By Topic

2014 2nd International Symposium on Computational and Business Intelligence

7-8 Dec. 2014

Filter Results

Displaying Results 1 - 25 of 35
  • [Front cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (2046 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (387 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2014, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (210 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2014, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (209 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2014, Page(s):x - xii
    Request permission for commercial reuse | PDF file iconPDF (228 KB)
    Freely Available from IEEE
  • Optimal Control of Time Varying Linear Systems: Neural Networks

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    Using the principle of parsimony, some interesting systems are modeled as linear systems. In some applications, assumption of time invariance of the system is too restrictive. Thus there are many applications where linear time varying systems naturally arise as the models of system dynamics. There are several formulations of optimal control of linear time-varying systems. For instance, time optima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-Orientation Text Detection by Skeletonization (MOTDS)

    Publication Year: 2014, Page(s):5 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (678 KB) | HTML iconHTML

    In this paper, we propose a method that is able to handle diverse scene images with different font sizes, orientation and background complexity. For this, we use canny edge detection to localize high density location in image and dilate high density pixels by extending pixels environments to create connected components. Then try to blocking each connected component by skeleton structure. The next ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple-Stage Classification of Human Poses while Watching Television

    Publication Year: 2014, Page(s):10 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    We compared the accuracy measure between a single-stage classifier model and a multiple-stage classifier model in postural classifications using Kinect. Postural training sets were collected from Kinect's skeletal data streams, based on some of the common human postures during television watching. Three types of training sets were used, including Kinect's raw skeletal training set, skeletons with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-objective Differential Evolution Based Optimization of Risk Budgeted Global Asset Allocation Portfolios

    Publication Year: 2014, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    The Risk Budgeted Global Asset Allocation Portfolio problem strives to obtain an optimal portfolio of assets across global markets, with the objective of maximizing its Sharpe Ratio, subject to the constraints of risk budgets and other specific conditions imposed by the investors on the various asset classes comprising the portfolio. The mathematical formulation of the optimization problem turns o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hiding Sound in Image by k-LSB Mutation Using Cuckoo Search

    Publication Year: 2014, Page(s):21 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    In this paper a novel approach to hide sound files in a digital image is proposed and implemented such that it becomes difficult to conclude about the existence of the hidden data inside the image. In this approach, we utilize the rightmost k-LSB of pixels in an image to embed MP3 sound bits into a pixel. The pixels are so chosen that the distortion in image would be minimized due to embedding. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving the Permutation Flow Shop Problem with Firefly Algorithm

    Publication Year: 2014, Page(s):25 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Firefly algorithm (FA) is a new member of bionic swarm intelligence optimization algorithms. In this paper the bionic principle of FA is investigated and extended to solving a well-known NP-hard problem: Permutation Flow-Shop Scheduling Problem (PFSP). A corresponding solution strategy for PFSP bound is designed with its scheduling features. The strategy is implemented in experimentation on MATLAB... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Multi-agent System to Solve Distributed Constraint Optimization Problems

    Publication Year: 2014, Page(s):30 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Many problems in multi-agent systems can be described as Distributed Constraint Satisfaction Problems (DCSPs), where the goal is to find a set of assignments to variables that satisfies all constraints among agents. However, when real-life application problems are formalized as DCSPs, they are often over-constrained and have no solution that satisfies all constraints. Moreover, the globalization o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Vector Evaluated Particle Swarm Optimisation Enhanced with Non-dominated Solutions and Multiple Nondominated Leaders Based on WFG Test Functions

    Publication Year: 2014, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (595 KB) | HTML iconHTML

    Multi Objective Optimisation (MOO) problem involves simultaneous minimization or maximization of many objective functions. One of MOO algorithms is Vector Evaluated Particle Swarm Optimization (VEPSO) algorithm. In VEPSO, each objective function is optimised by a swarm of particles under guidance of the best solution, known as leader, from another swarm. Recently, an improved VEPSO algorithm, name... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relation between Foreign Institutional Investments and Macro-Economic Factors - A Case Study

    Publication Year: 2014, Page(s):39 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    The foreign institutional investments (FII's) have had a very significant impact on the domestic stock market and the real economy since their arrival in India in 1993. Therefore, it is necessary to understand the factors that boost FII's inflows into the country. This study makes an attempt to understand the dynamics of trading behavior of FII with Indian equity market. The present study examines... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk Assessment for Environmentally Sustainable Business Planning and Optimization Based on the Identification of Regional Meteorology Pattern

    Publication Year: 2014, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1397 KB) | HTML iconHTML

    Currently, more and more attention has been paid to the environmentally sustainability of the surrounding community by the whole society. However, during the manufacturing operation of industrial plants, there are inevitable pollutant emission dispersion into the atmosphere from the plume or flare combustion. The impact scope and seriousness level of the emission events to the surrounding communit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development and Performance Evaluation of Support Vector Machine Classifiers for Indian Domestic Tourists

    Publication Year: 2014, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Tourism industry outperformed the rest of the economy in recent years, growing faster than other industries such as manufacturing, financial services and retail. Tourism is gaining prominence in enhancing country's income, but, in India it is still largely unorganized. In this paper, an in-depth investigation of Indian tourists' hospitality preference has been done. Factor analysis was carried out... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Intelligence & Geo Tracking - A Novel Mining Technique to Identify Alerts and Pattern Analysis

    Publication Year: 2014, Page(s):53 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Web mining plays vital role in day-to-day applications to improve intelligence of web in the context of business must be able to identify useful business intelligence. To achieve our model in web engineering, we are using mining techniques for next generation business intelligence development. In this research our approach identifies the weblogs error reports using comprehensive algorithms, applie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safe Transmission of Text Files through a New Audio Steganography Technique

    Publication Year: 2014, Page(s):58 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Steganography is a concept of hiding information in order for data to remain safe and unhandled by eve droppers. In this paper we are demonstrating a way to transmit data from sender to receiver without being handled by eve through a new technique of steganography. We are using an audio file for hiding our data as audio are very less judged to changes made to them. Audio files in wav form are repr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart Homes (Conceptual Views)

    Publication Year: 2014, Page(s):63 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    Smart Homes (Intelligent Homes) are homes with technologically advanced systems to enable domestic task automation, easier communication and higher security. The applications that can be supported by a Smart Home are very wide and their degree of sophistication depends on the underlying technology used. Some of the application areas include automation, monitoring and control of appliances, securit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Reconstruction of Abandoned Websites

    Publication Year: 2014, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    Nowadays, the Internet offers data to anyone at any time. Websites on the Internet have been warehousing data for many years ago, i.e., for 10 years and more. In the meantime, many websites have became obsolete. This means they no longer have owner because of either they have no-one to maintain them or they have become unavailable for indexing by spiders that retrieves information about documents ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recommending Next Query in an OLAP Session

    Publication Year: 2014, Page(s):73 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    Invariably, users formulate a sequence of OLAP queries, referred to as a session, in order to arrive at the intended analysis of the data in a data warehouse. Formulating this sequence is considered a formidable task. OLAP query recommendation addresses the formulation of the next query in an ongoing session. In this paper, to recommend the next query to the user, we apply the collaborative filter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual Analysis of Evolutionary Optimization Algorithms

    Publication Year: 2014, Page(s):81 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (818 KB) | HTML iconHTML

    Growing application of evolutionary optimization algorithms in the problems of different domain have led to analyze their efficiency and effectiveness rigorously. Various approaches have been proposed to algorithms for performance evaluation such as parametric, non-parametric or mathematical which lack direct involvement of results obtained. A visual comparative performance evaluation method has b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.