{"title":"Efficient user assignment in crowd sourcing applications","authors":"Akash Yadav, A. Sairam, Rituraj Singh","doi":"10.1109/ICACCI.2016.7732208","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732208","url":null,"abstract":"Recent technological advancement in hand-held computing devices such as smart phones/PDA integrates cyber and physical worlds altogether. This interaction creates a new paradigm called mobile crowd sourcing which takes advantages of human intellect and a large pool on internet users to perform various task more efficiently. In such applications, users are generally recruited in ad hoc manner to do a task and often receive some incentive. Such ad hoc nature provides flexibility for users to do any job but often decreases their reliability and output quality. Quality control is generally done by increasing the workforce which increases cost. To solve this issue, we proposed a user assignment framework which pushes the task to the right set of users which can perform the task in more economically efficient way. These framework first rank users by performing semantic comparison among task's requirements and user's attributes. Then it tries to assign minimum, yet most efficient users for each task in mutually exclusive manner. This framework ensures the allocation of most efficient users for each task while keeping the reward cost as minimum as possible, hence allows application developers and end users to enjoy the power of crowd in more effective way.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"606 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123334460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An implementation and performance evaluation of an improved chaotic image encryption approach","authors":"Gaytri, Shelza Suri, R. Vijay","doi":"10.1109/ICACCI.2016.7732253","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732253","url":null,"abstract":"With the advent of digitization, digital data took over the market with tremendous rate and changed the world into a digital one where digital data is considered to be the atomic mode of communication. Digital data which could be in the form of written matter or image is transmitted over the network within countless arenas such as armed forces, secret agencies, medical sciences, entertainment and many more. Being digital data as a fundamental source to a multimedia platform, today's multimedia generation is recklessly growing which have blended together technology with skills to form various applications which could be used in the digital devices. But due to some unscrupulous elements of the society various malicious attempts are made to craft a phobia to the mankind. Thus security is a crucial need for today's trend of technology. Ensuring about the current necessities of the society this paper formulates algorithms which could be used to protect the digital images. This paper scrutinized chaotic encryption techniques and articulated algorithms using the approach. Meticulously results in terms of security exploration and implementation are provided.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116504443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-objective optimization domino techniques for VLSI circuit","authors":"Jitesh R. Shinde, S. Salankar, Shilpa J. Shinde","doi":"10.1109/ICACCI.2016.7732366","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732366","url":null,"abstract":"The Domino logic circuits are often preferred in high performance designs because of the high speed and low area advantage it offers over CMOS static logic design. But in integrated circuits, the power consumed by clocking gradually takes a dominant part, and therefore research work in this paper is mainly focused on to study the comparative performance of various domino logic based techniques proposed in last decade and to evaluate the performance of the different domino techniques in terms of delay, power and their product (figure of merit) on BSIM4 model using Agilent Advanced Design System tool on 0.18μm CMOS process technology. The main focus of this work was to find the best Domino logic based technique that would provide best possible trade off to optimize multiple goals viz. area, power and speed at the same time to meet the multi-objective optimization goal for VLSI circuits.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124537589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency-based similarity measure for context-aware recommender systems","authors":"Mohammed Wasid, Vibhor Kant, R. Ali","doi":"10.1109/ICACCI.2016.7732116","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732116","url":null,"abstract":"Collaborative Filtering (CF), the widely used and most successful technique in the area of Recommender Systems, provides useful recommendations to users based on their similar users. Computing similarity among the users efficiently is the major step in CF. Further, it has been observed from literature that the context into CF provides more accurate and relevant recommendations for users but it is hard to represent and model contextual factors directly into the system. In this paper, we have incorporated the contextual information into user profile as an additional feature through a proposed novel frequency count method. After extending the user profiles, items are recommended based on similar profiles computed through a novel similarity measure. To evaluate the performance of our proposed recommendation strategy, several experiments are conducted on the popular LDOS-CoMoDa dataset.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126237153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feedback-based adaptive speedy transmission (FAST) control protocol to improve the performance of TCP over Ad-Hoc networks","authors":"Aniket S Deshpande, Ashok Kaushal","doi":"10.1109/ICACCI.2016.7732350","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732350","url":null,"abstract":"The main purpose of this research is to develop the performance improvement solution for use of TCP over Ad-Hoc networks. This research is implemented in Network Simulator2. This research analyzed the different the major techniques proposed in the past by different researchers, including TCP-DOOR, End-to-End Approach, Feedback Scheme and the Adaptive Back-off Response Approach protocols. Based on the review of existing works, the authors propose to combine the feedback and the adaptive approach to make it adaptable to most major scenarios. Next to that, to further enhance the overall performance, it is proposed to change underlying behavior of Standard TCP to its HS-TCP or its variant MX-TCP (depending on network conditions). From the findings of this research, it was found that MX-TCP is more appropriate for lossy-links such as driving on highway or low bandwidth 2G and accessing public hotspots or Internet and so on. It was also observed that HS-TCP is more appropriate and useful in high bandwidth scenarios like the Fourth generation Mobile Data Network with lower latency. Thus the modified approach of combining the Feedback Scheme with Adaptive Back-off based Response was observed to help TCP perform better compared to working with any of these protocols in isolation. Finally, HS-TCP/ MX-TCP addressed the throughput limitations, thereby delivering the maximum performance and enhanced end-user experience. Future scope for this research can be to bring in the intelligence wherein the protocol can detect the network conditions as well as the external environmental factors like power and then select whether to use MX-TCP or HS-TCP.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126543147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Kardam, Akshita Kejriwal, Kirti Sharma, Rishabh Kaushal
{"title":"Ranking scholarly work based on author reputation","authors":"K. Kardam, Akshita Kejriwal, Kirti Sharma, Rishabh Kaushal","doi":"10.1109/ICACCI.2016.7732358","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732358","url":null,"abstract":"Who is an authoritative author in a particular field is a common question that every learner or researcher wants to know. The widely available scholarly work from authors in different fields is typically indexed on various platforms like Google Scholar, DBLP, etc. Each platform uses various ranking algorithms to evaluate reputation of work based on the criteria of relevance, time and citation counts. In this paper, we focus on ascertaining reputation to authors publishing scholarly work by extending the present concept of citation index. Our first contribution is that we propose a novel method of ranking authors based on not just their citation count but also on the reputation of authors who have been citing their work. Intuitively, this means that an author would have a better rank (or reputation / authority) if he or she is cited by other reputed authors than the author who is cited by less reputed authors. Further, our second contribution is that our proposed author rank is used to rank scholarly articles, which until now has been based on citation counts and other metrics, when a user searches using a search keyword. A scholarly work is given higher ranking if it is written by reputed authors. Results show that authors with higher citation count may receive a lower rank than those with lower citation count due to the quality of the citations (reputation of authors citing them) that is being received. Our work can immensely help students (learners and researchers) find authoritative authors and papers in a field of interest by employing our proposed ranking metric which is based on the reputation of authors who are citing a research work.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128173050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information retrieval in web crawling: A survey","authors":"C. Saini, V. Arora","doi":"10.1109/ICACCI.2016.7732456","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732456","url":null,"abstract":"In today's scenario, World Wide Web (WWW) is flooded with huge amount of information. Due to growing popularity of the internet, finding the meaningful information among billions of information resources on the WWW is a challenging task. The information retrieval (IR) provides documents to the end users which satisfy their need of information. Search engine is used to extract valuable information from the internet. Web crawler is the principal part of search engine; it is an automatic script or program which can browse the WWW in automatic manner. This process is known as web crawling. In this paper, review on strategies of information retrieval in web crawling has been presented that are classifying into four categories viz: focused, distributed, incremental and hidden web crawlers. Finally, on the basis of user customized parameters the comparative analysis of various IR strategies has been performed.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131561768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Built in self-test scheme for SRAM memories","authors":"Abhinav Sharma, V. Ravi","doi":"10.1109/ICACCI.2016.7732220","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732220","url":null,"abstract":"Due to the continuous miniaturization in the size and increase in the complexity of the SRAM circuit causes the SRAM memory more prone to failure due to variations in process parameters which significantly affect and acutely degrading the output of SRAM. To enhance the consistent performance and firmness of SRAM towards parametric failures, fault detection mechanism based on various different algorithms is used to call built in Self-Test. In this paper a different circuit is implemented for the detection of faults based on the transient condition during the write operation of SRAM cell which has the self in test ability. Effectiveness of developed Built in Self-Test circuit is presented in this paper. Simulations are performed against the introduced fault in 6T SRAM Cell. The cadence virtuoso tool is used to design the SRAM cell, differential amplifier level shifter and comparator circuit. All the circuit designed with 180nm technology.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131855898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ratan, D. Mondal, R. Anima, Chandan Kumar, Amit Kumar, R. Kar
{"title":"Area optimization of two-stage amplifier using modified particle swarm optimization algorithm","authors":"S. Ratan, D. Mondal, R. Anima, Chandan Kumar, Amit Kumar, R. Kar","doi":"10.1109/ICACCI.2016.7732052","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732052","url":null,"abstract":"Modern era cannot be consider without an electronics circuits. If Signal strength at the receiving antenna is very weak then there must be required a device that increase the strength of the received signal (power), known as Amplifier. Output of an amplifier is always stronger than its input. So amplifiers are the simplest yet one of the most important parts of electronic circuits. This is why the designing of amplifiers is crucial in analog circuit designing. This paper investigated to minimize the area of a two stage amplifier using modified particle swarm optimization (MPSO) method considering other constraints. The total transistor area obtain using MPSO in this paper is 2.61×10-10 m2 and it is the best of my knowledge, also the power dissipation is much lesser, 1492 μW. Obtained values are verified by the CADENCE simulator and validated. The results proved that the use of modified particle swarm optimization made it possible to achieve better results.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117334340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rationale behind the virtual sensors and their applications","authors":"Atrayee Gupta, N. Mukherjee","doi":"10.1109/ICACCI.2016.7732278","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732278","url":null,"abstract":"Every physical sensor is pre-defined to act on purpose. On the other hand, a virtual sensor is destined to act on application needs, perhaps can perform more even in case of a single sensor device. The basic objective of this paper is to explore the conceptual form of virtual sensor with proper explanation. This paper substantiates the theory of the virtual sensor with implementation, algorithms and use cases. The paper presents a taxonomy of virtual sensors depending on their capabilities and deployment layer. The paper also presents some case studies along with experimental results of the virtual sensors in eHealth and environment monitoring domains.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131162885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}