find out suitable algorithm for a particular application.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130497524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security against malicious node in the vehicular cloud computing using a software-defined networking architecture 基于软件定义网络架构的车载云计算中针对恶意节点的安全防护
Mhidi Bousselham, Abderrahim Abdellaoui, H. Chaoui
{"title":"Security against malicious node in the vehicular cloud computing using a software-defined networking architecture","authors":"Mhidi Bousselham, Abderrahim Abdellaoui, H. Chaoui","doi":"10.1109/ICSOFTCOMP.2017.8280084","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280084","url":null,"abstract":"Recently Vehicular Cloud Computing (VCC) has become a significant research area, due to its potential to ensure passenger comfort and improve road safety. It has emerged as a promising technology that leverages the cloud computing functionalities to exploit vehicles underutilized computational, storage and communications. However, it has recently shown that the VCC might be vulnerable to various kinds of attacks, due to the public nature of its network. Therefore, ensuring security and privacy in this paradigm is considered as one of its most important challenges. In this paper, we exploit software-defined network (SDN) technology to design a new security approach that protects vehicles from malicious nodes, using pseudonyms, key management and revocation list which provides authentication, confidentiality, integrity and Availability.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133126427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Revolution in networks of smart objects: Social Internet of Things 智能物联网的革命:社交物联网
Kinjal Rabadiya, Ashwin Makwana, S. Jardosh
{"title":"Revolution in networks of smart objects: Social Internet of Things","authors":"Kinjal Rabadiya, Ashwin Makwana, S. Jardosh","doi":"10.1109/ICSOFTCOMP.2017.8280086","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280086","url":null,"abstract":"Nowadays Internet of Things gives a high comfort level to human life by providing connectivity between objects with a human being. People are also connected with each other via Social Network. There are many researches are being conducted on an integration of Social Network with Internet of Things. This new paradigm knows as “Social Internet of Things”. Internet of Things has many limitations so to overcome it Social IoT can be used. Social IoT provides network of objects with security, navigability and scalability by converting “Smart” objects to “Social” object. Social IoT provides all social network services and best comfort level using IoT. In this way, Social IoT has two separate layers as a network of people and network of smart objects and still, Social IoT paradigm can be represented as a field of state of art in IoT and Social Network and simulations. In this paper, we have contributed the implementation of Social IoT with history of Intranet of Things to Social IoT, Social IoT architectures, various relationships of Smart objects with each other, different policies, challenges and applications etc.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123263828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Keynote: Next generation internet, data science, & soft computing 主题演讲:下一代互联网、数据科学和软计算
Ashish Ghosh
{"title":"Keynote: Next generation internet, data science, & soft computing","authors":"Ashish Ghosh","doi":"10.1109/ICSOFTCOMP.2017.8280074","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280074","url":null,"abstract":"The Internet used today can be described as a network of computers, which connecats one user to others around the globe. Most of the usage and application of the “Internet of Computers” involves human intervention. The future of the Internet would be — a world where manual intervention for the objects on the network could be minimized and its functionalities would be automatic and smart. This internet would not only connect computers and smart phones; it would be a network of smart objects, the “Internet of Things”. These “things” would be smart enough to sense, process and decide a corresponding action, Examples include smart appliances (refrigerator, lights, air conditioners), traffic signals, smart body monitors, etc. The individual objects along with the network would collect process and exchange data strategically. This interconnected network along with all the smart objects working together in correspondence with each other form a larger “Cyber Physical System” (like smart cities, smart hospital, etc.). A working CPS would generate tons of data, hence efficient processing and effective use of this data is very crucial. There will be data from everywhere like climate data, social network data, video data, medical data, scientific data, etc. Storing these data for analytics may not always be feasible and analyzing them in real time will also be too difficult. Traditional analysis tools are not well suited to capture the complete essence of this massive data. The volume, velocity and variety is too large for comprehensive analysis, and the range of potential correlations and relationships between disparate data sources are too great for any analyst to test all hypotheses and derive all the value buried in the data. Some algorithms already have good capability of letting computers do the heavy thinking for us in case of smaller data. But, we are striving for more to deal with large volumes of such data in a short time. Therefore, we need to revisit old algorithms from statistics, machine learning, data mining and big data analytics and improvise them to tame such big data. Major innovations in big data analytics are still to take place; but, it is believed that emergence of such novel analytics is to come in near future from various domains. Soft computing tools, nature inspired algorithms, are likely to play a key role in this regard.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127475714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Soft computing framework for assessment of water quality in distribution network 配电网水质评价的软计算框架
Jyotirmoy Bhardwaj, K. K. Gupta, R. Gupta
{"title":"Soft computing framework for assessment of water quality in distribution network","authors":"Jyotirmoy Bhardwaj, K. K. Gupta, R. Gupta","doi":"10.1109/ICSOFTCOMP.2017.8280093","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280093","url":null,"abstract":"Modern techniques are replacing traditional methods of water quality parameter measurement systems. Continuous effective online monitoring with user friendly decision support system is one of the essential challenges of water quality monitoring system. To achieve the goal of development of user friendly decision support system for monitoring of potable water in distribution network, this paper introduces soft computing framework, mainly consist of Python programming framework and fuzzy sets. In so far, we have exploited the properties of NumPy and Matplotlib libraries of Python for user interface and fuzzy sets for decision support system. The proposed decision support system collects and utilizes the data points generated from integrated Multi Sensor Array and process the obtained data set through rule based fuzzy sets. Effective user interface and decision making are essential prerequisite of any decision support system. Therefore, we developed Rule Based Decision Support System (RBDSS) strategy to measure the extent of potability of water in distribution network. Based on extensive research, five water quality parameters has been considered to implement decision support system i.e pH, Dissolved Oxygen (D.O.), Electrical Conductivity (E.C.), Oxygen Reduction Potential (O.R.P) and Temperature. The conducted study to test the feasibility of proposed decision support system testify the plausibility of framework in water quality distribution network.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116839921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TIER: Table index evaluator and recommender — A proposed model to improve transaction performance in distributed heterogeneous database TIER:表索引评估器和推荐器——一种在分布式异构数据库中提高事务性能的提议模型
Shefali Naik
{"title":"TIER: Table index evaluator and recommender — A proposed model to improve transaction performance in distributed heterogeneous database","authors":"Shefali Naik","doi":"10.1109/ICSOFTCOMP.2017.8280085","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280085","url":null,"abstract":"Use of appropriate indexing improves the performance of transactions in heterogeneous distributed database whereas inappropriate or no indexing deteriorates the same. Properly designed index leads to faster data access which ultimately improves the execution of transactions. Various relational database management systems and third party tools exist which provide suggestion for index management, but up to certain limits. These tools provide index suggestion with limited and simple queries. They do not analyze or suggest index for aggregate queries, sub queries and other complicated queries. The applications which access data from heterogeneous databases using such type queries need an index evaluator and recommender. To develop a good index evaluator and recommender a model is proposed in this paper on the basis of survey and literature review of existing methods. The survey has been conducted from the experienced people of IT industry to find out the feasibility of proposed model. The tool which is going to be developed from this model will be useful to improve the performance of heterogeneous distributed database transactions and will contribute in resolving index Selection Problem.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128252456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信