{"title":"Recommender system based on Hierarchical Clustering algorithm Chameleon","authors":"Utkarsh Gupta, Nagamma Patil","doi":"10.1109/IADCC.2015.7154856","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154856","url":null,"abstract":"Recommender Systems are becoming inherent part of today's e-commerce applications. Since recommender system has a direct impact on the sales of many products therefore Recommender system plays an important role in e-commerce. Collaborative filtering is the oldest techniques used in the recommender system. A lot of work has been done towards the improvement of collaborative filtering which comprises of two components User Based and Item Based. The basic necessity of today's recommender system is accuracy and speed. In this work an efficient technique for recommender system based on Hierarchical Clustering is proposed. The user or item specific information is grouped into a set of clusters using Chameleon Hierarchical clustering algorithm. Further voting system is used to predict the rating of a particular item. In order to evaluate the performance of Chameleon based recommender system, it is compared with existing technique based on K-means clustering algorithm. The results demonstrates that Chameleon based Recommender system produces less error as compared to K-means based Recommender System.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"168 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122942239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. B. Sumeeth, J. Jayanthi, Manju Nanda, A. Avinash
{"title":"Validation of real time complex algorithms using fault model analyses","authors":"S. B. Sumeeth, J. Jayanthi, Manju Nanda, A. Avinash","doi":"10.1109/IADCC.2015.7154794","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154794","url":null,"abstract":"In the recent times with the increasing affect of malfunctioning of software developed using conventional approach on the world of embedded computer based systems, the use of model based approach is often advocated as a means of increasing confidence in such systems. Designing and validating real time systems using models helps to improve system safety, and reliability.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123023213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient approximate 2D Gaussian smoothing filter for error tolerant applications","authors":"S. Kaushik, N. Kumar","doi":"10.1109/IADCC.2015.7154815","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154815","url":null,"abstract":"Present multimedia applications demand highly energy-efficient devices due to need of intensive computation. Most filtering applications engage 2D gaussian smooth filter which is slow and severely affects the performance. In this paper, we propose a novel energy efficient approximate 2D gaussian smoothing filter. The proposed approach is based on “Mirror Short Pixel Approximation” and rounding-off gaussian kernel coefficients. In Mirror Short Pixel Approximation the elements of input image block is replaced via mirror pixel value. The proposed approach is modelled in high level language to check efficacy on benchmark image, which results in minor degradation of image quality. The proposed design is realized on Virtex 6 FPGA. The Simulation results show reduction of 85%, 8%, 58% in area, power and delay respectively compared to existing approximate 2D gaussian smooth filter.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129933779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model for improving relevant Feature Extraction for Opinion Summarization","authors":"Ashwini Rao, K. Shah","doi":"10.1109/IADCC.2015.7154660","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154660","url":null,"abstract":"The growth of E commerce has led to the abundance growth of opinions on the web, thereby necessitating the task of Opinion Summarization, which in turn has great commercial significance. Feature extraction in Opinion Summarization is very crucial as selection of relevant features reduce the feature space which successfully reduces the complexity of the classification task. The paper suggests extensive pre-processing technique & an algorithm for extracting features from Reviews/Blogs. The proposed technique of Feature Extraction is unsupervised, automated and also domain independent. The improved effectiveness of the proposed approach is demonstrated on a real life dataset that is crawled from many reviewing websites such as CNET, Amazon etc.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128349969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Savita Choudhary, Siddanth Kaul, Shridhar Mishra, J. B. Arun
{"title":"Signature verification using Java - Python for small computational devices","authors":"Savita Choudhary, Siddanth Kaul, Shridhar Mishra, J. B. Arun","doi":"10.1109/IADCC.2015.7154788","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154788","url":null,"abstract":"This paper identifies an innovative design for signature verification which is able to extract features from an individual's signatures and uses those feature sets to discriminate genuine signatures from forgeries. An innovative JAVA-PYTHON platform is used for the development. Detailed feature study, algorithm development and feature set verification is carried out during this experiment.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129145239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust and dynamic image zero watermarking using hessian laplace detector and logistic map","authors":"M. Dhoka, A. Patki","doi":"10.1109/IADCC.2015.7154841","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154841","url":null,"abstract":"In this digital world due to rapid growth in image processing technology and internet, Piracy of the images is becoming more and more serious problem. In order to prohibit such piracy, watermarking is widely used approach. In conventional watermarking, watermark is inserted in host image by modifying its original information. This approach creates a trade-off between robustness and imperceptibility. To overcome this, zero watermarking is used. In this process instead of embedding watermark, it is created using host image and original watermark of ownership identification. Zero Watermarking does not alter original information of the image and provides perfect imperceptibility. In this paper we are proposing a robust and dynamic zero watermarking using Hessian Laplace Detector and Logistic map. Here, Feature points of host image are detected using Hessian Laplace detector and used along with original watermark of ownership identity for constructing zero-watermark. Finally constructed zero-watermark is scrambled using Logistic map to improve its security before storing it into database. Our dynamic approach lets original watermark size to be solely decided by total number of detected feature points and all pixels of original watermark to be used for creating zero-watermark. We have compared our algorithm with previous work and got better reconstruction of original watermark under noise, filtering, compression, translation and cropping attacks.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123647083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the optimization of key revocation schemes for network telemetry data distribution","authors":"Bhanu Prakash Gopularam, N. Nalini","doi":"10.1109/IADCC.2015.7154765","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154765","url":null,"abstract":"Consider a cloud deployment where the organizational network pertaining to a tenant having routers, switches sharing network telemetry data on regular basis. Among different ways of managing networks flow-based network monitoring is most sought after approach because of accuracy and economies of scale. In the event of host compromise the device credentials are revoked thereby disabling its ability to read future communications. Broadcast Encryption techniques having strong key revocation mechanism can be used in this context. Waters et. al [?] is one the broadcast encryption schemes which facilitate efficient sharing using small size keys and the related Attribute-Based Encryption scheme uses dual encryption technique and is capable of handling non-monotonous access structure again with small keys. In this paper we experiment with broadcast encryption and attribute based encryotion schemes with real-time network telemetry data and provide detailed analysis of performace. Though the original scheme provides smaller keys, few changes to the algorithm improves the performance and efficiency and makes it acceptable for large scale usage. We found the optimized scheme is 20% more performant than inital scheme.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"863 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bi-modal Image segmentation by active shape model","authors":"Prashant A. Athavale, P. Puttaswamy","doi":"10.1109/IADCC.2015.7154683","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154683","url":null,"abstract":"This paper deals with Bi-modal Image segmentation with active shape model. This method has been applied to varieties of segmentation problems, where considerable information about the shape is available. The discussion about the implementation on a set of both synthetic and natural bimodal images is presented.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121708852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Establishment of equivalence between two degraded document images","authors":"Muralidhara Mallur, P. Nagabhushan, S. D. Gowda","doi":"10.1109/IADCC.2015.7154826","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154826","url":null,"abstract":"With the advent of Information Technology, large volume of hardcopy documents are being scanned and stored as document images. Due to the age of source document, quality of the ink and recurring photo copies of same source, the document images generated are degraded in quality. Degraded document images obtained from different sources are stored in different places depending on the requirement of images for various purposes. This leads to storage of multiple copies of same document image with variations in degradation. Establishment of equivalence between two degraded document images using Optical Character Recognizer (OCR) is not possible as OCR fails to recognize the characters in degraded conditions. In this paper, a novel approach has been proposed to establish equivalence between two degraded document images based on layout and content structure. Through projection profile, the number of components and the occurrence of components in the document images are compared correspondingly to establish layout equivalence. The components at paragraph level are compared based on foreground density and entropy quantifier to establish content structure equivalence. The efficacy of the proposed model is tested over variety of degraded document images.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125474319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parameters tuning of OLSR routing protocol with metaheuristic algorithm for VANET","authors":"Anusha Bandi, B. Chandrashekhar","doi":"10.1109/IADCC.2015.7154894","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154894","url":null,"abstract":"Vehicular Adhoc Network provides ability to wirelessly communicate between vehicles. Network fragmentations and frequent topology changes (Mobility of the nodes) and limited coverage of Wi-Fi, are issues in VANET, that arise due to absence of central manager entity. Because of these reasons, routing the packets within the network is difficult task. Hence, provisioning an adept routing strategy is vital for the deployment of VANETs. The optimized link state routing is a well-known mobile adhoc network routing protocol. In this paper, we are proposing an optimization strategy to fine-tune few parameters by configuring the OLSR protocol using metaheuristic method. We considered some of the quality parameters such as packet delivery ratio, latency, throughput and fitness value for fine tuning OSLR protocol. Then we made Comparison of genetic algorithm, particle swarm optimization algorithm by using QoS parameters. We implemented our work on Red Hat Enterprise Linux 6 platform. And results are shown by simulations using VanetMobiSim and NS2 simulators; the fine-tuned OSLR protocol behaves better than the original routing protocol with intelligence and optimization configuration.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125699005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}