2015 IEEE International Advance Computing Conference (IACC)最新文献

筛选
英文 中文
Recommender system based on Hierarchical Clustering algorithm Chameleon 基于分层聚类算法的变色龙推荐系统
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154856
Utkarsh Gupta, Nagamma Patil
{"title":"Recommender system based on Hierarchical Clustering algorithm Chameleon","authors":"Utkarsh Gupta, Nagamma Patil","doi":"10.1109/IADCC.2015.7154856","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154856","url":null,"abstract":"Recommender Systems are becoming inherent part of today's e-commerce applications. Since recommender system has a direct impact on the sales of many products therefore Recommender system plays an important role in e-commerce. Collaborative filtering is the oldest techniques used in the recommender system. A lot of work has been done towards the improvement of collaborative filtering which comprises of two components User Based and Item Based. The basic necessity of today's recommender system is accuracy and speed. In this work an efficient technique for recommender system based on Hierarchical Clustering is proposed. The user or item specific information is grouped into a set of clusters using Chameleon Hierarchical clustering algorithm. Further voting system is used to predict the rating of a particular item. In order to evaluate the performance of Chameleon based recommender system, it is compared with existing technique based on K-means clustering algorithm. The results demonstrates that Chameleon based Recommender system produces less error as compared to K-means based Recommender System.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"168 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122942239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Validation of real time complex algorithms using fault model analyses 基于故障模型分析的实时复杂算法验证
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154794
S. B. Sumeeth, J. Jayanthi, Manju Nanda, A. Avinash
{"title":"Validation of real time complex algorithms using fault model analyses","authors":"S. B. Sumeeth, J. Jayanthi, Manju Nanda, A. Avinash","doi":"10.1109/IADCC.2015.7154794","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154794","url":null,"abstract":"In the recent times with the increasing affect of malfunctioning of software developed using conventional approach on the world of embedded computer based systems, the use of model based approach is often advocated as a means of increasing confidence in such systems. Designing and validating real time systems using models helps to improve system safety, and reliability.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123023213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient approximate 2D Gaussian smoothing filter for error tolerant applications 用于容错应用的节能近似二维高斯平滑滤波器
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154815
S. Kaushik, N. Kumar
{"title":"Energy-efficient approximate 2D Gaussian smoothing filter for error tolerant applications","authors":"S. Kaushik, N. Kumar","doi":"10.1109/IADCC.2015.7154815","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154815","url":null,"abstract":"Present multimedia applications demand highly energy-efficient devices due to need of intensive computation. Most filtering applications engage 2D gaussian smooth filter which is slow and severely affects the performance. In this paper, we propose a novel energy efficient approximate 2D gaussian smoothing filter. The proposed approach is based on “Mirror Short Pixel Approximation” and rounding-off gaussian kernel coefficients. In Mirror Short Pixel Approximation the elements of input image block is replaced via mirror pixel value. The proposed approach is modelled in high level language to check efficacy on benchmark image, which results in minor degradation of image quality. The proposed design is realized on Virtex 6 FPGA. The Simulation results show reduction of 85%, 8%, 58% in area, power and delay respectively compared to existing approximate 2D gaussian smooth filter.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129933779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Model for improving relevant Feature Extraction for Opinion Summarization 改进意见摘要相关特征提取的模型
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154660
Ashwini Rao, K. Shah
{"title":"Model for improving relevant Feature Extraction for Opinion Summarization","authors":"Ashwini Rao, K. Shah","doi":"10.1109/IADCC.2015.7154660","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154660","url":null,"abstract":"The growth of E commerce has led to the abundance growth of opinions on the web, thereby necessitating the task of Opinion Summarization, which in turn has great commercial significance. Feature extraction in Opinion Summarization is very crucial as selection of relevant features reduce the feature space which successfully reduces the complexity of the classification task. The paper suggests extensive pre-processing technique & an algorithm for extracting features from Reviews/Blogs. The proposed technique of Feature Extraction is unsupervised, automated and also domain independent. The improved effectiveness of the proposed approach is demonstrated on a real life dataset that is crawled from many reviewing websites such as CNET, Amazon etc.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128349969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Signature verification using Java - Python for small computational devices 签名验证使用Java - Python为小型计算设备
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154788
Savita Choudhary, Siddanth Kaul, Shridhar Mishra, J. B. Arun
{"title":"Signature verification using Java - Python for small computational devices","authors":"Savita Choudhary, Siddanth Kaul, Shridhar Mishra, J. B. Arun","doi":"10.1109/IADCC.2015.7154788","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154788","url":null,"abstract":"This paper identifies an innovative design for signature verification which is able to extract features from an individual's signatures and uses those feature sets to discriminate genuine signatures from forgeries. An innovative JAVA-PYTHON platform is used for the development. Detailed feature study, algorithm development and feature set verification is carried out during this experiment.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129145239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust and dynamic image zero watermarking using hessian laplace detector and logistic map 基于hessian拉普拉斯检测器和logistic映射的鲁棒动态图像零水印
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154841
M. Dhoka, A. Patki
{"title":"Robust and dynamic image zero watermarking using hessian laplace detector and logistic map","authors":"M. Dhoka, A. Patki","doi":"10.1109/IADCC.2015.7154841","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154841","url":null,"abstract":"In this digital world due to rapid growth in image processing technology and internet, Piracy of the images is becoming more and more serious problem. In order to prohibit such piracy, watermarking is widely used approach. In conventional watermarking, watermark is inserted in host image by modifying its original information. This approach creates a trade-off between robustness and imperceptibility. To overcome this, zero watermarking is used. In this process instead of embedding watermark, it is created using host image and original watermark of ownership identification. Zero Watermarking does not alter original information of the image and provides perfect imperceptibility. In this paper we are proposing a robust and dynamic zero watermarking using Hessian Laplace Detector and Logistic map. Here, Feature points of host image are detected using Hessian Laplace detector and used along with original watermark of ownership identity for constructing zero-watermark. Finally constructed zero-watermark is scrambled using Logistic map to improve its security before storing it into database. Our dynamic approach lets original watermark size to be solely decided by total number of detected feature points and all pixels of original watermark to be used for creating zero-watermark. We have compared our algorithm with previous work and got better reconstruction of original watermark under noise, filtering, compression, translation and cropping attacks.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123647083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the optimization of key revocation schemes for network telemetry data distribution 网络遥测数据分发密钥撤销方案的优化研究
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154765
Bhanu Prakash Gopularam, N. Nalini
{"title":"On the optimization of key revocation schemes for network telemetry data distribution","authors":"Bhanu Prakash Gopularam, N. Nalini","doi":"10.1109/IADCC.2015.7154765","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154765","url":null,"abstract":"Consider a cloud deployment where the organizational network pertaining to a tenant having routers, switches sharing network telemetry data on regular basis. Among different ways of managing networks flow-based network monitoring is most sought after approach because of accuracy and economies of scale. In the event of host compromise the device credentials are revoked thereby disabling its ability to read future communications. Broadcast Encryption techniques having strong key revocation mechanism can be used in this context. Waters et. al [?] is one the broadcast encryption schemes which facilitate efficient sharing using small size keys and the related Attribute-Based Encryption scheme uses dual encryption technique and is capable of handling non-monotonous access structure again with small keys. In this paper we experiment with broadcast encryption and attribute based encryotion schemes with real-time network telemetry data and provide detailed analysis of performace. Though the original scheme provides smaller keys, few changes to the algorithm improves the performance and efficiency and makes it acceptable for large scale usage. We found the optimized scheme is 20% more performant than inital scheme.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"863 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bi-modal Image segmentation by active shape model 基于主动形状模型的双峰图像分割
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154683
Prashant A. Athavale, P. Puttaswamy
{"title":"Bi-modal Image segmentation by active shape model","authors":"Prashant A. Athavale, P. Puttaswamy","doi":"10.1109/IADCC.2015.7154683","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154683","url":null,"abstract":"This paper deals with Bi-modal Image segmentation with active shape model. This method has been applied to varieties of segmentation problems, where considerable information about the shape is available. The discussion about the implementation on a set of both synthetic and natural bimodal images is presented.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121708852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Establishment of equivalence between two degraded document images 两个退化文档图像之间等效性的建立
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154826
Muralidhara Mallur, P. Nagabhushan, S. D. Gowda
{"title":"Establishment of equivalence between two degraded document images","authors":"Muralidhara Mallur, P. Nagabhushan, S. D. Gowda","doi":"10.1109/IADCC.2015.7154826","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154826","url":null,"abstract":"With the advent of Information Technology, large volume of hardcopy documents are being scanned and stored as document images. Due to the age of source document, quality of the ink and recurring photo copies of same source, the document images generated are degraded in quality. Degraded document images obtained from different sources are stored in different places depending on the requirement of images for various purposes. This leads to storage of multiple copies of same document image with variations in degradation. Establishment of equivalence between two degraded document images using Optical Character Recognizer (OCR) is not possible as OCR fails to recognize the characters in degraded conditions. In this paper, a novel approach has been proposed to establish equivalence between two degraded document images based on layout and content structure. Through projection profile, the number of components and the occurrence of components in the document images are compared correspondingly to establish layout equivalence. The components at paragraph level are compared based on foreground density and entropy quantifier to establish content structure equivalence. The efficacy of the proposed model is tested over variety of degraded document images.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125474319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parameters tuning of OLSR routing protocol with metaheuristic algorithm for VANET 基于VANET元启发式算法的OLSR路由协议参数调优
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154894
Anusha Bandi, B. Chandrashekhar
{"title":"Parameters tuning of OLSR routing protocol with metaheuristic algorithm for VANET","authors":"Anusha Bandi, B. Chandrashekhar","doi":"10.1109/IADCC.2015.7154894","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154894","url":null,"abstract":"Vehicular Adhoc Network provides ability to wirelessly communicate between vehicles. Network fragmentations and frequent topology changes (Mobility of the nodes) and limited coverage of Wi-Fi, are issues in VANET, that arise due to absence of central manager entity. Because of these reasons, routing the packets within the network is difficult task. Hence, provisioning an adept routing strategy is vital for the deployment of VANETs. The optimized link state routing is a well-known mobile adhoc network routing protocol. In this paper, we are proposing an optimization strategy to fine-tune few parameters by configuring the OLSR protocol using metaheuristic method. We considered some of the quality parameters such as packet delivery ratio, latency, throughput and fitness value for fine tuning OSLR protocol. Then we made Comparison of genetic algorithm, particle swarm optimization algorithm by using QoS parameters. We implemented our work on Red Hat Enterprise Linux 6 platform. And results are shown by simulations using VanetMobiSim and NS2 simulators; the fine-tuned OSLR protocol behaves better than the original routing protocol with intelligence and optimization configuration.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125699005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信