2014 Seventh International Conference on Contemporary Computing (IC3)最新文献

筛选
英文 中文
Integrating greedy based approach with genetic algorithm to generate mixed covering arrays for pair-wise testing 将基于贪心的方法与遗传算法相结合,生成用于成对测试的混合覆盖数组
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-08-01 DOI: 10.1109/IC3.2014.6897246
Priti Bansal, Nitish Mittal, Aakanksha Sabharwal, S. Koul
{"title":"Integrating greedy based approach with genetic algorithm to generate mixed covering arrays for pair-wise testing","authors":"Priti Bansal, Nitish Mittal, Aakanksha Sabharwal, S. Koul","doi":"10.1109/IC3.2014.6897246","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897246","url":null,"abstract":"The effectiveness of combinatorial interaction testing (CIT) to test highly configurable systems has constantly motivated researchers to look out for new techniques to construct optimal covering arrays that correspond to test sets. Pair-wise testing is a combinatorial testing technique that generates a pair-wise interaction test set to test all possible combinations of each pair of input parameter value. Meta heuristic techniques have being explored by researchers in past to construct optimal covering arrays for t-way testing (where, t denotes the strength of interaction). In this paper we apply genetic algorithm, a meta heuristic search based optimization algorithm to generate optimal mixed covering arrays for pair-wise testing. Here, we present a novel method that uses a greedy based approach to perform mutation and study the impact of the proposed approach on the performance of genetic algorithm. We describe the implementation of the proposed approach by extending an open source tool PWiseGen. Experimental results indicate that the use of greedy approach to perform mutation improves the performance of genetic algorithm by generating mixed covering arrays with higher fitness level in less number of generations as compared to those generated using other techniques.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126189186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient computational framework for labeling large scale spatiotemporal remote sensing datasets 大尺度时空遥感数据标记的高效计算框架
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-08-01 DOI: 10.1109/IC3.2014.6897247
M. Sethi, Yupeng Yan, Anand Rangarajan, Ranga Raju Vatsavai, S. Ranka
{"title":"An efficient computational framework for labeling large scale spatiotemporal remote sensing datasets","authors":"M. Sethi, Yupeng Yan, Anand Rangarajan, Ranga Raju Vatsavai, S. Ranka","doi":"10.1109/IC3.2014.6897247","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897247","url":null,"abstract":"We present a novel framework for semisupervised labeling of regions in remote sensing image datasets. Our approach works by decomposing the image into irregular patches or superpixels and derives novel features based on intensity histograms, geometry, corner density, and scale of tessellation. Our classification pipeline uses either k-nearest neighbors or SVM to obtain a preliminary classification which is then refined using Laplacian propagation algorithm. Our approach is easily parallelizable and fast despite the high volume of data involved. Results are presented which showcase the accuracy as well as different stages of our pipeline.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"540 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120886943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hopeful hearts: A mobile health care application 充满希望的心:一个移动医疗保健应用程序
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-08-01 DOI: 10.1109/IC3.2014.6897199
Neha Nirwal, Neetu Sardana, Arpita Jadhav Bhatt
{"title":"Hopeful hearts: A mobile health care application","authors":"Neha Nirwal, Neetu Sardana, Arpita Jadhav Bhatt","doi":"10.1109/IC3.2014.6897199","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897199","url":null,"abstract":"Healthy eating and regular physical activity plays a substantial role in preventing diseases like heart disease, high blood pressure, cancer, diabetes and stroke etc. As mobile devices have become an integral part of our lives, it can alter the way we look after our health. Seeing the increase in adoption of mobile in our daily lives, we have used mobile as a platform for a healthcare, so that people can get factual information about their health and can have command on their health. It will help them to learn about their health and understand their illness. In this paper Mobile based healthcare application `Hopeful Hearts' has been proposed. Application which will suggest diet and physical activity based on six input parameters. The input parameters are BMI (Body Mass Index), BMR (Basal Metabolic Rate), working hours and user current body conditions (i.e. Body Temperature, Heart rate and SPO2 via Sensors). Decision-Tree is being used to make all suggestions. The application supports continuous monitoring of user health. The proposed system is scalable for all Android Based Mobile Devices.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132682147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Designing prosody rule-set for converting neutral TTS speech to storytelling style speech for Indian languages: Bengali, Hindi and Telugu 设计将中性TTS语音转换为印度语言(孟加拉语、印地语和泰卢固语)的讲故事风格语音的韵律规则集
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-08-01 DOI: 10.1109/IC3.2014.6897219
Parakrant Sarkar, Arijul Haque, A. Dutta, M. GurunathReddy, M. HarikrishnaD., P. Dhara, Rashmi Verma, N. Narendra, B. SunilKr.S., Jainath Yadav, K. S. Rao
{"title":"Designing prosody rule-set for converting neutral TTS speech to storytelling style speech for Indian languages: Bengali, Hindi and Telugu","authors":"Parakrant Sarkar, Arijul Haque, A. Dutta, M. GurunathReddy, M. HarikrishnaD., P. Dhara, Rashmi Verma, N. Narendra, B. SunilKr.S., Jainath Yadav, K. S. Rao","doi":"10.1109/IC3.2014.6897219","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897219","url":null,"abstract":"This paper provides a design of prosody rule-set for transforming the neutral speech synthesized by Text-to-Speech (TTS) system to storytelling style speech. The objective of this work is to synthesize storyteller speech from the neutral TTS system for a given story text as input. In this work, neutral TTS refers to TTS system developed using Festival framework with neutral speech corpus. For generating storyteller speech from neutral TTS, we are proposing modifications to various prosodic parameters of neutral synthesized speech. In this work, the prosodic parameters considered for modification are (i) pitch contour, (ii) duration patterns, (iii) intensity patterns, (iv) pause patterns and (v) tempo. We have designed individual rule-sets for the above mentioned prosodic parameters, separately for three Indian languages Bengali, Hindi and Telugu. The rule-sets are designed carefully by analyzing the perceptual differences between synthesized neutral speech utterances and their respective natural (original) spoken utterances, narrated by a storyteller. The designed prosody rule-sets are evaluated using subjective listening tests. The results of the perceptual evaluation indicate that the designed prosody rule-sets play a significant role in achieving the story-specific style during conversion from neutral to storytelling style speech.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128926805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Discriminant features for metamorphic malware detection 变形恶意软件检测的判别特征
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-08-01 DOI: 10.1109/IC3.2014.6897208
Jikku Kuriakose, P. Vinod
{"title":"Discriminant features for metamorphic malware detection","authors":"Jikku Kuriakose, P. Vinod","doi":"10.1109/IC3.2014.6897208","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897208","url":null,"abstract":"To unfold a solution for the detection of metamorphic viruses (obfuscated malware), we propose a non signature based approach using feature selection techniques such as Categorical Proportional Difference (CPD), Weight of Evidence of Text (WET), Term Frequency-Inverse Document Frequency (TF-IDF) and Term Frequency-Inverse Document Frequency-Class Frequency (TF-IDF-CF). Feature selection methods are employed to rank and prune bi-gram features obtained from malware and benign files. Synthesized features are further evaluated for their prominence in either of the classes. Using our proposed methodology 100% accuracy is obtained with test samples. Hence, we argue that the statistical scanner proposed by us can identify future metamorphic variants and can assist antiviruses with high accuracy.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128858122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A lightweight Sybil attack detection framework for Wireless Sensor Networks 用于无线传感器网络的轻量级Sybil攻击检测框架
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-08-01 DOI: 10.1109/IC3.2014.6897205
P. Raghuvamsi, K. Kant
{"title":"A lightweight Sybil attack detection framework for Wireless Sensor Networks","authors":"P. Raghuvamsi, K. Kant","doi":"10.1109/IC3.2014.6897205","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897205","url":null,"abstract":"In the field of Wireless Sensor Networks (WSNs), the problem of Sybil attacks has been widely considered by researchers. However, among the existing solutions, lightweight models are very limited. To accomplish this, the authors suggest a lightweight Sybil attack detection framework (LSDF) in this paper. This framework has two components: first, evidence collection; second, evidence validation. Every node in the network collects the evidences by observing the activities of neighboring nodes. These evidences are validated by running sequential hypothesis test to decide whether neighboring node is a benign node or Sybil node. With extensive simulations, it was revealed that the LSDF can detect Sybil activity accurately with few evidences.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130987272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Energy and carbon efficient VM placement and migration technique for green cloud datacenters 绿色云数据中心的能源和碳效率VM放置和迁移技术
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-08-01 DOI: 10.1109/IC3.2014.6897171
Bharti Wadhwa, A. Verma
{"title":"Energy and carbon efficient VM placement and migration technique for green cloud datacenters","authors":"Bharti Wadhwa, A. Verma","doi":"10.1109/IC3.2014.6897171","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897171","url":null,"abstract":"One of the most popular emerging technologies in today's world is Cloud Computing and it is being used widely all over the world by many IT companies as it provides various benefits to the users like cost saving and ease of use. But with the growing demands of users for computing services, cloud providers are encouraged to deploy large data centers which consume very large amount of energy and contribute to high operational costs. Carbon dioxide emission rate is also increasing day by day due to huge amount of power consumption. Therefore, we require to develop techniques which will help to get more environment friendly computing i.e. Green Cloud Computing. Some of the techniques being used in cloud data centers for reducing the operational costs, power consumption and CO2 emission are resource allocation, virtualization and VM migrations. In this paper, we propose a new technique to reduce the carbon emission and energy consumption in the distributed cloud datacenters having different energy sources and carbon footprint rates. Our approach uses the carbon footprints of all the datacenters in distributed cloud architecture and the concept of virtual machine allocation and migration inside each datacenter for reducing the carbon emission and energy consumption in the federated cloud system.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125035417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Integrated features of haar-like wavelet filters 类哈尔小波滤波器的集成特性
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-08-01 DOI: 10.1109/IC3.2014.6897202
Megha Agarwal
{"title":"Integrated features of haar-like wavelet filters","authors":"Megha Agarwal","doi":"10.1109/IC3.2014.6897202","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897202","url":null,"abstract":"In this paper a novel feature descriptor by integration of cooccurrence of Haar like wavelet filter (CHLWF) with color histogram (CH) is proposed for content based image retrieval (CBIR). The proposed feature is capable of extracting image properties from different visual perspectives in order to give image representation almost similar to human interpretation. It helps in the improvement of retrieval results in terms of various performance measures. An effort is made to reduce the sensitivity to noise and illumination changes by working on average intensities of the regions. CHLWF is extracted from images and employs only maximal edge responses in feature computation hence, only prominent directional information which can substantially represent an image is used. It provides textural information efficiently with reduced computational complexity. CHLWF also eliminates the step involved in the decision making of thresholds by automatic quantization of coefficients. All these properties assist to show the efficient image representation through CHLWF. Further with the integration of CH feature color information is also incorporated in the final feature and results are improved with respect to related state of art techniques. Since, the main aim of introducing this feature is to improve effectiveness of retrieval system hence; it is affirmed by evaluating the retrieval performance on Corel 1000 benchmark image database.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128307083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy rule based checkpointing arrangement for fault tolerance in Mobile Grids 基于模糊规则的移动电网容错检查点安排
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-08-01 DOI: 10.1109/IC3.2014.6897188
Parmeet Kaur, P. Parwekar
{"title":"Fuzzy rule based checkpointing arrangement for fault tolerance in Mobile Grids","authors":"Parmeet Kaur, P. Parwekar","doi":"10.1109/IC3.2014.6897188","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897188","url":null,"abstract":"Mobile Grids (MoGs) are an emerging sphere in distributed computing and are expected to become a crucial part of computational Grids in future. Apart from allowing a convenient user access to the Grid, mobile hosts can act as valuable computing resources in the Grid. However, mobile hosts have limitations of resources such as stable storage, wireless bandwidth, battery power etc. and are also subject to mobility and frequent disconnections. Therefore, a fault tolerance scheme is essential if the computing power of mobile hosts has to be used effectively in the grids. This paper presents a checkpointing based fault tolerance technique for Mobile Grid computing systems. A Fuzzy Rule based system (FRS) is used to construct an efficient checkpointing arrangement for MoGs. With FRS, superior nodes, i.e., having sufficient resources, are selected as Checkpoint Storage Nodes (CSNs) and other mobile hosts transfer their checkpointed data to one of the selected neighboring CSN. The objective of FRS is to increase the probability of recovery of checkpointed data subsequent to a failure; thereby allowing a distributed application to complete its execution successfully on the MoG. Simulations show FRS's better recovery probabilities in comparison to a random checkpointing arrangement.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130117432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An empirical study of the sensitivity of quality indicator for software module clustering 软件模块聚类质量指标敏感性的实证研究
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-08-01 DOI: 10.1109/IC3.2014.6897174
Amarjeet Prajapati, J. Chhabra
{"title":"An empirical study of the sensitivity of quality indicator for software module clustering","authors":"Amarjeet Prajapati, J. Chhabra","doi":"10.1109/IC3.2014.6897174","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897174","url":null,"abstract":"Recently, there has been a significant progress in applying evolutionary multiobjective optimization techniques to solve software module clustering problem. The results of evolutionary multiobjective optimization techniques for software module clustering problem are a set of many non-dominating clustering solutions. Generally, the quality indicators of clustering solutions produced by these techniques are sensitive to minor variation in the decision variables of the clustering solutions. Researchers have focused on finding software module clustering with better cluster quality indicator; however in practice developers may not always be interested to better quality indicator clustering solutions, particularly if these quality indicators are quite sensitive. Under such situations, developer looks for clustering solutions whose quality indicators are not sensitive to small variations in the decision variables of the candidate clustering solution. The paper performs an experiment for the sensitivity analysis of quality indicator on software module clustering solution with two multiobjective formulations MCA and ECA. To perform the experiment the NSGA-II is used as multi-objective evolutionary algorithm. We evaluate sensitivity of quality indicators for six real-world software and one random problem. Results indicate that the quality indicator for MCA formulation is less sensitive than ECA formulation and hence MCA will be a better choice for multiobjective software module clustering from sensitivity perspective.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134167912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信