2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)最新文献

筛选
英文 中文
Big data classification with quantum multiclass SVM and quantum one-against-all approach 基于量子多类支持向量机和量子单对全方法的大数据分类
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918805
Arit Kumar Bishwas, Ashish Mani, V. Palade
{"title":"Big data classification with quantum multiclass SVM and quantum one-against-all approach","authors":"Arit Kumar Bishwas, Ashish Mani, V. Palade","doi":"10.1109/IC3I.2016.7918805","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918805","url":null,"abstract":"In this paper, we have proposed a quantum approach for multiclass support vector machines to handle big data classification. To achieve this goal, we have also developed and implemented a quantum version of the one-against-all algorithm. The proposed approach demonstrates that the big data multiclass classification can be implemented with quantum multiclass support vector machine in logarithmic time complexity on a quantum computer, compared to the classical multiclass support vector machines that can be implemented with polynomial time complexity. Hence, our proposed approach exhibits an exponential speed up in time complexity for big data multiclass classification.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123265742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Recommendations through click stream: Tracking the need, current work and future directions 通过点击流提供建议:跟踪需求、当前工作和未来方向
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918058
Shalini Gupta, Mayank Rawat
{"title":"Recommendations through click stream: Tracking the need, current work and future directions","authors":"Shalini Gupta, Mayank Rawat","doi":"10.1109/IC3I.2016.7918058","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918058","url":null,"abstract":"Recommender system is a tool that provides suggestions to customers. Recommendations are provided for the products that a customer may like in future or that are close to the target customer. On an e-commerce website good recommendation plays an important role for the seller and the buyer. So far researchers have digged out many methodologies for recommendation that may use explicit ratings or implicit data. Keeping track of customers surfing behavior can also help in endorsing products to similar users. Finding preference levels of a product for a particular customer can provide accuracy in recommendation. In this survey, we review recent developments in recommender systems based on click stream data and discuss the major challenges faced. We compare and evaluate available algorithms and examine their roles in future developments. We will discuss the methodologies and techniques that the researchers have devised for e-commerce websites with their drawbacks and a relative comparison of their performance.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123717654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Representation of speech signals using Hartley group delay function 用Hartley群延迟函数表示语音信号
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917974
K. Narendra, R. K. Swamy
{"title":"Representation of speech signals using Hartley group delay function","authors":"K. Narendra, R. K. Swamy","doi":"10.1109/IC3I.2016.7917974","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917974","url":null,"abstract":"This paper presents an alternate representation of phase information in speech signals using Hartley transform. Hartley Group Delay Function (HGDF) is computed on similar lines of Fourier Group delay function. Cepstral smoothing is applied so as to reduce the spiky nature of the group delay functions. The smoothened HGDF (SHGDF) is reported to have better resolution in group delay spectrum. A speaker verification system is designed as an application for the proposed signal representation. SHGDF is then presented as input to feed forward neural network. Performance curves using MFCCs, MODGFs and proposed SHGDF as features for the neural network are compared. It is found that the SHGDF functions provide better average performance for the speaker recognition system.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126545322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FMODC: Fuzzy guided multi-objective document clustering by GA FMODC:基于遗传算法的模糊引导多目标文档聚类
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918043
A. Rao, S. Ramakrishna
{"title":"FMODC: Fuzzy guided multi-objective document clustering by GA","authors":"A. Rao, S. Ramakrishna","doi":"10.1109/IC3I.2016.7918043","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918043","url":null,"abstract":"In the unsuprevised learning method of text mining process that is in prevalence, the issues pertaining to multi dimensionality is turning out to be a major factor, as the clustering is not focusing on optimal evaluation of concept, context and semantic relevancy, which are also very essential in terms of clustering process. In majority of the models that are proposed earlier, the factors like the term frequency, were considered and the clustering has been focusing only on one factor of Semantic, whereas as context and conceptual factors also play a significant importance. In extension to the earlier model of MODC, and DC3SR, the proposed model of Multi-objective Distance based Optimal Document Clustering (MODC) by GA has been proposed in the study. Among the lessons that are learnt from the review of earlier models., the scope for fuzzy guided multi-objective optimal document clustering (FMODC) approach which shall support in more effective computation and clustering using the Genetic Algorithm is discussed in the case scenario. From the experimentation process that is focused in the study, using the meta-text data gathered from the same publisher, the model has been tested in comparative analysis to other two models, BADC and AC-DCO and the outcome in terms of optimum clustering that has been achieved with FMODC model depicts the kind of accuracy in the model and the system. An unsupervised learning approach to form the initial clusters that estimates similarity between any two documents by concept, context and semantic relevance score and further optimizes by fuzzy genetic algorithm is proposed. This novel method represents the concept as correlation between arguments and activities in given documents, context as correlation between meta-text of the documents and the semantic relevance is assessed by estimating the similarity between documents through the hyponyms of the arguments. The meta-text of the documents considered for context assessment contains the authors list, keywords list and list of document versioning time schedules. The experiments were conducted to assess the significance of the proposed model.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114004209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of optical flow technique for moving object detection 运动目标检测的光流技术综述
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917999
Anshuman Agarwal, Shivam Gupta, D. Singh
{"title":"Review of optical flow technique for moving object detection","authors":"Anshuman Agarwal, Shivam Gupta, D. Singh","doi":"10.1109/IC3I.2016.7917999","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917999","url":null,"abstract":"Object detection in a video is a challenging task in the field of image processing. Some applications of the domain are Human Machine Interaction (HMI), Security and Surveillance, Supplemented Authenticity, Traffic Monitoring on Roads, Medicinal Imaging etc. There happens to be a number of methods available for object detection. Each of the method has some constraints on the kind of application it has been used for. This paper presents one of such method which is termed as Optical Flow technique. This technique is found to be more robust and efficient for moving object detection and the same has been shown by an experiment in the paper. Applying optical flow to an image gives flow vectors of the points corresponding to the moving objects. Next part of marking the required moving object of interest counts to the post processing. Post processing is the legitimate contribution of the paper for moving object detection problem. This here is discussed as Blob Analysis. It is tested on datasets available online, real time videos and also on videos recorded manually. The results show that the moving objects are successfully detected using optical flow technique and the required post processing.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123641646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Security assessment of AODV protocol under Wormhole and DOS attacks AODV协议在虫洞和DOS攻击下的安全性评估
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917954
B. K. Joshi, Megha Soni
{"title":"Security assessment of AODV protocol under Wormhole and DOS attacks","authors":"B. K. Joshi, Megha Soni","doi":"10.1109/IC3I.2016.7917954","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917954","url":null,"abstract":"A MANet a is set of wireless mobile nodes that share a common wireless channel without any centralized unit. In recent years many routing protocols have been proposed for application of MANets in government, commercial and military area. MANets have some qualities such as dynamic nature, decentralized support and infrastructure-less which make it extremely prone to attacks. Security becomes a major issue in the design of routing protocols in MANets. In this paper, we present security analysis of routing protocol in general and Ad-hoc On demand Distance Vector in particular under different type of attacks.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122473349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Fine tuning the parameters of back propagation algorithm for optimum learning performance 对反向传播算法的参数进行微调以获得最佳的学习性能
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917926
Viral Nagori
{"title":"Fine tuning the parameters of back propagation algorithm for optimum learning performance","authors":"Viral Nagori","doi":"10.1109/IC3I.2016.7917926","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917926","url":null,"abstract":"The back propagation algorithm has wide range of applications for training of feed forward neural networks. Over the years, many researchers have used back propagation algorithm to train their neural network based systems without emphasizing on how to fine tune the parameters of the algorithm. The paper throws the light on how researchers can manipulate and experiment with the parameters of the back propagation algorithm to achieve the optimum learning performance. The paper presents the results of the laboratory experiments of fine tuning the parameters of the back propagation algorithm. The process of fine tuning the parameters was applied on the neural network based expert system prototype. The prototype aims to analyze and design customized motivational strategies based on employees' perspective. The laboratory experiments were conducted on the following parameters of back propagation algorithm: learning rate, momentum rate and activation functions. Learning performance are measured and recorded. At the same time, the impact of activation function on the final output is also measured. Based on the results, the values of the above parameters which provide the optimum learning performance is chosen for the full scale system implementation.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125103322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Simulink based fuzzified COCOMO 基于Simulink的模糊COCOMO
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918800
Sonia Chhabra, Harvir Singh
{"title":"Simulink based fuzzified COCOMO","authors":"Sonia Chhabra, Harvir Singh","doi":"10.1109/IC3I.2016.7918800","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918800","url":null,"abstract":"Accurate estimation of the cost of a software minimizes the risk for the software development process. Applicability of the different cost estimation models is very crucial as the information required for the implementation of such models is imprecise and vague. In order to increase the accuracy of the model, it is proposed to introduce the concept of fuzzification for calculating the value of effort multiplier corresponding to different of cost drivers used in COCOMO model. The proposed model is designed using the MATLAB and is modeled in SIMULINK. The results are validated using the COCOMO dataset and it has been observed that by fuzzifying the cost drivers the model generated the results more closer to the actual values and thus enhances the accuracy of the estimation process.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125176649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling of a compact dual band PIFA using hybrid neural network 基于混合神经网络的紧凑双频PIFA建模
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917958
Ruchi Varma, J. Ghosh
{"title":"Modeling of a compact dual band PIFA using hybrid neural network","authors":"Ruchi Varma, J. Ghosh","doi":"10.1109/IC3I.2016.7917958","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917958","url":null,"abstract":"In this paper, a compact dual band planar inverted-F antenna (PIFA) has been proposed. Dual band is achieved by inserting slots on the top radiating patch. The dimension of the patch is 15 × 12 mm2 and finite ground plane size is 44×40mm2 which can easily be integrated inside the mobile phone. Further, a hybrid neural network (HNN) is used for the design of dual band PIFA. This method is more accurate and requires less time. The HNN results are compared with the CST simulation results and are found to be in good accord.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127199705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Thermal effect aware X-bit filling technique for peak temperature reduction during VLSI testing 基于热效应感知的x位填充技术降低超大规模集成电路测试中的峰值温度
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917963
Sanjoy Mitra, Debaprasad Das
{"title":"Thermal effect aware X-bit filling technique for peak temperature reduction during VLSI testing","authors":"Sanjoy Mitra, Debaprasad Das","doi":"10.1109/IC3I.2016.7917963","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917963","url":null,"abstract":"Power density for digital circuits is increasing by leaps and bounds with the progress of technology and increased integration. Higher spatial power density contemplates heat generation which raises peak temperature affecting flawless system behavior. The situation is worsened further during testing and this rise in temperature during test can permanently spoil the chip. To resolve this problem, significant efforts are rendered by the academia and industry for controlling temperature rise during test mode operation and peak temperature reduction is viewed as a sub problem in this context. Controlling of temperature divergence is also needed to bring temperature distribution homogeneity across the chip. Heat generated inside a chip under test can be dropped down by lowering inter test cube switching activity. Controlling of peak temperature and temperature divergence with in a safe legitimate threshold may be accomplished by an intelligent don't care bit filling approach which especially takes care of thermal effect and drops down switching activity inside a circuit block. In this paper, a thermal effect aware don't care (X) filling approach is put forwarded which controls peak temperature and temperature divergence within a predefined threshold during testing. This proposal is verified by extensive simulation on ITC'99 benchmark circuits and exhibits a satisfactory level of efficacy.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114711818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信