2014 2nd International Conference on Business and Information Management (ICBIM)最新文献

筛选
英文 中文
Knowing minimum mobile device delivery context to maintain standard for m-learning in university scenario 了解最低限度的移动设备交付环境,以维护大学场景中移动学习的标准
2014 2nd International Conference on Business and Information Management (ICBIM) Pub Date : 2014-12-04 DOI: 10.1109/ICBIM.2014.6970920
Saurabh Pal, Prasenjit Choudhury, Srabasti Mukherjee, S. Nandi
{"title":"Knowing minimum mobile device delivery context to maintain standard for m-learning in university scenario","authors":"Saurabh Pal, Prasenjit Choudhury, Srabasti Mukherjee, S. Nandi","doi":"10.1109/ICBIM.2014.6970920","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970920","url":null,"abstract":"Mobile devices are completely heterogonous in respect to hardware and software, thus adaptation of e-learning content is necessary for supporting the contents to get fit into as per the mobile device suitability. Knowing the various attributes and capability information of a mobile device is necessary for proper content adaptation. As there are hundreds of information which can be known about a mobile device, choosing the proper ones are absolutely necessary as per the application requirement. The present paper provides the various techniques by which information regarding a mobile device can be known and the minimum information of which is needed for content adaptation in a mobie based learning or m-learning application in a University Campus scenario with maintaining standards.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"60 1","pages":"11-16"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87129518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image steganography with block entropy based segmentation and variable rate embedding 基于块熵分割和可变速率嵌入的图像隐写
2014 2nd International Conference on Business and Information Management (ICBIM) Pub Date : 2014-12-04 DOI: 10.1109/ICBIM.2014.6970937
Ratnakirti Roy, S. Changder
{"title":"Image steganography with block entropy based segmentation and variable rate embedding","authors":"Ratnakirti Roy, S. Changder","doi":"10.1109/ICBIM.2014.6970937","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970937","url":null,"abstract":"Steganography is the art and science of concealing information inside apparently innocuous covers like images, audio and video such that the very existence of the hidden message remains imperceptible to an adversary. Image steganography has numerous implementations developed over time. It is evident that certain areas in the image are more efficient for hiding data than the others. Such regions are called Regions of Interest. This paper proposes an object based image steganography technique that utilizes image entropy to segment smooth and textured areas in a cover image and then embed data with a variable data rate high efficiency embedding scheme. The method is shown to yield promising results in terms of stego-image fidelity and statistical imperceptibility.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"69 1","pages":"75-80"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80886813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Financial soundness in Indian insurance sector: A comparison between two leading life insurers 印度保险业的财务健全性:两家主要人寿保险公司的比较
2014 2nd International Conference on Business and Information Management (ICBIM) Pub Date : 2014-12-04 DOI: 10.1109/ICBIM.2014.6970961
Joy Chakraborty, P. Sengupta
{"title":"Financial soundness in Indian insurance sector: A comparison between two leading life insurers","authors":"Joy Chakraborty, P. Sengupta","doi":"10.1109/ICBIM.2014.6970961","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970961","url":null,"abstract":"In the pre-reform era, Life Insurance Corporation of India (L.I.C.I) dominated the Indian Life Insurance market. But the situation drastically changed since the beginning of the year 2000. With the development of the IRDA Act in 1999, private players started entering into the life insurance market. At the end of the FY 2011-12, there were 24 life insurance companies (inclusive of 1 public sector player), (L.I.C.I) operating in India. The present paper attempts to compare the level of financial soundness of two leading life insurers in India namely Life insurance Corporation of India (LICI) and ICICI Prudential Life Insurance Company Limited (ICICI Pru). The former is the sole public-sector life insurance player whereas the latter is a dominant private-sector life insurance player in India at present. As financial intermediaries, life insurers tap savings of the public in the form of premium. Hence, they should be financially viable to maintain the timely and anticipated returns of the public. In this regard, the International Monetary Fund (IMF) has come up with the CARAMELS model to analyze the financial soundness of several organizations spread across different industries. This study makes an attempt to analyze the financial soundness of two dominant life insurance players operating in India based on the CARAMELS framework in terms of capital adequacy, asset quality, reinsurance, management soundness, earnings and profitability, liquidity and solvency parameters.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"35 1","pages":"86-90"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85339070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel multicast technique in sparse splitting WDM mesh network using light-forest approach 基于轻森林方法的稀疏分割WDM网状网络组播新技术
2014 2nd International Conference on Business and Information Management (ICBIM) Pub Date : 2014-12-04 DOI: 10.1109/ICBIM.2014.6970954
S. Barat, Harshita Jaiswal, T. De
{"title":"A novel multicast technique in sparse splitting WDM mesh network using light-forest approach","authors":"S. Barat, Harshita Jaiswal, T. De","doi":"10.1109/ICBIM.2014.6970954","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970954","url":null,"abstract":"Multicast communication over optical fiber communication is becoming an emerging trend in the modern communication. As the member set increases the requirement of splitting also increases. Hence in a sparse splitting WDM network message blocking due to lack of splitters, available bandwidth, delay bound limitations are degrading the quality of service of the multicast communication. Hence better resource management algorithm need to be devised to improve the throughput and QoS of multicast communication. In this paper we have proposed a novel algorithm which minimizes the wavelength usages by allowing lesser component trees in a light-forest without violating either of the splitting as well as delay constraints.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"19 1","pages":"132-137"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84448091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study on Interrelation between Indian Economic condition (GDP at factor cost) with the Business Growth & NPA position of the Public Sector Banks in India 印度经济状况(按要素成本计算的GDP)与印度公共部门银行业务增长和不良资产头寸的相互关系研究
2014 2nd International Conference on Business and Information Management (ICBIM) Pub Date : 2014-12-04 DOI: 10.1109/ICBIM.2014.6970962
Souvik Ghosh, Anupam De, Banhi Guha
{"title":"A study on Interrelation between Indian Economic condition (GDP at factor cost) with the Business Growth & NPA position of the Public Sector Banks in India","authors":"Souvik Ghosh, Anupam De, Banhi Guha","doi":"10.1109/ICBIM.2014.6970962","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970962","url":null,"abstract":"In the post globalization era Indian banking Industry has seen lot of changes. Previously the banks were providing basic banking services to the customers but after the introduction of new age private banks the banks become the financial supermarkets with all financial products to offer their customers. But it was not easy for the state run banks to cope up with the situation with their traditional approach. The aim of this paper is to provide an insight into the performances of Public Sector Banks in India in terms of their Business Growth, Non-Performing Asset (NPA) with the economy of the country (India) in terms of GDP (at factor cost).","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"17 1","pages":"91-95"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88493425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bengali noun phrase chunking based on conditional random fields 基于条件随机场的孟加拉语名词短语组块
2014 2nd International Conference on Business and Information Management (ICBIM) Pub Date : 2014-12-04 DOI: 10.1109/ICBIM.2014.6970957
K. Sarkar, V. Gayen
{"title":"Bengali noun phrase chunking based on conditional random fields","authors":"K. Sarkar, V. Gayen","doi":"10.1109/ICBIM.2014.6970957","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970957","url":null,"abstract":"Noun phrase (NP) chunking deals with extracting the noun phrases from a sentence. While NP chunking is much simpler than parsing, it is still a challenging task to build an accurate and efficient NP chunker. Noun phrase chunking is an important and useful task in many natural language processing applications. It is studied well for English, however not much work has been done for Bengali. This paper presents a Bengali noun phrase chunking approach based on conditional random fields (CRFs) models. Our developed NP chunker has been tested on the ICON 2013 dataset and achieves an impressive F-score of 95.92.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"24 1","pages":"148-153"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84502545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Unsystematic Risk Analysis with special reference to Maharatna, Navratna and Miniratna CPSEs companies in India: An observational study on Business Risk and Financial Risk 非系统风险分析——以印度Maharatna, Navratna和Miniratna cpse公司为例——商业风险和财务风险的观察研究
2014 2nd International Conference on Business and Information Management (ICBIM) Pub Date : 2014-12-04 DOI: 10.1109/ICBIM.2014.6970945
A. Barman, P. Sengupta
{"title":"Unsystematic Risk Analysis with special reference to Maharatna, Navratna and Miniratna CPSEs companies in India: An observational study on Business Risk and Financial Risk","authors":"A. Barman, P. Sengupta","doi":"10.1109/ICBIM.2014.6970945","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970945","url":null,"abstract":"In today's dynamic business situation, the management of risk becomes very complicated. Making right and appropriate strategies to manage risk in accomplishing the wealth maximization objective of the corporate is utmost important. In the post liberalization era the drastic changes have been taken place in the policies concerning business of corporate which gives the paradigm shift to manage the business and financial risk. The present research study has been focusing on the analysis of the business and financial risk of the selected Maharatna, Navratna and Miniratna CPSEs companies of India; during the period of financial year 2008-2012. The purpose of this paper is to have an empirical examination regarding business and financial risk because of the changing environment of Indian economy. Successful supervision of risks and their forecast ought to help in lessen failures and losses. In that aspect, this paper focuses on Unsystematic Risk Analysis perspectives on India's selected Maharatna, Navratna and Miniratna CPSEs companies for the period 2008-2012.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"18 1","pages":"36-41"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83333509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A chaos based partial image encryption scheme 一种基于混沌的部分图像加密方案
2014 2nd International Conference on Business and Information Management (ICBIM) Pub Date : 2014-12-04 DOI: 10.1109/ICBIM.2014.6970933
S. Som, A. Kotal, A. Mitra, S. Palit, B. Chaudhuri
{"title":"A chaos based partial image encryption scheme","authors":"S. Som, A. Kotal, A. Mitra, S. Palit, B. Chaudhuri","doi":"10.1109/ICBIM.2014.6970933","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970933","url":null,"abstract":"Partial encryption of images can be considered to be better than the existing image encryption techniques in the application areas where computational overhead is the main criterion. In this communication, a chaos based symmetric key partial encryption of gray level images has been proposed. In the proposed algorithm, the plain images, after decomposing them to bitplanes, are first classified into different categories. Next, a threshold based on the autocorrelation of blocks of different bitplanes is used to identify the significant and insignificant bit planes. Following this, the correlated bit planes of an image are encrypted with key stream sequences generated by a chaos based pseudo random binary number generator. The experimental results depict that the proposed algorithm can successfully encrypt and decrypt gray level images with secret keys. The simulation analysis also exhibits that the proposed method is loss-less, secure and efficient in terms of several statistical tests, key sensitivity test, information entropy test and encryption quality tests. From the results it is observed that the new approach is able to hide the residual intelligence with lesser amount of time than that require for encrypting the entire image.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"3 1","pages":"58-63"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79287908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Modified Ant Colony Optimization to enhance MANET routing in Adhoc on demand Distance Vector 改进蚁群算法在Adhoc随需距离矢量中增强自组网路由
2014 2nd International Conference on Business and Information Management (ICBIM) Pub Date : 2014-12-04 DOI: 10.1109/ICBIM.2014.6970938
B. Nancharaiah, R. Scholar
{"title":"Modified Ant Colony Optimization to enhance MANET routing in Adhoc on demand Distance Vector","authors":"B. Nancharaiah, R. Scholar","doi":"10.1109/ICBIM.2014.6970938","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970938","url":null,"abstract":"A Mobile Adhoc Network (MANET) is an assortment of mobile nodes that can establish an adhoc network without any centralized structures. Networking infrastructure such as the base stations is unavailable for MANET. The interconnected collection of wireless nodes depends on its position and, its transmitting and receiving radio capacity to create a wireless connectivity and form a multi-hop graph or an “adhoc” network. Routing in MANET is used for finding the multi-hop paths to transmit the data flow through the network while optimizing one or more performance measures. In this paper, modified Ant Colony Optimization (ACO) has been proposed for the optimization for MANET routing protocol. The modifications have been incorporated in Adhoc On-demand Distance Vector (AODV) routing. The proposed modified Ant Colony Optimization algorithm performs better compared to existing algorithms(AODV and Cooperative Opportunistic Routing in Mobile Adhoc Networks i.e. CORMAN) in terms of end- to-end delay, route acquisition time, throughput, total cache replies and packet delivery ratio.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"84 1","pages":"81-85"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72736101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Reliable multipath wireless sensor network routing protocol scheme for network lifetime maximization 网络寿命最大化的可靠多径无线传感器网络路由协议方案
2014 2nd International Conference on Business and Information Management (ICBIM) Pub Date : 2014-12-04 DOI: 10.1109/ICBIM.2014.6970935
A. Chatterjee, D. Mukherjee
{"title":"Reliable multipath wireless sensor network routing protocol scheme for network lifetime maximization","authors":"A. Chatterjee, D. Mukherjee","doi":"10.1109/ICBIM.2014.6970935","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970935","url":null,"abstract":"Wireless sensor networks (WSNs) consist of tiny sensor nodes with sensing, computation and wireless communication capabilities. As sensor nodes are resource constrained, the usage of energy and memory must be done wisely to increase the lifetime of nodes. It is also necessary to deliver data reliably to make any application more useful to the end user. In this paper we propose a protocol using cluster based tree topology for network lifetime maximization. The whole network is divided into several clusters. The clusters contain high to low varied density of sensors. Each cluster contains a cluster head which is a child node of some other cluster head. The number of child nodes is given by `n/2i' where `n' is the number of children nodes of the parent node and `i' represents a particular generation/level of the tree. In this way the entire network is arranged in a cluster tree topology with the root node as the sink. Few sensors in the cluster, randomly selected by the sink, sense the environmental parameters and share the information among the neighboring nodes. Thereafter, each node aggregate the parameter values received from other sensors, till these converge to the estimated true value. The cluster heads transmit the data packets of their own clusters, and those obtained from their corresponding child nodes. If the cluster heads find significant traffic in the routes, they dynamically select alternative routes expecting less degree of congestion, to forward the data packets to the higher parent nodes. Thus, this protocol establishes multipath routing scheme in the networks. Energy of the higher parent nodes in the tree structure get depleted faster due to the upstream nature of the traffic. Hence, the density of sensor nodes in the higher parent nodes is made high to maximize the network lifetime. Reliability of this protocol is more, as, a large number of sensor nodes are sensing the parameters of the local area and the consensus decision of the cluster members is sent to the sink.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"38 1","pages":"64-68"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78063574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信