{"title":"Research of Ship Pilot System Based on E-Navigation","authors":"Ranxuan Ke, Guojun Peng, Zhixiu Du, Jin-Hai Chen","doi":"10.1109/ISCBI.2013.12","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.12","url":null,"abstract":"The paper analysis the existing onboard ship system, shore-based system and the infrastructure of navigation and communication, and introduces the framework of e-Navigation system, based on which, the ship pilot system was developed. Multi-resolution remote-sensing image, geographical spatial data such as IHO-S57 international standards electronic chart, and AIS, 3G, real-time current observation technology are applied on the Pilot System, which-improve the efficiency of pilot dispatch and enhance the safety of ship operation.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Cut Detection Based Video Segmentation","authors":"K. Mohanty, P. Kanungo","doi":"10.1109/ISCBI.2013.60","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.60","url":null,"abstract":"Due to the increasing demand of internet technology and availability of high performance computers the demand for video surfing, transmission and retrieval is increasing day by day. The automatic annotation is a process which helps the browser or the user to retrieve the exact video as well as the exact shots or content based frames from a video by saving time and resources. The first step towards the automatic annotation is the temporal video segmentation. A boundary between two groups of video is defined as cut. A cut has been declared between two consecutive image frames if the two frames are sufficiently dissimilar. In this paper a Peak Change Ratio based cut detection has been addressed to detect the cuts in a video. The performance of the proposed method is superior in terms of \"R (Recall)\", and \"F1\" measure in comparison to the existing histogram based cut detection and Gargi's RGB color model based cut detection.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125637953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Library Content Generation Using Focused Crawling Based Upon Meta Tags and Tf-Idf","authors":"Mukesh Kumar, R. Vig","doi":"10.1109/ISCBI.2013.73","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.73","url":null,"abstract":"Electronic library is the collection of digital information related to an individual domain and in turn to all domains. A focused crawler traverses the Web looking for the pages most relevant to a domain and at the same time discarding the irrelevant pages and hence is helpful for generating the-e contents for digital library related to a particular domain. In this paper a focused crawling technique to generate online contents for e-library is proposed. The applicability of the proposed approach is shown by retrieving the documents which are highly related to a single domain. The quality of the pages included into the library is derived from the relevancy measure of the page with the content of domain related pages.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121616221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personality Traits Identification Using Rough Sets Based Machine Learning","authors":"Umang Gupta, N. Chatterjee","doi":"10.1109/ISCBI.2013.44","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.44","url":null,"abstract":"Prediction of human behavior from his/her traits has long been sought by cognitive scientists. Human traits are often embedded in one's writings. Although some work has been done on identification of traits from essays, very little work can be found on extracting personality traits from written texts. Psychological studies suggest that extraction and prediction of rules from a data has been long pursued, and several methods have been proposed. In the present work we used Rough sets to extract the rules for prediction of personality traits. Rough Set is a comparatively recent method that has been effective in various fields such as medical, geological and other fields where intelligent decision making is required. Our experiments with rough sets in predicting personality traits produced encouraging results.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122750426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized Coronary Artery Segmentation Using Frangi Filter and Anisotropic Diffusion Filtering","authors":"Shashank, M. Bhattacharya, G. K. Sharma","doi":"10.1109/ISCBI.2013.59","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.59","url":null,"abstract":"X-ray angiography is currently the prime method of diagnosis during percutaneous coronary interventions. Robust automatic detection of coronary arteries from angiography images is of great interest. Hessian-based Vessel enhancement filtering was proven successful in automatically segmenting vessels from angiography images. However, there is too much noise and other anatomical structures also interfere with the Percutaneous Coronary Intervention (PCI) procedure. The proposed method uses Frangi Hessian based vessel enhancement filter for extracting coronary arteries and setting optimal value of Frangi filter parameters a and ß. The method is applied recursively on a set of angiography images from same machine and tries to assign optimal values of a and ß for it. This procedure is followed by (Rotation Invariant) An isotropic diffusion filtering of the image. An isotropic Diffusion Filtering is used for noise removal and coronary artery enhancement. For the diffusion tensor, hybrid diffusion is used with a continuous switch which is suitable for filtering tubular image structures.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130559308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extracting Method and Mappings for Heterogeneous Systems","authors":"Igor Hagara, P. Tanuška","doi":"10.1109/ISCBI.2013.38","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.38","url":null,"abstract":"This paper defines how to select the correct method or combinations of methods to minimize the impact of production system and common operation. Before any method is chosen it is necessary to know the primary system and its databases structures for optimal use of the actual data structure setup and the best design for the ETL process. Usually databases structures are categorized into groups, which define their quality. Classification helps to find an ideal method for each group and thus design the solution of the ETL process with minimal impact on the data warehouse and production system.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130568218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ProcurePass: A User Authentication Protocol to Resist Password Stealing and Password Reuse Attack","authors":"Mariam M. Kassim, A. Sujitha","doi":"10.1109/ISCBI.2013.14","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.14","url":null,"abstract":"The most popular form of user authentication is the text password, which is the most convenient and the simplest. Users mostly choose weak passwords and reuse the same password across different websites and thus, a domino effect. i.e., when an adversary compromises one password, she exploits, gaining access to more websites. Also typing passwords into public computers (kiosks) suffers password thief threat, thereby the adversary can launch several password stealing attacks, such as phishing, key loggers and malware. Therefore user's passwords tend to be stolen and compromised under different threats and vulnerabilities. A user authentication protocol named Procure Pass, which benefits a user's cell phone and short message service to prevent password stealing and password reuse attacks. Procure Pass adopts the one-time password strategy, which free users from having to remember or type any passwords into conventional public computers for authentication. In case of users lose their cell phones, this still works by reissuing the SIM cards and long-term passwords.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130480920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CrawlPart: Creating Crawl Partitions in Parallel Crawlers","authors":"Sonali Gupta, K. Bhatia","doi":"10.1109/ISCBI.2013.36","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.36","url":null,"abstract":"With the ever proliferating size and scale of the WWW [1], efficient ways of exploring content are of increasing importance. How can we efficiently retrieve information from it through crawling? And in this \"era of tera\" and multi-core processors, we ought to think of multi-threaded processes as a serving solution. So, even better how can we improve the crawling performance by using parallel crawlers that work independently? The paper devotes to the fundamental advantages and challenges arising from the design of parallel crawlers [4]. The paper mainly focuses on the aspect of URL distribution among the various parallel crawling processes. How to distribute URLs from the URL frontier to the various concurrently executing crawling process threads is an orthogonal problem. The paper provides a solution to the problem by designing a framework that partitions the URL frontier into a several URL queues by ordering the URLs within each of the distributed set of URLs.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129660373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Min-Max Neural Networks for Business Intelligence","authors":"Seba Susan, Satish Kumar Khowal, Ashwini Kumar, Arun Kumar, Anurag Singh Yadav","doi":"10.1109/ISCBI.2013.31","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.31","url":null,"abstract":"In this paper the supervised application of fuzzy min-max neural networks to business intelligence is discussed. It utilizes fuzzy sets as pattern classes and builds a fuzzy hyper box for each class in a single pass of the test data. The fuzzy set hyper box is defined by its min point and max point membership functions which are determined by an expansion-contraction process. The best hyper box conforming to the highest memberships is used for the classification of the test data to a particular class.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130645893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Various Conjugate Gradient Based ANN Training Methods for Designing Intelligent Manhole Gas Detection System","authors":"Varun Ojha, P. Dutta, A. Chaudhuri, H. Saha","doi":"10.1109/ISCBI.2013.24","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.24","url":null,"abstract":"Human fatality occurs due to presence of excessive proportion of toxic gases such as Ammonia (NH3), Carbon Dioxide (CO2), Carbon Monoxide (CO), Hydrogen Sulfide (H2S), Methane (CH4), and Nitrogen Oxide (NOx) in manholes. To ensure safety of the workers and the environment as well, we are motivated to develop an intelligent sensory system to serve the purpose of predetermination of the aforementioned gases. To design such intelligent sensory system, we are using Soft Computing tools like Artificial Neural Network (ANN) and resort to use Conjugate Gradient (CG) method to offer training to the ANN. In present article, we offer study on CG based ANN training algorithm used in design of an intelligent sensory system for sensing gas components of manhole gas mixture. We offer exhaustive discussion on performance of different variants of CG. We report two new variants of CG which are found to perform better than most of the existing variants of CG applied for the said purpose.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124160329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}