Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066701
G. Shiva Kumar, P. Lakshmi Sruthi, P. Rajasekhar, F. Karaer
Because of the rapidly increasing pollution in Lake Uluabat, which is one of the significant shallow lakes of Turkey and has been announced to be a Ramsar Area, eutrophic state evaluation based on geographic information system was performed. The eutrophication level of the lake is determined with the help of a 0 - 100 scale based on TSI calculations and secchi disc depth (SD), chlorophyll-a (Chl-a), total phosphorus (TP) and total nitrogen (TN) parameters. The TSI maps of four parameters were created using the Inverse Distance Weight (IDW) interpolation method. The final map showing the spatial distribution of trophic level was generated by synthesising the thematic maps of each indicator on the cell basis with the overlay technique. From the final map, the trophic level of the entire lake was characterized as eutrophic or more in all seasons studied during the year.
{"title":"Eutrophication assessment of a shallow lake using GIS","authors":"G. Shiva Kumar, P. Lakshmi Sruthi, P. Rajasekhar, F. Karaer","doi":"10.1109/ICCCT2.2014.7066701","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066701","url":null,"abstract":"Because of the rapidly increasing pollution in Lake Uluabat, which is one of the significant shallow lakes of Turkey and has been announced to be a Ramsar Area, eutrophic state evaluation based on geographic information system was performed. The eutrophication level of the lake is determined with the help of a 0 - 100 scale based on TSI calculations and secchi disc depth (SD), chlorophyll-a (Chl-a), total phosphorus (TP) and total nitrogen (TN) parameters. The TSI maps of four parameters were created using the Inverse Distance Weight (IDW) interpolation method. The final map showing the spatial distribution of trophic level was generated by synthesising the thematic maps of each indicator on the cell basis with the overlay technique. From the final map, the trophic level of the entire lake was characterized as eutrophic or more in all seasons studied during the year.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"71 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79183230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The current trend for communicating information in an organization is by using letters/ circulars; whereby the letter is prepared for a certain work and then forwarded on to all regardless of whether or not each employee has an interest or need for it. If the organization decides to send the letters to the respective/ interested employees, the job for the person assigned this task would be long and hard in the conventional mailing system. This paper proposes Automated Updates Mailing System (AUMS), a mailing system which identifies all the interested recipients' automatically to forward the letters/circulars in an organization using named-entity recognition and tree based indexing database, instead of an exhaustive manual search for all interested recipients' by mail administrator/sender. Our AUMS mailing scheme is straightforward to establish, fully compatible with any existing mailing systems, yet achieves an efficient way to construct an organization's mailing system. This process will result in a savings in time and money for the organization.
{"title":"Automated updates mailing system for an organization:using named-entity recognition and tree based indexing database","authors":"Sreenivasulu Sadineni, Bindhu Madhavi Kilaru, Eshwar Aluguri","doi":"10.1109/ICCCT2.2014.7066725","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066725","url":null,"abstract":"The current trend for communicating information in an organization is by using letters/ circulars; whereby the letter is prepared for a certain work and then forwarded on to all regardless of whether or not each employee has an interest or need for it. If the organization decides to send the letters to the respective/ interested employees, the job for the person assigned this task would be long and hard in the conventional mailing system. This paper proposes Automated Updates Mailing System (AUMS), a mailing system which identifies all the interested recipients' automatically to forward the letters/circulars in an organization using named-entity recognition and tree based indexing database, instead of an exhaustive manual search for all interested recipients' by mail administrator/sender. Our AUMS mailing scheme is straightforward to establish, fully compatible with any existing mailing systems, yet achieves an efficient way to construct an organization's mailing system. This process will result in a savings in time and money for the organization.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"401 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77126786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066704
J. Satyanarayana, A. G. Ramakrishnan
Research on the applications of compressed sensing has been mainly directed towards sub-Nyquist acquisition of a sparse signal followed by reconstruction, using different recovery algorithms, to get the original signal. In this paper, we present a scheme of compressed acquisition of a set of sparse signals and subsequent reconstruction of the signals at an effective sampling rate which is a multiple of the rated sampling rate of the analog to digital converters employed for data acquisition. We demonstrate that with a higher effective sampling rate the frequency specifications of the front-end anti-aliasing (AA) filter can be relaxed and it is possible to use a lower order AA filter, thereby simplifying the analog design on the embedded board. To verify the proof of concept we test the proposed acquisition architecture for sampling voltages proportional to the deflection of control surfaces of an in-flight aerospace vehicle.
{"title":"Reduction of the order of anti-aliasing filters in embedded avionics data acquisition","authors":"J. Satyanarayana, A. G. Ramakrishnan","doi":"10.1109/ICCCT2.2014.7066704","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066704","url":null,"abstract":"Research on the applications of compressed sensing has been mainly directed towards sub-Nyquist acquisition of a sparse signal followed by reconstruction, using different recovery algorithms, to get the original signal. In this paper, we present a scheme of compressed acquisition of a set of sparse signals and subsequent reconstruction of the signals at an effective sampling rate which is a multiple of the rated sampling rate of the analog to digital converters employed for data acquisition. We demonstrate that with a higher effective sampling rate the frequency specifications of the front-end anti-aliasing (AA) filter can be relaxed and it is possible to use a lower order AA filter, thereby simplifying the analog design on the embedded board. To verify the proof of concept we test the proposed acquisition architecture for sampling voltages proportional to the deflection of control surfaces of an in-flight aerospace vehicle.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"42 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77206346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066717
Nenavath Srinivas Naik, K. P. Kumar, D. Vasumathi
A Hypervisor at the same time agrees a single system to run two or additional operating systems. To gather forensic proof of examined activities or attacks against the system, the evidence kept in logs of a system plays an important role. In this paper, we have analyzed logs, snapshots and also the network connectivity of guest and host operating systems. We have studied different virtualization systems and analyzed their logs, snapshots of hypervisor with dissimilar case studies to find the actions done on virtual systems. We have analyzed the deleted and formatted files information with the help of Encase forensic tool on some of the open source virtualization technologies like virtual box and qemu to ensure that the information existing in the system is always secure.
{"title":"Securing information by performing forensic and network analysis on hosted virtualization","authors":"Nenavath Srinivas Naik, K. P. Kumar, D. Vasumathi","doi":"10.1109/ICCCT2.2014.7066717","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066717","url":null,"abstract":"A Hypervisor at the same time agrees a single system to run two or additional operating systems. To gather forensic proof of examined activities or attacks against the system, the evidence kept in logs of a system plays an important role. In this paper, we have analyzed logs, snapshots and also the network connectivity of guest and host operating systems. We have studied different virtualization systems and analyzed their logs, snapshots of hypervisor with dissimilar case studies to find the actions done on virtual systems. We have analyzed the deleted and formatted files information with the help of Encase forensic tool on some of the open source virtualization technologies like virtual box and qemu to ensure that the information existing in the system is always secure.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"2016 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86475700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066718
V. Anand, Ahmed Abdul, Moiz Qyser
Cloud computing has emerged as a major way of reducing the information technology costs incurred by organizations. For a cost-sensitive organization which stores its data in the cloud and retrieves files via keyword search, the primary focus is on the issues of cost effectiveness as well as privacy. Three keyword-based secure search protocols, namely Ostrovsky protocol, Cooperative Private Searching (COPS) protocol and Efficient Information Retrieval for Ranked Queries (EIRQ) protocol are reviewed in this paper. Each protocol offers an improvement over the basic keyword search used by today's cloud users. After discussing the limitations of EIRQ, a new protocol named Weighted Ranked Queries (WRQ) is proposed. A comparison of the performance of these protocols is presented. The future work that could be carried out in this area is mentioned in the conclusion.
{"title":"Weighted Ranked Queries for secure search in cost-effective clouds","authors":"V. Anand, Ahmed Abdul, Moiz Qyser","doi":"10.1109/ICCCT2.2014.7066718","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066718","url":null,"abstract":"Cloud computing has emerged as a major way of reducing the information technology costs incurred by organizations. For a cost-sensitive organization which stores its data in the cloud and retrieves files via keyword search, the primary focus is on the issues of cost effectiveness as well as privacy. Three keyword-based secure search protocols, namely Ostrovsky protocol, Cooperative Private Searching (COPS) protocol and Efficient Information Retrieval for Ranked Queries (EIRQ) protocol are reviewed in this paper. Each protocol offers an improvement over the basic keyword search used by today's cloud users. After discussing the limitations of EIRQ, a new protocol named Weighted Ranked Queries (WRQ) is proposed. A comparison of the performance of these protocols is presented. The future work that could be carried out in this area is mentioned in the conclusion.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"59 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82884647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066709
G. Rao, Suresh Patidar, P. Balaji, P. Arumugam, S. Satyamurty
The Strategic organizations need highly secure methods for identity verification and to control physical access to various facilities. In addition to improving overall security, an integrated identity system helps to make Strategic operations more efficient and builds trust that can be leveraged throughout interagency programs. This paper discusses a detailed view of design, development and implementation of the LPC 2478 ARM microcontroller based Intelligent Employee Authentication System for the employees possessing Radio Frequency IDentity[RFID] cards. Customised firmware is developed using KEIL μVision IDE to accomplish the objectives. Human Machine Interface[HMI] has been developed using Visual Basic, wherever required. The utility of this system in other areas are also presented.
{"title":"Design and implementation of Intelligent Employee Authentication System[IEAS]","authors":"G. Rao, Suresh Patidar, P. Balaji, P. Arumugam, S. Satyamurty","doi":"10.1109/ICCCT2.2014.7066709","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066709","url":null,"abstract":"The Strategic organizations need highly secure methods for identity verification and to control physical access to various facilities. In addition to improving overall security, an integrated identity system helps to make Strategic operations more efficient and builds trust that can be leveraged throughout interagency programs. This paper discusses a detailed view of design, development and implementation of the LPC 2478 ARM microcontroller based Intelligent Employee Authentication System for the employees possessing Radio Frequency IDentity[RFID] cards. Customised firmware is developed using KEIL μVision IDE to accomplish the objectives. Human Machine Interface[HMI] has been developed using Visual Basic, wherever required. The utility of this system in other areas are also presented.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"15 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81019481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066693
M. Venu Gopalachari, P. Sammulal
In the current era of web applications such as e-retail business, the web services focused to provide personalized search systems to the targeted user intents based on the navigation patterns. Intelligent collaborative filtering recommender system tries to recommend the web pages considering the similar patterns of the other users along with the usage knowledge of the current user session. This recommender systems strategy lacks of the domain knowledge in comparing the usage patterns of the other users in serving with recommendations. This paper mainly focused on incorporating the domain knowledge and usage knowledge in personalization as well as in comparing the similar user patterns for recommender systems. This novel strategy builds a model to recommend the web pages that can help the new search scenarios and can improve the likelihood of a user towards the host website. Experimental results shown that the proposed novel strategy yields to gain in performance of the recommender system in terms of the quality of the web page recommendations.
{"title":"Personalized collaborative filtering recommender system using domain knowledge","authors":"M. Venu Gopalachari, P. Sammulal","doi":"10.1109/ICCCT2.2014.7066693","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066693","url":null,"abstract":"In the current era of web applications such as e-retail business, the web services focused to provide personalized search systems to the targeted user intents based on the navigation patterns. Intelligent collaborative filtering recommender system tries to recommend the web pages considering the similar patterns of the other users along with the usage knowledge of the current user session. This recommender systems strategy lacks of the domain knowledge in comparing the usage patterns of the other users in serving with recommendations. This paper mainly focused on incorporating the domain knowledge and usage knowledge in personalization as well as in comparing the similar user patterns for recommender systems. This novel strategy builds a model to recommend the web pages that can help the new search scenarios and can improve the likelihood of a user towards the host website. Experimental results shown that the proposed novel strategy yields to gain in performance of the recommender system in terms of the quality of the web page recommendations.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"62 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90099054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066715
S. Binu, M. Misbahuddin, P. Raj
A Multi-Server Architecture comprises of a server environment having many different servers which provides the user the flexibility of accessing resources from multiple Service Providing Servers using the same credential. The primary objective of a Multi Server Environment (MSE) is to provide services of different Service Providers (SPs) without repeating registration at each SP server, and to get a unique single credential for all the servers in MSE. However, the conventional MSEs, proposed by various researchers, proposes the individual authentication service by each SP on their respective server using the credential issued by the Registration Authority of MSE. The mechanism requires the user to access each SP by keying the same credentials for every SP separately. Single Sign On (SSO) is an authentication mechanism that enables a user to sign-on once and access the services of various SPs in the same session. SAML is generally used as a Single Sign-On protocol. This work analyzes the smart card based authentication scheme for Multi-Server Environment proposed by Li et al.'s and discuss various security attacks on the said scheme. The paper also proposes a Secure Dynamic-ID based scheme using smart cards or crypto cards which do not require a verifier table and implements Single Sign On feature using SAML protocol, thus allowing the user to enjoy all the features of an MSE along with SSO.
多服务器体系结构由具有许多不同服务器的服务器环境组成,这些服务器为用户提供了使用相同凭据访问来自多个服务提供服务器的资源的灵活性。多服务器环境(MSE)的主要目标是提供不同服务提供者(SP)的服务,而无需在每个SP服务器上重复注册,并为MSE中的所有服务器获得唯一的单个凭据。然而,由各种研究人员提出的传统MSE,由每个SP在各自的服务器上使用MSE的注册机构颁发的凭据提出单独的身份验证服务。该机制要求用户通过为每个SP分别键入相同的凭据来访问每个SP。单点登录(Single Sign On, SSO)是一种允许用户一次登录并在同一会话中访问多个服务提供商的服务的认证机制。SAML通常用作单点登录协议。本文分析了Li等人提出的基于智能卡的多服务器环境认证方案,并讨论了针对该方案的各种安全攻击。本文还提出了一种安全的基于动态id的方案,该方案使用智能卡或加密卡,不需要验证表,并使用SAML协议实现单点登录功能,从而允许用户在单点登录的同时享受MSE的所有功能。
{"title":"A Single Sign on based secure remote user authentication scheme for Multi-Server Environments","authors":"S. Binu, M. Misbahuddin, P. Raj","doi":"10.1109/ICCCT2.2014.7066715","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066715","url":null,"abstract":"A Multi-Server Architecture comprises of a server environment having many different servers which provides the user the flexibility of accessing resources from multiple Service Providing Servers using the same credential. The primary objective of a Multi Server Environment (MSE) is to provide services of different Service Providers (SPs) without repeating registration at each SP server, and to get a unique single credential for all the servers in MSE. However, the conventional MSEs, proposed by various researchers, proposes the individual authentication service by each SP on their respective server using the credential issued by the Registration Authority of MSE. The mechanism requires the user to access each SP by keying the same credentials for every SP separately. Single Sign On (SSO) is an authentication mechanism that enables a user to sign-on once and access the services of various SPs in the same session. SAML is generally used as a Single Sign-On protocol. This work analyzes the smart card based authentication scheme for Multi-Server Environment proposed by Li et al.'s and discuss various security attacks on the said scheme. The paper also proposes a Secure Dynamic-ID based scheme using smart cards or crypto cards which do not require a verifier table and implements Single Sign On feature using SAML protocol, thus allowing the user to enjoy all the features of an MSE along with SSO.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82071120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Missile Onboard Computer (OBC) is an embedded computer to perform control, guidance, target data estimation, mission sequencing and various other critical operations during flight. The real-time embedded software for the OBC must be designed to achieve deterministic response times and quite minimal jitters (in the order of 50-100μs) for the accurate control and guidance operations and precise scheduling of computational modules and IO messages subsequently. The synchronization mechanisms of OBC with all other avionics subsystems has to ensure that it gets the latest updates of the data from sensors and outputs the latest command to actuators within specified bounds of time. For the specific case of Anti-Ballistic missile system, these requirements become further challenging to achieve because of the higher velocities of the moving target and the interceptor missile which demands higher data update rates from sensors, high frequent commands to control system. This paper discusses the design issues of the OBC software of Anti-Ballistic Air defense missile system.
{"title":"Real-time embedded software design for onboard computer of Anti-Ballistic missile system","authors":"Hemant Kumar Rathore, Mahender Katukuri, Dl Seshagiri Rao, Bhvs Narayana Murthy","doi":"10.1109/ICCCT2.2014.7066741","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066741","url":null,"abstract":"The Missile Onboard Computer (OBC) is an embedded computer to perform control, guidance, target data estimation, mission sequencing and various other critical operations during flight. The real-time embedded software for the OBC must be designed to achieve deterministic response times and quite minimal jitters (in the order of 50-100μs) for the accurate control and guidance operations and precise scheduling of computational modules and IO messages subsequently. The synchronization mechanisms of OBC with all other avionics subsystems has to ensure that it gets the latest updates of the data from sensors and outputs the latest command to actuators within specified bounds of time. For the specific case of Anti-Ballistic missile system, these requirements become further challenging to achieve because of the higher velocities of the moving target and the interceptor missile which demands higher data update rates from sensors, high frequent commands to control system. This paper discusses the design issues of the OBC software of Anti-Ballistic Air defense missile system.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"714 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76907144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066744
S. Padmaja, S. Fatima, Sasidhar Bandu, B. Sowmya
Electronic detection of linguistic negation in free text is a challenging need for many text handling applications including sentiment analysis. Our system uses online news archives from two different resources namely NDTV and The Hindu to predict the scope of negation in the text. In this paper, our main target was on determining the scope of negation in news articles for two political parties namely BJP and UPA by using three existing methodologies. They were Rest of the Sentence (RoS), Fixed Window Length (FWL) and Dependency Analysis (DA). The F measures for each one of them were 0.58, 0.69 and 0.75 respectively. We observed that DA was performing better than the other two. Among 1675 sentences in the corpus, according to annotator I, 1,137 were positive and 538 were negative whereas according to annotator II, 1,130 were positive and 545 were negative. Further we also identified the score of each sentence and calculated the accuracy on the basis of average score of both the annotators. The scope of negation detection was limited to specific rather than implicit negations within single sentences.
{"title":"Comparison of the scope of negation in online news articles","authors":"S. Padmaja, S. Fatima, Sasidhar Bandu, B. Sowmya","doi":"10.1109/ICCCT2.2014.7066744","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066744","url":null,"abstract":"Electronic detection of linguistic negation in free text is a challenging need for many text handling applications including sentiment analysis. Our system uses online news archives from two different resources namely NDTV and The Hindu to predict the scope of negation in the text. In this paper, our main target was on determining the scope of negation in news articles for two political parties namely BJP and UPA by using three existing methodologies. They were Rest of the Sentence (RoS), Fixed Window Length (FWL) and Dependency Analysis (DA). The F measures for each one of them were 0.58, 0.69 and 0.75 respectively. We observed that DA was performing better than the other two. Among 1675 sentences in the corpus, according to annotator I, 1,137 were positive and 538 were negative whereas according to annotator II, 1,130 were positive and 545 were negative. Further we also identified the score of each sentence and calculated the accuracy on the basis of average score of both the annotators. The scope of negation detection was limited to specific rather than implicit negations within single sentences.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"85 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82204953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}