{"title":"Load Balancing Techniques for Wireless Mesh Networks: A Survey","authors":"Banani Das, Sudipta Roy","doi":"10.1109/ISCBI.2013.57","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.57","url":null,"abstract":"Wireless Mesh Networks (WMNs) are evolving to be the key technology for next generation wireless networking because of its advantage over other wireless technologies. However, many challenging technical issues still exist in this field to be addressed. Network load balancing is one of the important challenges in WMNs. As because the traffic volume in a WMN is expected to be very high, load balancing becomes a crucial part of it. Network load balancing enhances the scalability and availability of network. Load balancing can be used to extend the lifetime of a Mesh Network. In a WMN, where multiple paths to the destination node are very common, load balancing is the best approach to increase network throughput and to reduce congestion. In order to provide a better understanding of the load balancing challenges of WMNs, this paper presents a detailed investigation of the various load balancing techniques for WMNs that has been proposed so far.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126161409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ranking of Alternatives in Multiple Attribute Group Decision Making: A Fuzzy Preference Relation Based Approach","authors":"Sujit Das, P. Ghosh, S. Kar","doi":"10.1109/ISCBI.2013.34","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.34","url":null,"abstract":"This paper presents a two phase approach for fuzzy multiple attributes group decision making based on fuzzy preference relations (FPR). In the first phase, incomplete fuzzy preference relations provided by the decision makers are completed based on the procedure proposed by Herrera-Viedma et al. (2007). Second phase focuses the selection of best alternative(s) among a set of alternatives based on average rating value and score of alternatives with respect to decision makers. Initially the average rating value of each decision maker with respect to the alternatives are calculated and sorted in descending order. Based on their sorting, suitable score values are assigned to them and then calculate the summation values of the scores of the alternatives with respect to each decision maker. When summations of scores are same, summation of average rating value for each expert on individual alternatives is calculated to rank those alternatives. Larger summation values of the scores gives better choice to the alternative. Finally, this approach is analyzed with a numerical example and the result is compared with the experiment executed by Herrera-Viedma et al. (2007).","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"85 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134196333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Kale, Y. Rode, M. Kazi, Siddharth B. Dabhade, S. V. Chavan
{"title":"Multimodal Biometric System Using Fingernail and Finger Knuckle","authors":"K. Kale, Y. Rode, M. Kazi, Siddharth B. Dabhade, S. V. Chavan","doi":"10.1109/ISCBI.2013.63","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.63","url":null,"abstract":"Over many decades lines on hands used for astrological and numerology analysis because there is a trust that Lines never lie. Dorsum of the hand can be very useful in personal identification but yet it has not that much extensive attention. Single scan of dorsum hand can give two biometric traits finger-knuckle and finger nail. This paper presents an approach to combine Finger-knuckle and finger-nail features. Finger nail biometric is considered as quite unique biometric trait hence we combine this trait with finger knuckle. Finger knuckle features are extracted using Mel Frequency Cepstral Coefficient (MFCC) technique and the features of finger-nail are extracted from second level wavelet decomposition. We combined these features using feature level fusion and feed forward back propagation neural network for classification. The performance of the system has been tested on our own KVKR-knuckle database that includes 100 subjects dorsal hands. Evaluation results shows that increase in training set gives increased performance rate. The best performance of the proposed system reaches up to 97% with respective training of 90% of total dataset.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122615968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topical Evolution and Regional Affinity of Tweets","authors":"Lipika Dey, Arpit Khurdiya, Diwakar Mahajan","doi":"10.1109/ISCBI.2013.66","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.66","url":null,"abstract":"Business organizations are increasingly showing interest in Twitter content to know their consumers. Tracking popular tags and trends give some idea about what people are talking about. However, in order to act on the knowledge acquired, they need more detailed information like regional variability in content, exact location of discontent if any, regional affinities and influences etc. In this work, we present methods to identify topics of discussion in tweets using a LDA-based approach, which can identify emerging or evolving topics. Regional analysis of topics can provide interesting business insights about consumer expectation or behavioural variations. Further, regional distribution of topics are analysed to identify clusters of regions that tend to behave similarly over extended periods of time.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117267965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Debbarma, Jhunu Debbarma, S. K. Sen, Sudipta Roy
{"title":"A DVR-Based Routing Protocol with Special Neighbours for Mobile Ad-Hoc Networks","authors":"M. Debbarma, Jhunu Debbarma, S. K. Sen, Sudipta Roy","doi":"10.1109/ISCBI.2013.54","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.54","url":null,"abstract":"We develop a Modified DVRA (MDVRA), distance vector protocol for mobile ad-hoc network. Our objective was primarily intended to remove the weaknesses inherent in the widely used DVRA, based on the well-known Bellman-Ford shortest path algorithm. Additionally, the goal was also to enhance the capabilities of the DVRA as to make it an efficient, robust and fully dynamic practical routing algorithm which may prove itself attractive enough for being used more extensively in general network as well as in the global Internet. As a distributed dynamic routing algorithm which is expected to adapt to changes in topology and traffic, the existing DVRA suffers mainly from two types of problems, namely, the problem of slow convergence with occasional count-to-infinity (CTI) and, occasional route oscillations. This paper, proposed routing protocol that use to create the MDVRA that would be truly dynamic, robust and free from the various limitations that have been discussed.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130439047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Video on Demand System over Cognitive Radio Wireless Mesh Networks","authors":"Mohammad Siraj, Z. Abbasi","doi":"10.1109/ISCBI.2013.53","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.53","url":null,"abstract":"Cognitive Radio (CR) is an emerging and promising technology which is predicted to solve the problem of spectrum shortage by utilization of the spectrum efficiently by exploiting the licensed spectrum white spaces. Video on demand (VoD) is a very popular present day service. It is a well-known fact, that video on demand internet service needs a large amount of bandwidth. CR WMNs is envisaged to provide the much needed bandwidth for video streaming as CR WMNs has the ability to access a large part of the under-utilized licensed spectrum. In CR WMNs interference is a critical issue which degrades cognitive radio wireless mesh networks (CR WMNs) performance. As the number of users rises, interference also increases resulting in low throughput. In this paper first an analytical model for CR WMNs has been presented. We have also presented an efficient VoD model and an optimizing approach which minimizes interference to provide a much needed higher network capacity to VoD services. Simulation results show effectiveness of our proposed approach as there is an increase in the number of concurrent VoD sessions.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131810501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Shadow of Eurozone Sovereign Debt Crisis Kept the Eastern Dragon's Property Away from Sunshine? Time Series Analysis on the Impact of Negative Externality in China's Property Market by EView 7 Software","authors":"R. Li, Tak Tin Wong","doi":"10.1109/ISCBI.2013.21","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.21","url":null,"abstract":"This article examines the impact of European sovereign debt crisis on China's real estate market with the software EView. It begins with an analysis on the causes of the Euro zone crisis. A multivariate regression analysis is used to determine the effect of the European sovereign debt crisis on China's real estate market. By using the Thomson Reuters' database and other databases, investment and the related exogenous variables in the real estate market from 2005 to 2011 were obtained. The result of Chow Test indicates that there is a structural breakpoint when the crisis occurred, confirming the impact of negative externality on China's property market.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129973375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Business Model for Online Tea Marketing for a Tea Factory in Arunachal Pradesh in North East India","authors":"Joli Angu, M. Muralidhar","doi":"10.1109/ISCBI.2013.19","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.19","url":null,"abstract":"E-Commerce has been a buzz word since many years with the increased usage of computers and communication technologies. The usage of these technologies have simplified the business functions and procedures and hence, increased the efficiency of business functions. E-commerce includes the core functions of business processes like buying, selling, ordering, services and information through internet. The introduction of internet and communication technology to common hands has opened the ways to exchange information between companies, individuals and between computers. In this paper, an attempt has been made to introduce marketing and business models to improve the efficiency of the business process for tea powder. The business models include a web portal design and Software model in flow chart. Some useful conclusions have been arrived at.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133614835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An ISM Approach to Model and Analyze Agility of a Supply Chain: A Case of Fashion Industry","authors":"S. Verma, V. Jain, A. Majumdar","doi":"10.1109/ISCBI.2013.47","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.47","url":null,"abstract":"Changing customer and business requirements force manufacturers to develop agility in order to be competitive. Agility refers to the skill to respond to unexpected needs of the market. This paper presents the essence of agile supply chain (ASC) and contributes to the existing literature on ASC by highlighting the various parameters that affect the agility of an ASC. More specifically, this paper aims at deriving an interrelationship among these parameters with the help of interpretive structural modeling. It also answers an important research question that is, what precisely is agility and how it can be measured in the form of an agility index, using a tool called comprehensive agility measurement tool. Moreover, the importance of agility as a tool to survive in the volatile market as the new dimension of this particular research domain has been discussed.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"52 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123703302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ravi Kumar, M. Punetha, Hitesh Soni, M. Bhattacharya
{"title":"User History Based Mail Filtering Process","authors":"Ravi Kumar, M. Punetha, Hitesh Soni, M. Bhattacharya","doi":"10.1109/ISCBI.2013.37","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.37","url":null,"abstract":"Email spams are probable intimidation to an email user. In this paper we deal with spams which may slither through filters into client's mailbox (false negative). We use client's history to solve the above mentioned problem. For a client a particular message can be important while for some other client they may be unimportant. Other than filtered spam generally a user decides which type of message is spam by flagging it. Our novel approach reduces this effort and client need not see all mails and manually flag them as spam because this filtering system and algorithms used in it will separate all those junks so that the client is left with only those mails which are useful for him/her. We propose using, part of speech tagging module of Natural Language Processing and some other discussed algorithms. This approach is not only saving time of a client but is also acting as a good mail filter.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}