2015 Eighth International Conference on Contemporary Computing (IC3)最新文献

筛选
英文 中文
Smartphone-based colorimetric detection to measure Blood Glucose Levels 基于智能手机的比色检测来测量血糖水平
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346691
Sarthak Singhal, P. Ralhan, Nishtha Jatana
{"title":"Smartphone-based colorimetric detection to measure Blood Glucose Levels","authors":"Sarthak Singhal, P. Ralhan, Nishtha Jatana","doi":"10.1109/IC3.2015.7346691","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346691","url":null,"abstract":"Diabetes Mellitus is a hazardous disease plaguing many humans in the world and it is caused due to high Blood Glucose Levels (BGL). Patients with diabetes need to regularly check their BGL in order to stay safe. Through this paper, we aim to provide a medical image processing system based on colorimetric detection particularly for diabetic patients that will measure the blood glucose levels by scanning an image of the visual glucose test strip using a smart-phone. The proposed technique measures the color change of the scanned test strip by using HSV and CIELAB color model based processing wherein concepts of color-gradient and CIEDE2000 color-difference formulas are applied. The technique was implemented in an Android based environment and tested using Accu-Chek active visual test strips along with its corresponding reference color chart. The results of the experiment show that such technique has promising capability to measure BGL in humans. Further, such technique can be also applied for any other visual medical test strips or even for other measurements which are calculated using a color metric.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117127390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Prediction of click frauds in mobile advertising 预测移动广告中的点击欺诈行为
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346672
Mayank Taneja, Kavyanshi Garg, Archana Purwar, Samarth Sharma
{"title":"Prediction of click frauds in mobile advertising","authors":"Mayank Taneja, Kavyanshi Garg, Archana Purwar, Samarth Sharma","doi":"10.1109/IC3.2015.7346672","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346672","url":null,"abstract":"Click fraud represents a serious drain on advertising budgets and can seriously harm the viability of the internet advertising market. This paper proposes a novel framework for prediction of click fraud in mobile advertising which consists of feature selection using Recursive Feature Elimination (RFE) and classification through Hellinger Distance Decision Tree (HDDT).RFE is chosen for the feature selection as it has given better results as compared to wrapper approach when evaluated using different classifiers. HDDT is also selected as classifier to deal with class imbalance issue present in the data set. The efficiency of proposed framework is investigated on the data set provided by Buzzcity and compared with J48, Rep Tree, logitboost, and random forest. Results show that accuracy achieved by proposed framework is 64.07 % which is best as compared to existing methods under study.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126121915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Consistency of Java run-time behavior with design-time specifications Java运行时行为与设计时规范的一致性
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346742
Swaminathan Jayaraman, D. Hari, B. Jayaraman
{"title":"Consistency of Java run-time behavior with design-time specifications","authors":"Swaminathan Jayaraman, D. Hari, B. Jayaraman","doi":"10.1109/IC3.2015.7346742","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346742","url":null,"abstract":"We present a novel framework for formal verification of run-time behaviour of Java programs. We focus on the class of programs with a repetitive behaviour, such as servers and interactive programs, including programs exhibiting concurrency and non-determinism. The design-time specifications for such programs can be specified as UML-like finite-state diagrams, or Kripke structures, in the terminology of model checking. In order to verify the run-time behavior of a Java program, we extract a state diagram from the execution trace of the Java program and check whether the run-time state diagram is consistent with the design-time diagram. We have implemented this framework as an extension of JIVE (Java Interactive Visualization Environment), a state-of-the-art dynamic analysis and visualization tool which constructs object, sequence, and state diagrams for Java program executions. JIVE is available as an open-source plugin for Eclipse and makes available the execution trace for facilitating analyses of program executions. We have tested our extension on a number of programs, and our experiments show that our methodology is effective in helping close the gap between the design and implementation of Java programs.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124594891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Identifying gamakas in Carnatic music 辨别卡纳蒂克音乐中的伽玛卡
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346662
Harsh M. Vyas, M. SumaS., S. Koolagudi, K. Guruprasad
{"title":"Identifying gamakas in Carnatic music","authors":"Harsh M. Vyas, M. SumaS., S. Koolagudi, K. Guruprasad","doi":"10.1109/IC3.2015.7346662","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346662","url":null,"abstract":"In this work, an effort has been made to identify the gamakas present in a given piece of Carnatic music clip. Gamakas are the beautification elements used to improve the melody. The identification of gamaka is very important stage in note transcription. In the proposed method, features that correspond to melodic variations such as pitch and energy are used for characterizing the gamakas. The input pitch contour is modelled using Hidden Markov Model with 3 states, namely Attack, Sustain and Decay. These states correspond to ups and downs in the melody of the music. The system is validated using a comprehensive data set consisting 160 songs from 8 different ragas. The average accuracy of 75.86% is achieved using this method.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124755597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Exploring sentiment analysis on twitter data 探索twitter数据的情感分析
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346686
Manju Venugopalan, Deepa Gupta
{"title":"Exploring sentiment analysis on twitter data","authors":"Manju Venugopalan, Deepa Gupta","doi":"10.1109/IC3.2015.7346686","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346686","url":null,"abstract":"The growing popularity of microblogging websites has transformed these into rich resources for sentiment mining. Even though opinion mining has more than a decade of research to boost about, it is mostly confined to the exploration of formal text patterns like online reviews, news articles etc. Exploration of the challenges offered by informal and crisp microblogging have taken roots but there is scope for a large way ahead. The proposed work aims at developing a hybrid model for sentiment classification that explores the tweet specific features and uses domain independent and domain specific lexicons to offer a domain oriented approach and hence analyze and extract the consumer sentiment towards popular smart phone brands over the past few years. The experiments have proved that the results improve by around 2 points on an average over the unigram baseline.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Cluster based load balancing in cloud computing 云计算中基于集群的负载均衡
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346656
Surbhi Kapoor, Chetna Dabas
{"title":"Cluster based load balancing in cloud computing","authors":"Surbhi Kapoor, Chetna Dabas","doi":"10.1109/IC3.2015.7346656","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346656","url":null,"abstract":"For a cloud datacenter the biggest issue is how to tackle billions of requests coming dynamically from the end users. To handle such requests efficiently and effectively, there is a need to distribute the load evenly among the cloud nodes. To achieve this goal, various load balancing approaches have been proposed in the past years. Load balancing strategies aim at achieving high user satisfaction by minimizing response time of the tasks and improving resource utilization through even and fair allocation of cloud resources. The traditional Throttled load balancing algorithm is a good approach for load balancing in cloud computing as it distributes the incoming jobs evenly among the VMs. But the major drawback is that this algorithm works well for environments with homogeneous VMS, does not considers the resource specific demands of the tasks and has additional overhead of scanning the entire list of VMs every time a task comes. In this paper, these issues have been addressed by proposing an algorithm Cluster based load balancing which works well in heterogeneous nodes environment, considers resource specific demands of the tasks and reduces scanning overhead by dividing the machines into clusters. Experimental results have shown that our algorithm gives better results in terms of waiting time, execution time, turnaround time and throughput as compared to existing throttled and modified throttled algorithms.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Enhanced heuristic approach for Traveling Tournament Problem based on Grey Wolf Optimizer 基于灰狼优化器的旅行竞赛问题的改进启发式方法
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346685
D. Gupta, Chand Anand, Tejas Dewan
{"title":"Enhanced heuristic approach for Traveling Tournament Problem based on Grey Wolf Optimizer","authors":"D. Gupta, Chand Anand, Tejas Dewan","doi":"10.1109/IC3.2015.7346685","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346685","url":null,"abstract":"This paper shows an enhanced heuristic approach of grey wolf optimizer and simulated annealing in order to find optimum solution for Travelling Tournament Problem. In this paper, we tackle the mirrored version of TTP. We use a fast constructive heuristic algorithm to generate schedules. Later we integrate an enhanced heuristic approach of simulated annealing based on prey proximity model of Grey Wolf Optimizer to obtain least cost tournament schedule. We upgrade the position updating step of GWO by using probabilistic methods and hybridize it with SA to solve TTP and avoid getting stuck in local minima. Our proposed hybrid algorithm converges to an optimum solution for TTP. We calculate the overall cost of TTP and compare the performance of our alorithm with other metaheuristic algorithms like MBBO/ESA, BBO/SA, ACO and PSO.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134343696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An image processing based method to identify and grade conjunctivitis infected eye according to its types and intensity 基于图像处理的结膜炎感染眼的类型和强度识别和分级方法
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346658
Joydeep Tamuli, Aishwarya Jain, A. V. Dhan, Anupama Bhan, M. Dutta
{"title":"An image processing based method to identify and grade conjunctivitis infected eye according to its types and intensity","authors":"Joydeep Tamuli, Aishwarya Jain, A. V. Dhan, Anupama Bhan, M. Dutta","doi":"10.1109/IC3.2015.7346658","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346658","url":null,"abstract":"Inflammation of the conjunctiva and pain and discomfort in the inner surface of the eyelids is referred to as Conjunctivitis. It causes severe pain, burning sensation or in extreme cases blindness of the eye. Normally conjunctivitis is detected by eye specialist doctors and their limited number makes it difficult for everyone to reach them and get themselves diagnosed. This paper describes an automatic efficient image processing based method to identify conjunctivitis infected eye from a normal eye and classify it according to its types. Some statistical and texture features were used and then followed by PCA for extraction of discriminatory features and then classified using supervised learning method such as multi-class SVM and KNN. The intensity of the infected eyes were also calculated using the significant red plane. Plotconfusion was used to calculate the accuracy and a high accuracy was achieved using this method. Also in addition this proposed method is efficient, computationally fast and costs very low.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127632695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
N-Hop broadcast and Street Broadcast Reduction algorithm using OMNeT++ and Google Earth plugin N-Hop广播和街道广播减少算法使用omnet++和谷歌地球插件
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346741
Deepti Agarwal, S. Sharma, Kavita Pandey
{"title":"N-Hop broadcast and Street Broadcast Reduction algorithm using OMNeT++ and Google Earth plugin","authors":"Deepti Agarwal, S. Sharma, Kavita Pandey","doi":"10.1109/IC3.2015.7346741","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346741","url":null,"abstract":"VANET are the systems used to collaborate the wireless devices installed on the vehicles, for transfer of messages. The implementation of algorithms on VANET in actual device is preceded by simulation of the same on a simulating environment like OMNeT++, SUMO, etc. This paper presents a study and implementation of VANET Broadcasting algorithms, and algorithms which are able to solve the problem of broadcast storming. With efficient use of resources, the transmission of signals to the different vehicles have been scalable to be broadcasted using two protocols namely, N-Hops Weighted p-persistence Broadcasting which is able to disseminate the data to different vehicles in all the regions covering the broadcast range. Another algorithm is Street Broadcast Reduction, which covers the area through different roads and effectively send the warning and alert messages to the vehicles, using the distance based schemes. The problems in VANET broadcast has been addressed, and have been implemented using OMNeT++, SUMO and Google Earth.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126528403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of the improved knapsack cipher 改进的背包密码分析
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346740
Ashish Jain, N. Chaudhari
{"title":"Analysis of the improved knapsack cipher","authors":"Ashish Jain, N. Chaudhari","doi":"10.1109/IC3.2015.7346740","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346740","url":null,"abstract":"Computational complexity of order 256n to solve the knapsack cipher 0/255 (or improved knapsack cipher) recently suggested by Pham is optimistic result. In this paper, we systematically analyze the improved knapsack cipher in relation to the complexity claims. During the analysis of the improved knapsack cipher, we examined that the public key size must be large to satisfy the constraint of complexity. Though we chose keys of large sizes, the improved knapsack cipher is not safe and its security is compromised by lattice-based attacks. Furthermore, the cipher lost its practicality, since the use of large size public keys. Hence, we identify a construction of practical knapsack cipher 0/f, characterize its requirements and demonstrate asymptotically, that the computational complexity of the knapsack cipher 0/f and knapsack cipher 0/1 (basic or sum-of-subset cipher) is equal. It is worth pointing out that the proposed knapsack cipher 0/f is a compact and viable option to use as a building block for security purpose in resource-constrained devices such as RFID tags, smart cards and the like.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121161331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信