2017 Tenth International Conference on Contemporary Computing (IC3)最新文献

筛选
英文 中文
Fault tolerant streaming of live news using multi-node Cassandra 使用多节点Cassandra的容错流直播新闻
2017 Tenth International Conference on Contemporary Computing (IC3) Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284310
Shubham Dhingra, Shreeya Sharma, Parmeet Kaur, Chetna Dabas
{"title":"Fault tolerant streaming of live news using multi-node Cassandra","authors":"Shubham Dhingra, Shreeya Sharma, Parmeet Kaur, Chetna Dabas","doi":"10.1109/IC3.2017.8284310","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284310","url":null,"abstract":"The paper presents an Android application for streaming live news data using Multi-node Cassandra as the underlying data store. This application is designed for the modern era's users who constantly wish to keep themselves abreast of the latest or trending news with the help of online media. The application provides access to abstracted day-to-day trending news in various categories, for instance national, technical, sports, science etc. in a single swipe. Our application uses Apache Cassandra, a distributed NoSQL database management system, as a data store for distribution of news related data across 4 nodes. Cassandra has been used due to its capability to manage and manipulate large amounts of data across various commodity servers along with features of high availability and fault tolerance. For testing the distribution and replication of data across the nodes, one or more nodes were failed in the experiments. The results show successful retrieval of data despite node failure.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115063695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hybrid particle swarm training for convolution neural network (CNN) 卷积神经网络(CNN)的混合粒子群训练
2017 Tenth International Conference on Contemporary Computing (IC3) Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284356
Yoshika Chhabra, Sanchit Varshney, Ankita
{"title":"Hybrid particle swarm training for convolution neural network (CNN)","authors":"Yoshika Chhabra, Sanchit Varshney, Ankita","doi":"10.1109/IC3.2017.8284356","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284356","url":null,"abstract":"Convolutional Neural Networks(CNN) are one of the most used neural networks in the present time. Its applications are extremely varied. Most recently they have been proving helpful with deep learning, as well. Since it is growing in more convoluted domains, its training complexity is also increasing. To tackle this problem, many hybrid algorithms have been implemented. In this paper, Particle Swarm Optimization (PSO) is used to reduce the overall complexity of the algorithm. The hybrid of PSO used with CNN decreases the required number of epochs for training and the dependency on GPU system. The algorithm so designed is capable of achieving 3–4% increase in accuracy with lesser number of epochs. The advantage of which is decreased hardware requirements for training of CNNs. The hybrid training algorithm is also capable of overcoming the local minima problem of the regular backpropagation training methodology.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124963255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A ranking based recommender system for cold start & data sparsity problem 基于排序的冷启动推荐系统及数据稀疏性问题
2017 Tenth International Conference on Contemporary Computing (IC3) Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284347
Anshu Sang, S. Vishwakarma
{"title":"A ranking based recommender system for cold start & data sparsity problem","authors":"Anshu Sang, S. Vishwakarma","doi":"10.1109/IC3.2017.8284347","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284347","url":null,"abstract":"Recommender Systems have been very common and useful nowadays, for predictions of different items which facilitate user by giving suitable recommendations. It deals with the specific type of items and technique used to generate the recommendations that are customized to provide valuable and effective suggestions to the end user. The present system considers two well-known problems during recommendation such as cold start and data sparsity and resolved these problems to the great extend with high accuracy. The proposed system provides the recommendation to new user, with high reliability and accuracy values as shown in our result.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129924508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The low-rate denial of service attack based comparative study of active queue management scheme 基于低速率拒绝服务攻击的主动队列管理方案比较研究
2017 Tenth International Conference on Contemporary Computing (IC3) Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284360
Sanjeev Patel, Abhinav Sharma
{"title":"The low-rate denial of service attack based comparative study of active queue management scheme","authors":"Sanjeev Patel, Abhinav Sharma","doi":"10.1109/IC3.2017.8284360","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284360","url":null,"abstract":"A serious threats is observed as the Denial of Service (DoS) attack to the stability of the Internet. In the DoS attack, a large number of systems send malicious packets that are useless to jam a victim which makes it unavailable to access the resources of the networks. The Low-rate DoS (L-DoS) attack is one of the major types of DoS attack that is not easy to detect. The various Active Queue Management (AQM) schemes have been compared to find the decrease in throughput and increase in loss rate, that results due to DoS attack. Various AQM techniques that we try to compare are: Drop-tail, Random Exponential Marking (REM), Random Early Detection (RED), Fair Queuing (FQ), Stochastic Fair Queuing (SFQ), and Proportional Integrator (PI). The throughput, end-to-end delay and loss rate are computed and plotted with respect to number of attackers and burst rate.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129010360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Investigation of IR based topic models on issue tracking systems to infer software-specific semantic related term pairs 问题跟踪系统中基于IR的主题模型研究,以推断软件特定的语义相关术语对
2017 Tenth International Conference on Contemporary Computing (IC3) Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284329
D. Correa, A. Sureka, Sangeeta Lal
{"title":"Investigation of IR based topic models on issue tracking systems to infer software-specific semantic related term pairs","authors":"D. Correa, A. Sureka, Sangeeta Lal","doi":"10.1109/IC3.2017.8284329","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284329","url":null,"abstract":"Software maintenance is a core component of any software development life-cycle. Contemporary software systems contain voluminous and complex information stored in software repositories. Software maintenance professionals spend significant amount of time in search and exploration of these repositories for common maintenance tasks like bug fixing, feature enhancements, code refactoring and reengineering. Therefore, tools and methods to facilitate search in software repositories can aid software maintenance professionals to have faster access to required information and increase productivity. A domain-specific lexical resource is an important tool to bridge the semantic gap existing between the information need and search query. In this work, we investigate the use of information retrieval (IR) based topic models (like LSI and LDA) to infer semantically related terms for a software context specific lexical resource. We perform our experiments on Google Chromium — a widely popular open-source browser — issue tracker system which contains 134,000+ bug reports. We divide our study into two parts — (1) In the first part, we apply our IR models on free form natural language textual data present in defect tracking systems. We perform qualitative analysis on the obtained output and uncover semantically related terms in the Google Chromium software context. We observe that we are able to infer semantically similar term pairs in four different contexts of English language, Software, Google Chromium and Code details. (2) In second part of this study, we utilize the semantically inferred terms obtained from the output of IR models to facilitate the software maintenance task of duplicate bug report detection. Our results demonstrate that the use of IR based topic models on defect tracking systems to automatically infer semantically related terms can help build a software domain-specific lexical resource and reduce the vocabulary gap.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121879548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing fault prediction usefulness from cost perspective using source code metrics 使用源代码度量从成本角度分析故障预测的有效性
2017 Tenth International Conference on Contemporary Computing (IC3) Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284297
L. Kumar, A. Sureka
{"title":"Analyzing fault prediction usefulness from cost perspective using source code metrics","authors":"L. Kumar, A. Sureka","doi":"10.1109/IC3.2017.8284297","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284297","url":null,"abstract":"Software fault prediction techniques are useful for the purpose of optimizing test resource allocation. Software fault prediction based on source code metrics and machine learning models consists of using static program features as input predictors to estimate the fault proneness of a class or module. We conduct a comparison of five machine learning algorithms on their fault prediction performance based on experiments on 56 open source projects. Several researchers have argued on the application of software engineering economics and testing cost for the purpose of evaluating a software quality assurance activity. We evaluate the performance and usefulness of fault prediction models within the context of a cost evaluation framework and present the results of our experiments. We propose a novel approach using decision trees to predict the usefulness of fault prediction based on distributional characteristics of source code metrics by fusing information from the output of the fault prediction usefulness using cost evaluation framework and distributional source code metrics.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133928885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Keystroke dynamics based authentication system with unrestricted data collection 基于击键动力学的不受限制数据采集的认证系统
2017 Tenth International Conference on Contemporary Computing (IC3) Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284312
Shashank Gupta, Kavita Pandey, Jatin Yadav, Richa Sharma
{"title":"Keystroke dynamics based authentication system with unrestricted data collection","authors":"Shashank Gupta, Kavita Pandey, Jatin Yadav, Richa Sharma","doi":"10.1109/IC3.2017.8284312","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284312","url":null,"abstract":"In today's world, superior authentication mechanisms have gained utmost importance to deal with increased synthetic forgeries. One such authentication mechanism uses keystroke dynamics to uniquely label users on the basis of their typing pattern. This paper proposes a statistical approach to implement such a keystroke dynamics based authentication system. The primary focus in this paper while building an authentication system is on providing an unrestricted environment for data collection. However, removing restrictions makes the data unfit for direct feature extraction, and therefore, it requires preprocessing. The majority of this paper presents techniques for improved data preprocessing with its principal element being the removal of outlier values from the dataset. It presents typing trajectories of a particular user before and after removing outliers from the dataset, to show that the similarities in typing pattern become even more prominent after preprocessing. After using the proposed method for removing outliers, the authentication accuracy of the system is increased many folds.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115800916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognition of epilepsy from non-seizure electroencephalogram using combination of linear SVM and time domain attributes 线性支持向量机与时域属性相结合的非发作性脑电图癫痫识别
2017 Tenth International Conference on Contemporary Computing (IC3) Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284306
Debanshu Bhowmick, Atrija Singh, S. Sanyal
{"title":"Recognition of epilepsy from non-seizure electroencephalogram using combination of linear SVM and time domain attributes","authors":"Debanshu Bhowmick, Atrija Singh, S. Sanyal","doi":"10.1109/IC3.2017.8284306","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284306","url":null,"abstract":"Classification of neural disorders, like epilepsy, can be performed efficiently using soft computing methods. Previously many methods of detecting epilepsy using various time and time-frequency domain features have been proposed. Our study proposes a unique feature set, comprising of time domain features, Waveform Length, Root Mean Square, Mean Absolute Value and Zero Crossing, combining them with Linear Support Vector Machine to classify a set of EEG signals into epileptic and non-epileptic under non-seizure condition. Our proposed classification approach yields an accuracy of 95%.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115318402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance evaluation of various data structures in building efficient indexing schemes for XML documents 为XML文档构建高效索引方案时各种数据结构的性能评估
2017 Tenth International Conference on Contemporary Computing (IC3) Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284351
G. Dhanalekshmi, Krishna Asawa
{"title":"Performance evaluation of various data structures in building efficient indexing schemes for XML documents","authors":"G. Dhanalekshmi, Krishna Asawa","doi":"10.1109/IC3.2017.8284351","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284351","url":null,"abstract":"With the increasing volume of XML documents on the Web, indexing, storing and retrieving these documents is of a great concern. Indexing allows efficient access to XML document parts. There are several methods proposed for indexing XML documents. Generally, they are classified by the database community and information retrieval community. This paper presents a comparative study of different data structures to create an efficient indexing of XML documents. The experiments were conducted to evaluate the performance of the various index structures in terms of the index construction time and the index storage space.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"414 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125066383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure live virtual machine migration through runtime monitors 通过运行时监视器安全实时虚拟机迁移
2017 Tenth International Conference on Contemporary Computing (IC3) Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284316
Ahmed M. Mahfouz, Md Lutfar Rahman, S. Shiva
{"title":"Secure live virtual machine migration through runtime monitors","authors":"Ahmed M. Mahfouz, Md Lutfar Rahman, S. Shiva","doi":"10.1109/IC3.2017.8284316","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284316","url":null,"abstract":"In this paper, we propose a new model for live migration of virtual machines (VMs) in a secure environment. The live migration of a VM is the process of moving the VM from one physical host to another without interrupting any of the VM running services. We review the stages of the live migration process and identify the threats to it. Also, we propose our migration model that fulfills the most security requirements for secure live VM migration process.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129967344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信