2014 International Conference on Intelligent Computing Applications最新文献

筛选
英文 中文
A Study on Direct Influence in Online Social Networks 在线社交网络中的直接影响研究
2014 International Conference on Intelligent Computing Applications Pub Date : 2014-03-06 DOI: 10.1109/ICICA.2014.85
Jane E. Klobas, L. Clyde, Habib M. Fardoun, Matthew S. Weber, M. Kasavana, Khaldoon “Khal” Nusair, Panayiotis Zaphiris, Keith S. Coulter
{"title":"A Study on Direct Influence in Online Social Networks","authors":"Jane E. Klobas, L. Clyde, Habib M. Fardoun, Matthew S. Weber, M. Kasavana, Khaldoon “Khal” Nusair, Panayiotis Zaphiris, Keith S. Coulter","doi":"10.1109/ICICA.2014.85","DOIUrl":"https://doi.org/10.1109/ICICA.2014.85","url":null,"abstract":"Online social networks are gaining momentum in an exceedingly fast succession ever since from their commencement as they lay a robust platform to share the knowledge seeping into everybody who cares about it. In this gogetting world substantial quantity of success depends on how quickly one is ready to succeed resolutely the most hodgepodges of individuals. There are only a few who will have preponderating thought of influence on others. Quintessence of the matter is to choose right individuals whose influence is incontestable so as to propagate the influence with minimum effort. These seeding individuals will successively be accustomed to build an upward notion in areas like politics, all sorts of education together with health and farming, introduce a product or service within the market, to revolutionize any formal setup surroundings of a piece non-public and public, coaching staff, transmute in thinking patterns of the society and its life trends, to proliferate advanced deliberations within the minds of individuals and likewise. This paper employs Pareto front function to spot the eminent leaders that is followed by the empirical analysis of the results of their undeviating influence.","PeriodicalId":312713,"journal":{"name":"2014 International Conference on Intelligent Computing Applications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115599343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IndexedFCP - An Index Based Approach to Identify Frequent Contiguous Patterns (FCP) in Big Data IndexedFCP——基于索引的大数据频繁连续模式(FCP)识别方法
2014 International Conference on Intelligent Computing Applications Pub Date : 2014-03-06 DOI: 10.1109/ICICA.2014.15
R. Devikarubi, R. D. Rubi, L. Arockiam
{"title":"IndexedFCP - An Index Based Approach to Identify Frequent Contiguous Patterns (FCP) in Big Data","authors":"R. Devikarubi, R. D. Rubi, L. Arockiam","doi":"10.1109/ICICA.2014.15","DOIUrl":"https://doi.org/10.1109/ICICA.2014.15","url":null,"abstract":"The process of identifying the repeated contiguous patterns existing in a Big data environment, especially in a Sequence Database (SDB) is called Frequent Contiguous Patterns (FCP) mining. The existing FCP algorithms repeatedly scan the SDB to find FCP, which requires high time complexity and large storage space. In this paper, an Index based algorithm has been presented which minimizes the scanning time of SDB, while finding FCP in the SDB. We define IndexedFCP() which uses index based technique to divide the SDB into sub SDBs and helps directly to search the required FCP in its possible sub SDBs. FCP algorithms are used in many SDB applications such as finding Motif, Regulatory Regions and internal repeats in genomic SDB, identifying required items in Inventory SDB and finding trading patterns in stack trading etc.","PeriodicalId":312713,"journal":{"name":"2014 International Conference on Intelligent Computing Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ontology Based Semantic Search: An Introduction and a Survey of Current Approaches 基于本体的语义搜索:现有方法的介绍与综述
2014 International Conference on Intelligent Computing Applications Pub Date : 2014-03-06 DOI: 10.1109/ICICA.2014.82
A. Ramkumar, B. Poorna
{"title":"Ontology Based Semantic Search: An Introduction and a Survey of Current Approaches","authors":"A. Ramkumar, B. Poorna","doi":"10.1109/ICICA.2014.82","DOIUrl":"https://doi.org/10.1109/ICICA.2014.82","url":null,"abstract":"Ontology based semantic search will lead to new generation of search based on the meaning of keyword rather than keyword and helps in finding correct information on the web. Here, ontology provides an explicit specification of conceptualization which helps to connect the information on the existing web pages with the background knowledge. Ontology based search overcomes the semantic gap between the keyword found in documents and those in query. This survey provides an introduction to ontology based semantic search and review the different details of selected ontology based search approaches and compare them by means of classification criteria. Based on this comparison, this survey attempts to identify the possible directions for future research.","PeriodicalId":312713,"journal":{"name":"2014 International Conference on Intelligent Computing Applications","volume":"751 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116108405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Performance Analysis of Various Segmentation Techniques in Breast Mammogram Images 乳腺x线图像中各种分割技术的性能分析
2014 International Conference on Intelligent Computing Applications Pub Date : 2014-03-06 DOI: 10.1109/ICICA.2014.56
S. Sasikala, M. Ezhilarasi, P. Sudharsan, C. Sivakumari
{"title":"Performance Analysis of Various Segmentation Techniques in Breast Mammogram Images","authors":"S. Sasikala, M. Ezhilarasi, P. Sudharsan, C. Sivakumari","doi":"10.1109/ICICA.2014.56","DOIUrl":"https://doi.org/10.1109/ICICA.2014.56","url":null,"abstract":"Breast cancer became the most dangerous disease that affect the most of the women and which has the less survival rate. Segmentation is the crucial step in analysis of mammogram images. Based on the segmented image further classification is done. Here we compared various available segmentation techniques for segmentation of mammogram images.","PeriodicalId":312713,"journal":{"name":"2014 International Conference on Intelligent Computing Applications","volume":"115 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122319880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Speech Recognition Tools for Mobile Phone - A Comparative Study 手机语音识别工具的比较研究
2014 International Conference on Intelligent Computing Applications Pub Date : 2014-03-06 DOI: 10.1109/ICICA.2014.93
R. Vishnupriya, T. Devi
{"title":"Speech Recognition Tools for Mobile Phone - A Comparative Study","authors":"R. Vishnupriya, T. Devi","doi":"10.1109/ICICA.2014.93","DOIUrl":"https://doi.org/10.1109/ICICA.2014.93","url":null,"abstract":"In this age of information technology, access of information in a convenient manner has gained importance. Since human beings use speech as a primary mode of communication, it is natural for people to expect to be able to carry out spoken dialogue with computer. Speech recognition (SR) system permits ordinary people to speak to the computer to retrieve information. This paper describes the existing tools developed for speech recognition. The objective of this paper is to summarize and compare the well known tools of speech recognition system which are at the forefront of this exciting and challenging field.","PeriodicalId":312713,"journal":{"name":"2014 International Conference on Intelligent Computing Applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122501047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the Secure Storage and Transmission of Health Care Records Based on DNA Sequences 基于DNA序列的医疗记录安全存储与传输研究
2014 International Conference on Intelligent Computing Applications Pub Date : 2014-03-06 DOI: 10.1109/ICICA.2014.33
A. Murugan, Grasha Jacob
{"title":"On the Secure Storage and Transmission of Health Care Records Based on DNA Sequences","authors":"A. Murugan, Grasha Jacob","doi":"10.1109/ICICA.2014.33","DOIUrl":"https://doi.org/10.1109/ICICA.2014.33","url":null,"abstract":"With the rapidly changing technological realm, modern healthcare management systems need to change to accommodate these new advances. There is an urgent need to provide and protect the confidentiality of health care records when stored in common databases and transmitted over public insecure channel. This paper outlines DNA sequence based cryptography which is easy to implement and is robust against any type of crypt attack as there is insignificant correlation between the original record and the encrypted image.","PeriodicalId":312713,"journal":{"name":"2014 International Conference on Intelligent Computing Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114066516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Simplified MCDM Analytical Weighted Model for Ranking Classifiers in Financial Risk Datasets 金融风险数据分类器排序的简化MCDM分析加权模型
2014 International Conference on Intelligent Computing Applications Pub Date : 2014-03-06 DOI: 10.1109/ICICA.2014.42
Y. Beulah Jeba Jaya, J. Tamilselvi
{"title":"Simplified MCDM Analytical Weighted Model for Ranking Classifiers in Financial Risk Datasets","authors":"Y. Beulah Jeba Jaya, J. Tamilselvi","doi":"10.1109/ICICA.2014.42","DOIUrl":"https://doi.org/10.1109/ICICA.2014.42","url":null,"abstract":"One of the most challenging tasks in data mining is to choose a better classifier for classification problems as this involves multiple criteria. The multiple criteria decision making (MCDM) techniques are noteworthy to judge different alternatives on various criteria. In this paper, a simplified MCDM technique is applied to make a judgement on different alternatives (classifiers) among multiple criteria in financial risk datasets. For this purpose, the paired t-test statistical significance test and significant win-loss tables are used to determine the performance scores for each classifier. Then, the weights are determined using an analytic hierarchy process (AHP) and finally simplified MCDM weighted sum model is applied to rank the classifiers. In addition, the efficiency of this simplified MCDM method is compared with other top MCDM methods such as TOPSIS, PROMETHEE and VIKOR to evaluate if there are any discrepancies in ranking. Analysis has been done for the three financial risk datasets from the UCI machine learning repository and surprisingly this simplified approach and the other top MCDM methods produce consistent rankings. Logistic regression and Bayesnet are ranked as the top two classifiers for financial risk datasets by this simplified approach and the other top MCDM methods. The simplified MCDM model can be applied to rank the classifiers which use simplified backgrounds in making right decisions among multiple criteria.","PeriodicalId":312713,"journal":{"name":"2014 International Conference on Intelligent Computing Applications","volume":"74 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128052586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Framework for Analysis of Purchase Dissonance in Recommender System Using Association Rule Mining 基于关联规则挖掘的推荐系统购买不协调分析框架
2014 International Conference on Intelligent Computing Applications Pub Date : 2014-03-06 DOI: 10.1109/ICICA.2014.41
D. Surendren, V. Bhuvaneswari
{"title":"A Framework for Analysis of Purchase Dissonance in Recommender System Using Association Rule Mining","authors":"D. Surendren, V. Bhuvaneswari","doi":"10.1109/ICICA.2014.41","DOIUrl":"https://doi.org/10.1109/ICICA.2014.41","url":null,"abstract":"Recommender System plays a vital role in various domains like E-Commerce, Entertainment, and News and currently in social networking. It is used as a tool in marketing for attracting the interest of customer. The purchase patterns of customer dependent on both psychological and external attributes. Generally customers' purchases vary with respect to their mood swings. It becomes a need for Recommender System to incorporate psychological concepts for understanding customer role for predicting user interests. The objective of the paper is to design a framework for Recommender System incorporating cognitive dissonance a psychological factor. The recommender system is designed as a hybrid system which combines both content and collaborative concepts using association rule mining concept a data mining technique. The experimental result of the framework are tested and analyzed for mobile industry to analyse the dissonance in choosing mobile tariff plans. The experimental results it is found that customers are affected with 16% of post purchase dissonance in opting for mobile tariffs. It is found that the recommender System when designed with psychological inputs provides a better mechanism for making effective decision for introducing new marketing strategy.","PeriodicalId":312713,"journal":{"name":"2014 International Conference on Intelligent Computing Applications","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122283253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lively Precedence and Overloaded Resource Based Approach to Virtual Machine Assignment Problem in a Datacenter Environment 基于动态优先和过载资源的数据中心环境下虚拟机分配问题研究
2014 International Conference on Intelligent Computing Applications Pub Date : 2014-03-06 DOI: 10.1109/ICICA.2014.72
T. Thiruvenkadam, V. Karthikeyani
{"title":"Lively Precedence and Overloaded Resource Based Approach to Virtual Machine Assignment Problem in a Datacenter Environment","authors":"T. Thiruvenkadam, V. Karthikeyani","doi":"10.1109/ICICA.2014.72","DOIUrl":"https://doi.org/10.1109/ICICA.2014.72","url":null,"abstract":"The number of cloud users has been growing everyday and it seems that scheduling of virtual machines in the cloud becomes an important problem to analyze. Lively consolidation of Virtual Machines is an efficient way to get better use of resources and power efficiency in Cloud data centers. Identifying when it is best to move VMs from a congested host is an aspect of Lively VM consolidation that directly influences the resource consumption and Quality of Service (QoS) delivered by the system. Server overloads is the basis of resource insufficiency and spoils the performance of applications which leads to affect the QoS. This paper focus on the importance of the detection of server overload and compares the various scheduling algorithms currently used for scheduling virtual machines and also proposes the design methodology of a new algorithm that helps to improve the resource utilization and at the same time energy efficiency.","PeriodicalId":312713,"journal":{"name":"2014 International Conference on Intelligent Computing Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127949080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adeptness Evaluation of Memory Based Classifiers for Credit Risk Analysis 信用风险分析中基于记忆分类器的适应性评价
2014 International Conference on Intelligent Computing Applications Pub Date : 2014-03-06 DOI: 10.1109/ICICA.2014.39
C. Devasena
{"title":"Adeptness Evaluation of Memory Based Classifiers for Credit Risk Analysis","authors":"C. Devasena","doi":"10.1109/ICICA.2014.39","DOIUrl":"https://doi.org/10.1109/ICICA.2014.39","url":null,"abstract":"Banking industry is an important source of finance in any country. Credit Risk analysis is a critical and decisive task in banking sector. Loan sanction procedure can be followed based on the credit risk analysis of any customer. Automation of decision making in financial applications using best algorithms and classifiers is much useful. This work evaluates the adeptness of different Memory based classifiers on credit risk analysis. The German credit data have been taken for adeptness evaluation and is done using open source machine learning tool. The performances of different memory based classifier are analyzed and a practical guideline for selecting exceptional and well suited algorithm for credit analysis is presented. Apart from that, some discreet criteria for relating and evaluating the best classifiers are discussed.","PeriodicalId":312713,"journal":{"name":"2014 International Conference on Intelligent Computing Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115941379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信