首页 > 最新文献

2017 Tenth International Conference on Contemporary Computing (IC3)最新文献

英文 中文
Randomized grey wolf optimizer (RGWO) with randomly weighted coefficients 随机加权系数随机灰狼优化器(RGWO
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284355
Kartikeya Jaiswal, H. Mittal, Sonia Kukreja
Meta-heuristic algorithms are quiet widely used in engineering and science. In this paper, a novel variant of grey-wolf optimizer, randomized gray-wolf optimizer, is proposed where the effect of random coefficients of the best agents are taken into consideration. The proposed variant is tested on a set of 12 standard benchmark functions and compared with grey-wolf optimizer and particle swarm optimization on different dimensional search spaces. To statistically validate and analyse the convergence behaviour of variant, wilcoxon rank sum test along with convergence graphs over 30 runs is studied. The experimental study signify that the proposed variant not only enhances the performance but has comparable convergence rate, especially in case of multi-modal problems.
元启发式算法在工程和科学中得到了广泛的应用。本文提出了一种新的灰狼优化算法——随机灰狼优化算法,该算法考虑了最佳代理随机系数的影响。在12个标准基准函数上进行了测试,并与灰狼优化器和粒子群优化器在不同维度搜索空间上进行了比较。为了统计验证和分析变量的收敛行为,研究了30次以上的收敛图的wilcoxon秩和检验。实验研究表明,该算法不仅提高了算法性能,而且具有相当的收敛速度,特别是在多模态问题下。
{"title":"Randomized grey wolf optimizer (RGWO) with randomly weighted coefficients","authors":"Kartikeya Jaiswal, H. Mittal, Sonia Kukreja","doi":"10.1109/IC3.2017.8284355","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284355","url":null,"abstract":"Meta-heuristic algorithms are quiet widely used in engineering and science. In this paper, a novel variant of grey-wolf optimizer, randomized gray-wolf optimizer, is proposed where the effect of random coefficients of the best agents are taken into consideration. The proposed variant is tested on a set of 12 standard benchmark functions and compared with grey-wolf optimizer and particle swarm optimization on different dimensional search spaces. To statistically validate and analyse the convergence behaviour of variant, wilcoxon rank sum test along with convergence graphs over 30 runs is studied. The experimental study signify that the proposed variant not only enhances the performance but has comparable convergence rate, especially in case of multi-modal problems.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123526571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Are tweets the real estimators of election results? 推特是选举结果的真正估计者吗?
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284309
Munaza Ramzan, S. Mehta, E. Annapoorna
A medium with a huge amount of information like Twitter, can be analyzed for surveying the opinions or sentiments of the public towards future leaders. This paper focuses on predicting the winning party in UP elections with the help of public opinion on Twitter. The paper intends to understand whether tweets can be used as useful method in predicting the election results or is it just a social hype. Twitter API is used to extract tweets about the UP elections. Public opinion is then ascertained with the help of sentiment analysis on the tweets. After sufficient amount of tweets are collected for analysis, we are simply expanding on positive tweets and getting 45.13% for BJP, the highest percentage as compared to other parties. On comparing this result with the exit polls and the actual election results, the prediction of winning party by the twitter data analysis is correct.
像Twitter这样拥有大量信息的媒体,可以分析公众对未来领导人的意见或情绪。本文的重点是利用Twitter上的民意来预测北方邦选举中的获胜政党。本文旨在了解推特是否可以作为预测选举结果的有用方法,或者它只是一种社会炒作。Twitter API用于提取关于UP选举的推文。然后通过对推文的情绪分析来确定公众意见。在收集了足够数量的推文进行分析后,我们只是扩大了积极的推文,人民党获得了45.13%的支持率,这是其他政党中最高的。将这一结果与出口民调和实际选举结果进行比较,twitter数据分析对获胜政党的预测是正确的。
{"title":"Are tweets the real estimators of election results?","authors":"Munaza Ramzan, S. Mehta, E. Annapoorna","doi":"10.1109/IC3.2017.8284309","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284309","url":null,"abstract":"A medium with a huge amount of information like Twitter, can be analyzed for surveying the opinions or sentiments of the public towards future leaders. This paper focuses on predicting the winning party in UP elections with the help of public opinion on Twitter. The paper intends to understand whether tweets can be used as useful method in predicting the election results or is it just a social hype. Twitter API is used to extract tweets about the UP elections. Public opinion is then ascertained with the help of sentiment analysis on the tweets. After sufficient amount of tweets are collected for analysis, we are simply expanding on positive tweets and getting 45.13% for BJP, the highest percentage as compared to other parties. On comparing this result with the exit polls and the actual election results, the prediction of winning party by the twitter data analysis is correct.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"424 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122798309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Impact of non-linear numerical methods on localization algorithm 非线性数值方法对定位算法的影响
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284339
Amanpreet Kaur, Padam Kumar, Govind P. Gupta
Localization is hot research topic in the area of WSNs. Many proposals have come in this area to develop an efficient, accurate, scalable and feasible algorithm. Distance-Vector (DV-Hop) is one standout amongst the most prominent algorithms due to its advantages, but it has still low accuracy. To improve accuracy of DV-Hop algorithm, the improvement has been proposed which combines a non-linear numerical method with DV-Hop. This improvement achieves better accuracy as it uses non-linear method for non-linear localization algorithm.
定位是无线传感器网络领域的研究热点。为了开发一种高效、准确、可扩展和可行的算法,在这一领域提出了许多建议。距离矢量算法(Distance-Vector, DV-Hop)因其自身的优点而成为最突出的算法之一,但其精度仍然较低。为了提高DV-Hop算法的精度,提出了将非线性数值方法与DV-Hop算法相结合的改进方法。这种改进由于在非线性定位算法中使用了非线性方法,从而获得了更好的精度。
{"title":"Impact of non-linear numerical methods on localization algorithm","authors":"Amanpreet Kaur, Padam Kumar, Govind P. Gupta","doi":"10.1109/IC3.2017.8284339","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284339","url":null,"abstract":"Localization is hot research topic in the area of WSNs. Many proposals have come in this area to develop an efficient, accurate, scalable and feasible algorithm. Distance-Vector (DV-Hop) is one standout amongst the most prominent algorithms due to its advantages, but it has still low accuracy. To improve accuracy of DV-Hop algorithm, the improvement has been proposed which combines a non-linear numerical method with DV-Hop. This improvement achieves better accuracy as it uses non-linear method for non-linear localization algorithm.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116777027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A feature-based analysis of MOOC for learning analytics 基于特征的MOOC学习分析
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284331
J. Chauhan, A. Goel
Massive Open Online Course (MOOC) is a popular way for offering online courses, globally, by the education providers. With large number of learners enrolled in the courses, it becomes difficult to help the learners, individually, in achieving learning objectives. But, large amount of data gets generated from activities performed by the learner. Learning analytics uses the learner-generated educational data to improve the learning process. Currently, MOOCs provide limited support to the learners for learning analytics. In this paper, an analysis of features offered to the learners by different MOOC platforms for learning analytics, is presented. For this, features of several key platforms are identified and further categorized for analysis purposes. The comparative analysis helps during selection of a platform on basis of the analytical features supported by them. Also, a recommendation is provided for enhancement of learning analytics capabilities of MOOC platforms.
大规模在线开放课程(MOOC)是全球教育提供商提供在线课程的一种流行方式。由于大量的学习者参加了课程,因此很难单独帮助学习者实现学习目标。但是,大量的数据是由学习者执行的活动产生的。学习分析使用学习者生成的教育数据来改进学习过程。目前,mooc为学习者提供的学习分析支持有限。本文分析了不同MOOC平台为学习者提供的学习分析功能。为此,本文确定了几个关键平台的特性,并对其进行了进一步分类,以便进行分析。对比分析有助于根据平台所支持的分析特性来选择平台。同时,对MOOC平台学习分析能力的增强提出了建议。
{"title":"A feature-based analysis of MOOC for learning analytics","authors":"J. Chauhan, A. Goel","doi":"10.1109/IC3.2017.8284331","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284331","url":null,"abstract":"Massive Open Online Course (MOOC) is a popular way for offering online courses, globally, by the education providers. With large number of learners enrolled in the courses, it becomes difficult to help the learners, individually, in achieving learning objectives. But, large amount of data gets generated from activities performed by the learner. Learning analytics uses the learner-generated educational data to improve the learning process. Currently, MOOCs provide limited support to the learners for learning analytics. In this paper, an analysis of features offered to the learners by different MOOC platforms for learning analytics, is presented. For this, features of several key platforms are identified and further categorized for analysis purposes. The comparative analysis helps during selection of a platform on basis of the analytical features supported by them. Also, a recommendation is provided for enhancement of learning analytics capabilities of MOOC platforms.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116283151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Acoustic features based word level dialect classification using SVM and ensemble methods 基于声学特征的支持向量机和集成方法的词级方言分类
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284315
Nagaratna B. Chittaragi, S. Koolagudi
In this paper, word based dialect classification system is proposed by using acoustic characteristics of the speech signal. Dialects mainly represent the different pronunciation patterns of any language. Dialectal cues can exist at various levels such as phoneme, syllable, word, sentence and phrase in an utterance. Word level dialectal traits are extracted to recognize dialects since every word exhibits significant dialect discriminating cues. Intonational Variations in English (IViE) speech corpus recorded in British English has been considered. The corpus includes nine dialects which cover nine distinct regions of British Isles. Acoustic properties such as spectral and prosodic features are derived from word level to construct the feature vector. Further, two different classification algorithms such as support vector machine (SVM) and tree-based extreme gradient boosting (XGB) ensemble algorithms are used to extract the prominent patterns that are used to discriminate the dialects. From the experiments, a better performance has been observed with word level traits using ensemble methods over the SVM classification method.
本文利用语音信号的声学特征,提出了一种基于词的方言分类系统。方言主要代表任何一种语言的不同发音模式。方言线索可以存在于话语中的音素、音节、单词、句子和短语等不同层次。提取词级方言特征来识别方言,因为每个词都有重要的方言区分线索。研究了英国英语语音语料库中记录的英语语调变化(IViE)。语料库包括九种方言,覆盖了不列颠群岛的九个不同地区。从词频和韵律等声学特性出发,构建特征向量。在此基础上,采用支持向量机(SVM)和基于树的极限梯度增强(XGB)集成算法提取方言识别的显著模式。从实验中可以看出,使用集成方法对词水平特征进行分类的效果优于支持向量机分类方法。
{"title":"Acoustic features based word level dialect classification using SVM and ensemble methods","authors":"Nagaratna B. Chittaragi, S. Koolagudi","doi":"10.1109/IC3.2017.8284315","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284315","url":null,"abstract":"In this paper, word based dialect classification system is proposed by using acoustic characteristics of the speech signal. Dialects mainly represent the different pronunciation patterns of any language. Dialectal cues can exist at various levels such as phoneme, syllable, word, sentence and phrase in an utterance. Word level dialectal traits are extracted to recognize dialects since every word exhibits significant dialect discriminating cues. Intonational Variations in English (IViE) speech corpus recorded in British English has been considered. The corpus includes nine dialects which cover nine distinct regions of British Isles. Acoustic properties such as spectral and prosodic features are derived from word level to construct the feature vector. Further, two different classification algorithms such as support vector machine (SVM) and tree-based extreme gradient boosting (XGB) ensemble algorithms are used to extract the prominent patterns that are used to discriminate the dialects. From the experiments, a better performance has been observed with word level traits using ensemble methods over the SVM classification method.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122420834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Efficient content based image retrieval using SVM and color histogram 基于支持向量机和颜色直方图的高效图像检索
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284352
Shiraaz Saad, H. Kumar, T. K. Tewari
The volume of the image databases have increased to such an extent that it is very difficult to retrieve the relevant images from the database efficiently. Content Based Image Retrieval methods use shape, color and texture features of the images and gives a more accurate method to search for the relevant images in the database. In this paper, we propose an approach for an efficient Content Based Image Retrieval which combines the use of Support Vector Machine (SVM) with color histogram. A two level approach is used by first filtering the relevant images using SVM followed by color based matching. The comparison of proposed image retrieval techniques is done based on the retrieval time and accuracy of the retrieved images.
图像数据库的容量越来越大,很难有效地从数据库中检索到相关的图像。基于内容的图像检索方法利用图像的形状、颜色和纹理特征,提供了一种更准确的方法在数据库中搜索相关图像。本文提出了一种将支持向量机(SVM)与颜色直方图相结合的基于内容的图像检索方法。首先使用支持向量机过滤相关图像,然后使用基于颜色的匹配,采用两级方法。基于检索时间和检索精度对几种图像检索技术进行了比较。
{"title":"Efficient content based image retrieval using SVM and color histogram","authors":"Shiraaz Saad, H. Kumar, T. K. Tewari","doi":"10.1109/IC3.2017.8284352","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284352","url":null,"abstract":"The volume of the image databases have increased to such an extent that it is very difficult to retrieve the relevant images from the database efficiently. Content Based Image Retrieval methods use shape, color and texture features of the images and gives a more accurate method to search for the relevant images in the database. In this paper, we propose an approach for an efficient Content Based Image Retrieval which combines the use of Support Vector Machine (SVM) with color histogram. A two level approach is used by first filtering the relevant images using SVM followed by color based matching. The comparison of proposed image retrieval techniques is done based on the retrieval time and accuracy of the retrieved images.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115968566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Delay-based workflow scheduling for cost optimization in heterogeneous cloud system 基于延迟的异构云系统成本优化工作流调度
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284323
M. Kumar, Indrajeet Gupta, P. K. Jana
Workflow scheduling has been widely adopted as a deep concern for heterogeneous cloud computing environment and recognized as a well-known NP-complete problem. The scheduling goal of any workflow scheduler is to map the user requests on the available virtual machines (VMs) which are deployed on various cloud servers such that overall processing time and incurred cost is minimized. This paper proposes a delay-based workflow scheduling algorithm for cost optimization in the heterogeneous cloud system. The proposed scheduling heuristic works in two phases. In the first phase, the proposed heuristic introduces a new priority scheme for the tasks. The prioritized tasks are then assigned to the appropriate VMs in the next phase. The algorithm is simulated on various synthetic workflows and two benchmark scientific workflows with different range of tasks. The experimental results of the proposed algorithm supercedes the existing scheduling algorithms in terms of makespan, schedule length ratio (SLR) and cost.
工作流调度是异构云计算环境中一个备受关注的问题,也是一个众所周知的np完全问题。任何工作流调度器的调度目标都是将用户请求映射到部署在各种云服务器上的可用虚拟机(vm)上,从而使总体处理时间和产生的成本最小化。针对异构云系统中的成本优化问题,提出了一种基于延迟的工作流调度算法。提出的调度启发式算法分为两个阶段。在第一阶段,提出的启发式算法为任务引入了一个新的优先级方案。然后在下一阶段将优先任务分配给适当的vm。在各种综合工作流和两个具有不同任务范围的基准科学工作流上对该算法进行了仿真。实验结果表明,该算法在makespan、进度长度比(SLR)和成本方面优于现有的调度算法。
{"title":"Delay-based workflow scheduling for cost optimization in heterogeneous cloud system","authors":"M. Kumar, Indrajeet Gupta, P. K. Jana","doi":"10.1109/IC3.2017.8284323","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284323","url":null,"abstract":"Workflow scheduling has been widely adopted as a deep concern for heterogeneous cloud computing environment and recognized as a well-known NP-complete problem. The scheduling goal of any workflow scheduler is to map the user requests on the available virtual machines (VMs) which are deployed on various cloud servers such that overall processing time and incurred cost is minimized. This paper proposes a delay-based workflow scheduling algorithm for cost optimization in the heterogeneous cloud system. The proposed scheduling heuristic works in two phases. In the first phase, the proposed heuristic introduces a new priority scheme for the tasks. The prioritized tasks are then assigned to the appropriate VMs in the next phase. The algorithm is simulated on various synthetic workflows and two benchmark scientific workflows with different range of tasks. The experimental results of the proposed algorithm supercedes the existing scheduling algorithms in terms of makespan, schedule length ratio (SLR) and cost.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124126309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Disassembling and patching iOS applications at assembly level 在组装级拆解和修补iOS应用程序
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284326
Chetna Gupta, Arpita Jadhav Bhatt, S. Mittal
There are many mobile operating systems for different smartphones. iOS is one of them available exclusively on Apple devices. It offers various features such as GPS tracking, Siri, multi touch gestures, biometric authentication etc. The functionality of an iOS device can be expanded by installing third party applications, available from App store. Apple follows a mandatory code signing process to ensure that applications are developed by trusted enterprises/developers and no malware exists on App Store. However, past attacks on iOS devices such as ikee, Wirelurker have revealed that Apple's code signing process is not sufficient to ensure the security of its devices. Considering past attacks on iOS devices and with view of analyzing the behavior of iOS applications, this paper aims to describe how an analyst can perform reverse engineering of iOS applications by disassembling, decompiling and debugging application's code using Disassembler to discover the vulnerable areas.
有许多针对不同智能手机的移动操作系统。iOS是其中之一,只能在苹果设备上使用。它提供了各种功能,如GPS跟踪,Siri,多点触摸手势,生物识别认证等。iOS设备的功能可以通过安装第三方应用程序来扩展,这些应用程序可以从App store获得。苹果遵循强制性的代码签名流程,以确保应用程序是由受信任的企业/开发者开发的,并且App Store上没有恶意软件。然而,过去针对iOS设备的攻击,如ikee, Wirelurker,都表明苹果的代码签名过程不足以确保其设备的安全性。考虑到以往针对iOS设备的攻击,并从分析iOS应用程序行为的角度出发,本文旨在描述分析人员如何通过使用反汇编器(Disassembler)对应用程序代码进行反汇编、反编译和调试,从而发现薄弱环节,从而对iOS应用程序进行逆向工程。
{"title":"Disassembling and patching iOS applications at assembly level","authors":"Chetna Gupta, Arpita Jadhav Bhatt, S. Mittal","doi":"10.1109/IC3.2017.8284326","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284326","url":null,"abstract":"There are many mobile operating systems for different smartphones. iOS is one of them available exclusively on Apple devices. It offers various features such as GPS tracking, Siri, multi touch gestures, biometric authentication etc. The functionality of an iOS device can be expanded by installing third party applications, available from App store. Apple follows a mandatory code signing process to ensure that applications are developed by trusted enterprises/developers and no malware exists on App Store. However, past attacks on iOS devices such as ikee, Wirelurker have revealed that Apple's code signing process is not sufficient to ensure the security of its devices. Considering past attacks on iOS devices and with view of analyzing the behavior of iOS applications, this paper aims to describe how an analyst can perform reverse engineering of iOS applications by disassembling, decompiling and debugging application's code using Disassembler to discover the vulnerable areas.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126177927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Measuring the randomness of speech cues for emotion recognition 测量语音线索的随机性用于情感识别
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284298
Seba Susan, Amandeep Kaur
Recognizing the emotional state of a human being from his/her speech is of great significance in modern surveillance systems. The Mel-Frequency Cepstral Coefficients (MFCC), pitch and energy are conventional speech cues that have been linked to emotions since long. In our work, we measure the randomness of these cues over time for discriminating between various human emotions. Entropy is used for measuring the randomness of the cues, computed from temporal histograms as well as temporal co-occurrence matrices. The direct values of MFCC, pitch and energy are not included and only their randomness is considered, since the actual values of MFCC, pitch and energy are often a characteristic of the speaker as much as of the emotion involved. The new set of entropy features for speech based emotion recognition is compared for its efficiency with the state-of-the- art methods on the benchmark SAVEE database. The higher classification accuracies demonstrate the efficiency of our approach.
从人的言语中识别人的情绪状态在现代监控系统中具有重要意义。Mel-Frequency倒谱系数(MFCC)、音调和能量是长期以来与情绪联系在一起的传统语音线索。在我们的工作中,我们测量了这些线索随时间的随机性,以区分不同的人类情绪。熵用于测量线索的随机性,从时间直方图和时间共现矩阵中计算。MFCC、音高和能量的直接值不包括在内,只考虑它们的随机性,因为MFCC、音高和能量的实际值往往是说话者的特征,也是所涉及的情绪的特征。在SAVEE基准数据库上,将基于语音的情感识别的熵特征集与目前最先进的方法进行了效率比较。较高的分类精度证明了该方法的有效性。
{"title":"Measuring the randomness of speech cues for emotion recognition","authors":"Seba Susan, Amandeep Kaur","doi":"10.1109/IC3.2017.8284298","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284298","url":null,"abstract":"Recognizing the emotional state of a human being from his/her speech is of great significance in modern surveillance systems. The Mel-Frequency Cepstral Coefficients (MFCC), pitch and energy are conventional speech cues that have been linked to emotions since long. In our work, we measure the randomness of these cues over time for discriminating between various human emotions. Entropy is used for measuring the randomness of the cues, computed from temporal histograms as well as temporal co-occurrence matrices. The direct values of MFCC, pitch and energy are not included and only their randomness is considered, since the actual values of MFCC, pitch and energy are often a characteristic of the speaker as much as of the emotion involved. The new set of entropy features for speech based emotion recognition is compared for its efficiency with the state-of-the- art methods on the benchmark SAVEE database. The higher classification accuracies demonstrate the efficiency of our approach.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130498478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Keystroke dynamics based authentication using fuzzy logic 基于模糊逻辑的按键动力学认证
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284338
Jatin Yadav, Kavita Pandey, Shashank Gupta, Richa Sharma
With online information thefts increasing every day, enhanced user authentication systems have become a necessity. This is due to the fact that current authentication systems have certain weaknesses, such as the username used for login is easily known to anyone and password can be guessed or forcibly retrieved. This paper focuses on overcoming these weaknesses by recognizing users based on their typing patterns. This technique which is used to uniquely label users based on their typing rhythm is known as keystroke dynamics. In an authentication system employing keystroke dynamics, samples provided by the users during the initial sign up phase are used to generate a template for the future authentication. This template is regularly updated whenever the user is correctly identified. The work proposed in this paper focuses on implementing a keystroke dynamics based authentication system using fuzzy logic. It also discusses how a fuzzy logic approach is beneficial as compared to other approaches implemented previously, and how a continuous learning model improves accuracy over time. The proposed fuzzy logic model gives 98% authentication accuracy and 2% false rejection rate.
随着网络信息盗窃日益增多,增强的用户认证系统已成为一种必要。这是由于当前的身份验证系统存在某些弱点,例如用于登录的用户名很容易被任何人知道,密码可以被猜测或强制检索。本文的重点是通过根据用户的输入模式来识别用户,从而克服这些弱点。这种根据用户的打字节奏对其进行唯一标记的技术被称为击键动力学。在使用击键动力学的身份验证系统中,用户在初始注册阶段提供的示例用于生成将来身份验证的模板。只要用户被正确识别,这个模板就会定期更新。本文提出的工作重点是利用模糊逻辑实现一个基于击键动力学的认证系统。它还讨论了与以前实现的其他方法相比,模糊逻辑方法是如何有益的,以及持续学习模型如何随着时间的推移提高准确性。所提出的模糊逻辑模型具有98%的认证准确率和2%的误拒率。
{"title":"Keystroke dynamics based authentication using fuzzy logic","authors":"Jatin Yadav, Kavita Pandey, Shashank Gupta, Richa Sharma","doi":"10.1109/IC3.2017.8284338","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284338","url":null,"abstract":"With online information thefts increasing every day, enhanced user authentication systems have become a necessity. This is due to the fact that current authentication systems have certain weaknesses, such as the username used for login is easily known to anyone and password can be guessed or forcibly retrieved. This paper focuses on overcoming these weaknesses by recognizing users based on their typing patterns. This technique which is used to uniquely label users based on their typing rhythm is known as keystroke dynamics. In an authentication system employing keystroke dynamics, samples provided by the users during the initial sign up phase are used to generate a template for the future authentication. This template is regularly updated whenever the user is correctly identified. The work proposed in this paper focuses on implementing a keystroke dynamics based authentication system using fuzzy logic. It also discusses how a fuzzy logic approach is beneficial as compared to other approaches implemented previously, and how a continuous learning model improves accuracy over time. The proposed fuzzy logic model gives 98% authentication accuracy and 2% false rejection rate.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114887865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2017 Tenth International Conference on Contemporary Computing (IC3)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1