{"title":"Learning domain-specific and domain-independent opinion oriented lexicons using multiple domain knowledge","authors":"K. S. Vishnu, T. Apoorva, Deepa Gupta","doi":"10.1109/IC3.2014.6897193","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897193","url":null,"abstract":"Sentiment analysis systems are used to know the opinions of customer reviews. The basic resource for the sentiment analysis systems are polarity lexicon. Each term in polarity lexicon indicates its affinity towards positive or negative opinion. However, this affinity of word changes with the change in domain. In this work, we explore a polarity lexicon using SentiWordNet, a domain independent lexicon to adapt specific domain and update the domain independent lexicon based on multiple domain knowledge. The proposed approach has been tested on five domains: Health, Books, Camera, Music and DVD. The improvement in accuracy ranges from 4.5 to 19 pointsacross all the domains over baseline.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A free and open source framework for rural education","authors":"V. Rekha, V. Adinarayanan","doi":"10.1109/IC3.2014.6897147","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897147","url":null,"abstract":"With more than 85% of India's schools being in rural areas, it is imminent that we focus on enhancing the quality of rural education. Given these large number of students in rural schools, we need scalable models to cater to their needs. Information and Communication Technology can go a long way in making resources available and accessible in a scalable manner. However, this comes with a huge cost. In this paper, we propose the FORE framework which is the Free and Open Source Software Based framework for rural education which helps cut cost in a drastic manner thereby making implementation not just cheaper but of very high quality. This framework integrates several components of rural education and it directly addresses the needs of schools in rural areas.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128601252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selecting and formalizing an architectural style: A comparative study","authors":"A. Dwivedi, S. K. Rath","doi":"10.1109/IC3.2014.6897201","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897201","url":null,"abstract":"An architectural style is characterized by their control-flow and data-flow patterns, appropriation of functionality across components, connectors, ports, and roles. Selecting an architectural style for an application is not an easy task. It is a decision-making task in which different objectives must be taken into consideration. In this study, different architectural styles are classified on the basis of many style-induced architectural properties. This classification provides additional guidance for people who lack expertise and experience to select an appropriate style for their software systems. Subsequently, an appropriate style is selected for the case study i.e., cargo router system. After selecting an appropriate style for cargo router system, it is formalized using formal modeling languages Alloy and Promela. For the model checking of these formal notations, automated verifiers such as Alloy Analyzer and SPIN are used. At the end of this study, comparison of performance between modeling languages Alloy and Promela as well as associated tools such as Alloy Analyzer and SPIN is performed.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127885929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of long integer multiplication using OpenMP and MPI on shared memory architecture","authors":"Jitendra V. Tembhurne, S. Sathe","doi":"10.1109/IC3.2014.6897187","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897187","url":null,"abstract":"Multiplying long integers is an operation that has many applications in Computational Science and arbitrary arithmetic computation. Many cryptographic algorithms such as Diffe-Hellman key exchange [1], RSA, ECC and etc. require operations on very large subsets of the integer numbers. These algorithms use security key size of 1024 bits and more for secure message encryption, decryption and, key exchange. To perform encryption, decryption and key exchange we are required to perform a series of exponentiation and multiplication operations. In this paper, we propose the parallel multiplication algorithms for long integers on multiple core processors using parallel programming languages such as OpenMP and MPI. The OpenMP and MPI are most common parallel languages for programming and provide different performances characteristics. We also target to analyze and compare the OpenMP and MPI implementations on multi-core processors. The new proposed parallel algorithm achieves better performance than the basic serial implementations. The achieved speedup by OpenMP and MPI on serial implementation are 12.62x and 10.72x using school-book, 49.95x and 37.26x using Karatsuba on school-book, 66.11x and 31.47x using Toom-Cook on school-book. We have observed, as bit-length are increased the parallel algorithms exhibits better speedup performance on utilizing more cores available.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126645538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A high payload audio watermarking algorithm robust against Mp3 compression","authors":"A. Kaur, M. Dutta, K. M. Soni, Nidhi Taneja","doi":"10.1109/IC3.2014.6897229","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897229","url":null,"abstract":"This paper presents a blind audio watermarking algorithm in wavelet domain. The proposed algorithm has high embedding capacity with very good robustness against mp3 compression and other signal processing attacks. Discrete wavelet transform is applied on non-overlapping frames and third level detailed coefficients are decomposed using QR decomposition represented in a matrix form. The R matrix of QR decomposition is then used to embed the watermarking bit using the embedding function in each frame. Experimental results indicate that the proposed audio watermarking algorithm is highly robust against mp3 compression with 0% BER at high payload of 320 bps.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131255220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selecting a set of appropriate metrics for detecting code clones","authors":"Geetika Bansal, Rajkumar Tekchandani","doi":"10.1109/IC3.2014.6897221","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897221","url":null,"abstract":"Most of the software systems consist of a number of code clones. Although it makes the task of software development easy but at the same time code cloning may cause several maintenance and cost related problems. A number of clone detection techniques have been proposed so far. In this paper, an approach for selecting a set of appropriate metrics from a list of large number of metrics is presented. The proposed approach evaluates a set of independent metrics on the basis of their precision and recall values in clone detection starting from all combinations of one metric and then gradually increasing the number of metrics in the metrics combinations until the complete set of metrics involved in the approach are evaluated. The result of implementing the proposed approach on a C language software system is provided as example.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127752657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Sharma, N. Prakash, H. Sharma, Dheerendra Singh
{"title":"Automatic construction of process template from business rule","authors":"D. Sharma, N. Prakash, H. Sharma, Dheerendra Singh","doi":"10.1109/IC3.2014.6897210","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897210","url":null,"abstract":"Business process modeling is used to model processes of an Enterprise. Business process modeling is typically performed by business analysts and managers from the purpose of transformation of business prospective of Enterprises to the IT prospective. To model business perspective, need of high level Process Model has been raised as Business Process Modeling Notation, BPMN, is considered at low level. Our belief is that the sequencing and alignment of business rule can lay down the construction of High level process model. We have explored the nature of business rule in business and developed a Business rule meta-model to represent them. Thereafter, A Process Template is derived from Business rule meta-model and then Process Template is mapped to High level process model. In this paper we have focused on Business rule meta-model and construction of Process Template. From Process Template to High level process model will be the future work.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132267481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A two warehouse inventory model with non- instantaneous deterioration and partial backlogging","authors":"S. Singh, H. Rathore","doi":"10.1109/IC3.2014.6897212","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897212","url":null,"abstract":"In this article we have studied the two- warehouse inventory problem with limited storage capacity of owned warehouse (OW).If Inventory level exceeds the storage capacity of owned warehouse (OW) then organization hires a rented warehouse (RW) at high holding cost than holding cost of owned warehouse (OW). We have developed an inventory model for deteriorating items with non- instantaneous deterioration rate and stock dependent demand. Partially backlogged shortages are allowed with time dependent backlogging rate and the whole study is done under the effect of inflation. Main objective of this paper is to find optimal value of total cost. Numerical illustrations and sensitivity analysis are given at the end of this article.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reference broadcast synchronization-based prevention to DoS attacks in VANET","authors":"K. Verma, H. Hasbullah, Hemant Kumar Saini","doi":"10.1109/IC3.2014.6897185","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897185","url":null,"abstract":"Vehicular Ad-hoc Networks (VANET) has suffered from many risks in the past, like security privilege and mode of authentication by many attackers/hackers because they were trying to disturb the network and break communication services for their personal interest. The series of attacks that have broken the secured communication are network jammer, source sink attackand these attacks are called as denial of service (DoS) attacks. A novel model for prevention of DoS attacks in VANET is proposed and named as RBS protocol. The proposed model is based on the master chock filter concept for filtration of packets during busy traffic and other attacks. The protocol was also evaluated by the other two methods, which are blocking the source IP originator by the DoS attacks and checking the prevention of TCP/UDP flooding and IP sniffing attacks. The evaluation of the protocol was based on the mobility node's interaction and utilization of bandwidth. The experimental results were performed on the highway transportation condition. The RBS protocol results showed that the packet delivery ratio, throughput, time delayhas improved as compared to IP-trackback protocol.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116869348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hierarchical map-based location service for VANETs in urban environments","authors":"A. Garg, Kavita Pandey, Buddha Singh","doi":"10.1109/IC3.2014.6897173","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897173","url":null,"abstract":"Vehicular Ad-hoc Network is gaining the attention of researchers because of the technological advancements for developing an Intelligent Transportation System (ITS). The dynamic nature of vehicles (nodes) leads to frequent path breaks and network fragmentation. Therefore, routing has become a critical issue in inter-vehicle communication. Location management in VANETs is considered as a critical issue in position based routing protocol. For this purpose we have proposed novel distributed map-based location service scheme that uses mobility pattern and density of the vehicles in the region. In the proposed location service mechanism, the geographical region is divided into segments and each segment is further fragmented into cells. For exchanging the routing information among vehicles across network, the location of destination node should be discovered within the cell. In case the destination is not discovered in the cell, the request for location search migrates to the segment. The information extracts from the digital map database helps to select location server in high traffic point regions in the entire area. The location service uses minimum speed aware policy to select location server at high traffic density waypoint and dynamic location updates are sent to location server based on threshold distance. In order to reduce the location discovery delay, adjacent level hierarchy is used for location query sent by the location servers. Simulation results obtained with different scenarios are used to demonstrate the performance of HLS, EMBL and HMLS in terms of location query answer and location update strategy. Simulation results show that HMLS achieve outperforms others in urban environments.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123305873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}