Search Results - "2015 Eighth International Conference on Contemporary Computing (IC3)"

Refine Results
  1. 1

    Exploring sentiment analysis on twitter data by Venugopalan, Manju, Gupta, Deepa

    “…The growing popularity of microblogging websites has transformed these into rich resources for sentiment mining. Even though opinion mining has more than a…”
    Get full text
    Conference Proceeding
  2. 2

    Emotion analysis of Twitter using opinion mining by Kumar, Akshi, Dogra, Prakhar, Dabas, Vikrant

    “…With the rise in use of micro-blogging sites like Twitter, people are able to express and share their opinions with each other on a common platform. Currently…”
    Get full text
    Conference Proceeding
  3. 3

    Feature selection using Artificial Bee Colony algorithm for medical image classification by Agrawal, Vartika, Chandra, Satish

    “…Feature Selection in medical image processing is a process of selection of relevant features, which are useful in model construction, as it will lead to…”
    Get full text
    Conference Proceeding
  4. 4

    Behavior analysis of malware using machine learning by Dhammi, Arshi, Singh, Maninder

    “…In today's scenario, cyber security is one of the major concerns in network security and malware pose a serious threat to cyber security. The foremost step to…”
    Get full text
    Conference Proceeding
  5. 5

    Cluster based load balancing in cloud computing by Kapoor, Surbhi, Dabas, Chetna

    “…For a cloud datacenter the biggest issue is how to tackle billions of requests coming dynamically from the end users. To handle such requests efficiently and…”
    Get full text
    Conference Proceeding
  6. 6

    Designing chaos based strong substitution box by Ahmad, Musheer, Ahmad, Faiyaz, Nasim, Zeba, Bano, Zohra, Zafar, Shadab

    “…Substitution boxes are the indispensable part of block ciphering techniques such as AES, DES, IDEA, etc. It is important to design effective S-boxes in an…”
    Get full text
    Conference Proceeding
  7. 7

    Identification of gait parameters from silhouette images by Prakash, Chandra, Mittal, Anshul, Kumar, Rajesh, Mittal, Namita

    “…Gait analysis has applications not only in medical, rehabilitation and sports, but it can also play a decisive role in security and surveillance as a…”
    Get full text
    Conference Proceeding
  8. 8

    Content aware targeted image manipulation to reduce power consumption in OLED panels by Choubey, Prafulla K., Singh, Ashish K., Bankapur, Raghu B., Sb, Vaisakh P. C., Prabhu B, Manoj

    “…FHD, QHD and UHD class of high pixel density panel enables precise rendering and smoothens the display quality of images. But driving such high resolution…”
    Get full text
    Conference Proceeding
  9. 9

    Design of large-scale Content-based recommender system using hadoop MapReduce framework by Saravanan, S.

    “…Nowadays, providing relevant product recommendations to customers plays an important role in retaining customers and improving their shopping experience…”
    Get full text
    Conference Proceeding
  10. 10

    Consistency of Java run-time behavior with design-time specifications by Jayaraman, Swaminathan, Hari, Dinoop, Jayaraman, Bharat

    “…We present a novel framework for formal verification of run-time behaviour of Java programs. We focus on the class of programs with a repetitive behaviour,…”
    Get full text
    Conference Proceeding
  11. 11

    Comparison of various metrics used in collaborative filtering for recommendation system by Kumar, Anuranjan, Gupta, Sahil, Singh, S. K., Shukla, K. K.

    “…Collaborative filtering technique for generating recommendation uses user's preferences to find other users most similar to the active user and recommends new…”
    Get full text
    Conference Proceeding
  12. 12

    Preface keynote talk

    “…Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for…”
    Get full text
    Conference Proceeding
  13. 13

    Dynamic simulator and planning tool for studying the defense and attack strategies in a war-zone by Gulati, Siddharth, Rastogi, Abhinav, Thakur, Manish K.

    “…Augmented Reality (AR) helps create information-enriched, real-time environments that are close to the real world. This paper discusses a unique defense…”
    Get full text
    Conference Proceeding
  14. 14

    Online anomaly detection via class-imbalance learning by Maurya, Chandresh Kumar, Toshniwal, Durga, Venkoparao, Gopalan Vijendran

    “…Anomaly detection is an important task in many real world applications such as fraud detection, suspicious activity detection, health care monitoring etc. In…”
    Get full text
    Conference Proceeding
  15. 15

    An efficient DCT based image watermarking scheme for protecting distribution rights by Gupta, Gaurav, Joshi, Amit Mahesh, Sharma, Kanika

    “…The chances of copyright violation and piracy have been increased due to growth of networking and technology. Digital watermark is useful to verify the…”
    Get full text
    Conference Proceeding
  16. 16

    Prediction of click frauds in mobile advertising by Taneja, Mayank, Garg, Kavyanshi, Purwar, Archana, Sharma, Samarth

    “…Click fraud represents a serious drain on advertising budgets and can seriously harm the viability of the internet advertising market. This paper proposes a…”
    Get full text
    Conference Proceeding
  17. 17

    Detection of design pattern using Graph Isomorphism and Normalized Cross Correlation by Pradhan, Prayasee, Dwivedi, Ashish Kumar, Rath, Santanu Kumar

    “…Present day software engineering concept gives emphasis on the use of design patterns for developing software which are recurring in nature. Detection of…”
    Get full text
    Conference Proceeding
  18. 18

    A workload balanced approach for resource scheduling in cloud computing by Kapur, Ritu

    “…The era of cloud based multimedia applications has lead to a huge increase in the no. of requests on cloud. The increased no. of requests on cloud leads to an…”
    Get full text
    Conference Proceeding
  19. 19

    Significance of Clustering Coefficient over Jaccard Index by Gupta, Anand Kumar, Sardana, Neetu

    “…Link prediction is a key task to identify the future links among existing non-connected members of a network, by measuring the proximity between nodes in a…”
    Get full text
    Conference Proceeding
  20. 20

    Dynamic facial emotion recognition from 4D video sequences by Suja, P., Kalyan Kumar, V. P., Tripathi, Shikha

    “…Emotions are characterized as responses to internal and external events of a person. Emotion recognition through facial expressions from videos plays a vital…”
    Get full text
    Conference Proceeding