2014 Seventh International Conference on Contemporary Computing (IC3)最新文献

筛选
英文 中文
Impact of topological properties over link prediction based on node neighbourhood: A study 拓扑特性对基于节点邻域的链路预测的影响研究
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897172
Anand Kumar Gupta, Neetu Sardana
{"title":"Impact of topological properties over link prediction based on node neighbourhood: A study","authors":"Anand Kumar Gupta, Neetu Sardana","doi":"10.1109/IC3.2014.6897172","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897172","url":null,"abstract":"Link prediction is an important task to identify the future interactions among existing non-connected members of a network, by measuring the proximity between nodes in a network. Link prediction is done on the basis of node similarity. Node neighbourhood based techniques are most popularly used for link prediction. Techniques based on Node neighbourhood can be applied on various applications like biological protein-protein interaction network, social network, information network and citation network to predict the future nodes. Every network has got certain topological properties. Topological properties play an integral role in choosing a technique for a particular network for predicting future links. This paper describes the impact of topological properties over link prediction technique. It also elaborates how presence of topological properties in a network improves the efficiency of the link prediction techniques.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126553916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A weight based energy-aware hierarchical clustering scheme for mobile ad hoc networks 一种基于权重的移动自组网能量感知分层聚类方案
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897227
A. Roda, Charu
{"title":"A weight based energy-aware hierarchical clustering scheme for mobile ad hoc networks","authors":"A. Roda, Charu","doi":"10.1109/IC3.2014.6897227","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897227","url":null,"abstract":"Clustering in MANETs is a hierarchical approach of partitioning the network, combing nodes and forming groups called Clusters. The paper focuses on implementing a Clustering technique that is Energy Aware, and provides Stability by using a weighted approach for the selection of Cluster-Heads (CHs) that takes different parameters like power, mobility etc. into account while selecting the CH and thereby reducing the chances of reconfiguration. Energy awareness of the scheme is based on minimization of energy consumption by creation of clusters where numbers of nodes depend on the energy required for the completion of tasks and tasks are distributed amongst clusters to get Balanced Load. In addition, to provide stability and to be able to achieve all the tasks assigned to the nodes, we propose grouping according to relative mobility and merging of clusters depending on the similar mobility pattern, thereby achieving a stable network which is continuous. The paper includes performance evaluation and characteristic analysis of our clustering scheme along with comparison with some of the existing algorithms which form the basis for our algorithm in order to show the strength of this scheme over others.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127166112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Crowdlearning: An incentive-based learning platform for crowd Crowdlearning:基于激励的大众学习平台
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897145
Nilesh Padhariya, Kshama Raichura
{"title":"Crowdlearning: An incentive-based learning platform for crowd","authors":"Nilesh Padhariya, Kshama Raichura","doi":"10.1109/IC3.2014.6897145","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897145","url":null,"abstract":"Crowdlearning is an incentive-based learning platform for crowd, denoted as iCL, to inspire experts for knowledge sharing and to incentivize them for their contributions in crowd. In iCL, collaborators provide learning platform to the crowd of interested learners. The relativeness of interest of contributors and learners is compared by match-making process. The core objective of iCL is to motivate learners to join common-interest crowd and to collaboratively perform Crowdlearning activities. Moreover, incentivization motivates learners to grow crowd. The main contributions of iCL are three-fold. First, it presents the architecture of iCL with the crowd formation process that includes the processes of initialization and collaboration. Second, it proposes three incentive-based fees distribution schemes defined as Equally Distributed Incentive (EDI), Level-based EDI (LEDI) and Commission-oriented LEDI (CLEDI). Third, our performance evaluation shows that our schemes are indeed effective to motivate learners for participation and to inspire experts for their contribution through incentivization in crowdlearning.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117276603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security and trust- new challenges to computing today in cyberspace 安全与信任——当今网络空间计算面临的新挑战
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897138
T. Ramesh
{"title":"Security and trust- new challenges to computing today in cyberspace","authors":"T. Ramesh","doi":"10.1109/IC3.2014.6897138","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897138","url":null,"abstract":"Cyber security threats and issues are escalating in many facets of system domain applications. A comprehensive cyber security model is the need today for quick identification and analysis of various type of threats and attacks for developing a comprehensive mitigation plan. In recent years, hardware threat issues are drawing wide attention adding to the security problem in cyber space. TRUST which is beyond SECURITY is playing a major role. In this paper we present a short synopsis of cyber security and trust for computing today in cyber space that includes hardware security threats, trust and few mitigations.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116210380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Door negotiation of a omni robot platform using depth map based navigation in dynamic environment 动态环境下基于深度图导航的万能机器人平台的门协商
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897169
A. S. Kundu, O. Mazumder, Ritwik Chattaraj, S. Bhaumik
{"title":"Door negotiation of a omni robot platform using depth map based navigation in dynamic environment","authors":"A. S. Kundu, O. Mazumder, Ritwik Chattaraj, S. Bhaumik","doi":"10.1109/IC3.2014.6897169","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897169","url":null,"abstract":"Aim of this paper is to develop a holonomic omnidirectional drive system to detect and pass through a doorway using depth map based navigation using Kinect sensor in dynamic environment. Omni drive mechanism enables holonomic motion of the system which provides efficient movement in narrow space due to higher degree of maneuverability. Omni robot is controlled in manual mode by joystick and in autonomous mode, it localizes and navigates using an overhead mounted webcam and a special augmented reality based marker and Kinect based depth mapping. The proposed system is a prototype for a multimodal holonomic wheelchair. The system has potential application in the field of assistive device, rehabilitation robotics and in multipurpose robot navigation.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126077247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A novel Bayesian Belief Network structure learning algorithm based on bio-inspired monkey search meta heuristic 基于仿生猴子搜索元启发式的贝叶斯信念网络结构学习算法
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897163
S. Mittal, K. Gopal, S. Maskara
{"title":"A novel Bayesian Belief Network structure learning algorithm based on bio-inspired monkey search meta heuristic","authors":"S. Mittal, K. Gopal, S. Maskara","doi":"10.1109/IC3.2014.6897163","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897163","url":null,"abstract":"Bayesian Belief Networks (BBN) combine available statistics and expert knowledge to provide a succinct representation of domain knowledge under uncertainty. Learning BBN structure from data is an NP hard problem due to enormity of search space. In recent past, heuristics based methods have simplified the search space to find optimal BBN structure (based on certain scores) in reasonable time. However, slow convergence and suboptimal solutions are common problems with these methods. In this paper, a novel searching algorithm based on bio-inspired monkey search meta-heuristic has been proposed. The jump, watch-jump and somersault sub processes are designed to give a global optimal solution with fast convergence. The proposed method, Monkey Search Structure Leaner (MS2L), is evaluated against five popular BBN structure learning approaches on model construction time and classification accuracy. The results obtained prove the superiority of our proposed algorithm on all metrics.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125166816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Inverse study of double-glazed solar collector using hybrid evolutionary algorithm 双层玻璃太阳能集热器的混合进化算法反演研究
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897236
R. Das
{"title":"Inverse study of double-glazed solar collector using hybrid evolutionary algorithm","authors":"R. Das","doi":"10.1109/IC3.2014.6897236","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897236","url":null,"abstract":"This paper presents an application of the hybrid evolutionary-nonlinear programming based optimization algorithm for solving an inverse problem of a double-glazed flat-plate solar collector. For a given configuration, the performance of the solar collector can be represented by heat loss factor. In this work, four parameters such as plate-inner glass spacing, inner-outer glass spacing, thickness of the glass cover and the emissivity of the absorber plate have been estimated by the hybrid algorithm for satisfying a given heating requirement in a double-glazed flat-plate solar collector. Hybrid algorithm is used to search different unknowns within a prescribed feasible range of various parameters. Many feasible and nearly unique combinations of the four unknowns are observed to satisfy the same heating requirement, which is confirmed by satisfactory reconstruction of the heat loss factor fields.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128360118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An integrated spoken language recognition system using support vector machines 基于支持向量机的集成语音识别系统
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897156
Garima Vyas, M. Dutta
{"title":"An integrated spoken language recognition system using support vector machines","authors":"Garima Vyas, M. Dutta","doi":"10.1109/IC3.2014.6897156","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897156","url":null,"abstract":"An automatic Language Identification (LID) is a system designed to recognize a language from a given spoken utterance. The spoken utterances are classified according to the pre-defined set of languages. In this paper a LID system is designed for two different languages namely English and French. The classification of an audio sample is done by extracting Mel frequency cepstral coefficients (MFCCs) and putting them on support vector machines with radial basis function kernel. The proposed framework is speaker-independent. This scheme was tested on a database of multi-lingual speech samples. The language identification accuracy is found to be 92% for French and 88% for English.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
EmoXract: Domain independent emotion mining model for unstructured data EmoXract:非结构化数据的领域独立情感挖掘模型
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897154
Akriti Saini, Nishank Bhatia, Bhavya Suri, Shikha Jain
{"title":"EmoXract: Domain independent emotion mining model for unstructured data","authors":"Akriti Saini, Nishank Bhatia, Bhavya Suri, Shikha Jain","doi":"10.1109/IC3.2014.6897154","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897154","url":null,"abstract":"Emotion plays an important role in human computer interaction to give a human like feel. To acknowledge the importance of emotions in an artificial agent, we propose a domain independent emotion mining model (EmoXract) which extracts emotions from an unstructured data. The emotion is extracted at sentence level based upon the contextual information. Basically, we have used two corpuses: WordNet dictionary and WordNet-Affect dictionary. WordNet dictionary is used for the creation of synonyms and stemmed words. WordNet-Affect dictionary is used to establish a weighted relationship between each word to every primary emotion. Various modules adopted in the model are converter, tokenizer, creating synsets and stemmed words, assigning weights, heuristics rules, calculating net weight and sentence level emotion extraction. We have also designed a self-learning dictionary which self-updates the new word, its synonym and stemmed words with the same weight in accordance to its already existing synonym. Finally the model is simulated for a test data of more than 500 sentences, selected from different domains to validate the proposed design.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133666290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel architecture for identity management system using virtual appliance technology 一种基于虚拟设备技术的身份管理系统架构
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897168
Parth Srivastava, S. Pande
{"title":"A novel architecture for identity management system using virtual appliance technology","authors":"Parth Srivastava, S. Pande","doi":"10.1109/IC3.2014.6897168","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897168","url":null,"abstract":"Identity management system has gained significance for any organization today for not only storing details of its employees but securing its sensitive information and safely managing access to its resources. This system being an enterprise based application has time taking deployment process, involving many complex and error prone steps. Also being globally used, its continuous running on servers lead to large carbon emissions. This paper proposes a novel architecture that integrates the Identity management system together with virtual appliance technology to reduce the overall deployment time of the system. It provides an Identity management system as pre-installed, pre-configured and ready to go solution that can be easily deployed even by a common user. The proposed architecture is implemented and the results have shown that there is decrease in deployment time and decrease in number of steps required in previous architecture. The hardware required by the application is also reduced as its deployed on virtual machine monitor platform, which can be installed on already used servers. This contributes to the green computing practices and gives costs benefits for enterprises. Also there is ease of migration of system from one server to another and the enterprises which do not want to depend on third party cloud for security and cost reasons, can easily deploy their identity management system in their own premises.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132554103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信