2013 International Symposium on Computational and Business Intelligence最新文献

筛选
英文 中文
Sentiment Analysis of Online News Using MALLET 基于MALLET的网络新闻情感分析
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.67
S. Fong, Yan Zhuang, Jinyan Li, R. Khoury
{"title":"Sentiment Analysis of Online News Using MALLET","authors":"S. Fong, Yan Zhuang, Jinyan Li, R. Khoury","doi":"10.1109/ISCBI.2013.67","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.67","url":null,"abstract":"The challenge of sentiment analysis consists in automatically determining whether a text is positive or negative in tone. Part of the difficulty in this task stems from the fact that the same words or sentences can have very different sentimental meaning given their context. In our work, we further focus on news articles, which tend to use a more neutral vocabulary, as opposed to the emotionally charged vocabulary of opinion pieces such as editorials, reviews, and blogs. In this paper, we use MALLET (Machine Learning for Language Toolkit) to implement and train several algorithms for sentiment analysis, and run experiments to compare and contrast them.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117008534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Enhancing Performance of Intrusion Detection through Soft Computing Techniques 利用软计算技术提高入侵检测性能
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.17
M. Patra, Ashalata Panigrahi
{"title":"Enhancing Performance of Intrusion Detection through Soft Computing Techniques","authors":"M. Patra, Ashalata Panigrahi","doi":"10.1109/ISCBI.2013.17","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.17","url":null,"abstract":"The worldwide rapid expansion of computer networks and ever growing dependence of organizations on network based information management have led to serious security concerns. Among other security threats network intrusion has been a major concern which requires considerable attention in order to protect the information resources that are accessible via network infrastructure. Though different intrusion detection approaches have been experimented but none of them can guarantee complete protection against network intrusions. Furthering research in this direction, we have been exploring the use of soft computing techniques to analyze intrusion data in order to detect intrusive behavior in network access patters. In this paper, we have carried out some experiments using techniques such as Radial Basis Function Network (RBFN), Self-Organizing Map (SOM), Support Vector Machine (SVM), back propagation, and J48 on the NSL-KDD intrusion data set in order to evaluate the performance of each of the techniques. We have also compared the performance of these techniques with respect to the detection and false alarm rates.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122644511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Stay in Touch: Multimedia Delivery for Elderly People “保持联络:长者多媒体资讯传递”
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.74
P. Mongkolnam, Jutarat Choomkasean, Jonathan H. Chan
{"title":"Stay in Touch: Multimedia Delivery for Elderly People","authors":"P. Mongkolnam, Jutarat Choomkasean, Jonathan H. Chan","doi":"10.1109/ISCBI.2013.74","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.74","url":null,"abstract":"The world has seen an increasing number of elderly people living alone with some mental and emotional complications as the ageing population increases worldwide. The elderly people have a greater risk for loneliness, depression, and decreased mobility than any other age group. A proper health and social care environment is needed for them to become more accustomed to living alone. Partially due to retirement and physical limitation, most of them become less involved with other people and have less mobility away from their homes. Spending most of their time at homes and watching televisions is unavoidable. There are increasingly fewer family members who live with elderly people full-time. Contacting to relatives and old friends becomes more difficult, and so does using phones and computers even though they are readily available. We propose a simple but effective system to deliver multimedia to the elderly people in order to help them stay in touch with family members, relatives and friends, and consequently lessen the aforementioned problems. The multimedia's contents are sent via the Internet from family members' and friends' devices such as smartphones and tablet PCs to the elderly people's television sets. It is intended to improve the mental disposition of the ageing population and to give them a sense of social belonging and active societal engagement, hopefully resulting in a better quality of life.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131500394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PI Controller with Fuzzy Logic Based On-Line Variable Reset-Rate 基于模糊逻辑的在线可变复位率PI控制器
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.35
R. De, R. Mudi
{"title":"PI Controller with Fuzzy Logic Based On-Line Variable Reset-Rate","authors":"R. De, R. Mudi","doi":"10.1109/ISCBI.2013.35","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.35","url":null,"abstract":"In this study, we propose a fuzzy logic based enhanced auto-tuning PI controller. The widely practiced conventional Ziegler-Nichols tuned PI controller (ZNPIC) exhibits poor performance for integrating and high-order systems. To overcome this limitation, in our proposed tuning method, the integral time (Ti) or the reset-rate (1/Ti) of the ZNPIC is continuously updated by a real-time nonlinear updating factor a depending on the process trend. The value of a is found out through a fuzzy inference engine with either 49 or 25 if-then rules defined on the process error and change of error. The usefulness of the proposed fuzzy auto-tuning ZNPIC, termed as FZNPIC, is tested for a number of second-order integrating plus dead time processes under both set point change and load disturbance. Simulation results of the proposed controller demonstrate significantly improved transient responses compared to other controllers. FZNPIC is found to be robust when applied with considerable change in dead time.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132204298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Strategic Decisions Using Intuitionistic Fuzzy Vikor Method for Information System (IS) Outsourcing 基于直觉模糊向量法的信息系统外包战略决策
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.33
Kajal Chatterjee, Mohuya B. Kar, S. Kar
{"title":"Strategic Decisions Using Intuitionistic Fuzzy Vikor Method for Information System (IS) Outsourcing","authors":"Kajal Chatterjee, Mohuya B. Kar, S. Kar","doi":"10.1109/ISCBI.2013.33","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.33","url":null,"abstract":"Outsourcing is a common trend in information system field in recent decade. Selection of appropriate outsourcing partners is an important goal for multi-national organizations. This study propose a Hybrid algorithm based on the Intuitionistic fuzzy-VIKOR method to evaluate five potential supplier alternatives using five criteria and four decision makers illustrated by a case study. The advantages of the proposed method are highlighted by comparing the result with IF-SIR and IF-TOPSIS methods. The ranking based result provides a reference that assists organizations to improve the efficiency of IS-outsourcing process.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123582914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
The Gesture Replicating Robotic Arm 手势复制机械臂
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.11
S. Karamchandani, S. Sinari, A. Aurora, D. Ruparel
{"title":"The Gesture Replicating Robotic Arm","authors":"S. Karamchandani, S. Sinari, A. Aurora, D. Ruparel","doi":"10.1109/ISCBI.2013.11","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.11","url":null,"abstract":"The Gesture Replicating Robotic arm is a servo controlled robotic arm which replicates gestures in a three dimensional environment. It makes use of cameras which detect the motion of one's hand in three dimensions. The cameras provide frames as input to the software which performs segmentation algorithms like background subtraction, color detection and contour detection. Pixel to angle mapping gives the appropriate commands to the respective servo motors. Thus, replication of the human hand movements is done. The crux of the project is to create software which can detect hand gestures without any involvement of sensors like accelerometers attached to the human arm, with no involvement of artificial intelligence. Thus it can avoid large blocks of code to perform a simple function which humans can perform easily like pouring coffee into a mug. That is robots will be able to move like people and they don't need to be intelligent. Such lifelike robotic arms can be tele-operated to protect human workers in hazardous environments, such as on assembly lines, in space, undersea, and amid nuclear radiation.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128126269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Intelligent Recommendation System Model Based on Style for Virtual Home Furnishing in Three-Dimensional Scene 基于风格的三维场景虚拟家居智能推荐系统模型
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.50
Yan Wang, He Wang, Xirui Li
{"title":"An Intelligent Recommendation System Model Based on Style for Virtual Home Furnishing in Three-Dimensional Scene","authors":"Yan Wang, He Wang, Xirui Li","doi":"10.1109/ISCBI.2013.50","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.50","url":null,"abstract":"This paper discusses an intelligent recommendation system model based on style for virtual home furnishing in three-dimensional scene to improve the business intelligence, let users get the embodied experience of the virtual home furnishing experience which was equivalent in realistic scene when they buy furniture online, thus helping users find the furniture merchandise based on personalized style demand. This system is consisted of four modules: User information mining and information gathering module, furniture merchandise information processing module, recommendation results computing module, recommendation results displaying module. First of all, this system is to build the database of furniture merchandise based on style classification. Through users' browsing behaviors on the network, such as utilizing the eye tracker devices to capture user physiological perception on products, and combing with web data mining techniques, this system is to calculate furniture information which users interested in. Secondly, while this system recommends furniture products to its target users, it could present a unified style virtual home furnishing scenes. Users could have the embodied experience about the overall effect of furniture merchandise displaying in the virtual environment with unified style furniture. Thirdly, the embodied experience promotes network marketing of furniture merchandise.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116921670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of Business Intelligence: A Case on Payroll Management 商业智能的应用:以工资管理为例
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.22
Monika Arora, D. Chakrabarti
{"title":"Application of Business Intelligence: A Case on Payroll Management","authors":"Monika Arora, D. Chakrabarti","doi":"10.1109/ISCBI.2013.22","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.22","url":null,"abstract":"Business intelligence (BI) approaches have fallen short in delivering the expected value and return on investment. High costs, lengthy implementations and increasing complexity have led to frustration and disappointment for many enterprises. However, a new generation of BI tools is emerging. Data discovery tools promise to overcome many of the advantages of BI tools, delivering more flexibility, ease of use and productivity at a fraction of the cost and time. In this paper, it discusses the usage of BI tool as Dashboard. It discusses the BI application in an enterprise. The implementation of HR Payroll Management as BI Tool. The enterprises optimized their BI performance through data discovery for effectively pursuing and implementing a data discovery approach to BI.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121629674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Hybrid Algorithm for Line Planning Problem 线路规划问题的混合算法
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.42
Piotr Ratajczak, Malgorzata Michaluszko, Dawid Polak, L. Koszalka, I. Pozniak-Koszalka, A. Kasprzak
{"title":"Hybrid Algorithm for Line Planning Problem","authors":"Piotr Ratajczak, Malgorzata Michaluszko, Dawid Polak, L. Koszalka, I. Pozniak-Koszalka, A. Kasprzak","doi":"10.1109/ISCBI.2013.42","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.42","url":null,"abstract":"The line planning problem belongs to the area of the public transportation strategic planning. In this paper, we propose a new hybrid algorithm dealing with this problem. Its performance is verified against a simulated annealing algorithm and random search. The obtained results are promising, the hybrid algorithm has produced good solutions in almost all of tested scenarios.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114791344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of Distributed Clustering Algorithms: A Survey 分布式聚类算法的比较分析:综述
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.40
Deepika Singh, A. Gosain
{"title":"A Comparative Analysis of Distributed Clustering Algorithms: A Survey","authors":"Deepika Singh, A. Gosain","doi":"10.1109/ISCBI.2013.40","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.40","url":null,"abstract":"Cluster analysis (or clustering) is one of the most common techniques used for data mining. It is a process in which a given set of objects is assigned into groups, where these groups are known as clusters. Objects belonging to a single cluster are similar to other objects in that cluster but different from the objects belonging to other clusters. The task of clustering becomes difficult and complex in case the data is distributed across multiple sites. Distributed clustering comes as a rescue to the problems of traditional clustering when applied to distributed databases. Many researchers have proposed clustering algorithms which work efficiently in the distributed environment. In this research paper we have provided the comparative analysis of some of these distributed clustering algorithms based on various parameters.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122692577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信