2013 International Symposium on Computational and Business Intelligence最新文献

筛选
英文 中文
Research of Ship Pilot System Based on E-Navigation 基于电子导航的船舶引航系统研究
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.12
Ranxuan Ke, Guojun Peng, Zhixiu Du, Jin-Hai Chen
{"title":"Research of Ship Pilot System Based on E-Navigation","authors":"Ranxuan Ke, Guojun Peng, Zhixiu Du, Jin-Hai Chen","doi":"10.1109/ISCBI.2013.12","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.12","url":null,"abstract":"The paper analysis the existing onboard ship system, shore-based system and the infrastructure of navigation and communication, and introduces the framework of e-Navigation system, based on which, the ship pilot system was developed. Multi-resolution remote-sensing image, geographical spatial data such as IHO-S57 international standards electronic chart, and AIS, 3G, real-time current observation technology are applied on the Pilot System, which-improve the efficiency of pilot dispatch and enhance the safety of ship operation.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Cut Detection Based Video Segmentation 基于自动切割检测的视频分割
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.60
K. Mohanty, P. Kanungo
{"title":"Automatic Cut Detection Based Video Segmentation","authors":"K. Mohanty, P. Kanungo","doi":"10.1109/ISCBI.2013.60","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.60","url":null,"abstract":"Due to the increasing demand of internet technology and availability of high performance computers the demand for video surfing, transmission and retrieval is increasing day by day. The automatic annotation is a process which helps the browser or the user to retrieve the exact video as well as the exact shots or content based frames from a video by saving time and resources. The first step towards the automatic annotation is the temporal video segmentation. A boundary between two groups of video is defined as cut. A cut has been declared between two consecutive image frames if the two frames are sufficiently dissimilar. In this paper a Peak Change Ratio based cut detection has been addressed to detect the cuts in a video. The performance of the proposed method is superior in terms of \"R (Recall)\", and \"F1\" measure in comparison to the existing histogram based cut detection and Gargi's RGB color model based cut detection.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125637953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Online Library Content Generation Using Focused Crawling Based Upon Meta Tags and Tf-Idf 基于元标签和Tf-Idf的集中爬行在线图书馆内容生成
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.73
Mukesh Kumar, R. Vig
{"title":"Online Library Content Generation Using Focused Crawling Based Upon Meta Tags and Tf-Idf","authors":"Mukesh Kumar, R. Vig","doi":"10.1109/ISCBI.2013.73","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.73","url":null,"abstract":"Electronic library is the collection of digital information related to an individual domain and in turn to all domains. A focused crawler traverses the Web looking for the pages most relevant to a domain and at the same time discarding the irrelevant pages and hence is helpful for generating the-e contents for digital library related to a particular domain. In this paper a focused crawling technique to generate online contents for e-library is proposed. The applicability of the proposed approach is shown by retrieving the documents which are highly related to a single domain. The quality of the pages included into the library is derived from the relevancy measure of the page with the content of domain related pages.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121616221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personality Traits Identification Using Rough Sets Based Machine Learning 基于粗糙集的机器学习的人格特征识别
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.44
Umang Gupta, N. Chatterjee
{"title":"Personality Traits Identification Using Rough Sets Based Machine Learning","authors":"Umang Gupta, N. Chatterjee","doi":"10.1109/ISCBI.2013.44","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.44","url":null,"abstract":"Prediction of human behavior from his/her traits has long been sought by cognitive scientists. Human traits are often embedded in one's writings. Although some work has been done on identification of traits from essays, very little work can be found on extracting personality traits from written texts. Psychological studies suggest that extraction and prediction of rules from a data has been long pursued, and several methods have been proposed. In the present work we used Rough sets to extract the rules for prediction of personality traits. Rough Set is a comparatively recent method that has been effective in various fields such as medical, geological and other fields where intelligent decision making is required. Our experiments with rough sets in predicting personality traits produced encouraging results.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122750426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Optimized Coronary Artery Segmentation Using Frangi Filter and Anisotropic Diffusion Filtering 基于弗兰吉滤波和各向异性扩散滤波的冠状动脉分割优化
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.59
Shashank, M. Bhattacharya, G. K. Sharma
{"title":"Optimized Coronary Artery Segmentation Using Frangi Filter and Anisotropic Diffusion Filtering","authors":"Shashank, M. Bhattacharya, G. K. Sharma","doi":"10.1109/ISCBI.2013.59","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.59","url":null,"abstract":"X-ray angiography is currently the prime method of diagnosis during percutaneous coronary interventions. Robust automatic detection of coronary arteries from angiography images is of great interest. Hessian-based Vessel enhancement filtering was proven successful in automatically segmenting vessels from angiography images. However, there is too much noise and other anatomical structures also interfere with the Percutaneous Coronary Intervention (PCI) procedure. The proposed method uses Frangi Hessian based vessel enhancement filter for extracting coronary arteries and setting optimal value of Frangi filter parameters a and ß. The method is applied recursively on a set of angiography images from same machine and tries to assign optimal values of a and ß for it. This procedure is followed by (Rotation Invariant) An isotropic diffusion filtering of the image. An isotropic Diffusion Filtering is used for noise removal and coronary artery enhancement. For the diffusion tensor, hybrid diffusion is used with a continuous switch which is suitable for filtering tubular image structures.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130559308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Extracting Method and Mappings for Heterogeneous Systems 异构系统的提取方法与映射
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.38
Igor Hagara, P. Tanuška
{"title":"Extracting Method and Mappings for Heterogeneous Systems","authors":"Igor Hagara, P. Tanuška","doi":"10.1109/ISCBI.2013.38","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.38","url":null,"abstract":"This paper defines how to select the correct method or combinations of methods to minimize the impact of production system and common operation. Before any method is chosen it is necessary to know the primary system and its databases structures for optimal use of the actual data structure setup and the best design for the ETL process. Usually databases structures are categorized into groups, which define their quality. Classification helps to find an ideal method for each group and thus design the solution of the ETL process with minimal impact on the data warehouse and production system.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130568218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ProcurePass: A User Authentication Protocol to Resist Password Stealing and Password Reuse Attack procrepass:防止密码窃取和密码重用攻击的用户认证协议
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.14
Mariam M. Kassim, A. Sujitha
{"title":"ProcurePass: A User Authentication Protocol to Resist Password Stealing and Password Reuse Attack","authors":"Mariam M. Kassim, A. Sujitha","doi":"10.1109/ISCBI.2013.14","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.14","url":null,"abstract":"The most popular form of user authentication is the text password, which is the most convenient and the simplest. Users mostly choose weak passwords and reuse the same password across different websites and thus, a domino effect. i.e., when an adversary compromises one password, she exploits, gaining access to more websites. Also typing passwords into public computers (kiosks) suffers password thief threat, thereby the adversary can launch several password stealing attacks, such as phishing, key loggers and malware. Therefore user's passwords tend to be stolen and compromised under different threats and vulnerabilities. A user authentication protocol named Procure Pass, which benefits a user's cell phone and short message service to prevent password stealing and password reuse attacks. Procure Pass adopts the one-time password strategy, which free users from having to remember or type any passwords into conventional public computers for authentication. In case of users lose their cell phones, this still works by reissuing the SIM cards and long-term passwords.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130480920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
CrawlPart: Creating Crawl Partitions in Parallel Crawlers CrawlPart:在并行爬虫中创建爬虫分区
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.36
Sonali Gupta, K. Bhatia
{"title":"CrawlPart: Creating Crawl Partitions in Parallel Crawlers","authors":"Sonali Gupta, K. Bhatia","doi":"10.1109/ISCBI.2013.36","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.36","url":null,"abstract":"With the ever proliferating size and scale of the WWW [1], efficient ways of exploring content are of increasing importance. How can we efficiently retrieve information from it through crawling? And in this \"era of tera\" and multi-core processors, we ought to think of multi-threaded processes as a serving solution. So, even better how can we improve the crawling performance by using parallel crawlers that work independently? The paper devotes to the fundamental advantages and challenges arising from the design of parallel crawlers [4]. The paper mainly focuses on the aspect of URL distribution among the various parallel crawling processes. How to distribute URLs from the URL frontier to the various concurrently executing crawling process threads is an orthogonal problem. The paper provides a solution to the problem by designing a framework that partitions the URL frontier into a several URL queues by ordering the URLs within each of the distributed set of URLs.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129660373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fuzzy Min-Max Neural Networks for Business Intelligence 商业智能中的模糊最小-最大神经网络
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.31
Seba Susan, Satish Kumar Khowal, Ashwini Kumar, Arun Kumar, Anurag Singh Yadav
{"title":"Fuzzy Min-Max Neural Networks for Business Intelligence","authors":"Seba Susan, Satish Kumar Khowal, Ashwini Kumar, Arun Kumar, Anurag Singh Yadav","doi":"10.1109/ISCBI.2013.31","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.31","url":null,"abstract":"In this paper the supervised application of fuzzy min-max neural networks to business intelligence is discussed. It utilizes fuzzy sets as pattern classes and builds a fuzzy hyper box for each class in a single pass of the test data. The fuzzy set hyper box is defined by its min point and max point membership functions which are determined by an expansion-contraction process. The best hyper box conforming to the highest memberships is used for the classification of the test data to a particular class.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130645893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Study of Various Conjugate Gradient Based ANN Training Methods for Designing Intelligent Manhole Gas Detection System 基于共轭梯度的各种人工神经网络训练方法在智能井口气体检测系统设计中的研究
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.24
Varun Ojha, P. Dutta, A. Chaudhuri, H. Saha
{"title":"Study of Various Conjugate Gradient Based ANN Training Methods for Designing Intelligent Manhole Gas Detection System","authors":"Varun Ojha, P. Dutta, A. Chaudhuri, H. Saha","doi":"10.1109/ISCBI.2013.24","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.24","url":null,"abstract":"Human fatality occurs due to presence of excessive proportion of toxic gases such as Ammonia (NH3), Carbon Dioxide (CO2), Carbon Monoxide (CO), Hydrogen Sulfide (H2S), Methane (CH4), and Nitrogen Oxide (NOx) in manholes. To ensure safety of the workers and the environment as well, we are motivated to develop an intelligent sensory system to serve the purpose of predetermination of the aforementioned gases. To design such intelligent sensory system, we are using Soft Computing tools like Artificial Neural Network (ANN) and resort to use Conjugate Gradient (CG) method to offer training to the ANN. In present article, we offer study on CG based ANN training algorithm used in design of an intelligent sensory system for sensing gas components of manhole gas mixture. We offer exhaustive discussion on performance of different variants of CG. We report two new variants of CG which are found to perform better than most of the existing variants of CG applied for the said purpose.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124160329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信