Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943140
Madhuri Yadav, R. Purwar
Humans can easily recognize handwritten words, after gaining basic knowledge of languages. This knowledge needs to be transferred to computers for automatic character recognition. The work proposed in this paper tries to automate recognition of handwritten hindi isolated characters using multiple classifiers. For feature extraction, it uses histogram of oriented gradients as one feature and profile projection histogram as another feature. The performance of various classifiers has been evaluated using theses features experimentally and quadratic SVM has been found to produce better results.
{"title":"Hindi handwritten character recognition using multiple classifiers","authors":"Madhuri Yadav, R. Purwar","doi":"10.1109/CONFLUENCE.2017.7943140","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943140","url":null,"abstract":"Humans can easily recognize handwritten words, after gaining basic knowledge of languages. This knowledge needs to be transferred to computers for automatic character recognition. The work proposed in this paper tries to automate recognition of handwritten hindi isolated characters using multiple classifiers. For feature extraction, it uses histogram of oriented gradients as one feature and profile projection histogram as another feature. The performance of various classifiers has been evaluated using theses features experimentally and quadratic SVM has been found to produce better results.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"57 1","pages":"149-154"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77061677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943127
Nur Aliyatul Husna Bt Yahya, S. Abdullah, Abbas Salimi Zaini, Mohd Zamri Murah, A. Abdullah, Shariffpudin Basiron
A license plate localization system is useful for many applications. Due to ambient of lighting in three distinct situation which are morning, afternoon and night causing difficulty to search optimum threshold value in each situation. This research uses global thresholding approach by using Kapur entropy multilevel threshold based on Patch-Levy Bees Algorithm (PLBA). As a result, the system properly localize and identify number plate in the image by using proposed segmentation image. From the experiment, proposed method are achieve accuracy rates to 67.68%, 90.71%, 24.34% respectively for morning, afternoon and night dataset.
{"title":"License plate localization based on Kapur optimal multilevel threshold","authors":"Nur Aliyatul Husna Bt Yahya, S. Abdullah, Abbas Salimi Zaini, Mohd Zamri Murah, A. Abdullah, Shariffpudin Basiron","doi":"10.1109/CONFLUENCE.2017.7943127","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943127","url":null,"abstract":"A license plate localization system is useful for many applications. Due to ambient of lighting in three distinct situation which are morning, afternoon and night causing difficulty to search optimum threshold value in each situation. This research uses global thresholding approach by using Kapur entropy multilevel threshold based on Patch-Levy Bees Algorithm (PLBA). As a result, the system properly localize and identify number plate in the image by using proposed segmentation image. From the experiment, proposed method are achieve accuracy rates to 67.68%, 90.71%, 24.34% respectively for morning, afternoon and night dataset.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"10 9 1","pages":"77-81"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80625501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943177
A. Malik, Babita Pandey
Data gathering is big challenging problem in Vehicular ad hoc Network (VANET). To overcome this problem, plenty of data gathering techniques have been proposed. None of the technique provides security in the process of gathering of data from vehicles to RSUs. The primary objective of this paper is to propose a secure as well as efficient data gathering technique that provides security and confidentiality to the gathering of data from vehicles to RSUs and vice versa. Performance of the data gathering technique proposed is evaluated by comparing the proposed technique with the existing data gathering techniques on the basis of message delivery ratio (MDR), average delay and computational overhead. Results of simulation assure that the data gathering technique proposed performs better in comparison to existing data gathering technique.
{"title":"Asymmetric encryption based secure and efficient data gathering technique in VANET","authors":"A. Malik, Babita Pandey","doi":"10.1109/CONFLUENCE.2017.7943177","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943177","url":null,"abstract":"Data gathering is big challenging problem in Vehicular ad hoc Network (VANET). To overcome this problem, plenty of data gathering techniques have been proposed. None of the technique provides security in the process of gathering of data from vehicles to RSUs. The primary objective of this paper is to propose a secure as well as efficient data gathering technique that provides security and confidentiality to the gathering of data from vehicles to RSUs and vice versa. Performance of the data gathering technique proposed is evaluated by comparing the proposed technique with the existing data gathering techniques on the basis of message delivery ratio (MDR), average delay and computational overhead. Results of simulation assure that the data gathering technique proposed performs better in comparison to existing data gathering technique.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"94 1","pages":"369-372"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79589824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943170
S. Bhingarkar, D. Shah
Several vendors opt for Cloud based website hosting nowadays, as it is very trustworthy, easily scalable and reasonable hosting solution than traditional website hosting in various aspects. The most common attacks carried out currently against web application are SQL injection. Cross Site Scripting (XSS), Distributed Denial of Service (DDoS) and Cross Site Request Forgery (CSRF). Distributed Denial-of-service (DDoS) attack is one of the major web security attacks to the cloud hosted websites. Hence, this paper mainly concentrates upon soft computing techniques used so far against such attack. The most straightforward way to carry out the attack is through botnet. The malicious HTTP traffic generated by an attacker imitates to be genuine and hence go undetected. Nowadays, different soft computing techniques are used as a tool to detect malicious traffic. This paper presents a review of these techniques implemented so far that differentiate between genuine and malicious traffic. Economic Denial of Sustainability (EDoS) is a special sort ο f DDoS attack that exploits cloud's pay-as-you-go model. The attacker generates anomalous HTTP requests that cause up scaling of the architecture and this puts financial burden over website owner. This paper tries to realize whether existing techniques can be used for defending EDoS attack and it also points out research directions in this field.
{"title":"A survey: Cloud hosted website protection using soft computing techniques","authors":"S. Bhingarkar, D. Shah","doi":"10.1109/CONFLUENCE.2017.7943170","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943170","url":null,"abstract":"Several vendors opt for Cloud based website hosting nowadays, as it is very trustworthy, easily scalable and reasonable hosting solution than traditional website hosting in various aspects. The most common attacks carried out currently against web application are SQL injection. Cross Site Scripting (XSS), Distributed Denial of Service (DDoS) and Cross Site Request Forgery (CSRF). Distributed Denial-of-service (DDoS) attack is one of the major web security attacks to the cloud hosted websites. Hence, this paper mainly concentrates upon soft computing techniques used so far against such attack. The most straightforward way to carry out the attack is through botnet. The malicious HTTP traffic generated by an attacker imitates to be genuine and hence go undetected. Nowadays, different soft computing techniques are used as a tool to detect malicious traffic. This paper presents a review of these techniques implemented so far that differentiate between genuine and malicious traffic. Economic Denial of Sustainability (EDoS) is a special sort ο f DDoS attack that exploits cloud's pay-as-you-go model. The attacker generates anomalous HTTP requests that cause up scaling of the architecture and this puts financial burden over website owner. This paper tries to realize whether existing techniques can be used for defending EDoS attack and it also points out research directions in this field.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"25 1","pages":"325-330"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82227621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943176
Jaweria Usmani, Rakesh Kumar, J. Prakash
Mobile adhoc network (MANET) is a collection of mobile node that can communicate with each other via radio or infra without any fixed infrastructure. MANET is a wireless network so to connect with internet any interface is needed that is called gateway which provide route to the internet. Due to dynamic topology packets are loss which degrades network operation. So to achieved high throughput security scheme are applied on internet gateway which helps to out from adversarial environment. There are some security goal is discussed (confidentiality, integrity, authentication and non-repudiation) which enhanced adhoc network operation. In this paper we survey on the gateway discovery scheme with security and without security on the basis of various performance parameter like packet delivery ratio, end to end delay, routing overhead and throughput and then conclude which one is better.
{"title":"A survey on secure gateway discovery in MANET","authors":"Jaweria Usmani, Rakesh Kumar, J. Prakash","doi":"10.1109/CONFLUENCE.2017.7943176","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943176","url":null,"abstract":"Mobile adhoc network (MANET) is a collection of mobile node that can communicate with each other via radio or infra without any fixed infrastructure. MANET is a wireless network so to connect with internet any interface is needed that is called gateway which provide route to the internet. Due to dynamic topology packets are loss which degrades network operation. So to achieved high throughput security scheme are applied on internet gateway which helps to out from adversarial environment. There are some security goal is discussed (confidentiality, integrity, authentication and non-repudiation) which enhanced adhoc network operation. In this paper we survey on the gateway discovery scheme with security and without security on the basis of various performance parameter like packet delivery ratio, end to end delay, routing overhead and throughput and then conclude which one is better.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"4 1","pages":"362-368"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82440570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943152
Vaibhav Sachdeva, L. Chung
Agile methodologies are gaining popularity at a lightning pace in the software industry. Prominent agile methodologies, such as Scrum and Extreme Programming (XP), help quickly deliver a system that meets Functional Requirements (FRs), while adapting to the changes in the customer requirements and feedback. However, Non-Functional Requirements (NFRs) by and large have been either mostly ignored or introduced and retrofit late in the software development cycle, oftentimes leading to project failures. With the recent, increasing shifts towards cloud and emphasis in big data in the software industry, NFRs, such as security and performance, have become more critical than ever before. This research proposes a novel approach to handling security and performance NFRs for projects involving big data and cloud, using Scrum. An industrial case study, conducted over a span of 9 months, shows that the approach helps deal with security and performance requirements individually as well as conflicts between them in an agile methodology.
{"title":"Handling non-functional requirements for big data and IOT projects in Scrum","authors":"Vaibhav Sachdeva, L. Chung","doi":"10.1109/CONFLUENCE.2017.7943152","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943152","url":null,"abstract":"Agile methodologies are gaining popularity at a lightning pace in the software industry. Prominent agile methodologies, such as Scrum and Extreme Programming (XP), help quickly deliver a system that meets Functional Requirements (FRs), while adapting to the changes in the customer requirements and feedback. However, Non-Functional Requirements (NFRs) by and large have been either mostly ignored or introduced and retrofit late in the software development cycle, oftentimes leading to project failures. With the recent, increasing shifts towards cloud and emphasis in big data in the software industry, NFRs, such as security and performance, have become more critical than ever before. This research proposes a novel approach to handling security and performance NFRs for projects involving big data and cloud, using Scrum. An industrial case study, conducted over a span of 9 months, shows that the approach helps deal with security and performance requirements individually as well as conflicts between them in an agile methodology.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"1965 1","pages":"216-221"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82730052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943245
T. Sen, D. K. Chaudhary
Web mining is a very important research subject. It's basically an application of data mining to find concealed information on web. Internet has been providing us with boundless source of information according to our need. In recent times search tools have emerged as one of the requisite tools for person who do navigation on net or rely on web. But with expanding usage of net, it is stretching hastily in its material. With this reckless augmentation in information material, there comes a daunting task in organizing the information according to people's demands. The plight is like “drowning in data but starving for knowledge”. So to avoid the challenging scenario we have techniques to extract or filter information which have great relevance to user's query. This paper actually deals with some of those algorithms and their comparative exploration based on various parameters which will succeed in removing difficulty in ranking appropriate content to user. Techniques that has been discussed here with apt example are Simple PageRank which is based on link structure mainly forward links mainly followed by Google after that Weighted PageRank has been explained which also based on link approach but here both backward and forward links are used to rank the pages, finally HITS (Hypertext Induced Topic Search) has been scrutinized which work on both content and link structure ofweb.
{"title":"Contrastive study of Simple PageRank, HITS and Weighted PageRank algorithms: Review","authors":"T. Sen, D. K. Chaudhary","doi":"10.1109/CONFLUENCE.2017.7943245","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943245","url":null,"abstract":"Web mining is a very important research subject. It's basically an application of data mining to find concealed information on web. Internet has been providing us with boundless source of information according to our need. In recent times search tools have emerged as one of the requisite tools for person who do navigation on net or rely on web. But with expanding usage of net, it is stretching hastily in its material. With this reckless augmentation in information material, there comes a daunting task in organizing the information according to people's demands. The plight is like “drowning in data but starving for knowledge”. So to avoid the challenging scenario we have techniques to extract or filter information which have great relevance to user's query. This paper actually deals with some of those algorithms and their comparative exploration based on various parameters which will succeed in removing difficulty in ranking appropriate content to user. Techniques that has been discussed here with apt example are Simple PageRank which is based on link structure mainly forward links mainly followed by Google after that Weighted PageRank has been explained which also based on link approach but here both backward and forward links are used to rank the pages, finally HITS (Hypertext Induced Topic Search) has been scrutinized which work on both content and link structure ofweb.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"20 1","pages":"721-727"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83331604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943180
K. K. Paliwal, Surjeet Singh, Suman Bajaj
Mobile Ad hoc network(MANET) are group of devices which are equipped with tiny processor, transreceiver and small power supply battery. Mobile nodes are capable to communicate to another mobile node through single hope communication or multihop communication via relay nodes. In rural area the coverage of network is very poor. There are lot of problems in rural area for robust and secure communication. To reduce this problem of poor communication increase the radio frequency range and design an algorithm for shortest path multihop communication. If the distance of mobile devices increases from the base station then mobile devices consumes more energy because energy consumption is directly proportional to distance. For overcome the power supply problem in rural area design an appropriate algorithm for maximizing the network life time of backbone infrastructure network. The base station maintains the level of energy of all mobile devices and using the information of all the device base station is capable of predict the shortest path among the mobile devices.
{"title":"Rural communication enhancement using mobile ad-hoc network","authors":"K. K. Paliwal, Surjeet Singh, Suman Bajaj","doi":"10.1109/CONFLUENCE.2017.7943180","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943180","url":null,"abstract":"Mobile Ad hoc network(MANET) are group of devices which are equipped with tiny processor, transreceiver and small power supply battery. Mobile nodes are capable to communicate to another mobile node through single hope communication or multihop communication via relay nodes. In rural area the coverage of network is very poor. There are lot of problems in rural area for robust and secure communication. To reduce this problem of poor communication increase the radio frequency range and design an algorithm for shortest path multihop communication. If the distance of mobile devices increases from the base station then mobile devices consumes more energy because energy consumption is directly proportional to distance. For overcome the power supply problem in rural area design an appropriate algorithm for maximizing the network life time of backbone infrastructure network. The base station maintains the level of energy of all mobile devices and using the information of all the device base station is capable of predict the shortest path among the mobile devices.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"30 1","pages":"387-391"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89424801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943254
S. Dwivedi
Present paper is fully dedicated for antenna design for advance communication systems. Substrate thickness has been taken as key role for antenna performance characteristics. Rectangular microstrip antenna with fractal over the patch is considered with height of substrate, and compared with thickness for improve return loss and efficiency. Results obtained with the help of commercial software CST microwave studio for frequency range 2–4 GHz. Improvement in return loss is found −46.8 dB and VSWR 1.005 dB as compared to −45.7 dB and 1.008 dB.
{"title":"Effect of thickness of substrate on antenna design for advance communication","authors":"S. Dwivedi","doi":"10.1109/CONFLUENCE.2017.7943254","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943254","url":null,"abstract":"Present paper is fully dedicated for antenna design for advance communication systems. Substrate thickness has been taken as key role for antenna performance characteristics. Rectangular microstrip antenna with fractal over the patch is considered with height of substrate, and compared with thickness for improve return loss and efficiency. Results obtained with the help of commercial software CST microwave studio for frequency range 2–4 GHz. Improvement in return loss is found −46.8 dB and VSWR 1.005 dB as compared to −45.7 dB and 1.008 dB.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"6 1","pages":"770-774"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73884188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.1109/CONFLUENCE.2017.7943233
Floyd Moodley, J. Van Belle, Nitasha Hasteer
This research paper explores what factors contribute to software developers in South Africa taking part in crowdsourced software development. These factors include motivations as well as challenges and this research takes an in depth look at what incentives affect the different motives to participate in crowdsourcing. To explore these factors, the Motives, Incentives, Activation, and Behaviour (MIAB) research has been adapted to investigate what incentives contribute to the motivations of money, pleasure, self-efficacy, and altruism. The research analyses data from respondents that are either software developers or work in software development and comes to the conclusion that there are various incentives that contribute to the different motives for taking part in crowdsourced software development, however, for developers in South Africa, pleasure, self-efficacy, and altruism seem to be more important than that of receiving income for crowdsourcing tasks.
{"title":"Crowdsourced software development: Exploring the motivational and inhibiting factors of the South African crowd","authors":"Floyd Moodley, J. Van Belle, Nitasha Hasteer","doi":"10.1109/CONFLUENCE.2017.7943233","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943233","url":null,"abstract":"This research paper explores what factors contribute to software developers in South Africa taking part in crowdsourced software development. These factors include motivations as well as challenges and this research takes an in depth look at what incentives affect the different motives to participate in crowdsourcing. To explore these factors, the Motives, Incentives, Activation, and Behaviour (MIAB) research has been adapted to investigate what incentives contribute to the motivations of money, pleasure, self-efficacy, and altruism. The research analyses data from respondents that are either software developers or work in software development and comes to the conclusion that there are various incentives that contribute to the different motives for taking part in crowdsourced software development, however, for developers in South Africa, pleasure, self-efficacy, and altruism seem to be more important than that of receiving income for crowdsourcing tasks.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"16 1","pages":"656-661"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72754922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}