{"title":"Prediction of Traffic Density in Internet Offline Mode","authors":"B. C. Tripathi, R. Prasad, T. Kumar","doi":"10.1109/IC3I44769.2018.9007277","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007277","url":null,"abstract":"Today google maps is the defacto app used for the direction and traffic analysis. The proposed work illustrates the solution to a problem of finding traffic between any two points. The technique adopted in this work is predictive form of Machine Learning and the analysis and the prediction of the traffic is done. The use of machine learning method enables traffic analysis in offline mode much easier and expand the span of maps working. The traffic data is collected from users, through API “here” and several other API’s to collect the data. These data are used to predict the traffic when needed. The application will behave as a normal direction provider on Internet Connectivity but as soon as the user goes offline, the real use of application prevails.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"58 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Filtering of Noise in Audio/Voice Signal","authors":"Rishma Thakur, Manoj Pandey, Neeraj Gupta","doi":"10.1109/IC3I44769.2018.9007299","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007299","url":null,"abstract":"Filter plays a vital role in electronics and communication system. Filters are used to pass the desired frequency signals and rejects undesired frequency signal. There are several applications where digital filtering techniques are used such as data communication, voice or audio filtering, video processing, image processing and many more. The basic idea behind this paper is to design different types of infinite impulse response digital filters such as Butterworth filter (BWF), Chebyshev type I filter (CSFT-1), Chebyshev type II filter (CSFT-2) and elliptic filter (EF) and to compare their performance to find out best suitable type for the filtering of voice signal, using LabVIEW simulation.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128031398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Natural Language Processing and Deep Learning Towards Security Requirements Classification","authors":"Prudence Kadebu, V. Thada, Panashe Chiurunge","doi":"10.1109/IC3I44769.2018.9007300","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007300","url":null,"abstract":"Security Requirements classification is an important area to the Software Engineering community in order to build software that is secure, robust and able to withstand attacks. This classification facilitates proper analysis of security requirements so that adequate security mechanisms are incorporated in the development process. Machine Learning techniques have been used in Security Requirements classification to aid in the process that lead to ensuring that correct security mechanisms are designed corresponding to the Security Requirements classifications made to eliminate the risk of security being incorporated in the late stages of development. However, these Machine Learning techniques have been found to have problems including, handcrafting of features, overfitting and failure to perform well with high dimensional data. In this paper we explore Natural Language Processing and Deep Learning to determine if this can be applied to Security Requirements classification.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133086985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating popularity bias in Twitter- Recommending novel hashtags using pooled tweets","authors":"Chhavi Sharma, Punam Bedi","doi":"10.1109/IC3I44769.2018.9007248","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007248","url":null,"abstract":"Twitter has grown as a popular microblogging site in the last decade. A tweet, is a small, crisp 140 characters-based text in Twitter. It lets people raise their opinions, convey ideas and to follow other events or people. Hashtags in the Twitter network allow spread of a particular idea, event and help in easy search in the voluminous amount of data. The hashtags used by twitter users may strengthen particular hashtag conversation leading to a number of tweets concerning the idea. Twitter-pooling phenomenon refers to collection of tweets based on hashtags or conversations. We use hashtag-based twitter pooling in this work.Recommender Systems (RSs) suggest user-oriented suggestions for items from a plethora of options available across the Internet. Recommendations may be generated keeping in view the other similar users or items across the recommendation environment. Research in recommendation for social networks has been worked upon lately. In this paper, we strive to suggest hashtags to be used by the twitter users. We propose a notion to recommend novel hashtags in Twitter to handle the prevalent challenge of popularity bias across RSs. The idea of novelty in hashtag recommendation has been utilized for this research motive.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116166440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Clustering Based Routing Protocols In Wireless Sensor Networks","authors":"D. Sharma, S. Bagga, Rishabh Rastogi","doi":"10.1109/IC3I44769.2018.9007291","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007291","url":null,"abstract":"Wireless Sensor Network (WSN) constitutes of spatially deployed independent nodes with attached sensors to sense the surrounding physical conditions such as humidity, pressure, temperature etc. These nodes with connected sensors eventually transmit the collected data to the sink (base station) and in this process of transmission, energy efficiency and network lifetime are major concerns. Accordingly, clustering based routing algorithms (protocols) have been designed in which the network of the sensor nodes is broken into groups and the sensors existing in that cluster group transfer the information to the cluster heads present in their respective clusters. These cluster heads conclusively channel the information to the base station. In this evaluation, various routing protocols using clustering techniques namely Homogeneous LEACH, Heterogeneous LEACH, Unequal Clustering Mechanism (UCM) based LEACH, SEP, Z-SEP, DEEC, MSE, modified DEEC, Enhanced SEP and Threshold DEEC have been simulated, investigated and compared based on multiple parameters like network lifetime, throughput, period of stability and average energy of the network.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116107221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of real time face recognition using few shot recognition techniques","authors":"Paramveer Singh, S. Srivastava, A. Rai, A. Cheema","doi":"10.1109/IC3I44769.2018.9007247","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007247","url":null,"abstract":"This paper aims at studying the problem of face recognition using very few examples. Face recognition is a tough problem yet is important for several practical applications. Contemporary techniques require thousands of samples to recognize them effectively. However, constructing such a dataset is not always feasible for practical applications. Therefore, we analyze the effectiveness of such techniques with few shot learning paradigms on benchmark datasets with standard evaluation metrics.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126594283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[IC3I 2018 Front Matter]","authors":"","doi":"10.1109/ic3i44769.2018.9007254","DOIUrl":"https://doi.org/10.1109/ic3i44769.2018.9007254","url":null,"abstract":"","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134046571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Requirements Extraction and Classification: A Survey","authors":"Prudence Kadebu, V. Thada, Panashe Chiurunge","doi":"10.1109/IC3I44769.2018.9007263","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007263","url":null,"abstract":"Security Requirements Engineering is a very important process in the Software Development Life Cycle (SDLC) with Security Engineering being given profound attention in the development of software. It is imperative to build security within a software product. This ensures that software that is deployed is secure and can withstand attack. The research work explores Security Requirements extraction and classification techniques and application of Machine to the process. Techniques such as Naïve Bayes Classifier, K-NN, Support Vector Machine (SVM), ANN among others have been applied to the various tasks embedded in the process. This research will pave a way to techniques that can aid in the process of Security Requirements extraction and classification.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133532872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Primer on Intelligent Defense Mechanism to Counter Cloud Silent Attacks","authors":"F. Mukoko, V. Thada","doi":"10.1109/IC3I44769.2018.9007279","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007279","url":null,"abstract":"Cloud security is a key to both Cloud clients and vendors, and this has prodded intensified massive research around this domain. The contractual continuous Cloud security research is as well fuelled by the abrupt popping up of attacks that even extend to silent or stealth. Moreover these silent or stealth attacks are characterised by low observability along with bad traceability resulting in their difficulty detection, traceability and prevention. Due to the nature of silent or stealth attacks that have difficulty detection, traceability and prevention calibre, it means traditional and/or ordinary security mechanisms won’t be sufficient to compact such attacks. In turn the nearby remedy to tackle these attacks is to incorporate method(s) that can curb trends that has hidden patterns. This then calls for techniques that have capabilities for revealing hidden patterns, thus Hidden Markov Model will find its projected usage in the proposed model. As a way to offer maximum security when dealing with these sophisticated kinds of attacks, a conjuncture of cryptography will also be fused in the proposed model. A logical series of actions will be executed such that once a possible attack is sensed, then a proactive action is triggered to avoid an invasion by this attack. The intelligence is derived from the previously learning by Hidden Markov Model, although continuous active learning is still guaranteed as this algorithm carries the Machine Learning algorithm standards, along with the proactive action is triggered.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128527836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. M. Hussain, Kamaluddin Mohammad Yosof, Shaik Ashfaq Hussain
{"title":"Interoperability Issues in Internet of vehicles- A Survey","authors":"S. M. Hussain, Kamaluddin Mohammad Yosof, Shaik Ashfaq Hussain","doi":"10.1109/IC3I44769.2018.9007261","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007261","url":null,"abstract":"Internet of Vehicles is one of the emerging technologies which is predicted to be on the roads in the near future because of its tremendous features that has embraced and relieved people from driving. The new revolution has raised many questions in terms of its Sensing, Processing and Decision making capabilities. In this paper, the authors will survey a set of Open Research issues, Challenges of Interoperabiltiy in this new emerging area. This survey paper highlights some of the existing technologies in IOV and explores most of it.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129896813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}