{"title":"A Comparative Study of Classification Techniques for Intrusion Detection","authors":"Himadri Chauhan, Vipin Kumar, S. Pundir, E. Pilli","doi":"10.1109/ISCBI.2013.16","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.16","url":null,"abstract":"Intrusion detection is one of the major research problems in network security. It is the process of monitoring and analyzing network traffic data to detect security violations. Mining approach can play very important role in developing an intrusion detection system. The network traffic can be classified into normal and anomalous in order to detect intrusions. In our paper, top-ten classification algorithms namely J48, BayesNet, Logistic, SGD, IBK, JRip, PART, Random Forest, Random Tree and REPTree were selected after experimenting with more than twenty most widely used classification algorithms. The comparison of these top-ten classification algorithms is presented in this paper based upon their performance metrics to find out the best suitable algorithm available. Performance of the classification models is measured using 10-fold cross validation. Experiments and assessments of these methods are performed in WEKA environment using NSL-KDD dataset.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126680983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Review of Unstructured Data Management Approaches in Data Warehouse","authors":"Vedika Gupta, A. Gosain","doi":"10.1109/ISCBI.2013.20","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.20","url":null,"abstract":"The amount of business data is large & keeps on evolving leading to heterogeneous information base. The challenge is to access, analyze & integrate various data sources for making intelligent decisions. Business data can be structured or unstructured. Structured data attains the row-column format easily while unstructured data (USD) is the one that poses problem in such kind of tabular storage. Owing to the fact that USD is more than three times of structured data, and that it is more resourceful business wise and helps in charting out strategies and making decisions, it becomes important to devise methods for handling USD in data warehouse. Since the importance of USD has been realized, various authors have discussed different ways to manage it and extract useful information from it. In this paper, we have first comprehensively reviewed & surveyed the representative research works of various authors that have demonstrated how unstructured data can be handled in the warehouse. Finally, we have manifested & sorted them on various parameters & provided the same in tabular form.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121431119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Random Inertia Weighted Particle Swarm Optimization","authors":"A. Biswas, A. Lakra, Sharad Kumar, Avjeet Singh","doi":"10.1109/ISCBI.2013.27","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.27","url":null,"abstract":"Interactive cooperation of local best and global best solution encourages particles to move towards them, with a hope that better solution may present in the neighboring positions around local best or global best. However, this encouragement does not guarantees that movements taken by particle will always be the suitable one (comparatively better solution). With the influence of three random parameters in PSO-RANDIW increases exploration power as well as probability of unsuitable movements (move towards comparatively worst solution). These unsuitable movement may delay in convergence. In this paper, we have introduced a noble method to avoid such move with cognition of particle's own worst solution. Analysis on well known four benchmark functions shows proposed approach performance is comparatively better.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124573190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Defuzzification Methods Influence on Fuzzy Control of Nuclear Reactor","authors":"T. Skulavik, M. Kopček, P. Mydlo, P. Schreiber","doi":"10.1109/ISCBI.2013.32","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.32","url":null,"abstract":"This paper deals with the influence of the defuzzification methods on the quality of fuzzy control. There exist many defuzzification methods in theory. Each of them has its own benefits and application areas. The scope of this paper is focused only to the defuzzification methods available in Matlab Simulink environment. These are compared and evaluated using the integral quality criteria. The fuzzy PI controller was designed with normalized universes to simplify the tuning of controller parameters. The nuclear reactor model has been used as a reference system during experiments. The nuclear reactor model has been constructed using the Point kinetics model and the Thermal model. Step response characteristics of the closed loop control system were evaluated using integral criteria to compare available defuzzification methods. Finally the achieved results were briefly summarized.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125412267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical Features Identification for Sentiment Analysis Using Machine Learning Techniques","authors":"A. Kamal, M. Abulaish","doi":"10.1109/ISCBI.2013.43","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.43","url":null,"abstract":"Due to increasing fascinating trend of using internet and online social media, user-generated contents are growing exponentially on the Web, containing users' opinion on various products. In this paper, we have proposed a sentiment analysis system which combines rule-based and machine learning approaches to identify feature-opinion pairs and their polarity. The efficiency of the proposed system is established through experimentation over customer reviews on different electronic products.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117163301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Fuzzy Based IMC-PID Controller for IPD Process","authors":"Parikshit Kr Paul, C. Dey, R. Mudi","doi":"10.1109/ISCBI.2013.30","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.30","url":null,"abstract":"A fuzzy based IMC-PID controller is designed for pure integrating process with delay (IPD). Here, we develop an IMC-PID tuning rule for the IPD process using first-order Padé approximation for dead time and a second-order filter is added to make the controller structure proper. The value of the only tuning parameter i.e., closed-loop time constant is selected with the help of a simple fuzzy rule base. An overall improvement is observed in the performance of the proposed IMC-PID controller in comparison with existing IMC tuning relations.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131391277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Global DCT Domain Power Law Transformations in Image Enhancement Technique","authors":"T. Singh, S. Roy, K. Manglem Singh","doi":"10.1109/ISCBI.2013.61","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.61","url":null,"abstract":"Power Law Transformation (PLT) is a standard transformation function used in image enhancement techniques. PLT associates two constant parameters which can change an input value in different ways. The two PLT parameters can take different roles on different domains like spatial and transform domain. Discrete Cosine Transformation(DCT) is the popular transform domain used in image processing. Alpha Rooting (AR) and DCT block domain techniques are popular image contrast enhancement techniques which apply PLT on DCT domain. They are limited to edge contrast enhancement only. This paper describes an image enhancement technique which applies PLT on a global DCT domain like AR. PLT is applied only on AC coefficients while AR applies to all the DCT coefficients. This new technique can enhance global contrast, edge contrast and brightness of an image through a single function with three parameters. The results of this technique are compared with other techniques, applied on transformed domain for quality and quantity measure. This technique outperforms than the other techniques reported so far.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130112672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of Path Models for Structural Equation Modeling by Use of Union Operation for Merging Multiple Viewpoints","authors":"R. Saga, Rikuto Kunimoto","doi":"10.1109/ISCBI.2013.48","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.48","url":null,"abstract":"This study describes a method for integration of multiple path models. Structural equation modeling (SEM) is useful for causality analysis. However, the result of SEM may lack reliability owing to the model being constructed upon subjective assumptions. To mitigate this condition, the integration of multiple path models by use of the union operation is proposed. Four integrations are performed in an experiment for each feature case and the method usability is discussed.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130606070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jyoti Gupta, A. Grover, Garish Kumar Wadhwa, Neeti Grover
{"title":"Multipliers Using Low Power Adder Cells Using 180nm Technology","authors":"Jyoti Gupta, A. Grover, Garish Kumar Wadhwa, Neeti Grover","doi":"10.1109/ISCBI.2013.8","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.8","url":null,"abstract":"Multiplier is the most commonly used circuit in the digital devices. Multiplication is one of the basic functions used in digital signal processing. Most high performance DSP systems rely on hardware multiplication to achieve high data throughput. There are various types of multipliers available depending upon the application in which they are used. Full adder is the main block of power dissipation in multiplier. So reducing the power dissipation of full adder ultimately reduces the power dissipation of multiplier. In this article 8-bit multipliers based on Gate Diffusion Input (GDI) adder cells are compared using EDA Tanner, simulations are based on 180nm CMOS technology.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134128009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HiCrawl: A Hidden Web Crawler for Medical Domain","authors":"Sonali Gupta, K. Bhatia","doi":"10.1109/ISCBI.2013.39","DOIUrl":"https://doi.org/10.1109/ISCBI.2013.39","url":null,"abstract":"The Hidden Web refers to a huge portion of the WWW that holds numerous freely accessible Web databases, hidden behind search form interfaces which can only be accessed through dynamic web pages that are generated in response to the user queries issued at the search form interface. Thus, the core challenge to implement any crawler for the Hidden Web is to routinely surpass these search form interfaces by automatically generating & issuing queries that help discover these dynamic Web pages. The paper provides a novel approach to guide the crawler in choosing the right query term to be submitted to any search form interface that has been designed to accept keywords or terms as input to it. The system is based on the use of classification hierarchies that might have either been manually or automatically constructed. And for the purposes of illustration, we have considered the search form interfaces in the 'Medical' domain, it being one of the most popular domains used by the researchers and the use of a manually generated top-down classification hierarchy in the same domain.","PeriodicalId":311471,"journal":{"name":"2013 International Symposium on Computational and Business Intelligence","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124457157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}