2015 Eighth International Conference on Contemporary Computing (IC3)最新文献

筛选
英文 中文
Identification of allied raagas in Carnatic music 卡纳蒂克音乐中联合拉格舞曲的鉴定
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346666
Prithvi Upadhyaya, M. SumaS., S. Koolagudi
{"title":"Identification of allied raagas in Carnatic music","authors":"Prithvi Upadhyaya, M. SumaS., S. Koolagudi","doi":"10.1109/IC3.2015.7346666","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346666","url":null,"abstract":"In this work, an effort has been made to differentiate the allied raagas in Carnatic music. Allied raagas are the raagas that are composed using same set of notes. The features derived from the pitch sequence are used for differentiating these raagas. The coefficients of legendre polynomials, used to fit the pitch contours of the song clips are used for identifying raagas. Obtained features are validated using different classifiers such as Neural networks, Naive Bayes, Multi class classifier, Bagging and Random forest. The proposed system is tested on 4 sets of allied raagas. Naive Bayes classifier gives an average accuracy of 86.67% for allied set of Todi-Dhanyasi and Multi class classifier gives an average accuracy of 86.67% for allied set of Kharaharapriya-Anandabhairavi-Reethigoula. In general, Neural network classifier performance is found to be better than other classifiers.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132713717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigation of desynchronization attack during inter-eNodeB handover key management in LTE LTE中enodeb间切换密钥管理过程中去同步攻击的缓解
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346744
K. PavanKumarReddy, B. R. Chandavarkar
{"title":"Mitigation of desynchronization attack during inter-eNodeB handover key management in LTE","authors":"K. PavanKumarReddy, B. R. Chandavarkar","doi":"10.1109/IC3.2015.7346744","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346744","url":null,"abstract":"In recent years, 3rd Generation Partnership Project (3GPP) is taking on a pivotal role in standardizing the 4G network. Long Term Evolution (LTE) is a standard by the 3rd Generation Partnership Project (3GPP) and its main goal is to transform into 4G from mobile cellular wireless technology. Optimization of radio access techniques along with the improvement in the LTE systems lead 3GPP in developing the 4G standard as the next generation of LTE-Advanced (LTE-A) wireless networks. The support of full inter-working and flat Internet Protocol (IP) connectivity with heterogeneous wireless access networks in both 3GPP LTE and LTE-A architecture leads to new challenges in the security aspects. The primary challenge of LTE is to provide security to end users. Despite of security architecture available in LTE, still there exist vulnerabilities which can compromise the whole network. The major contribution of this paper is to design a new mitigation scheme which reduces the impact of desynchronization attack during the inter-eNodeB handover key management in LTE. Desynchronization attack can lead to serious consequences like compromise of User Equipment (UE) and eNodeB, during inter-eNodeB handover key management.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"97 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114050864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Novel fuzzy clustering algorithm for fuzzy data 一种新的模糊数据聚类算法
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346671
Vijyant Agarwal
{"title":"Novel fuzzy clustering algorithm for fuzzy data","authors":"Vijyant Agarwal","doi":"10.1109/IC3.2015.7346671","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346671","url":null,"abstract":"This paper presents a new fuzzy clustering algorithm for fuzzy numbers, called the weight fuzzy c-means (WFCM) clustering based on distance function [1]. We first discuss the conventional FCM algorithm for crisp data with brief overview of fuzzy set theory related to the problem at hand and indicate the disparity in the existing approaches of clustering for fuzzy data. In the proposed method, first we converted the fuzzy data matrix into respective weight matrix and then using FCM calculates the membership grade of every fuzzy data. Numerical results show that the presented algorithm performs more robust, logical and superior in performance.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127805395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance enhancement of distributed K-Means clustering for big Data analytics through in-memory computation 基于内存计算的分布式k均值聚类大数据分析性能增强
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346700
Shwet Ketu, Sonali Agarwal
{"title":"Performance enhancement of distributed K-Means clustering for big Data analytics through in-memory computation","authors":"Shwet Ketu, Sonali Agarwal","doi":"10.1109/IC3.2015.7346700","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346700","url":null,"abstract":"Big Data analytics are recently coming up as prominent research area in the field of Information Technology serving various data driven domains for effective processing of big data. Big data analytics have been facing various challenges such as inefficient storage, processing delays, low rate of information retrieval, complex algorithms which cannot be handled and managed using traditional methods. For assisting software developers to deal with big data challenges, new programming frameworks are required. In this research paper Hadoop MapReduce and Apache Spark are taken for this purpose which supports on-disk and in-memory computation respectively. Clustering is one of the important tasks of big data mining used for information retrieval and knowledge discovery. In this research work, we are analyzing the performance of distributed K-Means clustering based on in-memory and on-disk computational models. For performance enhancement of distributed K-Means clustering, in-memory and on-disk computational models have been adopted and an experimental analysis has been performed.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127964728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Enhanced page Reclaim for Android devices Android设备的增强页面回收
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346725
Balakrishnan Jayavel, Subbaramaiah Mandava, Jyoti Johri
{"title":"Enhanced page Reclaim for Android devices","authors":"Balakrishnan Jayavel, Subbaramaiah Mandava, Jyoti Johri","doi":"10.1109/IC3.2015.7346725","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346725","url":null,"abstract":"Smartphones emerge as one of the most coherent companion for humans over past few years. A memory crunch situation makes the user feel sluggishness while accessing the applications. So, Linux starts retrieving memory using kswapd or Direct Reclaim followed by Android Low Memory Killer which identifies victim processes to be killed on the basis of defined criteria until sufficient amount of memory is released. A proper handshake between Android platform and Linux is required to reclaim and keep enough memory for harmonious execution of the devices. We propose two approaches to enhance the existing page reclamation process which suggests that pages obtained by Low Memory Killer should be considered during kswapd and Direct Reclaim path. Experimental analysis assures performance improvement in Android devices by decreasing the application launch time.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128498187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Firefly inspired feature selection for face recognition 萤火虫启发的人脸识别特征选择
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346689
Vandana Agarwal, S. Bhanot
{"title":"Firefly inspired feature selection for face recognition","authors":"Vandana Agarwal, S. Bhanot","doi":"10.1109/IC3.2015.7346689","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346689","url":null,"abstract":"In this paper, an adaptive technique using Firefly Algorithm for feature selection in face recognition is proposed. The artificial fireflies are designed to represent the feature subset and they move in a hyper dimensional space to obtain the best features. The features are extracted using Discrete Cosine Transform (DCT) and Haar wavelets based Discrete Wavelet Transform (DWT). The algorithm is validated using benchmark face databases namely ORL and Yale. The proposed algorithm outperforms various existing techniques. The average recognition accuracy using five randomly selected training samples over four independent runs for the ORL is 94.375%. The accuracy using six training images for Yale face database is 99.16%. The effect of parameter `gamma', specific to Firefly Algorithm on recognition accuracy is also investigated.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126271418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cloud detection in all sky ConCam images by Gaussian fitting and valley detection in histogram 基于高斯拟合和直方图谷检测的全天空ConCam图像云检测
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346692
Tushar Jadhav, Aditi Kotibhaskar
{"title":"Cloud detection in all sky ConCam images by Gaussian fitting and valley detection in histogram","authors":"Tushar Jadhav, Aditi Kotibhaskar","doi":"10.1109/IC3.2015.7346692","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346692","url":null,"abstract":"Clouds are the complex part to classify in the all sky Continuous Camera (ConCam) image due to their intensity similar to other objects and their diverse nature. The paper presents a histogram based technique to extract clouds in ConCam images. Small scale features are extracted by subtracting Gaussian fitted histogram from original histogram of an image. Valleys are then detected in these small scale features and based on these valleys, i.e. their intensity levels, different regions of sky are classified.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122260851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VISORV: Board reading, getting directions through Marker Detection for partially visually impaired people VISORV:阅读板,通过标记检测为部分视力受损的人获得方向
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346707
Akriti Saini, Nishank Bhatia, V. Saxena
{"title":"VISORV: Board reading, getting directions through Marker Detection for partially visually impaired people","authors":"Akriti Saini, Nishank Bhatia, V. Saxena","doi":"10.1109/IC3.2015.7346707","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346707","url":null,"abstract":"Augmented reality brings reality into virtual world experience, it's one of the fastest emerging and challenging field experienced. In this paper, we proposed a model VISORV which helps partially visually impaired people to easily navigate through the streets by reading aloud sign (direction) boards usually placed on the streets using a marker detection technique. The proposed algorithm is divided into three phases: Marker Detection Algorithm (MDA), Marker Identification Algorithm (MIA) and Audio formation. The Marker Detection phase involves detecting a square marker by calculating angle for each pixel and applying edge dwindling algorithm (EDA). In the second phase, marker already being detected in the first phase is identified by efficiently matching it against the markers stored in the database. The Matched marker fetches the direction along with their destinations from the database. In the final phase, guidance is being provided to the end user in the form of audio, stored in a database corresponding to marker ID identified in second phase. Various models adopted in this work are: RGB to Gray scale conversion, Shrinking, Expansion, Gray Scale to Binary Conversion, Run length encoding algorithm. Finally the model is simulated for test markers with different patterns stored and validate the proposed design.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120990352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real cepstrums on electroencephalogram biometric identification 脑电图生物特征识别中的真倒谱
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346652
Marcos del Pozo-Baños, C. Travieso-González, J. R. Ticay-Rivas, J. B. Alonso, M. Dutta, Anushikha Singh
{"title":"Real cepstrums on electroencephalogram biometric identification","authors":"Marcos del Pozo-Baños, C. Travieso-González, J. R. Ticay-Rivas, J. B. Alonso, M. Dutta, Anushikha Singh","doi":"10.1109/IC3.2015.7346652","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346652","url":null,"abstract":"In a time when personal data circulates constantly between devices and within the cloud, biometric security systems represents one of the most viable security solutions. A relatively new biometric modality based on the individual's Electroencephalogram (EEG) is starting now to gain popularity among researchers. Its relevance relay mainly on its prospects of high security and robustness against intruders and the proliferation of consumer EEG devices. In this work we propose the use of real cepstrums as descriptors of the subject traits within the EEG. When evaluated with each of the 14 conditions of the 100-subjects BCI2000 database, the proposed approach achieved classification accuracies between 86.88% and 94.91% using only the first 5% of the computed cepstral coefficients (13 coefficients).","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131241234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extracting academic social networks among conference participants 提取会议参与者的学术社交网络
2015 Eighth International Conference on Contemporary Computing (IC3) Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346650
T. Arif, M. Asger, M. B. Malik, R. Ali
{"title":"Extracting academic social networks among conference participants","authors":"T. Arif, M. Asger, M. B. Malik, R. Ali","doi":"10.1109/IC3.2015.7346650","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346650","url":null,"abstract":"Academics establish relations among them in multitude ways, co-authorship being one of them. In fact co-authorship has the advantage of being the best recorded among all forms of academic collaborations. Co-authored publications appear in the form of research articles, conference and workshop proceedings, technical reports, etc. As per DBLP, one of the major digital libraries, around 55 percent of the publications appear in conference and workshop proceedings. This implies that conference and workshops provide a rich environment for academics to portray their co-authorship based academic social networks. In this paper we extract academic social networks among conference participants, study their collaboration patterns, analyze their evolution over time and use social network analysis metrics to quantify them.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132227256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信