2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)最新文献

筛选
英文 中文
A Binomial Heap Extractor for Automatic Keyword Extraction 用于自动关键字提取的二项堆提取器
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-01 DOI: 10.1109/SAPIENCE.2016.7684154
D. V. Paul, J. Pawar
{"title":"A Binomial Heap Extractor for Automatic Keyword Extraction","authors":"D. V. Paul, J. Pawar","doi":"10.1109/SAPIENCE.2016.7684154","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684154","url":null,"abstract":"Automatic Extraction of Keywords using Frequent Itemsets (AEKFI) is a new technique for keyword extraction which integrates adjacency of location of words within the document to automatically select the most discriminative words without using a corpus. This paper introduces a novel Binomial Heap Approach based AEKFI for document summarization. Binomial heap does keyword extraction using binomial minimum heap operations. AEKFI provides flexibility to select either the set of keywords from a given document or user specified number of keywords. AEKFI does not impose any restriction on the length of keywords being extracted. Demonstration of Binomial Heap Extractor has been made and has been found efficient in reducing the time complexity O (n2) of existing approaches to O (n log n). Experimental results prove the advantage of Binomial Minimum Heap based AEKFI over other keyword extraction tools.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123816279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A hybrid technique of Mamdani and Sugeno based fuzzy interference system approach 基于Mamdani和Sugeno的模糊干涉系统混合方法
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-01 DOI: 10.1109/SAPIENCE.2016.7684131
M. Devi, M. Soranamageswari
{"title":"A hybrid technique of Mamdani and Sugeno based fuzzy interference system approach","authors":"M. Devi, M. Soranamageswari","doi":"10.1109/SAPIENCE.2016.7684131","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684131","url":null,"abstract":"Neuro-Fuzzy network based impulse noise filtering for gray scale images is presented. The proposed method is constructed by hybrid technique of Mamdani and Sugeno based fuzzy interference system approach. As demonstrated by experimental results, Peak signal-to-noise ratio(PSNR) and Root Mean Square Error(RMSE) possess better performance. The proposed filter has some advantages over its competitors. The hybrid rule is applied to reduce the error of the optimization. In hybrid based fuzzy interference system approach, the system develops a fuzzy logic based scheme to filter a noisy signal. This can be applied in various source to reduce noise. A one input and output Mamdani fuzzy interference system is designed for the filter where the input is a noisy signal and output is a filtered output. Fuzzy rules have been used to obtain the filtered output.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124500391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An efficient illumination invariant human face recognition using new preprocessing approach 基于新的预处理方法的高效光照不变人脸识别
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-01 DOI: 10.1109/SAPIENCE.2016.7684143
U. K. Jaliya, J M Rathod
{"title":"An efficient illumination invariant human face recognition using new preprocessing approach","authors":"U. K. Jaliya, J M Rathod","doi":"10.1109/SAPIENCE.2016.7684143","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684143","url":null,"abstract":"In any image, illumination is one of the challenges task and effect the performance of the system. In this paper, we have proposed new preprocessing approach to eliminate illumination effect from the human face images. In our approach we first apply Log transform on the input image to enhance illumination effect, output of this is given as input to the DoG filtering technique to smooth the image and then performing image normalization so we get the illumination eliminated image. To measure the performance of the proposed approach we are using PCA method to calculate the face recognition. We have performed analysis on the YaleB face database. We have proved that our approach give better recognition rate compare to some of the existing approaches.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vritthi - a theoretical framework for IT recruitment based on machine learning techniques applied over Twitter, LinkedIn, SPOJ and GitHub profiles Vritthi -一个基于机器学习技术的IT招聘理论框架,应用于Twitter, LinkedIn, SPOJ和GitHub配置文件
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-01 DOI: 10.1109/SAPIENCE.2016.7684163
Animesh Giri, A. Ravikumar, Sneha R. Mote, Rahul Bharadwaj
{"title":"Vritthi - a theoretical framework for IT recruitment based on machine learning techniques applied over Twitter, LinkedIn, SPOJ and GitHub profiles","authors":"Animesh Giri, A. Ravikumar, Sneha R. Mote, Rahul Bharadwaj","doi":"10.1109/SAPIENCE.2016.7684163","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684163","url":null,"abstract":"In this model, we propose an innovative recruitment system using social networking websites like Twitter and LinkedIn along with code repository hosting website GitHub and competitive coding platforms like SPOJ. It is aimed to develop advanced search engines to automatically sort the job-seekers based on job offer requirements using various data mining and machine learning techniques. Vritthi allows job-seekers to quantify their job preparedness and offer a list of specific areas for them to focus on. We propose the formulation of VPQF (Vritthi Professional Quotient) that involves the use of K-means algorithm to classify users into appropriate clusters and provide them with appropriate suggestions for improvement. Using classic data mining techniques like filtration, classification, clustering, profiling as well as string matching & user profiling, this tool will enable recruiters to effectively select candidates who fit their organization in a hassle-free automated manner.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117320674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Non linear analysis of epileptic EEG 癫痫脑电图的非线性分析
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-01 DOI: 10.1109/SAPIENCE.2016.7684174
J. E. Jacob, V. Vijith, K. Gopakumar
{"title":"Non linear analysis of epileptic EEG","authors":"J. E. Jacob, V. Vijith, K. Gopakumar","doi":"10.1109/SAPIENCE.2016.7684174","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684174","url":null,"abstract":"EEG contains immense information about the brain activity which cannot be understood completely by visual inspection. Powerful signal processing algorithms in EEG analysis can greatly assist the physicians and neurologists to extract such hidden information. It has been found that EEG being a time-varying and non-stationary signal, can be analyzed by non-linear methods. In this paper we tried to evaluate the non linear features, Correlation dimension, Approximate Entropy, Sample Entropy, and Hurst Exponent in epileptic and normal EEG and has obtained clear discrimination between them.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114654628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A semantic graph based approach on interest extraction from user generated texts in social media 基于语义图的社交媒体用户生成文本兴趣提取方法
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-01 DOI: 10.1109/SAPIENCE.2016.7684118
Lijo M. Jose, K. Rahamathulla
{"title":"A semantic graph based approach on interest extraction from user generated texts in social media","authors":"Lijo M. Jose, K. Rahamathulla","doi":"10.1109/SAPIENCE.2016.7684118","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684118","url":null,"abstract":"Micro-blogs and social networking websites have become a platform for self-expression. They reflect the thoughts, ideas and opinions of people on various subjects. Analyzing these texts to find the main topics mentioned in them is a fine method for targeted marketing. Targeted marketing involves identifying potential clients who might be interested in particular products or services and marketing them to these clients. Examples of targeted marketing include recommender systems and targeted advertising. Identifying the personal interests of users is a major factor that determines the quality of such systems. Commonly used techniques monitor online behavior of users like purchase histories, product views etc. or explicitly collect the user's interests through surveys and rating systems. However there have been only a few attempts to use user generated texts as a source for analyzing personal interests and preferences. This paper proposes a semantic graph based method to identify the likes and interests of users by analyzing their twitter feeds. It also put forward the design for a recommender system that can work along with the proposed interest extraction method. This method is purely based on the texts that a user leaves in a particular social network website or a micro blog. Unlike the other conventional methods there is no need to track the user activity on the Internet or conduct exclusive surveys and ratings to collect explicit ideas from the user.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127298064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An effective middleware based architecture for discovering web services on Mobile devices 用于在移动设备上发现web服务的有效的基于中间件的体系结构
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-01 DOI: 10.1109/SAPIENCE.2016.7684141
B. Revathi, J. Sathya
{"title":"An effective middleware based architecture for discovering web services on Mobile devices","authors":"B. Revathi, J. Sathya","doi":"10.1109/SAPIENCE.2016.7684141","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684141","url":null,"abstract":"In Today's world Mobile devices are the important handheld devices spreading throughout the world, and it is necessary to integrate web services into the mobile device. We introduce a simple approach for dynamically invoking web service methods from mobile devices with minimal user intervention that only involves entering a search phrase and values for the method parameters. This energy efficient architecture overcomes technical challenges that involve power consuming and speedy access of web services by introducing man-in-the-middle (MIM) server that provides a web service whose responsibility is to discover needed services and build the client-side proxies at runtime. We perform extensive evaluations of the system performance to measure scalability as it relates to the capacity of the MIM server in handling mobile client requests, and device battery power savings resulting from delegating the service discovery tasks to the server.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126574779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COBBS: A Multicloud Architecture for better business solutions cobs:用于更好的业务解决方案的多云架构
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-01 DOI: 10.1109/SAPIENCE.2016.7684148
K. Baby, Anupriya Vysala
{"title":"COBBS: A Multicloud Architecture for better business solutions","authors":"K. Baby, Anupriya Vysala","doi":"10.1109/SAPIENCE.2016.7684148","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684148","url":null,"abstract":"Adapting to the latest technological advancement is the only means for sustainability and growth for any organization in this era of fast growing business world. Cloud computing have proved to be a great boon for business development as it provides servers across the globe for storing data securely and performing computations on them. However security challenges still pose a great threat for using clouds especially in handling sensitive data. This paper throws light into different existing Multicloud approaches and then proposes a novel architecture named COBBS. Partitioning data and logic part of an application and performing a strong encryption scheme like homomorphic encryption before storing in cloud is the base of COBBS. Homomorphic encryption is different from other encryption schemes as it can perform computations on encrypted data, excluding the need for sharing a secret key and preventing the exposure of most valuable data even from the cloud service providers.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116224653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MANET protocols: Extended ECDSR protocol for solving stale route problem and overhearing MANET协议:扩展的ECDSR协议,用于解决陈旧路由问题和监听
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-01 DOI: 10.1109/SAPIENCE.2016.7684168
Hridya V. Devaraj, A. Chandran, S. Babu
{"title":"MANET protocols: Extended ECDSR protocol for solving stale route problem and overhearing","authors":"Hridya V. Devaraj, A. Chandran, S. Babu","doi":"10.1109/SAPIENCE.2016.7684168","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684168","url":null,"abstract":"MANET is collection of wireless nodes which are connected to each other, but all nodes are independent. They can communicate each other via intermediate nodes or directly. In order to increase the lifetime of the network, routing must be energy efficient. Routing protocols like DSR, ECDSR, AODV, TORA, DSDV, EEAODR, and EPAR are proposed for MANET. Design of energy efficient routing protocol is the key issue for mobile ad hoc networks. One difficulty with routing protocols in MANET is to know which protocol performs best in which situation. Since protocols exhibit advantages and disadvantages based on certain context, it is quite difficult to determine. This paper provides an insight into the facts of proactive, reactive and hybrid routing protocols that are used in MANET. ECDSR protocol selects nodes on the basis of minimum threshold energy. As ECDSR protocol has overhearing and stale route problem, which leads to packet loss and over energy consumption. In our paper we reviewed the solution to address overhearing and stale route problem by suggesting modification in ECDSR protocol.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126567703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A survey: Optimal node routing strategies in MANET MANET中最优节点路由策略综述
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-01 DOI: 10.1109/SAPIENCE.2016.7684111
Renisha P. Salim, R. Rajesh
{"title":"A survey: Optimal node routing strategies in MANET","authors":"Renisha P. Salim, R. Rajesh","doi":"10.1109/SAPIENCE.2016.7684111","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684111","url":null,"abstract":"MANET, a self-organizing network of various devices responsible for seamless communication. Routing protocols involved in the communication adopts new strategies to assure energy, security, traffic minimization, overhead. Dynamic nature of the MANET requires the modification in routing protocols for performance improvement. This paper presents the detailed survey of strategies involved in the implementation of routing protocols in the MANET. The survey categorized into four phases namely, routing protocols, neighborhood discovery, centralized / distributed hash tables, and bloom filter involved in MANET routing applications. First, the categorization of routing protocols on the basis of various traffic models presents the MANET structure. Second, a neighborhood discovery mechanism conveys the improvement in the routing configurations. Third, application of hash table mechanisms (centralized / distributed) to MANET to improve the matching efficiencies and computational speed. Finally, the application of bloom filter concept to improve service discovery rate and reduce the fake identities. Traditionally, the uncertainty occurs during the prediction of optimal node routing due to the dynamic nature of the MANET. Moreover, the presence of removed malicious node in another cluster degraded the link stability. This survey conveys the difficulties namely, storage overhead, mobility nature, malicious nodes and false positive rates in the traditional methods. The detailed survey leads to the stone of integration of Distributed Hash Table (DHT) with a bloom filter to overcome the difficulties in traditional research works.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129077846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信