V. Saharia, R. Ghosh, J. Alam, Ajay Kumar, Manish Deo
{"title":"Analysis of one dimentional 5N Cellular Automata","authors":"V. Saharia, R. Ghosh, J. Alam, Ajay Kumar, Manish Deo","doi":"10.1109/ICBIM.2014.6970953","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970953","url":null,"abstract":"Cellular Automata (CA) is a decentralized computing tool which attracts the researchers from different domains. It comprises of various dimensions and particularly having diverse behavior according to the structure considered. Our main goal regarding this study is to analyze the structure and behavior of one dimensional five neighborhood Cellular Automata keeping in mind the aspects and properties of one dimensional three neighborhood Cellular Automata. We here put our effort to brief the study on cellular automata which might help the researchers from this diverse field.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"12 6","pages":"126-131"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91482873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Srabasti Mukherjee, Saurabh Pal, Prasenjit Choudhury, S. Nandi
{"title":"Challenges of establishing a collaborative learning environment using MANET","authors":"Srabasti Mukherjee, Saurabh Pal, Prasenjit Choudhury, S. Nandi","doi":"10.1109/ICBIM.2014.6970922","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970922","url":null,"abstract":"The increased popularity of the smart devices among student community has increased the teacher learner communication and taken learning beyond classroom now. The Mobile based Learning (m-learning) gives learner the flexibility of learning and enables a collaborative learning environment. Involvement, cooperation, team work are the crucial benefits that a student can obtain from the collaborative learning environment. Because of the dynamic nature of m-learning environment, a dynamic self created network or Mobile Ad hoc Network (MANET) would be best suited to establish the collaborative learning environment. Use of MANET in itself raises various issues. For the educational collaboration mobile nodes may frequently exchange data, text, images, transmit audio, video streaming packets to one another or even exchange information from databases thereby causing heavy network traffic. Another important issue to be considered are the malicious attacks-the mobile learning collaborative environment may have to face in absence of centralized authorities and granting access to both legitimate users and attackers. This unconditional trust may not only cause attack on single node, but also on numerous others. Keeping the reputation of participating nodes and to mitigate the attacks against them in the collaborative learning environment has become a challenging issue. This paper will try to jot down these challenges of establishing a Collaborative Learning Environment using the MANET.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"52 5 1","pages":"23-26"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87702204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a smart job allocation model for a Cloud Service Provider","authors":"Sourav Banerjee, Mainak Adhikari, U. Biswas","doi":"10.1109/ICBIM.2014.6970946","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970946","url":null,"abstract":"Cloud Computing is known as a provider of dynamic services. It utilizes a very large, scalable and virtualized resource over the Internet. So many industries have joined this bandwagon nowadays. One of the major research issues is to maintain good Quality of Service (QoS) of a Cloud Service Provider (CSP). The QoS encompasses different parameters, like, smart job allocation strategy, efficient load balancing, response time optimization, reduction in wastage of bandwidth, accountability of the overall system, etc. The efficient allocation strategy of the independent computational jobs among different Virtual Machines (VM) in a Datacenter (DC) is a distinguishable challenge in the Cloud Computing domain and finding out an optimal job allocation strategy guided by a good scheduling heuristic for such an environment is an NP-complete problem. So different heuristic approaches may be used for better result. The related works with other NP- complete problems have shown that solutions guided by heuristic approaches can often be improved by applying local scheduling procedure for allocating independent jobs in the virtual machines (VM) inside a Datacenter (DC), which, when combined with fast construction heuristics, can find out the shorter schedules on benchmark problems than the other solution methodologies found in different literatures, and in significant less time. This paper highlights a smart job allocation strategy for a CSP by applying Round-Robin (RR) scheduling policy.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"85 1","pages":"114-119"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83912170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An outlier detection method based on cluster pruning","authors":"R. Pamula, J. Deka, Sukumar Nandi","doi":"10.1109/ICBIM.2014.6970955","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970955","url":null,"abstract":"Outlier detection has a wide range of applications. In this paper we present a new method for detecting outliers, focused on reducing the number of computations. Our method operates on two phases and uses one pruning strategy. Objective is to remove the points which are considered to be inliers. In the first phase a clustering algorithm is applied to partition the data into clusters and make an estimate to prune the clusters, in the second phase we apply a outlier score function to dictate the outliers. The experimental results using real datasets demonstrate the superiority of our method over existing outlier detection method.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"1 1","pages":"138-141"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75986387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behavioral factors and their influence on property investment decisions: a study of investors' perspective","authors":"S. Rath, Mousumi Singha Mahapatra, Anupam De","doi":"10.1109/ICBIM.2014.6970952","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970952","url":null,"abstract":"The classical economic theory propounds that human beings are completely rational decision makers who carefully evaluate all facts and evidences before taking decisions that aim at maximizing outcomes. However it has been found that in real life people are not totally rational, rather they are influenced by various behavioral factors while making decisions. This has led to the emergence of the Behavioral Finance that studies the influence of psychology on financial decisions. The losses or suboptimal outcomes resulting from the irrational decision making of individuals serve as a learning tool for market participants. But, many of the unexplainable behaviour, classified as market anomalies remains questionable. The traditional finance theories have not been quite helpful to answer many questions. Behavioral finance and neuro finance are quite successful in answering many of these questions. Research is being conducted at a staggering pace in the area of neurofinance and behavioral finance.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"19 1","pages":"64-68"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90394032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mrinal Goswami, B. Kumar, Harsh Tibrewal, S. Mazumdar
{"title":"Efficient realization of digital logic circuit using QCA multiplexer","authors":"Mrinal Goswami, B. Kumar, Harsh Tibrewal, S. Mazumdar","doi":"10.1109/ICBIM.2014.6970972","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970972","url":null,"abstract":"Quantum-dot cellular Automata (QCA), a viable alternative to current CMOS, is gaining its prominence in digital circuit due to its very high device density and clocking speed. This work targets design of efficient logic circuits based on QCA multiplexer. The design capability of the multiplexer in QCA is investigated implementing XOR, XNOR logic gate and arithmetic logic unit. Further, efficient sequential circuits like D latch, T latch, D flip-flop, Scan flip-flop, shift registers are designed using QCA multiplexer. Results obtained supports the fact that the proposed designs achieve significant improvement in terms of device density, cell count as well as clock delay than that of the other previous designs.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"37 1","pages":"165-170"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80923485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing encryption with Enhanced Mobility Aware Routing Protocol for Bluetooth network","authors":"D. Pradhan, S. Nandi, Prasenjit Choudhury","doi":"10.1109/ICBIM.2014.6970974","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970974","url":null,"abstract":"Enhanced Mobility Aware Routing Protocol (EMOLAR) deals with data loss in Ad-hoc networks ignoring Bluetooth Security mechanism; which is Passkey or PIN, as using PIN in the process of Scatternet formation or reconstruction is highly impracticable. However, sometimes we feel the necessity to send secure data even in insecure networks. So, our algorithm will be useful in such situations. Bluetooth uses PIN authentication and Scatternet is a form of MANET, so end to end Encrypted data transmission can be a practical solution. EMOLAR sustains data loss in a Scatternet considering the mobility of devices, ignoring security. Herein, we are trying to implement Elliptic Curve Cryptography along with EMOLAR to overcome the security issues in Bluetooth Scatternet. Public Key Cryptography algorithms as RSA and ECC are most acceptable for their performance and efficiency; however Bluetooth is basically a low-power, low-memory device, so ECC will be more suitable for such devices.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"53 1","pages":"171-175"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88450814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Singh, Sajal Mahanta, Samir Malakar, R. Sarkar, M. Nasipuri
{"title":"Development of a page segmentation technique for Bangla documents printed in italic style","authors":"P. Singh, Sajal Mahanta, Samir Malakar, R. Sarkar, M. Nasipuri","doi":"10.1109/ICBIM.2014.6970950","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970950","url":null,"abstract":"Optical Character Recognition (OCR) is one of the most imperative prerequisites of electronic document analysis systems. Segmentation is the preliminary step of OCR, which has long been an active area of research. In this paper, we present a hierarchical system towards the segmentation of Bangla script document printed in two different styles viz., italic and bold italic with varying fonts and sizes. At first, the text lines are segmented from the document pages. Next, the words are segmented from the extracted text lines. Finally, the characters are segmented from the extracted word images by using a Trapezoidal Fuzzy membership function, which has been used for the detection of Matra region. The proposed technique is tested on 16 document pages consisting of 1456 words. The average success rates of the technique for text line, word and character segmentation are found to be 99.91%, 98.63% and 89.41% respectively.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"43 1","pages":"120-125"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79956734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing process maturity measure of Total Information Quality Management (TIQM)","authors":"I. Gunawan, Suhardi","doi":"10.1109/ICBIM.2014.6970948","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970948","url":null,"abstract":"Information plays an important role in decision making process. Poor information quality will have an impact on various organization aspects. Information quality problems can only be solved by implementation an effective and efficient information quality management, so that the information production process can be controlled. Total Information Quality Management (TIQM) is a method for building an effective information quality management with continuous improvement through an increase in whole process. TIQM not have a standard measure in determining the process maturity level. This situation causes TIQM process maturity level can not be determined with certainty. That requires an indicator and standard measure in determining maturity level in TIQM process. TIQM process maturity measure designed by adopting concept the Capability Maturity Model (CMM).","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"69 1","pages":"47-52"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80623401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficiency ranking of Indian Oil Companies (DMUs) using DEA techniques","authors":"Banhi Guha, Gautam Bandyopadhyay, Arun Upadhyay","doi":"10.1109/ICBIM.2014.6970969","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970969","url":null,"abstract":"This study offers an application of a non-parametric and quantitative technique (Data envelopment analysis, DEA) in ranking the stock performance of the Indian companies using statistical parameters based on the monthly closing price of Sensex during 2005-2012. The stock performance of any industry plays a very vital role for their survival in such a competitive environment and to attract the investors, financial analysts and the researchers too. In this study DEA has been applied to rank the stock performances of the Indian companies which are taken as DMUs enlisted with BSE and NSE. In the first phase of this paper Mean, SD on the monthly closing price of the Sensex are determined and considered as Input. The second phase of this research paper concentrated on the output selections which are based on the Mean/SD concept. The third phase highlights the productivity of each DMU through the application of input oriented DEA technique and shows identical scores of the DMUs then we observed super efficiency analysis and ranked the DMUs accordingly.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"118 1","pages":"113-118"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88075463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}