2013 International Symposium on Computational and Business Intelligence最新文献

筛选
英文 中文
Load Balancing Techniques for Wireless Mesh Networks: A Survey 无线网状网络负载均衡技术综述
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.57
Banani Das, Sudipta Roy
{"title":"Load Balancing Techniques for Wireless Mesh Networks: A Survey","authors":"Banani Das, Sudipta Roy","doi":"10.1109/ISCBI.2013.57","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.57","url":null,"abstract":"Wireless Mesh Networks (WMNs) are evolving to be the key technology for next generation wireless networking because of its advantage over other wireless technologies. However, many challenging technical issues still exist in this field to be addressed. Network load balancing is one of the important challenges in WMNs. As because the traffic volume in a WMN is expected to be very high, load balancing becomes a crucial part of it. Network load balancing enhances the scalability and availability of network. Load balancing can be used to extend the lifetime of a Mesh Network. In a WMN, where multiple paths to the destination node are very common, load balancing is the best approach to increase network throughput and to reduce congestion. In order to provide a better understanding of the load balancing challenges of WMNs, this paper presents a detailed investigation of the various load balancing techniques for WMNs that has been proposed so far.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126161409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Ranking of Alternatives in Multiple Attribute Group Decision Making: A Fuzzy Preference Relation Based Approach 基于模糊偏好关系的多属性群体决策方案排序
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.34
Sujit Das, P. Ghosh, S. Kar
{"title":"Ranking of Alternatives in Multiple Attribute Group Decision Making: A Fuzzy Preference Relation Based Approach","authors":"Sujit Das, P. Ghosh, S. Kar","doi":"10.1109/ISCBI.2013.34","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.34","url":null,"abstract":"This paper presents a two phase approach for fuzzy multiple attributes group decision making based on fuzzy preference relations (FPR). In the first phase, incomplete fuzzy preference relations provided by the decision makers are completed based on the procedure proposed by Herrera-Viedma et al. (2007). Second phase focuses the selection of best alternative(s) among a set of alternatives based on average rating value and score of alternatives with respect to decision makers. Initially the average rating value of each decision maker with respect to the alternatives are calculated and sorted in descending order. Based on their sorting, suitable score values are assigned to them and then calculate the summation values of the scores of the alternatives with respect to each decision maker. When summations of scores are same, summation of average rating value for each expert on individual alternatives is calculated to rank those alternatives. Larger summation values of the scores gives better choice to the alternative. Finally, this approach is analyzed with a numerical example and the result is compared with the experiment executed by Herrera-Viedma et al. (2007).","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"85 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134196333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multimodal Biometric System Using Fingernail and Finger Knuckle 利用指甲和指关节的多模态生物识别系统
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.63
K. Kale, Y. Rode, M. Kazi, Siddharth B. Dabhade, S. V. Chavan
{"title":"Multimodal Biometric System Using Fingernail and Finger Knuckle","authors":"K. Kale, Y. Rode, M. Kazi, Siddharth B. Dabhade, S. V. Chavan","doi":"10.1109/ISCBI.2013.63","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.63","url":null,"abstract":"Over many decades lines on hands used for astrological and numerology analysis because there is a trust that Lines never lie. Dorsum of the hand can be very useful in personal identification but yet it has not that much extensive attention. Single scan of dorsum hand can give two biometric traits finger-knuckle and finger nail. This paper presents an approach to combine Finger-knuckle and finger-nail features. Finger nail biometric is considered as quite unique biometric trait hence we combine this trait with finger knuckle. Finger knuckle features are extracted using Mel Frequency Cepstral Coefficient (MFCC) technique and the features of finger-nail are extracted from second level wavelet decomposition. We combined these features using feature level fusion and feed forward back propagation neural network for classification. The performance of the system has been tested on our own KVKR-knuckle database that includes 100 subjects dorsal hands. Evaluation results shows that increase in training set gives increased performance rate. The best performance of the proposed system reaches up to 97% with respective training of 90% of total dataset.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122615968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Topical Evolution and Regional Affinity of Tweets 推文的话题演化与区域亲和力
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.66
Lipika Dey, Arpit Khurdiya, Diwakar Mahajan
{"title":"Topical Evolution and Regional Affinity of Tweets","authors":"Lipika Dey, Arpit Khurdiya, Diwakar Mahajan","doi":"10.1109/ISCBI.2013.66","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.66","url":null,"abstract":"Business organizations are increasingly showing interest in Twitter content to know their consumers. Tracking popular tags and trends give some idea about what people are talking about. However, in order to act on the knowledge acquired, they need more detailed information like regional variability in content, exact location of discontent if any, regional affinities and influences etc. In this work, we present methods to identify topics of discussion in tweets using a LDA-based approach, which can identify emerging or evolving topics. Regional analysis of topics can provide interesting business insights about consumer expectation or behavioural variations. Further, regional distribution of topics are analysed to identify clusters of regions that tend to behave similarly over extended periods of time.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117267965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A DVR-Based Routing Protocol with Special Neighbours for Mobile Ad-Hoc Networks 移动Ad-Hoc网络中基于dvr的特殊邻居路由协议
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.54
M. Debbarma, Jhunu Debbarma, S. K. Sen, Sudipta Roy
{"title":"A DVR-Based Routing Protocol with Special Neighbours for Mobile Ad-Hoc Networks","authors":"M. Debbarma, Jhunu Debbarma, S. K. Sen, Sudipta Roy","doi":"10.1109/ISCBI.2013.54","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.54","url":null,"abstract":"We develop a Modified DVRA (MDVRA), distance vector protocol for mobile ad-hoc network. Our objective was primarily intended to remove the weaknesses inherent in the widely used DVRA, based on the well-known Bellman-Ford shortest path algorithm. Additionally, the goal was also to enhance the capabilities of the DVRA as to make it an efficient, robust and fully dynamic practical routing algorithm which may prove itself attractive enough for being used more extensively in general network as well as in the global Internet. As a distributed dynamic routing algorithm which is expected to adapt to changes in topology and traffic, the existing DVRA suffers mainly from two types of problems, namely, the problem of slow convergence with occasional count-to-infinity (CTI) and, occasional route oscillations. This paper, proposed routing protocol that use to create the MDVRA that would be truly dynamic, robust and free from the various limitations that have been discussed.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130439047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Video on Demand System over Cognitive Radio Wireless Mesh Networks 基于认知无线电无线网状网络的高效视频点播系统
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.53
Mohammad Siraj, Z. Abbasi
{"title":"An Efficient Video on Demand System over Cognitive Radio Wireless Mesh Networks","authors":"Mohammad Siraj, Z. Abbasi","doi":"10.1109/ISCBI.2013.53","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.53","url":null,"abstract":"Cognitive Radio (CR) is an emerging and promising technology which is predicted to solve the problem of spectrum shortage by utilization of the spectrum efficiently by exploiting the licensed spectrum white spaces. Video on demand (VoD) is a very popular present day service. It is a well-known fact, that video on demand internet service needs a large amount of bandwidth. CR WMNs is envisaged to provide the much needed bandwidth for video streaming as CR WMNs has the ability to access a large part of the under-utilized licensed spectrum. In CR WMNs interference is a critical issue which degrades cognitive radio wireless mesh networks (CR WMNs) performance. As the number of users rises, interference also increases resulting in low throughput. In this paper first an analytical model for CR WMNs has been presented. We have also presented an efficient VoD model and an optimizing approach which minimizes interference to provide a much needed higher network capacity to VoD services. Simulation results show effectiveness of our proposed approach as there is an increase in the number of concurrent VoD sessions.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131810501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Shadow of Eurozone Sovereign Debt Crisis Kept the Eastern Dragon's Property Away from Sunshine? Time Series Analysis on the Impact of Negative Externality in China's Property Market by EView 7 Software 欧元区主权债务危机的阴影使东方巨龙的房地产远离阳光?基于eview7软件的中国房地产市场负外部性影响的时间序列分析
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.21
R. Li, Tak Tin Wong
{"title":"The Shadow of Eurozone Sovereign Debt Crisis Kept the Eastern Dragon's Property Away from Sunshine? Time Series Analysis on the Impact of Negative Externality in China's Property Market by EView 7 Software","authors":"R. Li, Tak Tin Wong","doi":"10.1109/ISCBI.2013.21","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.21","url":null,"abstract":"This article examines the impact of European sovereign debt crisis on China's real estate market with the software EView. It begins with an analysis on the causes of the Euro zone crisis. A multivariate regression analysis is used to determine the effect of the European sovereign debt crisis on China's real estate market. By using the Thomson Reuters' database and other databases, investment and the related exogenous variables in the real estate market from 2005 to 2011 were obtained. The result of Chow Test indicates that there is a structural breakpoint when the crisis occurred, confirming the impact of negative externality on China's property market.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129973375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Business Model for Online Tea Marketing for a Tea Factory in Arunachal Pradesh in North East India 为印度东北部**的一家茶厂开发网上茶叶营销的商业模式
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.19
Joli Angu, M. Muralidhar
{"title":"Development of Business Model for Online Tea Marketing for a Tea Factory in Arunachal Pradesh in North East India","authors":"Joli Angu, M. Muralidhar","doi":"10.1109/ISCBI.2013.19","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.19","url":null,"abstract":"E-Commerce has been a buzz word since many years with the increased usage of computers and communication technologies. The usage of these technologies have simplified the business functions and procedures and hence, increased the efficiency of business functions. E-commerce includes the core functions of business processes like buying, selling, ordering, services and information through internet. The introduction of internet and communication technology to common hands has opened the ways to exchange information between companies, individuals and between computers. In this paper, an attempt has been made to introduce marketing and business models to improve the efficiency of the business process for tea powder. The business models include a web portal design and Software model in flow chart. Some useful conclusions have been arrived at.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133614835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An ISM Approach to Model and Analyze Agility of a Supply Chain: A Case of Fashion Industry 基于ISM的供应链敏捷性建模与分析——以服装行业为例
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.47
S. Verma, V. Jain, A. Majumdar
{"title":"An ISM Approach to Model and Analyze Agility of a Supply Chain: A Case of Fashion Industry","authors":"S. Verma, V. Jain, A. Majumdar","doi":"10.1109/ISCBI.2013.47","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.47","url":null,"abstract":"Changing customer and business requirements force manufacturers to develop agility in order to be competitive. Agility refers to the skill to respond to unexpected needs of the market. This paper presents the essence of agile supply chain (ASC) and contributes to the existing literature on ASC by highlighting the various parameters that affect the agility of an ASC. More specifically, this paper aims at deriving an interrelationship among these parameters with the help of interpretive structural modeling. It also answers an important research question that is, what precisely is agility and how it can be measured in the form of an agility index, using a tool called comprehensive agility measurement tool. Moreover, the importance of agility as a tool to survive in the volatile market as the new dimension of this particular research domain has been discussed.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"52 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123703302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
User History Based Mail Filtering Process 基于用户历史记录的邮件过滤过程
2013 International Symposium on Computational and Business Intelligence Pub Date : 2013-08-24 DOI: 10.1109/ISCBI.2013.37
Ravi Kumar, M. Punetha, Hitesh Soni, M. Bhattacharya
{"title":"User History Based Mail Filtering Process","authors":"Ravi Kumar, M. Punetha, Hitesh Soni, M. Bhattacharya","doi":"10.1109/ISCBI.2013.37","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.37","url":null,"abstract":"Email spams are probable intimidation to an email user. In this paper we deal with spams which may slither through filters into client's mailbox (false negative). We use client's history to solve the above mentioned problem. For a client a particular message can be important while for some other client they may be unimportant. Other than filtered spam generally a user decides which type of message is spam by flagging it. Our novel approach reduces this effort and client need not see all mails and manually flag them as spam because this filtering system and algorithms used in it will separate all those junks so that the client is left with only those mails which are useful for him/her. We propose using, part of speech tagging module of Natural Language Processing and some other discussed algorithms. This approach is not only saving time of a client but is also acting as a good mail filter.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信