By Topic

2013 International Symposium on Computational and Business Intelligence

24-26 Aug. 2013

Filter Results

Displaying Results 1 - 25 of 75
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1574 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (217 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (319 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2013, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (182 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2013, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (255 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committees

    Publication Year: 2013, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (248 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2013, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2013, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (247 KB)
    Freely Available from IEEE
  • Multipliers Using Low Power Adder Cells Using 180nm Technology

    Publication Year: 2013, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    Multiplier is the most commonly used circuit in the digital devices. Multiplication is one of the basic functions used in digital signal processing. Most high performance DSP systems rely on hardware multiplication to achieve high data throughput. There are various types of multipliers available depending upon the application in which they are used. Full adder is the main block of power dissipatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speaker Independent Speech Recognition Implementation with Adaptive Language Models

    Publication Year: 2013, Page(s):7 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Speech recognition system is the method of implementing protocols and codes to enable a machine to take sound waves in the form of input, interpret it and formulate the desired output. In this paper, a method has been proposed to build up a speech recognition system which could interpret in any language (tested with Hindi and Bengali language) and implement it on Windows 7 platform which could be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of File Transfer Using Message Transmission Optimization Mechanism (MTOM)

    Publication Year: 2013, Page(s):11 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    Different applications over the Internet uses Web Services to help them for better communication. Using encryption techniques, these applications can send any type of information to each other. W3C recommends MTOM (Message Transmission Optimization Mechanism) as the standard for transferring binary files as an attachment to SOAP messages. The basic feature of MTOM is that it does not break the XML... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Gesture Replicating Robotic Arm

    Publication Year: 2013, Page(s):15 - 19
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1059 KB) | HTML iconHTML

    The Gesture Replicating Robotic arm is a servo controlled robotic arm which replicates gestures in a three dimensional environment. It makes use of cameras which detect the motion of one's hand in three dimensions. The cameras provide frames as input to the software which performs segmentation algorithms like background subtraction, color detection and contour detection. Pixel to angle mapping giv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Ship Pilot System Based on E-Navigation

    Publication Year: 2013, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    The paper analysis the existing onboard ship system, shore-based system and the infrastructure of navigation and communication, and introduces the framework of e-Navigation system, based on which, the ship pilot system was developed. Multi-resolution remote-sensing image, geographical spatial data such as IHO-S57 international standards electronic chart, and AIS, 3G, real-time current observation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guaranteed Quality of Service in Cloud Ready Application

    Publication Year: 2013, Page(s):24 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Cloud computing is a grid based application which eases "On demand network access to a shared pool of computing recourses". This environment strives to be secure, scalable and customized with guaranteed Quality of Service (QoS). However, QoS is guaranteed through fulfillment of non-functional requirements like Security, Scalability, Mobility and Virtualization in Cloud computing System. In this pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ProcurePass: A User Authentication Protocol to Resist Password Stealing and Password Reuse Attack

    Publication Year: 2013, Page(s):31 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    The most popular form of user authentication is the text password, which is the most convenient and the simplest. Users mostly choose weak passwords and reuse the same password across different websites and thus, a domino effect. i.e., when an adversary compromises one password, she exploits, gaining access to more websites. Also typing passwords into public computers (kiosks) suffers password thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Intellectual Property as a Service (DIPaaS): For Mobile Cloud Users

    Publication Year: 2013, Page(s):35 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    With the integration of cloud computing, smart phones enormously improved in processing power, storage, communication efficiency, and reliability. The technical architecture of Cloud strongly supports the efficient delivery of services in mobile environment. Whereas the mobile cloud users can access all the resources as a service dynamically in elastic mode. Accessing Digital Intellectual Property... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparative Study of Classification Techniques for Intrusion Detection

    Publication Year: 2013, Page(s):40 - 43
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    Intrusion detection is one of the major research problems in network security. It is the process of monitoring and analyzing network traffic data to detect security violations. Mining approach can play very important role in developing an intrusion detection system. The network traffic can be classified into normal and anomalous in order to detect intrusions. In our paper, top-ten classification a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Performance of Intrusion Detection through Soft Computing Techniques

    Publication Year: 2013, Page(s):44 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    The worldwide rapid expansion of computer networks and ever growing dependence of organizations on network based information management have led to serious security concerns. Among other security threats network intrusion has been a major concern which requires considerable attention in order to protect the information resources that are accessible via network infrastructure. Though different intr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Blocks' Signature in Cloud Computing

    Publication Year: 2013, Page(s):49 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    Several trends are opening up the era of cloud computing. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This work studies the problem of ensuring the integrity of data storage in cloud computing. We use RSA's homomorphic property to construct the provable data integrity. In our prot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of Business Model for Online Tea Marketing for a Tea Factory in Arunachal Pradesh in North East India

    Publication Year: 2013, Page(s):59 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    E-Commerce has been a buzz word since many years with the increased usage of computers and communication technologies. The usage of these technologies have simplified the business functions and procedures and hence, increased the efficiency of business functions. E-commerce includes the core functions of business processes like buying, selling, ordering, services and information through internet. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comprehensive Review of Unstructured Data Management Approaches in Data Warehouse

    Publication Year: 2013, Page(s):64 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (129 KB) | HTML iconHTML

    The amount of business data is large & keeps on evolving leading to heterogeneous information base. The challenge is to access, analyze & integrate various data sources for making intelligent decisions. Business data can be structured or unstructured. Structured data attains the row-column format easily while unstructured data (USD) is the one that poses problem in such kind of tabular sto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Shadow of Eurozone Sovereign Debt Crisis Kept the Eastern Dragon's Property Away from Sunshine? Time Series Analysis on the Impact of Negative Externality in China's Property Market by EView 7 Software

    Publication Year: 2013, Page(s):68 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    This article examines the impact of European sovereign debt crisis on China's real estate market with the software EView. It begins with an analysis on the causes of the Euro zone crisis. A multivariate regression analysis is used to determine the effect of the European sovereign debt crisis on China's real estate market. By using the Thomson Reuters' database and other databases, investment and t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Business Intelligence: A Case on Payroll Management

    Publication Year: 2013, Page(s):73 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Business intelligence (BI) approaches have fallen short in delivering the expected value and return on investment. High costs, lengthy implementations and increasing complexity have led to frustration and disappointment for many enterprises. However, a new generation of BI tools is emerging. Data discovery tools promise to overcome many of the advantages of BI tools, delivering more flexibility, e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.