{"title":"Energy Efficient Approach for Intrusion Detection System for WSN by applying Optimal Clustering and Genetic Algorithm","authors":"Shubhangi Singh, R. S. Kushwah","doi":"10.1145/2979779.2979840","DOIUrl":"https://doi.org/10.1145/2979779.2979840","url":null,"abstract":"Ubiquitous computing is modifying the presence of human being in the current epoch. Smart home is solitary of the emerging instances for omnipresent computing solicitations. Wireless Sensor Network can hypothetically be responsible for information about environmental and confidential activities and their status. This information can be expedient for assortment of tenacities like monitoring home sanctuary, exploratory status of nodes, and replacing nodes that are deficient or dead. The sensor network needs to be protected from intrusions, anomalies and incongruities. Concluded ages, numerous intrusion detection systems are anticipated for thwarting wireless sensor networks from intrusions. This research work is taking conventional probabilistic clustering protocol concepts, also considering heterogeneity and behaviour based detection procedure in wireless sensor network as an effective way to increase the detection accuracy, network lifetime and stability. Various issues in Wireless Sensor Networks are formulated as multidimensional optimization problems, and impend through self-organizing concept and intrusion detection architecture. In this paper, we have proposed an optimized cluster based approach for intrusion detection system using genetic algorithm, to make an optimized agent selection process and adaptive intrusion detection which depends upon prevailing network conditions and resource status. Here, simulation results have shown that with this network designing the network efficiency and stability period have increased extensively.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122512098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Median Edge Detector for Lossless Video Coding: An efficient prediction scheme for lossless video coding","authors":"Mahima Agrawal, R. Choudhary","doi":"10.1145/2979779.2979819","DOIUrl":"https://doi.org/10.1145/2979779.2979819","url":null,"abstract":"In this paper, we propose a novel non-linear prediction based method for lossless video coding. This method exploits gradient energies to perform pixel by pixel prediction. A feedback mechanism based on prediction context is also proposed, which prevents the non-linear predictor from over adjusting its predicted value. To exploit the redundancies present in the residues, a context based residue coding scheme is devised. This scheme efficiently predicts sign and magnitude of the residue. Besides computational simplicity of the proposed method, experimental results show lower value of zero order entropy as compared to the competitive algorithms reported in the literature.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121220274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ECG analysis with signal classification using Decision Tree Induction (DTI)","authors":"Baljit Kaur, Sanjay Singla","doi":"10.1145/2979779.2979874","DOIUrl":"https://doi.org/10.1145/2979779.2979874","url":null,"abstract":"This paper presents a new technique of classifying Arrhythmia based on ECG signal by using Decision Tree Induction as our method. Dataset of Arrhythmia is already available in MATLAB. In this paper, we trying to solve the problem of over fitting that occur in DTI. To overcome this problem, we tested it on a standard dataset and we achieved an average accuracy of 100% using our method.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122262014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tweet Sentiment Analyzer: Sentiment Score Estimation Method for Assessing the Value of Opinions in Tweets","authors":"M. A. M. Raja, S. Swamynathan","doi":"10.1145/2979779.2979862","DOIUrl":"https://doi.org/10.1145/2979779.2979862","url":null,"abstract":"Social networking applications are prominent among the internet user communities. Many social media websites are used for sharing the information instantly. Twitter is one of the vibrant social networking websites for sharing small textual information within a short span of time. It is essential to identify the type of information shared on these websites. Sentiment analysis involves the process of analyzing the opinion content present in the text. Millions of tweets are posted in a day about various topics. Twitter sentiment analysis mainly involves the process of identifying the polarity oriented terms mentioned in the tweet. Most of the twitter sentiment analysis works have concentrated on the sentiment polarity identification. Based on the literature, it is observed that, researchers still need to contribute in the area of sentiment score calculation of a tweet. Hence, in this work, sentiment score calculation is carried out with sentiment corpus oriented approach for calculating the score effectively. In addition, the grammatical type of the word used in a tweet, the relationship between the words are properly identified. The tweet tagger, corpus based sentiment score assignment have been distinctively used when compared to other previous works. The experimental results show that the sentimental score based tweet identification resulted in top tweets among the large collection of tweets.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132857266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An automation framework for configuration management to reduce manual intervention","authors":"Supriya V. Karale, Vishal Kaushal","doi":"10.1145/2979779.2979853","DOIUrl":"https://doi.org/10.1145/2979779.2979853","url":null,"abstract":"To support the increasing expectations of clients in getting quick bug resolutions and feature enhancements, many IT industries today use agile software development methodology. Under this methodology changes are made in the software on daily basis. In order to cope-up with these changes, Software Configuration Management (SCM) plays an important role. Configuration manager is responsible for maintaining and monitoring changes which are made in software over a period of time. Version control tools are used by the configuration manager to maintain the software. It allows developers to keep source code in repository and take copy from repository, whenever needed. This makes it necessary to integrate complete code in repository, compile it and create deliverable package. Configuration manager performs these activities, such as analyzing logs of daily compilation and package creation software that is to be delivered. In current scenario these tasks are performed manually. This paper proposes a framework to reduce manual intervention and automate above mentioned tasks of the configuration manager.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133297334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perceptive Proposition of Combined Boosted Algorithm for Brain Tumor Segmentation","authors":"S. Hasan, Mohiudding Ahmad, Suvro Ghosh","doi":"10.1145/2979779.2979852","DOIUrl":"https://doi.org/10.1145/2979779.2979852","url":null,"abstract":"In recent days, brain tumor detection through Magnetic Resonance Imaging (MRI) is becoming broad and current interest because it is a very challenging task even, in today's modern medical image processing research. Earlier, many researchers used a variety of algorithms to segment the tumor from MRI images. However, this research paper outlines a hybrid approach detecting brain tumor through MRI image segmentation for better accuracy than earlier techniques, where both region-based and supervised classifiers-based techniques are combined together. The problem of over-segmentation has been minimized. The combined feature extraction technique has also added a new concept in our system. In addition, the paper concludes with the status checking of the tumor & provides a necessary diagnosis of brain tumor. Lastly, we compare our proposed model with other techniques and get a far better result.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131612867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Malay Kumar, Jasraj Meena, M. Vardhan, Sanjeev Jain
{"title":"Secure and Efficient Regression Analysis Outsourcing Algorithm for Cloud Server","authors":"Malay Kumar, Jasraj Meena, M. Vardhan, Sanjeev Jain","doi":"10.1145/2979779.2979842","DOIUrl":"https://doi.org/10.1145/2979779.2979842","url":null,"abstract":"IT industry has been experiencing the benefits of outsourcing for years, since the outsourcing brings down both the capital and operational expenditure. Similarly, cloud computing provides storage, computation, and other specialized services on demand to customers over the internet at a very generous cost. However, outsourcing data and computation to a third party cloud server is a great cause of concern to the client because a customer physically loses control over their sensitive/classified data and computation. The loss of physical control over the data and computation is the main issue for a client that makes him feel insecure using cloud computing services. The solution to address outsourcing issues, first, the cloud service provider must be honest by providing correct and secure computation; second, the outsourced data and computation shall be verifiable to customers in terms of confidentiality and integrity. In this paper, we investigate the problem of regression analysis, outsourcing problem and devise a secure and efficient outsourcing algorithm which provides security for the input and also provide safeguards to the output result computed on cloud servers. Further, a novel and efficient result verification technique have been developed to detect server misbehavior and cheating with optimal probability of 1. Furthermore, theoretical and experimental analysis has compared with existing algorithm to demonstrate the efficiency, security and effectiveness of the proposed algorithms.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128614241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajat Pasari, Vaibhav Chaudhari, Atharva Borkar, Amit D. Joshi
{"title":"Parallelization of Vertical Search Engine using Hadoop and MapReduce","authors":"Rajat Pasari, Vaibhav Chaudhari, Atharva Borkar, Amit D. Joshi","doi":"10.1145/2979779.2979830","DOIUrl":"https://doi.org/10.1145/2979779.2979830","url":null,"abstract":"In this paper, we build a parallelized Vertical Search Engine on Apache Hadoop cluster. Domain of our Vertical Search Engine is Computer related terminologies and it takes seed URLs of computer domain extracted from Wikipedia. These web-pages are then crawled and parsed with the help of Apache Nutch crawler and stored into Apache HBase. Linguistic processing like removal of stop words and stemming are performed on the content of the web pages stored in the database. Inverted index is constructed and results are ranked as per the ranking algorithm described later in the paper. This paper mainly focuses on obtaining the most relevant results in shortest time possible by distributed processing.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128640189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Potent Cloud Services Utilization with Efficient Revised Rough Set Optimization Service Parameters","authors":"Ashish Tiwari, R. Sharma","doi":"10.1145/2979779.2979869","DOIUrl":"https://doi.org/10.1145/2979779.2979869","url":null,"abstract":"Cloud computing is another wave in the field of data innovation. Some consider it to be a rising field in software engineering. It comprises of an arrangement of assets and administrations offered through the Internet. Cloud computing is a trial in conveying assets as an administration. In Cloud computing surroundings the part of administration supplier in different ways like Cloud Broker who oversee cloud stages and rent assets with regards to a utilization based rating model and repair suppliers, who rent assets from one or a few foundation suppliers to serve the tip clients. The arrangement of activity of selecting a Cloud Service supplier is assessed upon the reason of Which-Cloud Provider-Provides-What. Selecting scholarly degree relevant administration supplier is harder as an aftereffects of all CSPs cant be meant all relentless Service. Aside from the execution and pressure reason we have taken indistinguishable four parameters that unit of estimation blessing in ROSP calculation. We have got utilized harsh math to ask the numerical model at interims that the calculation Rough set change Service Parameters is framed on the reason of the prudent asset Utilization in Cloud Computing rehearse Revised ROSP programming Technique. At that point the calculation is actualized at interims the cloud machine at interims that cloudlets, datacenters, and cloud dealers unit of estimation acclimated perform the calculations. The strategy is finished consolidated underneath net Beans and sql. The outcomes once the usage of the ERROSP calculation we have unit of estimation over the ROSP calculation in time taken and centralized computer use. This paper deals with the Simulation of Cloud Sim package for the results.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115885622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topic Extraction and Sentiment Classification by using Latent Dirichlet Markov Allocation and SentiWordNet","authors":"P. Kaur, T. Ghorpade, V. Mane","doi":"10.1145/2979779.2979865","DOIUrl":"https://doi.org/10.1145/2979779.2979865","url":null,"abstract":"Now days, the power of internet is having an immense impact on human life and helps one to make important decisions. Since plenty of knowledge and valuable information is available on the internet therefore many users read review information given on web to take decisions such as buying products, watching movies, going to restaurants etc. Reviews contain user opinion about the product, service, event or topic. It is difficult for web users to read and understand the contents from large number of reviews. Whenever any detail is required in the document, this can be achieved by many probabilistic topic models. A topic model provides a generative model for documents and it defines a probabilistic scheme by which documents can be achieved. Topic model is an Integration of acquaintance and these acquaintances are blended with theme, where a theme is a fusion of terms. We describe Latent Dirichlet Markov Allocation 4 level hierarchical Bayesian Model (LDMA), planted on Latent Dirichlet Allocation (LDA) and Hidden Markov Model (HMM), which highlights on extracting multiword topics from text data. To retrieve the sentiment of the reviews, along with LDMA we will be using SentiWordNet and will compare our result to LDMA with feature extraction of baseline method of sentiment analysis.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116992210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}