2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)最新文献

筛选
英文 中文
Prediction of Traffic Density in Internet Offline Mode 互联网离线模式下的流量密度预测
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007277
B. C. Tripathi, R. Prasad, T. Kumar
{"title":"Prediction of Traffic Density in Internet Offline Mode","authors":"B. C. Tripathi, R. Prasad, T. Kumar","doi":"10.1109/IC3I44769.2018.9007277","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007277","url":null,"abstract":"Today google maps is the defacto app used for the direction and traffic analysis. The proposed work illustrates the solution to a problem of finding traffic between any two points. The technique adopted in this work is predictive form of Machine Learning and the analysis and the prediction of the traffic is done. The use of machine learning method enables traffic analysis in offline mode much easier and expand the span of maps working. The traffic data is collected from users, through API “here” and several other API’s to collect the data. These data are used to predict the traffic when needed. The application will behave as a normal direction provider on Internet Connectivity but as soon as the user goes offline, the real use of application prevails.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"58 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Filtering of Noise in Audio/Voice Signal 音频/语音信号中的噪声滤波
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007299
Rishma Thakur, Manoj Pandey, Neeraj Gupta
{"title":"Filtering of Noise in Audio/Voice Signal","authors":"Rishma Thakur, Manoj Pandey, Neeraj Gupta","doi":"10.1109/IC3I44769.2018.9007299","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007299","url":null,"abstract":"Filter plays a vital role in electronics and communication system. Filters are used to pass the desired frequency signals and rejects undesired frequency signal. There are several applications where digital filtering techniques are used such as data communication, voice or audio filtering, video processing, image processing and many more. The basic idea behind this paper is to design different types of infinite impulse response digital filters such as Butterworth filter (BWF), Chebyshev type I filter (CSFT-1), Chebyshev type II filter (CSFT-2) and elliptic filter (EF) and to compare their performance to find out best suitable type for the filtering of voice signal, using LabVIEW simulation.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128031398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Natural Language Processing and Deep Learning Towards Security Requirements Classification 面向安全需求分类的自然语言处理和深度学习
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007300
Prudence Kadebu, V. Thada, Panashe Chiurunge
{"title":"Natural Language Processing and Deep Learning Towards Security Requirements Classification","authors":"Prudence Kadebu, V. Thada, Panashe Chiurunge","doi":"10.1109/IC3I44769.2018.9007300","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007300","url":null,"abstract":"Security Requirements classification is an important area to the Software Engineering community in order to build software that is secure, robust and able to withstand attacks. This classification facilitates proper analysis of security requirements so that adequate security mechanisms are incorporated in the development process. Machine Learning techniques have been used in Security Requirements classification to aid in the process that lead to ensuring that correct security mechanisms are designed corresponding to the Security Requirements classifications made to eliminate the risk of security being incorporated in the late stages of development. However, these Machine Learning techniques have been found to have problems including, handcrafting of features, overfitting and failure to perform well with high dimensional data. In this paper we explore Natural Language Processing and Deep Learning to determine if this can be applied to Security Requirements classification.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133086985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigating popularity bias in Twitter- Recommending novel hashtags using pooled tweets 减轻Twitter中的流行偏见-使用汇集的tweet推荐新颖的主题标签
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007248
Chhavi Sharma, Punam Bedi
{"title":"Mitigating popularity bias in Twitter- Recommending novel hashtags using pooled tweets","authors":"Chhavi Sharma, Punam Bedi","doi":"10.1109/IC3I44769.2018.9007248","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007248","url":null,"abstract":"Twitter has grown as a popular microblogging site in the last decade. A tweet, is a small, crisp 140 characters-based text in Twitter. It lets people raise their opinions, convey ideas and to follow other events or people. Hashtags in the Twitter network allow spread of a particular idea, event and help in easy search in the voluminous amount of data. The hashtags used by twitter users may strengthen particular hashtag conversation leading to a number of tweets concerning the idea. Twitter-pooling phenomenon refers to collection of tweets based on hashtags or conversations. We use hashtag-based twitter pooling in this work.Recommender Systems (RSs) suggest user-oriented suggestions for items from a plethora of options available across the Internet. Recommendations may be generated keeping in view the other similar users or items across the recommendation environment. Research in recommendation for social networks has been worked upon lately. In this paper, we strive to suggest hashtags to be used by the twitter users. We propose a notion to recommend novel hashtags in Twitter to handle the prevalent challenge of popularity bias across RSs. The idea of novelty in hashtag recommendation has been utilized for this research motive.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116166440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of Clustering Based Routing Protocols In Wireless Sensor Networks 无线传感器网络中基于聚类的路由协议性能分析
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007291
D. Sharma, S. Bagga, Rishabh Rastogi
{"title":"Performance Analysis of Clustering Based Routing Protocols In Wireless Sensor Networks","authors":"D. Sharma, S. Bagga, Rishabh Rastogi","doi":"10.1109/IC3I44769.2018.9007291","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007291","url":null,"abstract":"Wireless Sensor Network (WSN) constitutes of spatially deployed independent nodes with attached sensors to sense the surrounding physical conditions such as humidity, pressure, temperature etc. These nodes with connected sensors eventually transmit the collected data to the sink (base station) and in this process of transmission, energy efficiency and network lifetime are major concerns. Accordingly, clustering based routing algorithms (protocols) have been designed in which the network of the sensor nodes is broken into groups and the sensors existing in that cluster group transfer the information to the cluster heads present in their respective clusters. These cluster heads conclusively channel the information to the base station. In this evaluation, various routing protocols using clustering techniques namely Homogeneous LEACH, Heterogeneous LEACH, Unequal Clustering Mechanism (UCM) based LEACH, SEP, Z-SEP, DEEC, MSE, modified DEEC, Enhanced SEP and Threshold DEEC have been simulated, investigated and compared based on multiple parameters like network lifetime, throughput, period of stability and average energy of the network.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116107221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of real time face recognition using few shot recognition techniques 基于少量镜头识别技术的实时人脸识别研究
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007247
Paramveer Singh, S. Srivastava, A. Rai, A. Cheema
{"title":"Study of real time face recognition using few shot recognition techniques","authors":"Paramveer Singh, S. Srivastava, A. Rai, A. Cheema","doi":"10.1109/IC3I44769.2018.9007247","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007247","url":null,"abstract":"This paper aims at studying the problem of face recognition using very few examples. Face recognition is a tough problem yet is important for several practical applications. Contemporary techniques require thousands of samples to recognize them effectively. However, constructing such a dataset is not always feasible for practical applications. Therefore, we analyze the effectiveness of such techniques with few shot learning paradigms on benchmark datasets with standard evaluation metrics.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126594283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[IC3I 2018 Front Matter] [IC3I 2018前沿事项]
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/ic3i44769.2018.9007254
{"title":"[IC3I 2018 Front Matter]","authors":"","doi":"10.1109/ic3i44769.2018.9007254","DOIUrl":"https://doi.org/10.1109/ic3i44769.2018.9007254","url":null,"abstract":"","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134046571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Requirements Extraction and Classification: A Survey 安全需求提取与分类:综述
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007263
Prudence Kadebu, V. Thada, Panashe Chiurunge
{"title":"Security Requirements Extraction and Classification: A Survey","authors":"Prudence Kadebu, V. Thada, Panashe Chiurunge","doi":"10.1109/IC3I44769.2018.9007263","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007263","url":null,"abstract":"Security Requirements Engineering is a very important process in the Software Development Life Cycle (SDLC) with Security Engineering being given profound attention in the development of software. It is imperative to build security within a software product. This ensures that software that is deployed is secure and can withstand attack. The research work explores Security Requirements extraction and classification techniques and application of Machine to the process. Techniques such as Naïve Bayes Classifier, K-NN, Support Vector Machine (SVM), ANN among others have been applied to the various tasks embedded in the process. This research will pave a way to techniques that can aid in the process of Security Requirements extraction and classification.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133532872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Primer on Intelligent Defense Mechanism to Counter Cloud Silent Attacks 应对云静默攻击的智能防御机制初探
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007279
F. Mukoko, V. Thada
{"title":"A Primer on Intelligent Defense Mechanism to Counter Cloud Silent Attacks","authors":"F. Mukoko, V. Thada","doi":"10.1109/IC3I44769.2018.9007279","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007279","url":null,"abstract":"Cloud security is a key to both Cloud clients and vendors, and this has prodded intensified massive research around this domain. The contractual continuous Cloud security research is as well fuelled by the abrupt popping up of attacks that even extend to silent or stealth. Moreover these silent or stealth attacks are characterised by low observability along with bad traceability resulting in their difficulty detection, traceability and prevention. Due to the nature of silent or stealth attacks that have difficulty detection, traceability and prevention calibre, it means traditional and/or ordinary security mechanisms won’t be sufficient to compact such attacks. In turn the nearby remedy to tackle these attacks is to incorporate method(s) that can curb trends that has hidden patterns. This then calls for techniques that have capabilities for revealing hidden patterns, thus Hidden Markov Model will find its projected usage in the proposed model. As a way to offer maximum security when dealing with these sophisticated kinds of attacks, a conjuncture of cryptography will also be fused in the proposed model. A logical series of actions will be executed such that once a possible attack is sensed, then a proactive action is triggered to avoid an invasion by this attack. The intelligence is derived from the previously learning by Hidden Markov Model, although continuous active learning is still guaranteed as this algorithm carries the Machine Learning algorithm standards, along with the proactive action is triggered.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128527836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interoperability Issues in Internet of vehicles- A Survey 车联网中的互操作性问题——调查
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007261
S. M. Hussain, Kamaluddin Mohammad Yosof, Shaik Ashfaq Hussain
{"title":"Interoperability Issues in Internet of vehicles- A Survey","authors":"S. M. Hussain, Kamaluddin Mohammad Yosof, Shaik Ashfaq Hussain","doi":"10.1109/IC3I44769.2018.9007261","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007261","url":null,"abstract":"Internet of Vehicles is one of the emerging technologies which is predicted to be on the roads in the near future because of its tremendous features that has embraced and relieved people from driving. The new revolution has raised many questions in terms of its Sensing, Processing and Decision making capabilities. In this paper, the authors will survey a set of Open Research issues, Challenges of Interoperabiltiy in this new emerging area. This survey paper highlights some of the existing technologies in IOV and explores most of it.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129896813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信