Search Results - "2015 Eighth International Conference on Contemporary Computing (IC3)"
-
1
Exploring sentiment analysis on twitter data
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…The growing popularity of microblogging websites has transformed these into rich resources for sentiment mining. Even though opinion mining has more than a…”
Get full text
Conference Proceeding -
2
Emotion analysis of Twitter using opinion mining
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…With the rise in use of micro-blogging sites like Twitter, people are able to express and share their opinions with each other on a common platform. Currently…”
Get full text
Conference Proceeding -
3
Feature selection using Artificial Bee Colony algorithm for medical image classification
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…Feature Selection in medical image processing is a process of selection of relevant features, which are useful in model construction, as it will lead to…”
Get full text
Conference Proceeding -
4
Behavior analysis of malware using machine learning
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…In today's scenario, cyber security is one of the major concerns in network security and malware pose a serious threat to cyber security. The foremost step to…”
Get full text
Conference Proceeding -
5
Cluster based load balancing in cloud computing
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…For a cloud datacenter the biggest issue is how to tackle billions of requests coming dynamically from the end users. To handle such requests efficiently and…”
Get full text
Conference Proceeding -
6
Designing chaos based strong substitution box
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…Substitution boxes are the indispensable part of block ciphering techniques such as AES, DES, IDEA, etc. It is important to design effective S-boxes in an…”
Get full text
Conference Proceeding -
7
Identification of gait parameters from silhouette images
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…Gait analysis has applications not only in medical, rehabilitation and sports, but it can also play a decisive role in security and surveillance as a…”
Get full text
Conference Proceeding -
8
Content aware targeted image manipulation to reduce power consumption in OLED panels
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…FHD, QHD and UHD class of high pixel density panel enables precise rendering and smoothens the display quality of images. But driving such high resolution…”
Get full text
Conference Proceeding -
9
Design of large-scale Content-based recommender system using hadoop MapReduce framework
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…Nowadays, providing relevant product recommendations to customers plays an important role in retaining customers and improving their shopping experience…”
Get full text
Conference Proceeding -
10
Consistency of Java run-time behavior with design-time specifications
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…We present a novel framework for formal verification of run-time behaviour of Java programs. We focus on the class of programs with a repetitive behaviour,…”
Get full text
Conference Proceeding -
11
Comparison of various metrics used in collaborative filtering for recommendation system
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…Collaborative filtering technique for generating recommendation uses user's preferences to find other users most similar to the active user and recommends new…”
Get full text
Conference Proceeding -
12
Preface keynote talk
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for…”
Get full text
Conference Proceeding -
13
Dynamic simulator and planning tool for studying the defense and attack strategies in a war-zone
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…Augmented Reality (AR) helps create information-enriched, real-time environments that are close to the real world. This paper discusses a unique defense…”
Get full text
Conference Proceeding -
14
Online anomaly detection via class-imbalance learning
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…Anomaly detection is an important task in many real world applications such as fraud detection, suspicious activity detection, health care monitoring etc. In…”
Get full text
Conference Proceeding -
15
An efficient DCT based image watermarking scheme for protecting distribution rights
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…The chances of copyright violation and piracy have been increased due to growth of networking and technology. Digital watermark is useful to verify the…”
Get full text
Conference Proceeding -
16
Prediction of click frauds in mobile advertising
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…Click fraud represents a serious drain on advertising budgets and can seriously harm the viability of the internet advertising market. This paper proposes a…”
Get full text
Conference Proceeding -
17
Detection of design pattern using Graph Isomorphism and Normalized Cross Correlation
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…Present day software engineering concept gives emphasis on the use of design patterns for developing software which are recurring in nature. Detection of…”
Get full text
Conference Proceeding -
18
A workload balanced approach for resource scheduling in cloud computing
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…The era of cloud based multimedia applications has lead to a huge increase in the no. of requests on cloud. The increased no. of requests on cloud leads to an…”
Get full text
Conference Proceeding -
19
Significance of Clustering Coefficient over Jaccard Index
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…Link prediction is a key task to identify the future links among existing non-connected members of a network, by measuring the proximity between nodes in a…”
Get full text
Conference Proceeding -
20
Dynamic facial emotion recognition from 4D video sequences
Published in 2015 Eighth International Conference on Contemporary Computing (IC3) (01-08-2015)“…Emotions are characterized as responses to internal and external events of a person. Emotion recognition through facial expressions from videos plays a vital…”
Get full text
Conference Proceeding