2016 Ninth International Conference on Contemporary Computing (IC3)最新文献

筛选
英文 中文
MetaFusion: An efficient metasearch engine using genetic algorithm MetaFusion:使用遗传算法的高效元搜索引擎
2016 Ninth International Conference on Contemporary Computing (IC3) Pub Date : 2016-08-01 DOI: 10.1109/IC3.2016.7880228
D. Gupta, Devika Singh
{"title":"MetaFusion: An efficient metasearch engine using genetic algorithm","authors":"D. Gupta, Devika Singh","doi":"10.1109/IC3.2016.7880228","DOIUrl":"https://doi.org/10.1109/IC3.2016.7880228","url":null,"abstract":"World Wide Web is a dynamic source of information which is expanding its content at a staggering rate. Individual search engines are not able to handle the exponential nature of web. Hence meta-search engines are used to solve the problem of low web space information coverage rate of individual search engines. A meta-search engine is a kind of search tool that dynamically dispatches user query to the underlying search engines, hence providing parallel access to multiple search engines and then aggregate the results to present single consolidated result list to user. In this paper, a novel meta-search engine, MetaFusion, has been proposed. The proposed algorithm combines fuzzy AHP with genetic algorithm to get more comprehensive and optimized results. Experimental results shows that relevancy of results returned by MetaFusion is more than several existing research Metasearch engines. The precision of MetaFusion is more when compared with Dogpile and Infospace.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"238 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133941615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automated segmentation of colon gland using histology images 利用组织学图像自动分割结肠腺体
2016 Ninth International Conference on Contemporary Computing (IC3) Pub Date : 2016-08-01 DOI: 10.1109/IC3.2016.7880223
Anamika Banwari, Namita Sengar, M. Dutta, C. Travieso-González
{"title":"Automated segmentation of colon gland using histology images","authors":"Anamika Banwari, Namita Sengar, M. Dutta, C. Travieso-González","doi":"10.1109/IC3.2016.7880223","DOIUrl":"https://doi.org/10.1109/IC3.2016.7880223","url":null,"abstract":"This paper represents an automated methodology for segmentation of colon glands using histology images. The manifestations of colorectal cancer under microscope has always been challenging as staining and sectioning leads to variation in tissue specimen, which causes conflict in gland appearance. Gland segmentation and classification is very important for the automation of the system. The presented methodology automatically segments the colon gland tissues by using intensity based thresholding which makes this methodology efficient. Unlike other segmentation methods, this methodology is entirely automated and quantifies lumen and epithelial cells only in the region of interest, which makes this method computationally efficient. This methodology is efficient for calculation of number of glands as well as for segmentation of gland area and achieves overall 93.76% accuracy for both.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"83 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134523337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A hybrid approach for optimizing transparency, robustness and capacity of an audio watermarking algorithm 一种优化音频水印算法透明性、鲁棒性和容量的混合方法
2016 Ninth International Conference on Contemporary Computing (IC3) Pub Date : 2016-08-01 DOI: 10.1109/IC3.2016.7880237
A. Kaur, M. Dutta
{"title":"A hybrid approach for optimizing transparency, robustness and capacity of an audio watermarking algorithm","authors":"A. Kaur, M. Dutta","doi":"10.1109/IC3.2016.7880237","DOIUrl":"https://doi.org/10.1109/IC3.2016.7880237","url":null,"abstract":"In the field of digital audio watermarking, the issue of optimizing imperceptibility, robustness and payload is still a big challenge. In this paper, the problem of optimizing the design parameters has been addressed by presenting a secure, robust and imperceptible blind audio watermarking algorithm with large payload. The proposed algorithm is designed using the singular values of SVD in detailed coefficients of wavelet domain. Reference to the existing literature, embedding watermark in the singular values of SVD gives a robust algorithm and embedding in wavelet coefficients provide good transparency. The embedding quantization function is designed in such a way that it introduces minimal changes in the signal while embedding and provide opportunity to hide more watermarking data. The features of both the domains have been properly utilized to achieve robustness and imperceptibility at an acceptable level. The experimental results validate that proposed hybrid technique is robust to various signal processing attacks with good perceptual transparency at high payload. The efficiency of the proposed algorithm has been proved by simulation results. The comparison of the proposed algorithm with the existing algorithms show that proposed algorithm has good performance giving good imperceptibility and robustness at 1562.5 bps.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134545633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
New approach toward data hiding using XOR for image steganography 利用异或技术实现图像隐写数据隐藏的新方法
2016 Ninth International Conference on Contemporary Computing (IC3) Pub Date : 2016-08-01 DOI: 10.1109/IC3.2016.7880204
Kamaldeep Joshi, Rajkumar Yadav
{"title":"New approach toward data hiding using XOR for image steganography","authors":"Kamaldeep Joshi, Rajkumar Yadav","doi":"10.1109/IC3.2016.7880204","DOIUrl":"https://doi.org/10.1109/IC3.2016.7880204","url":null,"abstract":"With the growth in internet usage, there is a proportional growth in security and privacy demands. In this paper, a three bit XOR steganography system for concealing messages into gray Images is projected. In this method, last three bits of pixel value offer 100 percentage of message addition. This new technique uses the XOR operation between the message and original image. If the intruder extracts the last three bits, he would not be able to find the meaning of the message as the message is in decoded form. The maximum no of bit which is to be hidden using this method is equal to the R∗C∗3, where R and C is the rows and column of the image. The time complexity is also calculated which is equal to O(1). Later on the method is analysed on the bases of PSNR, MSE, L2RAT and MAXERR. The projected technique is also matched with other similar techniques to show the superiority.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129422635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Community detection using meta-heuristic approach: Bat algorithm variants 使用元启发式方法的社区检测:Bat算法变体
2016 Ninth International Conference on Contemporary Computing (IC3) Pub Date : 2016-08-01 DOI: 10.1109/IC3.2016.7880209
Jigyasha Sharma, B. Annappa
{"title":"Community detection using meta-heuristic approach: Bat algorithm variants","authors":"Jigyasha Sharma, B. Annappa","doi":"10.1109/IC3.2016.7880209","DOIUrl":"https://doi.org/10.1109/IC3.2016.7880209","url":null,"abstract":"In the present world, it is hard to overlook — the omnipresence of ‘network’. Be it the study of internet structure, mobile network, protein interactions or social networks, they all religiously emphasizes on network and graph studies. Social network analysis is an emerging field including community detection as its key task. A community in a network, depicts group of nodes in which density of links is high. To find the community structure modularity metric of social network has been used in different optimization approaches like greedy optimization, simulated annealing, extremal optimization, particle swarm optimization and genetic approach. In this paper we have not only introduced modularity metrics but also hamiltonian function (potts model) amalgamated with meta-heuristic optimization approaches of Bat algorithm and Novel Bat algorithm. By utilizing objective functions (modularity and hamiltonian) with modified discrete version of Bat and Novel Bat algorithm we have devised four new variants for community detection. The results obtained across four variants are compared with traditional approaches like Girvan and Newman, fast greedy modularity optimization, Reichardt and Bornholdt, Ronhovde and Nussinov, and spectral clustering. After analyzing the results, we have dwelled upon a promising outcome supporting the modified variants.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128586890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Deterministic learning machine for face recognition with multi-model feature extraction 基于多模型特征提取的人脸识别确定性学习机
2016 Ninth International Conference on Contemporary Computing (IC3) Pub Date : 2016-08-01 DOI: 10.1109/IC3.2016.7880264
V. P. Vishwakarma
{"title":"Deterministic learning machine for face recognition with multi-model feature extraction","authors":"V. P. Vishwakarma","doi":"10.1109/IC3.2016.7880264","DOIUrl":"https://doi.org/10.1109/IC3.2016.7880264","url":null,"abstract":"In this paper, a new fast learning algorithm named deterministic learning machine (DLM) for the training of single-hidden layer feed-forward neural network (SLFN) subject to face recognition problem is proposed to solve the problem of high dimensional pattern recognition. The existing training algorithms for SLFN are either gradient based iterative learning algorithms or non-iterative algorithms such as extreme learning machine (ELM). The iterative learning algorithms suffer from slow learning, under-fitting, over-fitting whereas in ELM input weights are randomly chosen consequently the classification using ELM is non-deterministic. The proposed DLM is a non-iterative algorithm in which input weights are derived from input space without finding any parameter experimentally and output weights are calculated as an exact solution of linear system. This makes very fast learning and deterministic classification. The feature extraction is performed in a multi-model way by integrating the face image pixels intensity and local entropy of the image. The resulting face recognition system is highly robust against ample facial variations including illumination, pose, expression and occlusion. The proposed DLM with multi-model feature extraction is evaluated on AT&T and Yale face databases. The experimental results clearly reveal the superiority of the proposed approach.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129323154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Parameter estimation of a space radiator using differential evolution algorithm 基于差分进化算法的空间辐射器参数估计
2016 Ninth International Conference on Contemporary Computing (IC3) Pub Date : 2016-08-01 DOI: 10.1109/IC3.2016.7880200
R. Das
{"title":"Parameter estimation of a space radiator using differential evolution algorithm","authors":"R. Das","doi":"10.1109/IC3.2016.7880200","DOIUrl":"https://doi.org/10.1109/IC3.2016.7880200","url":null,"abstract":"In this article, different combinations of geometrical dimensions of a rectangular space radiator have been estimated using an inverse method. The solution procedure is based on the real-coded differential evolution (DE) optimization algorithm. Electronic equipments and aircraft power plants such as gas turbines need to be consistently cooled for safe operation and due to absence of air medium in space, the heat transfer occurs mainly by surface radiation. The required rate of heat to be dissipated is directly dependent upon the prevailing temperature distribution. Therefore, in this work, the estimation of parameters has been done for satisfying a predefined and simulated surface temperature profile on a space radiator. The temperature distribution used in the present inverse simulation study has been calculated and updated using the fourth order Runge-Kutta method and DE algorithm, respectively. Results have been validated against the existing literature. The present work reveals many possible combinations of the space radiator to attain a given temperature distribution. This offers the opportunity and flexibility to select a space radiator to achieve the required heat transfer rate for cooling various electronic equipments and power generating units typically for space applications.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121862636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review ranking method for spam recognition 垃圾邮件识别的评审排名方法
2016 Ninth International Conference on Contemporary Computing (IC3) Pub Date : 2016-08-01 DOI: 10.1109/IC3.2016.7880240
Gunjan Ansari, Tanvir Ahmad, M. Doja
{"title":"Review ranking method for spam recognition","authors":"Gunjan Ansari, Tanvir Ahmad, M. Doja","doi":"10.1109/IC3.2016.7880240","DOIUrl":"https://doi.org/10.1109/IC3.2016.7880240","url":null,"abstract":"E-commerce websites are becoming popular among customers who are buying products online. Online reviews play a major role in selling of online products. Reviews give the customer a complete overview of the product thus making it popular or unpopular among buyers thus increasing its sales. In order to increase sales of a product, reviewers are writing fake reviews. In this paper, a review ranking method is proposed. This method assigns a score to each review based on different parameters. The reviews having high score are considered to be more helpful or genuine and thus are ranked higher than the reviews having lower score. The lower ranked reviews are fake reviews and thus they are non-useful to the users. The proposed approach is an effective approach which avoids heavy computation of learning. Evaluation on real-life flipkart review dataset shows a precision of 83.3% thus showing the effectiveness of proposed model.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127671988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RF energy harvesting based D2D communication in downlink cellular network with repulsion point process modeling 基于斥力点过程建模的下行蜂窝网络射频能量采集D2D通信
2016 Ninth International Conference on Contemporary Computing (IC3) Pub Date : 2016-08-01 DOI: 10.1109/IC3.2016.7880241
Veerpal Kaur, S. Thangjam
{"title":"RF energy harvesting based D2D communication in downlink cellular network with repulsion point process modeling","authors":"Veerpal Kaur, S. Thangjam","doi":"10.1109/IC3.2016.7880241","DOIUrl":"https://doi.org/10.1109/IC3.2016.7880241","url":null,"abstract":"RF energy harvesting and D2D communication have been proposed as potential solutions to provide the energy efficient and spectrum efficient techniques for the wireless networks, respectively. In this paper, the performance of the RF energy harvesting based D2D communication in downlink SWIPT cellular network using the stochastic geometry approach is analyzed. A network model where the RF transmitters are distributed using the Ginibre α-determinantal point process model is proposed and a special case of Poisson point process when repulsion parameter (α) approaches zero is found. The network performance in terms of energy harvesting rate, power outage probability and the transmission outage probability is analyzed. The numerical results show that better performance is obtained when the maximum repulsion is exhibited between the RF energy sources.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115304952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Logger4u: Predicting debugging statements in the source code Logger4u:预测源代码中的调试语句
2016 Ninth International Conference on Contemporary Computing (IC3) Pub Date : 2016-08-01 DOI: 10.1109/IC3.2016.7880255
Srishti Saini, Neetu Sardana, Sangeeta Lal
{"title":"Logger4u: Predicting debugging statements in the source code","authors":"Srishti Saini, Neetu Sardana, Sangeeta Lal","doi":"10.1109/IC3.2016.7880255","DOIUrl":"https://doi.org/10.1109/IC3.2016.7880255","url":null,"abstract":"Software logging is an essential programming practice that saves important runtime information that can be used later by software developers for troubleshooting, debugging and monitoring the software. Even though software logging has numerous benefits this practice is underutilized because of lack of any formal guiding principles to developers for making strategic and efficient logging decisions. Logging should be optimized because too much logging can cause performance overheads; sparse logging can leave out vital information that might give clues to developers about the real issues. In absence of any formal guidelines developers rely solely on their domain knowledge and experience while making logging decisions. In order to lessen this effort of making decisions we have proposed a machine learning based framework, Logger4u for if-block logging prediction. We extract and use 28 distinctive static features from the source code helpful in making well informed logging decisions. We use Support Vector Machine (two variants, 1 linear and 1 RBF kernel based) models, Multilayer Perceptron with back propagation model and Random forest model in our work. Our approach gives encouraging results for if-block logging task. The accuracy achieved by the Linear SVM, MLP, Random Forest and kernel SVM are 73.05%, 74.62%, 79.84% and 81.22% respectively","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121857973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信