2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)最新文献

筛选
英文 中文
Local Binary Pattern Based Shot Boundary Detection for Video Summarization 基于局部二值模式的镜头边界检测视频摘要
S. Kaavya, G. Priya
{"title":"Local Binary Pattern Based Shot Boundary Detection for Video Summarization","authors":"S. Kaavya, G. Priya","doi":"10.1109/ICRTCCM.2017.64","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.64","url":null,"abstract":"Video Summarization plays a vital role in the internet user's life, especially for those searching for user specified video of interest for a long time. In order to provide support for users in terms of searching and retrieving video content, it is necessary to segment the video into shots and extract representative frame of each shot which acts as a summary of the video. So, in this paper, an approach for shot boundary detection and keyframe extraction is proposed. To provide a better summarization of video, Local Binary Pattern (LBP) based feature extraction for detecting video shots is performed in order to identify objects motion information. Based on local maxima analysis, an efficient keyframe, which contains salient information of a shot is proposed. The performance of the proposed work is evaluated using evaluation metrics like Precision, Recall, and F1-Measure.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115328220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Influential Detection in Twitter Using Tweet Quality Analysis 推文质量分析在推特中的影响检测
G. Mahalakshmi, K. Koquilamballe, S. Sendhilkumar
{"title":"Influential Detection in Twitter Using Tweet Quality Analysis","authors":"G. Mahalakshmi, K. Koquilamballe, S. Sendhilkumar","doi":"10.1109/ICRTCCM.2017.62","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.62","url":null,"abstract":"To create the content available on social media platforms such as twitter, is easy and creative. Such information have become strategically important for companies interested in obtaining feedback for their products, for brand endorsements, merchandising etc. By analyzing the content from social media like twitter, companies can decide their target groups and select influential users from these platforms to promote or endorse their brands. This paper discusses analyzing influential users from twitter data using semantic quality mining of tweets. Klout score is used for evaluating the obtained results.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114258691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secured Data Storage and Retrieval Techniques for Effective Handling of Transport Data 有效处理运输数据的安全数据存储和检索技术
K. Mohanram, T. T. Mirnalinee
{"title":"Secured Data Storage and Retrieval Techniques for Effective Handling of Transport Data","authors":"K. Mohanram, T. T. Mirnalinee","doi":"10.1109/ICRTCCM.2017.76","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.76","url":null,"abstract":"In this paper, we propose new techniques for the secure storage of transport data consisting of vehicles, registrations and payments in the e-Services Web Portal of Transport Department. For this purpose, new secure and effective storage techniques are proposed in this paper in order to store the data efficiently and to retrieve them fast. The proposed techniques have been tested, using Tamil Nadu Transport Department Data of India and found that the proposed techniques are more efficient with respect to the consumption of time, memory and increase in security. The major advantages of the proposed System are that it increases the availability and security of data, provides fast access from anywhere at any time and helps to make online payments.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124114123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Performance Evaluation Techniques in Cloud 云环境下性能评估技术综述
M. S. Kumar, B. Balamurugan
{"title":"A Review on Performance Evaluation Techniques in Cloud","authors":"M. S. Kumar, B. Balamurugan","doi":"10.1109/ICRTCCM.2017.29","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.29","url":null,"abstract":"Cloud computing is the main paradigmshift in the field of information technology era. Itoffers a special feature to cloud users is scalability. This is possible by the key technology calledvirtualization. Virtualization helps to user toachieve the scalability by emulating the physicalmachine into one or more workstation or servers. An analysis of performance of this cloud is to beanalyzed. This paper presents a survey ofperformance evaluation techniques based onqueueing system.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121401419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Probabilistic Authentication Scheme for Converging VANETs 一种高效的收敛vanet概率认证方案
V. Hemamalini, G. Zayaraz, V. Susmitha, V. Saranya
{"title":"An Efficient Probabilistic Authentication Scheme for Converging VANETs","authors":"V. Hemamalini, G. Zayaraz, V. Susmitha, V. Saranya","doi":"10.1504/IJITST.2018.10012281","DOIUrl":"https://doi.org/10.1504/IJITST.2018.10012281","url":null,"abstract":"VANET is used for interconnecting the nodes for exchanging secure data across the nodes. VANET has been utilized to give security and effectiveness in framework of transportation. Numerous activity signs are utilized yet it is very little powerful. An Authentication framework with Conditional Privacy-preservation and Non-repudiation (ACPN) has already been given in VANETs. In ACPN, the Public-Key Cryptography (PKC) to the nom de plume is utilized, which guarantees real outsiders in accomplishing the vehicles non-repudiation by obtaining genuine IDs of vehicles'. The autogenic pen names based on PKC are also utilized as identifiers rather than vehicle IDs when nom de plumes on vehicles are demanded. The ID-Based Signature (IBS) and the ID-Based Online/Offline Signature (IBOOS) plan are utilized, to validate across the Road Side Units (RSUs) and vehicles. The dynamic key sharing and triple DES for mysterious circulation and irregular V2V and R2V correspondence is proposed. The perception from the explanatory model affirms that utilizing the vehicle thickness out and about is a decent metric for setting the right sending likelihood in vehicles. The Convergence Point (CPA) is utilized to empower correspondence at the time when handover happens. This gives a consistent network and also protected message transmission.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122279894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Multi-keyword Search over Encrypted Data in Untrusted Cloud Environment 非可信云环境下加密数据的高效多关键字搜索
P. Pandiaraja, P. Vijayakumar
{"title":"Efficient Multi-keyword Search over Encrypted Data in Untrusted Cloud Environment","authors":"P. Pandiaraja, P. Vijayakumar","doi":"10.1109/ICRTCCM.2017.54","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.54","url":null,"abstract":"In the present cloud computing paradigm, with each business moving to the cloud computing, ithas become mandatory that the data be moved to the publiccloud environment and managing the same without anysecurity breach. The main problem was privacy notmaintain to secure access the data in local and public cloudstorage, and another problem not securely to searchingthe encrypted data in biggest cloud storage. Many of theresearchers to be motivated this work under the single dataowner setting model and multi-owner data setting model. As more and more data are stored in the databasesprovided by a single cloud service provider, the data isowned by multi persons. In this approach, we haveproposed a new scheme to deal with preserving the privacyin encrypted cloud data using multi-keyword searching. Toenable cloud server to perform access securely to searchingthe data with no cognizance about the real data of bothkeywords and trapdoors.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131962760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Secured Geospatial Data Storage and Retrieval Using Spatial Hadoop Framework in Cloud Environment 云环境下基于空间Hadoop框架的安全地理空间数据存储与检索
S. Karthi, S. Prabu
{"title":"Secured Geospatial Data Storage and Retrieval Using Spatial Hadoop Framework in Cloud Environment","authors":"S. Karthi, S. Prabu","doi":"10.1109/ICRTCCM.2017.77","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.77","url":null,"abstract":"Due torecent advancement in satellite remote sensing technology, the volume of remote sensing image data grows exponentially, while the processing capability of existing computer system is hard to satisfy the requirements of remote sensing image data accessing. Technological advancements of Geospatial Information Systems (GIS) and cloud did the process in a simpler and acceptable way to share the fact and figures that makes complicated and time consuming decision making with more assurance level. Later on, increase in an IT reflected the storage, management, integration and correlation of huge data which has an impact in the efficiency of the operations growth rate. It is more important to secure the geospatial data which is stored in the public cloud to ensure who is accessing the data to reducerisks to information, national security, or perhaps for other reasons. This research proposes an efficient way of storing the geospatial data in public cloud using Spatial Hadoop mechanism in cloud computing environment. The Spatial Hadoop-GIS is a scalable and high performance spatial data warehousing system for running large scale spatial queries on Spatial Hadoop. Itwill support multiple types of spatial queries on MapReduce through spatial partitioning, customizable spatial query engine. However, the associations are hesitant to store their touchy data on the cloud because of different protection and character following dangers. In the previous couple of years, a great deal of innovative work endeavors has been considered to list out the features and security for unified nodes for the development of makeup of data in cloud environment. At the outset, the model need to be refined with a similarity as the main concern. The article shows verification and approval protocol that pictorize the primary components of mysterious correspondence to be used for the cloud.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130786404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Prediction on Road Traffic Data Using Regression Analysis in FIMT-DD Technique 基于FIMT-DD技术的道路交通数据回归预测
D. Suvitha, V. Muthuswamy, P. Sathyabama
{"title":"Prediction on Road Traffic Data Using Regression Analysis in FIMT-DD Technique","authors":"D. Suvitha, V. Muthuswamy, P. Sathyabama","doi":"10.1109/ICRTCCM.2017.68","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.68","url":null,"abstract":"Rapidly developing cities with increasing population mobility has led to exponential increase of on-road vehicles that couples with challenges for road traffic management embracing traffic clogging, vehicle collisioning and air contamination. Over the recent years advances in sensing, communication and adaptive technologies has become the nerve center for researchers from both academia and industry, to carve out a more efficient road traffic management system from the already existing to encompass the issues listed above. However, Inadequacy persists to build a reliable and robust Traffic Management System to handle anticipated population and vehicle traffic in smart cities. In this paper, a methodology to forsee traffic volumes has been presented and implemented using FIMT-DD (Fast Incremental Model Trees-Drift Detection) numeration which intends to predict and conceptualize the traffic shape, road wise. Another method considered to measure the error performance is Regression analysis, an optimal research method for validating the traffic data. Using the prediction system, real time traffic enroute between the sensors is well conceived.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115231603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concept Identification from Poems 诗歌概念辨析
P. Sreeja, G. Mahalakshmi
{"title":"Concept Identification from Poems","authors":"P. Sreeja, G. Mahalakshmi","doi":"10.1109/ICRTCCM.2017.51","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.51","url":null,"abstract":"Emotion recognition has become an important topicin natural language processing. Usually words labeled with theiremotion is the starting place to find the emotion of a text, but itis very essential that context must also be considered. It is not asimple task to capture the overall emotion of a Text, as words aremutually influence their emotion related interpretation. There isa lot of word-based dictionaries available for emotion recognitionfrom the text. However, commonsense knowledge bases arevery less. We used ConceptNet (commonsense knowledge) forconcept mining from poems. In this paper we proposed a conceptidentification method by using ConceptNet knowledge base todepict the concept of poems. This system gives a precision valueof 71% and inter-rater agreement of 48%, depicting its moderateagreement with Human Expert interpretation.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115095448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Structural Equation Model Analyzed on Cyber Crime and Media Awareness in India 印度网络犯罪与媒体意识的结构方程模型分析
K. Ravichandran, S. Arulchelvan
{"title":"Structural Equation Model Analyzed on Cyber Crime and Media Awareness in India","authors":"K. Ravichandran, S. Arulchelvan","doi":"10.1109/ICRTCCM.2017.79","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.79","url":null,"abstract":"Computer and mobile phone based crimes have increased alarmingly in India. From the unauthorized dissemination, keeping information systems secure from tampering and from unauthorized removals are the need of the hour, otherwise, the incidents of hacking, data theft, cyber bullying and now cyber extortion as well has kept the cyber security team on its toes. For this a majority of the respondents that is 60 per cent felt that only sometimes the media is giving cyber crime related news, 25 per cent said they did not find enough news related to cyber security while only 20 per cent were of the opinion that cyber crime related news appear in media very often. Of the remaining 20 percent, 5 per cent were of the opinion that print media is creating more awareness and 15 per cent said it is the electronic media that is creating people more aware of on issues related to cyber crime. Quantitative analysis within the style of a survey was instrumental in collecting the information which is analyzed by the ANOVA test, Multivariate Tests, Normative analysis, Structural Equation Model and Model fit assessment. Along with this, measures being taken to control cyber crime also have also been discussed.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125408371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信