{"title":"Impact of topological properties over link prediction based on node neighbourhood: A study","authors":"Anand Kumar Gupta, Neetu Sardana","doi":"10.1109/IC3.2014.6897172","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897172","url":null,"abstract":"Link prediction is an important task to identify the future interactions among existing non-connected members of a network, by measuring the proximity between nodes in a network. Link prediction is done on the basis of node similarity. Node neighbourhood based techniques are most popularly used for link prediction. Techniques based on Node neighbourhood can be applied on various applications like biological protein-protein interaction network, social network, information network and citation network to predict the future nodes. Every network has got certain topological properties. Topological properties play an integral role in choosing a technique for a particular network for predicting future links. This paper describes the impact of topological properties over link prediction technique. It also elaborates how presence of topological properties in a network improves the efficiency of the link prediction techniques.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126553916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A weight based energy-aware hierarchical clustering scheme for mobile ad hoc networks","authors":"A. Roda, Charu","doi":"10.1109/IC3.2014.6897227","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897227","url":null,"abstract":"Clustering in MANETs is a hierarchical approach of partitioning the network, combing nodes and forming groups called Clusters. The paper focuses on implementing a Clustering technique that is Energy Aware, and provides Stability by using a weighted approach for the selection of Cluster-Heads (CHs) that takes different parameters like power, mobility etc. into account while selecting the CH and thereby reducing the chances of reconfiguration. Energy awareness of the scheme is based on minimization of energy consumption by creation of clusters where numbers of nodes depend on the energy required for the completion of tasks and tasks are distributed amongst clusters to get Balanced Load. In addition, to provide stability and to be able to achieve all the tasks assigned to the nodes, we propose grouping according to relative mobility and merging of clusters depending on the similar mobility pattern, thereby achieving a stable network which is continuous. The paper includes performance evaluation and characteristic analysis of our clustering scheme along with comparison with some of the existing algorithms which form the basis for our algorithm in order to show the strength of this scheme over others.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127166112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crowdlearning: An incentive-based learning platform for crowd","authors":"Nilesh Padhariya, Kshama Raichura","doi":"10.1109/IC3.2014.6897145","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897145","url":null,"abstract":"Crowdlearning is an incentive-based learning platform for crowd, denoted as iCL, to inspire experts for knowledge sharing and to incentivize them for their contributions in crowd. In iCL, collaborators provide learning platform to the crowd of interested learners. The relativeness of interest of contributors and learners is compared by match-making process. The core objective of iCL is to motivate learners to join common-interest crowd and to collaboratively perform Crowdlearning activities. Moreover, incentivization motivates learners to grow crowd. The main contributions of iCL are three-fold. First, it presents the architecture of iCL with the crowd formation process that includes the processes of initialization and collaboration. Second, it proposes three incentive-based fees distribution schemes defined as Equally Distributed Incentive (EDI), Level-based EDI (LEDI) and Commission-oriented LEDI (CLEDI). Third, our performance evaluation shows that our schemes are indeed effective to motivate learners for participation and to inspire experts for their contribution through incentivization in crowdlearning.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117276603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and trust- new challenges to computing today in cyberspace","authors":"T. Ramesh","doi":"10.1109/IC3.2014.6897138","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897138","url":null,"abstract":"Cyber security threats and issues are escalating in many facets of system domain applications. A comprehensive cyber security model is the need today for quick identification and analysis of various type of threats and attacks for developing a comprehensive mitigation plan. In recent years, hardware threat issues are drawing wide attention adding to the security problem in cyber space. TRUST which is beyond SECURITY is playing a major role. In this paper we present a short synopsis of cyber security and trust for computing today in cyber space that includes hardware security threats, trust and few mitigations.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116210380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. S. Kundu, O. Mazumder, Ritwik Chattaraj, S. Bhaumik
{"title":"Door negotiation of a omni robot platform using depth map based navigation in dynamic environment","authors":"A. S. Kundu, O. Mazumder, Ritwik Chattaraj, S. Bhaumik","doi":"10.1109/IC3.2014.6897169","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897169","url":null,"abstract":"Aim of this paper is to develop a holonomic omnidirectional drive system to detect and pass through a doorway using depth map based navigation using Kinect sensor in dynamic environment. Omni drive mechanism enables holonomic motion of the system which provides efficient movement in narrow space due to higher degree of maneuverability. Omni robot is controlled in manual mode by joystick and in autonomous mode, it localizes and navigates using an overhead mounted webcam and a special augmented reality based marker and Kinect based depth mapping. The proposed system is a prototype for a multimodal holonomic wheelchair. The system has potential application in the field of assistive device, rehabilitation robotics and in multipurpose robot navigation.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126077247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel Bayesian Belief Network structure learning algorithm based on bio-inspired monkey search meta heuristic","authors":"S. Mittal, K. Gopal, S. Maskara","doi":"10.1109/IC3.2014.6897163","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897163","url":null,"abstract":"Bayesian Belief Networks (BBN) combine available statistics and expert knowledge to provide a succinct representation of domain knowledge under uncertainty. Learning BBN structure from data is an NP hard problem due to enormity of search space. In recent past, heuristics based methods have simplified the search space to find optimal BBN structure (based on certain scores) in reasonable time. However, slow convergence and suboptimal solutions are common problems with these methods. In this paper, a novel searching algorithm based on bio-inspired monkey search meta-heuristic has been proposed. The jump, watch-jump and somersault sub processes are designed to give a global optimal solution with fast convergence. The proposed method, Monkey Search Structure Leaner (MS2L), is evaluated against five popular BBN structure learning approaches on model construction time and classification accuracy. The results obtained prove the superiority of our proposed algorithm on all metrics.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125166816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inverse study of double-glazed solar collector using hybrid evolutionary algorithm","authors":"R. Das","doi":"10.1109/IC3.2014.6897236","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897236","url":null,"abstract":"This paper presents an application of the hybrid evolutionary-nonlinear programming based optimization algorithm for solving an inverse problem of a double-glazed flat-plate solar collector. For a given configuration, the performance of the solar collector can be represented by heat loss factor. In this work, four parameters such as plate-inner glass spacing, inner-outer glass spacing, thickness of the glass cover and the emissivity of the absorber plate have been estimated by the hybrid algorithm for satisfying a given heating requirement in a double-glazed flat-plate solar collector. Hybrid algorithm is used to search different unknowns within a prescribed feasible range of various parameters. Many feasible and nearly unique combinations of the four unknowns are observed to satisfy the same heating requirement, which is confirmed by satisfactory reconstruction of the heat loss factor fields.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128360118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated spoken language recognition system using support vector machines","authors":"Garima Vyas, M. Dutta","doi":"10.1109/IC3.2014.6897156","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897156","url":null,"abstract":"An automatic Language Identification (LID) is a system designed to recognize a language from a given spoken utterance. The spoken utterances are classified according to the pre-defined set of languages. In this paper a LID system is designed for two different languages namely English and French. The classification of an audio sample is done by extracting Mel frequency cepstral coefficients (MFCCs) and putting them on support vector machines with radial basis function kernel. The proposed framework is speaker-independent. This scheme was tested on a database of multi-lingual speech samples. The language identification accuracy is found to be 92% for French and 88% for English.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akriti Saini, Nishank Bhatia, Bhavya Suri, Shikha Jain
{"title":"EmoXract: Domain independent emotion mining model for unstructured data","authors":"Akriti Saini, Nishank Bhatia, Bhavya Suri, Shikha Jain","doi":"10.1109/IC3.2014.6897154","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897154","url":null,"abstract":"Emotion plays an important role in human computer interaction to give a human like feel. To acknowledge the importance of emotions in an artificial agent, we propose a domain independent emotion mining model (EmoXract) which extracts emotions from an unstructured data. The emotion is extracted at sentence level based upon the contextual information. Basically, we have used two corpuses: WordNet dictionary and WordNet-Affect dictionary. WordNet dictionary is used for the creation of synonyms and stemmed words. WordNet-Affect dictionary is used to establish a weighted relationship between each word to every primary emotion. Various modules adopted in the model are converter, tokenizer, creating synsets and stemmed words, assigning weights, heuristics rules, calculating net weight and sentence level emotion extraction. We have also designed a self-learning dictionary which self-updates the new word, its synonym and stemmed words with the same weight in accordance to its already existing synonym. Finally the model is simulated for a test data of more than 500 sentences, selected from different domains to validate the proposed design.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133666290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel architecture for identity management system using virtual appliance technology","authors":"Parth Srivastava, S. Pande","doi":"10.1109/IC3.2014.6897168","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897168","url":null,"abstract":"Identity management system has gained significance for any organization today for not only storing details of its employees but securing its sensitive information and safely managing access to its resources. This system being an enterprise based application has time taking deployment process, involving many complex and error prone steps. Also being globally used, its continuous running on servers lead to large carbon emissions. This paper proposes a novel architecture that integrates the Identity management system together with virtual appliance technology to reduce the overall deployment time of the system. It provides an Identity management system as pre-installed, pre-configured and ready to go solution that can be easily deployed even by a common user. The proposed architecture is implemented and the results have shown that there is decrease in deployment time and decrease in number of steps required in previous architecture. The hardware required by the application is also reduced as its deployed on virtual machine monitor platform, which can be installed on already used servers. This contributes to the green computing practices and gives costs benefits for enterprises. Also there is ease of migration of system from one server to another and the enterprises which do not want to depend on third party cloud for security and cost reasons, can easily deploy their identity management system in their own premises.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132554103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}