<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Year-2011</title>
<link href="http://repository.iiitd.edu.in/xmlui/handle/123456789/6" rel="alternate"/>
<subtitle/>
<id>http://repository.iiitd.edu.in/xmlui/handle/123456789/6</id>
<updated>2026-04-11T11:24:12Z</updated>
<dc:date>2026-04-11T11:24:12Z</dc:date>
<entry>
<title>Context-aware IVR : challenges and opportunities</title>
<link href="http://repository.iiitd.edu.in/xmlui/handle/123456789/29" rel="alternate"/>
<author>
<name>Asthana, Siddhartha</name>
</author>
<author>
<name>Singh, Pushpendra</name>
</author>
<author>
<name>Singh, Amarjeet</name>
</author>
<author>
<name>Naik, Vinayak</name>
</author>
<id>http://repository.iiitd.edu.in/xmlui/handle/123456789/29</id>
<updated>2017-07-24T17:14:01Z</updated>
<published>2012-03-26T10:39:51Z</published>
<summary type="text">Context-aware IVR : challenges and opportunities
Asthana, Siddhartha; Singh, Pushpendra; Singh, Amarjeet; Naik, Vinayak
Voice based telecommunication services are emerging&#13;
as most appropriate medium for information dissemination in&#13;
developing regions, as they overcome prevalent low literacy rate&#13;
and are more reachable than any other medium like internet.&#13;
However, present-day Interactive Voice Response (IVR) systems&#13;
are not able to capture user requirements and present a rigid&#13;
interface to its users, and thus the IVR systems are commonly&#13;
considered as frustrating to use.&#13;
In this paper, we are proposing an architecture to build&#13;
context-aware IVR systems, which can adapt themselves to&#13;
match user requirements and provide a better experience, thus&#13;
enabling their widespread use. We did a real world deployment to&#13;
understand the requirements for the new architecture. We intend&#13;
to make use of work in context-aware systems and adaptive&#13;
systems to create next-generation IVR systems that have humanlike&#13;
ability in tackling caller intricacies with ease of access like&#13;
internet.
</summary>
<dc:date>2012-03-26T10:39:51Z</dc:date>
</entry>
<entry>
<title>140 characters of @hate and #protest</title>
<link href="http://repository.iiitd.edu.in/xmlui/handle/123456789/28" rel="alternate"/>
<author>
<name>Sureka, Ashish</name>
</author>
<id>http://repository.iiitd.edu.in/xmlui/handle/123456789/28</id>
<updated>2017-07-24T17:14:28Z</updated>
<published>2012-03-26T10:33:35Z</published>
<summary type="text">140 characters of @hate and #protest
Sureka, Ashish
Research shows that cyber-hate, illegal or malicious&#13;
form of cyber-protest and cyber-activism in online&#13;
social media and Web 2.0 platforms has become a common&#13;
phenomenon. This is a growing concern and hence automated&#13;
techniques to counter such forms of online propaganda and&#13;
identification of users and virtual communities is an area which&#13;
has recently attracted a lot of research attention. In this paper,&#13;
we present a simple and effective method to mine Twitter&#13;
(a very popular and largest micro-blogging service) data for&#13;
automatically identifying users and communities having a&#13;
shared agenda. We propose a generic framework that consists&#13;
of a systematic and focused traversal of the follower-network&#13;
on Twitter and a user profile classifier based on contentbased&#13;
features. We customize the proposed framework for a&#13;
specific domain and demonstrate that the proposed approach is&#13;
effective. We perform empirical analysis on data crawled from&#13;
Twitter and the experimental results on the test dataset reveals&#13;
that the proposed features and framework can successfully&#13;
identify twitterers and hidden communities having a common&#13;
agenda or shared interest.
</summary>
<dc:date>2012-03-26T10:33:35Z</dc:date>
</entry>
<entry>
<title>Memetic approach for matching sketches with digital face images</title>
<link href="http://repository.iiitd.edu.in/xmlui/handle/123456789/27" rel="alternate"/>
<author>
<name>Bhatt, Himanshu S</name>
</author>
<author>
<name>Bharadwaj, Samarth</name>
</author>
<author>
<name>Singh, Richa</name>
</author>
<author>
<name>Vatsa, Mayank</name>
</author>
<id>http://repository.iiitd.edu.in/xmlui/handle/123456789/27</id>
<updated>2017-07-24T17:13:55Z</updated>
<published>2012-03-26T10:26:22Z</published>
<summary type="text">Memetic approach for matching sketches with digital face images
Bhatt, Himanshu S; Bharadwaj, Samarth; Singh, Richa; Vatsa, Mayank
One of the important cues in solving crimes and&#13;
apprehending criminals is matching sketches with digital face&#13;
images. This paper presents an automated algorithm that extracts&#13;
discriminating information from local regions of both sketches&#13;
and digital face images. Structural information along with&#13;
the minute details present in local facial regions are encoded&#13;
using multi-scale circular Weber’s Local descriptor. Further, an&#13;
evolutionary memetic optimization is proposed to assign optimal&#13;
weights to every local facial region to boost the identification&#13;
performance. Since, forensic sketches or digital face images&#13;
can be of poor quality, a pre-processing technique is used to&#13;
enhance the quality of images and improve the identification performance.&#13;
Comprehensive experimental evaluation on different&#13;
sketch databases show that the proposed algorithm yields better&#13;
identification performance compared to existing algorithms and&#13;
two commercial face recognition systems.
</summary>
<dc:date>2012-03-26T10:26:22Z</dc:date>
</entry>
<entry>
<title>Twitter explodes with activity in mumbai blasts! a lifeline or an unmonitored daemon in the lurking?</title>
<link href="http://repository.iiitd.edu.in/xmlui/handle/123456789/26" rel="alternate"/>
<author>
<name>Gupta, Aditi</name>
</author>
<author>
<name>Kumaraguru, Ponnurangam</name>
</author>
<id>http://repository.iiitd.edu.in/xmlui/handle/123456789/26</id>
<updated>2017-07-24T17:14:54Z</updated>
<published>2012-03-26T10:19:46Z</published>
<summary type="text">Twitter explodes with activity in mumbai blasts! a lifeline or an unmonitored daemon in the lurking?
Gupta, Aditi; Kumaraguru, Ponnurangam
Online social media has become an integral part of every Internet users' life. It has given common people a platform and forum to share information, post their opinions and promote campaigns. The threat of exploitation of social media like Facebook, Twitter, etc. by malicious entities, becomes crucial during a crisis situation, like bomb blasts or natural calamities such as earthquakes and floods. In this report, we attempt to characterize and extract patterns of activity of general users on Twitter during a crisis situation. This is the fi rst attempt to study an India-centric crisis event such as the triple bomb blasts in Mumbai (India), using online social media. In this research, we perform content and activity analysis of content posted on Twitter after the bomb blasts. Through our analysis, we conclude, that the number of URLs and @mentions in tweets increase during the time of the crisis in comparison to what researchers have exhibited for normal circumstances. In addition to the above, we empirically show that the number of tweets or updates by authority users (those with large number of followers) are very less, i.e. majority of content generated on Twitter during the crisis comes from non authority users. In the end, we discuss certain case scenarios during the Mumbai blasts, where rumors were spread through the network of Twitter.
</summary>
<dc:date>2012-03-26T10:19:46Z</dc:date>
</entry>
</feed>
