2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)最新文献

筛选
英文 中文
Code clone detection based on order and content of control statements 基于顺序和控制语句内容的代码克隆检测
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917935
M. Sudhamani, Lalitha Rangarajan
{"title":"Code clone detection based on order and content of control statements","authors":"M. Sudhamani, Lalitha Rangarajan","doi":"10.1109/IC3I.2016.7917935","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917935","url":null,"abstract":"In this paper, we propose a method to detect duplicate codes based on structure and content of control statements present in the source codes. The proposed method efficiently finds all types of clones. Similarity between two programs is identified by comparing metrics of programs. Metric of a program is computed using control statements, operators and operands present in the program. Proposed method is independent of programming languages. This approach is also useful to detect plagiarized programs in academic environment.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123673594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A comparison of reinforcement learning based approaches to appliance scheduling 基于强化学习的电器调度方法比较
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917970
Namit Chauhan, Neha Choudhary, K. George
{"title":"A comparison of reinforcement learning based approaches to appliance scheduling","authors":"Namit Chauhan, Neha Choudhary, K. George","doi":"10.1109/IC3I.2016.7917970","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917970","url":null,"abstract":"Reinforcement learning is often proposed as a technique for intelligent control in a smart home setup with dynamic real-time energy pricing and advanced sub-metering infrastructure. In this paper, we introduce a variation of State Action Reward State Action (SARSA) as an optimization algorithm for appliance scheduling in smart homes with multiple appliances and compare it with the popular reinforcement learning method Q-learning. A simple, intuitive and unique treelike Markov decision process (MDP) structure of appliances is proposed which takes into account the states, such as on/off/runtime status, of all schedulable appliances but does not require the knowledge of the state to state transition probabilities.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The redesigned Fuzzy C Strange points clustering algorithm 重新设计的模糊C奇异点聚类算法
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918790
Terence Johnson, S. Singh, Anuradha Sharma
{"title":"The redesigned Fuzzy C Strange points clustering algorithm","authors":"Terence Johnson, S. Singh, Anuradha Sharma","doi":"10.1109/IC3I.2016.7918790","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918790","url":null,"abstract":"The redesigned Fuzzy C Strange points clustering algorithm uses the membership function to find the strange points and also to establish the degree of likeness of elements to different clusters as opposed to the traditional fuzzy c strange points clustering algorithm which uses the Euclidean distance to find the strange points and membership function only to group the points into clusters. The redesigned algorithm was observed to give similar quality of clusters and also converge with the same speed of execution as the orthodox fuzzy c strange points clustering method.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124188319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance analysis of hybrid filters in high power applications 混合滤波器在大功率应用中的性能分析
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917984
B. Misra, B. Nayak
{"title":"Performance analysis of hybrid filters in high power applications","authors":"B. Misra, B. Nayak","doi":"10.1109/IC3I.2016.7917984","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917984","url":null,"abstract":"In the proposed work shunt connected active and passive harmonic filters are taken into consideration. This proposed configuration is able to eliminate current harmonics produced by large nonlinear loads which are connected to the grid. The current waveform is improved by passive harmonic filter created by a non-linear load, whereas active harmonic filter improves power balancing effect of the load. Among different types of shunt passive filters, a high pass filter, a double tuned filter and a C-type filter has been taken into consideration. Similarly a shunt active filter using voltage source inverter, a series inductor on the AC side and a capacitor on DC side is considered for the proposed hybrid filter design for high power application. The system performance with the filters is presented by considering different cases and the results are compared in the MATLAB-Simulink platform.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127268942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Connected dominating set based network coding for SDN 基于连通支配集的SDN网络编码
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918792
A. Singh, A. Nagaraju
{"title":"Connected dominating set based network coding for SDN","authors":"A. Singh, A. Nagaraju","doi":"10.1109/IC3I.2016.7918792","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918792","url":null,"abstract":"In order to address complex and resource demanding applications. Software Defined Networks (SDN) and Network Coding (NC) paradigm has garnered much attention in recent years. NC is the key concept of networking to enhance network throughput and reliability, whereas SDN is the modern network architecture to virtualized network services for making route more flexible and allocating network resources on-the-fly. NC advances the conventional store-and-forward concept of packet flow by the notion of a store-code-forward among the intermediate nodes. With effect, source and destination no longer need to track singular packets, but rather targeting enough autonomous encoded packets. The practical coding gain lies on the complication of deploying coding techniques over the classical network of routers. The comprehensive view of SDN can overcome this challenge by separating network architecture into control plane and data plane. This paper counsels the use of SDN which not only assist traffic, but also manage buffering, scheduling and processing of packets. Further, the paper presents NC functionality rich Connected Dominated Set based Flow-oriented Coding-aware Routing technique (CFCR) to optimize number of transmissions over the SDN network.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128821360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification of power quality events using support vector machine and S-Transform 基于支持向量机和s变换的电能质量事件分类
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917975
P. K. A. Kumar, V. Vijayalakshmi, J. Karpagam, C. K. Hemapriya
{"title":"Classification of power quality events using support vector machine and S-Transform","authors":"P. K. A. Kumar, V. Vijayalakshmi, J. Karpagam, C. K. Hemapriya","doi":"10.1109/IC3I.2016.7917975","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917975","url":null,"abstract":"Classification of power quality events (PQE) to enhance the power quality is a vital problem in end users. In this article a novel method to classify PQE with random white noise of zero mean based on wavelet energy change and Support Vector Machine (SVM) is presented. Here PQE waveforms are disintegrated into 10 layers by db4-wavelet with multi-resolution. Energy Changes (EC) of every level between PQE waveforms and standard voltage waveforms is drawn out as eigenvectors. Principal Component Analysis (PCA) is implemented to decrease the dimensions of eigenvectors and gives the main structure of the matrix, which creates new feature vectors and these vectors separated into two sets, namely training set and testing set. The method of cross-validation is adopted for the training set to identify the optimum parameters adaptively and build the training model also the testing set is replaced into the training model for testing. In conclusion the suggested method accuracy is compared with S-Transform (ST) based PQE classification to prove the accuracy of classification. The classification accuracy of SVM is great and having strong ability to resist noise, speedy classification of PQE.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128861429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Building secure healthcare services using OAuth 2.0 and JSON web token in IOT cloud scenario 在物联网云场景中使用OAuth 2.0和JSON web令牌构建安全的医疗保健服务
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917942
Prajakta Solapurkar
{"title":"Building secure healthcare services using OAuth 2.0 and JSON web token in IOT cloud scenario","authors":"Prajakta Solapurkar","doi":"10.1109/IC3I.2016.7917942","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917942","url":null,"abstract":"OAuth 2.0 is a delegated authorization framework enabling secure authorization for applications running on various kinds of platforms. In healthcare services, OAuth allows the patient (resource owner) seeking real time clinical care to authorize automatic monthly payments from his bank account (resource server) without the patient being required to supply his credentials to the clinic (client app). OAuth 2.0 achieves this with the help of tokens issued by an authorization server which enables validated access to a protected resource. To ensure security, access tokens have an expiry time and are short-lived. So the clinical app may use a refresh token to obtain a new access token to cash monthly payments for rendering real time health care services. Refresh tokens need secure storage to ensure they are not leaked, since any malicious party can use them to obtain new access and refresh tokens. Since OAuth 2.0 has dropped signatures and relies completely on SSL/TLS, it is vulnerable to phishing attack when accessing interoperable APIs. In this paper, we develop an approach that combines JSON web token (JWT) with OAuth 2.0 to request an OAuth access token from authorization server when a client wishes to utilize a previous authentication and authorization. Experimental evaluation confirms that the proposed scheme is practically efficient, removes secure storage overhead by removing the need to have or store refresh token, uses signature and prevents different security attacks which is highly desired in health care services using an IOT cloud platform.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129034166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
On the selection of efficient routing protocol for 802.11p interface in VANET VANET中802.11p接口高效路由协议的选择
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918037
K. Priya, J. Malhotra
{"title":"On the selection of efficient routing protocol for 802.11p interface in VANET","authors":"K. Priya, J. Malhotra","doi":"10.1109/IC3I.2016.7918037","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918037","url":null,"abstract":"In this modern era the road accidents, traffic are increasing day by day. A smart technique is required to tackle these problems. So for wireless communication, Vehicular Adhoc Network (VANET) is highly influenced research area that has been developing very fast. Presently this area is not as mature as certain issues need to be addressed. Considering Routing Protocols as an important area in VANET, work has been done in this paper. In doing so AODV, DSDV, DSR and GOD Routing Protocols have been evaluated in terms of Parameters namely Packet Collision Rate, Packet Drop Rate and Throughput Rate. Based on the aforementioned parameters this paper further compares and evaluates the performance of 802.11a interface with 802.11p MAC Interface when speed of multi interface car is varied. The simulations are performed on GUI Based Tool NCTUns 6.0.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127613419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Sixth sense technology: Applications and comparison 第六感技术:应用与比较
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918003
Allan Shivji, Neeta Patil
{"title":"Sixth sense technology: Applications and comparison","authors":"Allan Shivji, Neeta Patil","doi":"10.1109/IC3I.2016.7918003","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918003","url":null,"abstract":"We grew up interacting with the physical objects around us. And there are large number of them that we use everyday. These objects are more fun to use than our computing devices. Taking about objects, another thing that get's attached with objects is gestures; how we manipulate these objects & how we use them in everyday life. These gesture are used to interact with objects as well as to interact with each other. So using Sixth Sense Technology we get to know about everyday objects and gestures and how using these objects can leverage (power to influence situation) our interaction with digital world. This technology helps us to build bridge between physical world and the digital world. It brings part of digital world to physical world, some part of digital information in brought into physical world which can be manipulated in physical world [1]. Anybody who is equipped with sixth sense device can use its applications at any place and any time. Working of Sixth sense technology, its applications, advantages, future scope and different implementation approaches are presented in this paper.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115763460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Utilization-based power consumption profiling in smartphones 智能手机中基于利用率的功耗分析
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7919046
N. Shukla, Rosarium Pila, S. Rawat
{"title":"Utilization-based power consumption profiling in smartphones","authors":"N. Shukla, Rosarium Pila, S. Rawat","doi":"10.1109/IC3I.2016.7919046","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7919046","url":null,"abstract":"Energy cost of crowd-sourced continuous sensing is reported to be quite high. As the number of on-board active sensors increases, complications arise due to inter-sensor interactions. The energy-cost of the Smartphones is primarily due to wireless communications (in various modes, such as, cellular radio, GPS, Wi-Fi direct, and Bluetooth) and environmental sensing using its embedded sensors in a wireless personal area network setting. The existing popular on-device-online energy-cost profilers for Android Smartphones, namely, Amobisense and PowerTutor, are energy-hungry. In this paper, we report an efficient on-demand-online profiler, called pProf, that learns from offline-precomputed model parameters to reduce the online profiling cost. We have tested our proposed technique in a customized test-bed setup comprising of the Android Smart-phones with embedded sensors that also communicate with the neighborhood sensors on smart-wearables and Sensorcon's Sensordrone platform. Our experimental measurement studies demonstrate that, compared to the popular profilers, such as Amobisense and PowerTutor, pProf consumes typically 10–15% lesser energy.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131636253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信