{"title":"TweetSmart: Hedging in markets through Twitter","authors":"T. Rao, S. Srivastava","doi":"10.1109/EAIT.2012.6407894","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407894","url":null,"abstract":"Application of pattern recognition and machine learning in highly dynamic and data intensive financial markets is a popular research area amongst researchers and financial analysts. With evolving social dynamics of millions across the globe, it provides opportunity to make use of patterns in investor sentiment comprising of large scale microblog discussions to understand market movements and make an effective application in making hedging decisions. We apply sentiment analysis and machine learning principles to study causation between public collective sentiment and market movements. In this work we have used 0.6 million tweets for a period of November 2010 to June 2011, to run a practical simulation of hedging model for Dow Jones Industrial Average-DJIA Index. We have elaborated on how a simple hedging strategy like married-put can exercise use of weekly directional forecasts for DJIA to make portfolio adjustments from risky to high market conditions and vice versa. We have found the maximum of 91% SVM based binary classifier accuracy, towards direction (up and down prediction) estimations of DJIA.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mukherjee, M. Chattopadhyay, S. Chattopadhyay, P. Bose, A. Bakshi
{"title":"Detection of selective forwarding attack in wireless ad hoc networks using binary search","authors":"S. Mukherjee, M. Chattopadhyay, S. Chattopadhyay, P. Bose, A. Bakshi","doi":"10.1109/EAIT.2012.6407978","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407978","url":null,"abstract":"Selective forwarding attack is one of the most harmful attacks in wireless networks. This paper proposes an algorithm to defend against selective forwarding attacks based on binary search technique in clustered wireless ad hoc network. In the first phase, the cluster head raises an alarm when number of packets dropped along a path is more than a threshold value. In the second phase, control packets and hello packets are exchanged along a misbehaving routing path between the wireless node and a cluster head to detect compromised node. Experimental results demonstrate that the detection efficiency of the proposed algorithm is more than 90%. The algorithm can detect multiple compromised nodes if they exist. We have also experimented to estimate the threshold value of packet drops and computed the required rate of drops of compromised nodes so that they can be detected.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128691758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Singh, A. Khasnobish, A. Jati, S. Bhattacharyya, A. Konar, D. Tibarewala, R. Janarthanan
{"title":"Object-shape classification and reconstruction from tactile images using image gradient","authors":"G. Singh, A. Khasnobish, A. Jati, S. Bhattacharyya, A. Konar, D. Tibarewala, R. Janarthanan","doi":"10.1109/EAIT.2012.6407870","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407870","url":null,"abstract":"A human explores the world around him through his sense to touch. Touch sensation enables us to understand shape, texture and hardness of an object/surface necessary for efficient exploration. Incorporating artificial haptic sensory systems in rehabilitative aids and in various other human computer interfaces enhances the dexterity. This paper presents a novel approach of shape reconstruction and classification from the tactile images by touching the surface of various real life objects. Here four objects (viz. a planar surface, object with one edge, a cuboid i.e. object with two edges and a cylindrical object) have been used for the shape recognition purpose. A new gradient based feature extraction technique has been used for the classification purpose. The reconstruction algorithm also uses image gradients to differentiate between a surface having continuous curvature and a surface having sharp edge. Prewitt masks are used for determining the gradients. A comparison between the performances of different classifiers has been drawn to prove the efficacy of the shape classification algorithm.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115417220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sadhukhan, U. Tiwari, V. Agarwal, V. Agrawal, P. Venkateswaran
{"title":"Mobility management protocol in dual-homed UMTS networks","authors":"S. Sadhukhan, U. Tiwari, V. Agarwal, V. Agrawal, P. Venkateswaran","doi":"10.1109/EAIT.2012.6407966","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407966","url":null,"abstract":"As the subscriber numbers soar and traffic load increases in the network, operators face various challenges during post planning stages of their network. One such post planning problem relates to minimizing of total handoff cost in a cellular network. This is solved by making some Radio Network Controllers (RNCs) dual homed [4]. Conventionally UMTS networks are single homed in which one RNC is connected to one MSC/SGSN. In dual homed network one RNC can be connected to at most two MSCs/SGSNs. In this paper, we have proposed a scheme for handoff management in dual homed network. We have modified the existing protocol related to Iu-PS interface to incorporate the handoff handling in a dual homed network. It has been shown that when the RNC is dual homed, approximately four commands are not required thus saving the handoff handling cost. It is found that little changes in the existing 3GPP specified mobility management protocol in the single homed network is needed to take care of handoff management effectively under the dual homing scenario of RNC.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114908918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trusted checkpointing based on ant colony optimization in MANET","authors":"S. Biswas, P. Dey, S. Neogy","doi":"10.1109/EAIT.2012.6408002","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6408002","url":null,"abstract":"Mobile ad hoc network (MANET) is a collection of mobile nodes dynamically forming a temporary network without a centralized administration. Failure rate and security attack rate of processes running on mobile hosts in MANET is high due to its characteristics such as open network environment, dynamic topology due to random node movement, lack of centralized control, fixed infrastructure, stable storage etc. Existing secure checkpointing algorithm using cryptography to provide fault tolerance in failure and security attack prone mobile cellular network cannot be applied in MANET due to enhanced overhead. As an alternative solution, we have designed an ant colony based trust model to evaluate trust value of a mobile node in MANET. A trusted node, that will never be a malicious or selfish node, has low or negligible failure and security attack rate, high available battery power which indicates high availability in the network and high positive reference from other nodes. So checkpoint is secure in a trusted mobile node without additional overheads of cryptography. Experimental result shows that using proposed mobility and trust model based checkpointing and rollback recovery technique, maximum recovery probability of 0.93 can be achieved.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124777889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samir Malakar, B. Seraogi, R. Sarkar, N. Das, S. Basu, M. Nasipuri
{"title":"Two-stage skew correction of handwritten Bangla document images","authors":"Samir Malakar, B. Seraogi, R. Sarkar, N. Das, S. Basu, M. Nasipuri","doi":"10.1109/EAIT.2012.6407929","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407929","url":null,"abstract":"Skewness in the handwritten document images is a common scenario. Therefore, it is very much required to detect and correct the skewness before the document is presented to the document image analysis system. In this regard, the present work develops a two-stage Hough transform based approach to remove the skewness in the document images written in Bangla script. Firstly, page-level skewness is removed by rotating the skewed text lines appropriately and then skewed words in each text line, if any, are also rotated along a reference line.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124991156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Packet size optimization for multi hop CDMA wireless sensor networks with nearest neighbors based routing","authors":"U. Datta, S. Kundu","doi":"10.1109/EAIT.2012.6407986","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407986","url":null,"abstract":"Power conservation is one of the most important issues in wireless ad hoc and sensor networks, where nodes are likely to rely on limited battery power. In this paper we evaluate multi-hop based data transmission performance of a static CDMA wireless sensor network (WSN), where the positions of nodes are random. Data generated from the source node is received by the sink via multi hop, where an intermediate node in the route selects the nearest node within a sector angle, considered as search angle, towards the direction of the destination as the next hop. Optimization of transmitted data packet in present WSN is considered using the objective function, resource utilization, which has importance in case of delay sensitive WSN. From this frame work, the optimal packet sizes under various network parameters are estimated.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125000302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel algorithm for enumerating maximal bicliques from a symmetric matrix","authors":"M. D. Savio, A. Sankar, R. V. Nataraj","doi":"10.1109/EAIT.2012.6407897","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407897","url":null,"abstract":"We address the problem of enumerating maximal bicliques from a symmetric matrix. We propose a novel algorithm named TWINBLADE which exploits the properties of symmetric matrix, and reduces the search space to a larger extent and it generates not even a single duplicate. Our algorithm is compared with LCM-MBC algorithm, in the experiment conducted, ours take almost only half the running time of LCM-MBC for sparse and comparatively performs better for dense datasets.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual restoration of old mural paintings using patch matching technique","authors":"B. Chanda, Dhruv Ratra, B.L.S. Mounica","doi":"10.1109/EAIT.2012.6407928","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407928","url":null,"abstract":"Changes occurring in nature cause considerable deterioration of Old mural Paintings. This paper presents a virtual restoration scheme to restore the degraded versions to some extent. Our scheme is based on the assumption that there exist mural Paintings which are completely in their original form, without any degradation. The scheme then presents a technique of best patch matching from a database obtained from clean paintings, where the error patch is replaced by the best patch found. The above is done taking into account the time of execution of the whole process. Prior to patch matching, image enhancement techniques are used on the image to ensure better patch matching. Finally post processing operations are performed on the output for the final cleaned mural. This paper includes demonstration of the above mentioned algorithm on real images, which shows the validity of the proposed scheme.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131605861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reconnecting broken ridges in fingerprints","authors":"S. Mitra, P. Munshi","doi":"10.1109/EAIT.2012.6407922","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407922","url":null,"abstract":"Fingerprint is the oldest and the most widely used biometric. The performance of any Automatic Fingerprint Identification System (AFIS) highly depends on the quality of the fingerprint used. Fingerprint comprises of parallel ridges and valleys. For various reasons, ridges could be broken. Most of the fingerprint recognition algorithms are based on minutiae information. The accuracy of minutiae extraction could be affected by the presence of unwanted broken ridges. A technique for automatically detecting and reconnecting broken ridges is presented here. This technique utilizes a combination of directional information and watershed transform to identify the regions of the broken area. Results using real fingerprint data are presented and discussed.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132876849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}