By Topic

2014 Seventh International Conference on Contemporary Computing (IC3)

7-9 Aug. 2014

Filter Results

Displaying Results 1 - 25 of 116
  • [Front cover]

    Publication Year: 2014, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (18092 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (18092 KB)
    Freely Available from IEEE
  • 2014 Seventh International Conference on Contemporary Computing (IC3). 7-9 August, Noida, India [Copyright notice]

    Publication Year: 2014, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2014, Page(s):iii - xiv
    Request permission for commercial reuse | PDF file iconPDF (194 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):xv - xxii
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Security and trust- new challenges to computing today in cyberspace

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (723 KB) | HTML iconHTML

    Cyber security threats and issues are escalating in many facets of system domain applications. A comprehensive cyber security model is the need today for quick identification and analysis of various type of threats and attacks for developing a comprehensive mitigation plan. In recent years, hardware threat issues are drawing wide attention adding to the security problem in cyber space. TRUST which... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-aware resource management for computing systems

    Publication Year: 2014, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1741 KB) | HTML iconHTML

    This corresponds to the material in the invited keynote presentation by H. J. Siegel, summarizing the research in [1], [2]. We address the problem of assigning dynamically-arriving tasks to machines in a heterogeneous computing environment. These machines execute a workload composed of different tasks, where the tasks have diverse computational requirements. Each task has a utility function associ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From specification languages to wide-spectrum logics

    Publication Year: 2014, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (978 KB) | HTML iconHTML

    In this paper we describe a new approach to system specification that takes the language Z as its inspiration but moves the focus from language to logic and from specification to wide-spectrum. In this paper we illustrate the differences between Z and nuZ and the advantages of the latter by means of illustrative examples. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing JFLAP with automata construction problems and automated feedback

    Publication Year: 2014, Page(s):19 - 23
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB) | HTML iconHTML

    JFLAP is a powerful and popular educational software tool that allows students in Formal Languages and Automata courses to understand theoretical concepts in a visual and interactive manner. In this paper, we enhance the quality of JFLAP's interactivity in two ways that are extremely useful for beginners learning to build finite automata: (1) our tool can automatically generate a rich variety of p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PoGest: A vision based tool for facilitating Kathak learning

    Publication Year: 2014, Page(s):24 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1798 KB) | HTML iconHTML

    We present a vision based tool for enriching the conventional method of learning Kathak. Teachers can record their dance steps using PoGest and give it to the learners for practice according to their pace and convenience. PoGest will help learners to analyze their dance movements by giving them immediate feedback in the form of similarity score and also the concurrent display of juxtaposed recordi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CoSDEES: A framework for developing CSD environments for educational settings

    Publication Year: 2014, Page(s):30 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (607 KB) | HTML iconHTML

    The recent drift towards the use of Collaborative Software Development (CSD) practices in software industry may prove to be an escalating movement towards changing software development philosophies. Consequently, research is in progress in developing related computing technologies for supporting the collaborative engagements of software developers. Eventually, it is essential that software enginee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LectureKhoj: Automatic tagging and semantic segmentation of online lecture videos

    Publication Year: 2014, Page(s):37 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1568 KB) | HTML iconHTML

    Online educational lecture videos are very popular nowadays. However, effective search of relevant videos remains a difficult task. Texts displayed in lecture video slides have important information about the video content. Therefore, it can be utilized as a valuable source of content analysis and tagging. In this paper, we present an automated method for semantic segmentation and tag recommendati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crowdlearning: An incentive-based learning platform for crowd

    Publication Year: 2014, Page(s):44 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (810 KB) | HTML iconHTML

    Crowdlearning is an incentive-based learning platform for crowd, denoted as iCL, to inspire experts for knowledge sharing and to incentivize them for their contributions in crowd. In iCL, collaborators provide learning platform to the crowd of interested learners. The relativeness of interest of contributors and learners is compared by match-making process. The core objective of iCL is to motivate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using WebGL to implement a glass lens in Online Labs

    Publication Year: 2014, Page(s):50 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (777 KB) | HTML iconHTML

    Online Labs are revolutionizing education by offering access to content anytime and from any place. The OLabs project has had a deep impact on learning capabilities of students by providing an integrated environment that includes videos, animations, simulations and textual content. It has also helped to substitute teachers wherever there have been gaps. OLabs offers an excellent platform for the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A free and open source framework for rural education

    Publication Year: 2014, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (679 KB) | HTML iconHTML

    With more than 85% of India's schools being in rural areas, it is imminent that we focus on enhancing the quality of rural education. Given these large number of students in rural schools, we need scalable models to cater to their needs. Information and Communication Technology can go a long way in making resources available and accessible in a scalable manner. However, this comes with a huge cost... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A wireless dynamic gesture user interface for HCI using hand data glove

    Publication Year: 2014, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1224 KB) | HTML iconHTML

    In this paper, DG5 hand data glove is used to design an intelligent and efficient human-computer interface to interact with VLC media player. It maps the static keyboard with dynamic human hand gestures with 22 Degree of Freedom (DoF) to interact more natural way with computer. The result is very much appreciated showing the confusion matrix of various gestures used. In this paper, 10 complex gest... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel hybrid memetic search in Artificial Bee Colony algorithm

    Publication Year: 2014, Page(s):68 - 73
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (638 KB) | HTML iconHTML

    Artificial Bee Colony (ABC) algorithm is a Nature Inspired Algorithm (NIA). ABC is motivated by clever food foraging behavior of honey bees. Comparable to other population based stochastic algorithm ABC also lack balance in exploration of local search reason and exploitation of finest possible solutions in search space. The proposed algorithm is a hybrid of two memetic algorithms; it combines Levy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fat time optimization protocol in cellular networks

    Publication Year: 2014, Page(s):74 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1023 KB) | HTML iconHTML

    As the widespread of cellular networks is broadening, the volumes of end-users also keep on increasing exponentially. Amongst the primeval issues, the concern of providing high throughput along with a decent fairness, surfaces with the ever expanding reign of cellular networks. The present-day algorithms such as Max-Rate, Round-Robin and Proportional-Fair algorithm are getting cast-out in the spri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information metrics for low-rate DDoS attack detection: A comparative evaluation

    Publication Year: 2014, Page(s):80 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (913 KB) | HTML iconHTML

    Invasion by Distributed Denial of Service (DDoS) is a serious threat to services offered on the Internet. A low-rate DDoS attack allows legitimate network traffic to pass and consumes low bandwidth. So, detection of this type of attacks is very difficult in high speed networks. Information theory is popular because it allows quantifications of the difference between malicious traffic and legitimat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A heuristic for two bin partition problem

    Publication Year: 2014, Page(s):85 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB) | HTML iconHTML

    There are many heuristics to address 2-bin integer partition problem. The range (R) of the values in the data set and the number of element (N) in the data set are 2-parameters which determine the appropriate heuristics. By and large, for large N, Karmarkar-Karp(KK) heuristics offers solutions. For low values of N, Complete Karmarkar-Karp heuristics (CKK), Horowitz and Sahni (HS), Schroeppel and S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Earned Value Analysis for real time wireless sensor network

    Publication Year: 2014, Page(s):89 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    As Wireless Sensor Network (WSN) is spread across wide geographically area, global end-to-end estimates of control parameters can't predict timely reporting of data. However, as packet progresses over multihop WSN, routing decisions may have to be adapted according to changed environment parameters/conditions. Many algorithms lack dynamic adaptability to changed environment conditions. Real Time W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EmoXract: Domain independent emotion mining model for unstructured data

    Publication Year: 2014, Page(s):94 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    Emotion plays an important role in human computer interaction to give a human like feel. To acknowledge the importance of emotions in an artificial agent, we propose a domain independent emotion mining model (EmoXract) which extracts emotions from an unstructured data. The emotion is extracted at sentence level based upon the contextual information. Basically, we have used two corpuses: WordNet di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Static hand gesture recognition using stacked Denoising Sparse Autoencoders

    Publication Year: 2014, Page(s):99 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1152 KB) | HTML iconHTML

    With the advent of personal computers, humans have always wanted to communicate with them in either their natural language or by using gestures. This gave birth to the field of Human Computer Interaction and its subfield Automatic Sign Language Recognition. This paper proposes the method of automatic feature extraction of the images of hand. These extracted features are then used to train the Soft... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated spoken language recognition system using support vector machines

    Publication Year: 2014, Page(s):105 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (598 KB) | HTML iconHTML

    An automatic Language Identification (LID) is a system designed to recognize a language from a given spoken utterance. The spoken utterances are classified according to the pre-defined set of languages. In this paper a LID system is designed for two different languages namely English and French. The classification of an audio sample is done by extracting Mel frequency cepstral coefficients (MFCCs)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification of glaucoma based on texture features using neural networks

    Publication Year: 2014, Page(s):109 - 112
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (611 KB) | HTML iconHTML

    Glaucoma is the most common cause of blindness and it affects most of the ageing society and this occurs due to pressure increases in the optic nerve which damages the optic nerve. This paper is an attempt to study and analyze the texture features of the Fundus image and its variations when the Fundus image is infected with glaucoma. The texture features extracted are localized around the optic cu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.