2018 2nd International Conference on Data Science and Business Analytics (ICDSBA)

21-23 Sept. 2018

Filter Results

Displaying Results 1 - 25 of 108
  • [Title page i]

    Publication Year: 2018, Page(s): 1
    Request permission for reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2018, Page(s): 3
    Request permission for reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2018, Page(s): 4
    Request permission for reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2018, Page(s):5 - 14
    Request permission for reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • ICDSBA 2018 Preface

    Publication Year: 2018, Page(s):15 - 16
    Request permission for reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • ICDSBA 2018 Program Committee

    Publication Year: 2018, Page(s):17 - 18
    Request permission for reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • ICDSBA 2018 Reviewers

    Publication Year: 2018, Page(s):19 - 20
    Request permission for reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Design of a Quadcopter UAV for Flood Area Data Analysis

    Publication Year: 2018, Page(s):3 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Unmanned Air Vehicles (UAV) are extensively used in military and civil applications. This paper proposes the design of Quad rotor, based on PID control with Type 2 Fuzzy Logic application. It can be used for collection data in the flood prone areas. A camera is connected with the Quad copter. The feedback obtained from the model will be updated in the main database when the model is subjected to a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moving Object Detection Using Background Subtraction in Wavelet Domain

    Publication Year: 2018, Page(s):8 - 12
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Detecting and tracking of any suspicious moving objects is of the prior importance in video surveillance. In this paper, the background subtraction method has been employed in the wavelet transform domain. By masking the approximate wavelet coefficient to zero, the detailed coefficients provide the necessary information about the moving objects only, thereby reduces the probability of misdetection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Net Asset Value Prediction Using Extreme Learning Machine with Dolphin Swarm Algorithm

    Publication Year: 2018, Page(s):13 - 18
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (406 KB) | HTML iconHTML

    Net Asset Value prediction of different mutual funds is highly essential for different investors. But prediction of such financial time series data is very difficult task as NAV data are nonlinear in nature. Various researchers have used feed forward neural network models involving gradient descent learning in NAV prediction. But these models have certain limitations of local optima and slow conve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selection of Cost-Effective Prime Source towards Possible Uses in Fog Computing

    Publication Year: 2018, Page(s):19 - 24
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    This work reports a systematic investigation towards the probable selection of cost-effective prime source to facilitate enhanced Quality of Services (QoS) in Fog Computing. Among several ones, Elementary Cellular Automata (ECA) based prime generation was found suitable towards its possible consideration in real life application modeling. Detailed investigation explores the advantages of ECA based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Review on Rule-Based and Hybrid Stemming Techniques

    Publication Year: 2018, Page(s):25 - 29
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Reducing a word to its original form called stemming is extremely important in the field of natural language processing, especially to develop morphological analyzer and information retrieval systems. Use of stemming has decreased the dimension of indexing. Stemming algorithms are developed during last few decades to automate the process requires different approaches as it is mostly language speci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Isolated Odia Digit Recognition Using HTK: An Implementation View

    Publication Year: 2018, Page(s):30 - 35
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    This paper outlines the frame work for an isolated Odia digit recognition. The HTK toolkit which consider the Hidden Markov Model (HMM), as the base for developing the system. The recording environment is simple and created using the HTK tool. Initially the system is trained for 900 signals of 10 Odia digits spoken by 10 different speakers. The work done on this paper also signifies the role of HT... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WTM: An Interlinking Medium for Student Teacher Connectivity

    Publication Year: 2018, Page(s):36 - 39
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    In today's scenario Recommender systems have become increasingly popular in recent years, and are utilized in a variety of areas including movies, music, news, books, research articles, search queries, social tags, and products in general. Mostly used in the digital domain, majority of today's E-Commerce sites like eBay, Amazon, Alibaba etc. make use of their proprietary recommendation algorithms ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware Implementation of Parallel FIR Filter Using Modified Distributed Arithmetic

    Publication Year: 2018, Page(s):40 - 44
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    We proposed a area efficient architecture implementation of finite impulse response (FIR) Filter using Distributed Arithmetic. Area complexity in the fir filter is mainly increased for the multipliers. To overcome this drawback the multiplier less techniques distributed arithmetic is most preferred area efficient technique to implement FIR filter. In this technique, partial products of filter coef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CFSES Optimization Feature Selection with Neural Network Classification for Microarray Data Analysis

    Publication Year: 2018, Page(s):45 - 50
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (119 KB) | HTML iconHTML

    The DNA microarray data are enabling to measure the countenance levels of genes simultaneously, so long as an excessive for tuitous for cancer prediction. The number of features or genes is often more than thousands but in another side, the number of instances or subjects is less than hundreds. For that, it is required and vital to perform gene selection for classification. Feature selection moder... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TOPSIS in Multi-Criteria Decision Making: A Survey

    Publication Year: 2018, Page(s):51 - 54
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    This paper presents a systematic review of an outranked multi-criteria decision making (MCDM) method and its application for solving many complex real life issues. The method Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is discussed along with its strengths, weakness and area of application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Simulation of AlGaAs/InGaAs/GaAs Based Pseudomorphic HEMT Using SILVACO ATLASTM

    Publication Year: 2018, Page(s):55 - 58
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    The High Electron Mobility Transistor (HEMT) is a field effect transistor which is used to give very high performance at microwave and radio frequencies, exhibiting a low noise figure. The HEMT works on the principle of formation of Two Dimensional Electron Gas (2DEG) where there are very less electron collisions. In this work we have designed and observed the characteristics of a Pseudomorphic HE... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of Flexible Workflow in Scientific Research Management System

    Publication Year: 2018, Page(s):61 - 64
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    In scientific research management projects, if the process model changes, without a workflow technology, the codes need to be modified and the workload of modification will increase significantly. After introducing a flexible workflow technology, what can be done is to directly define the new process model. This paper mainly introduces ECA rules on the basis of workflow meta-model to design a flex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Algorithm for Semantic Similarity Based on HowNet

    Publication Year: 2018, Page(s):65 - 70
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    This thesis puts forward an improved algorithm for semantic similarity based on HowNet. This method is built on the sememe tree, and continues to use the thought of calculation of semantic similarity based on the semantic distance, and has made two improvements in this idea. Firstly, the influence of the children's node density under the common parent node on semantic similarity is increased, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Defect Prediction Using Propositionalization Based Data Preprocessing: An Empirical Study

    Publication Year: 2018, Page(s):71 - 77
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    Data preprocessing can be used to improve classifier performance in classification problems. Software defect prediction is also one of classification problems, so it is needed to use data preprocessing for improving the performance of model. In this paper, we study about the software defect prediction using propositonalization based data preprocessing method. We proposed propositionalization using... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determining the Best Clustering Number of K-Means Based on Bootstrap Sampling

    Publication Year: 2018, Page(s):78 - 83
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    In this paper, the selection of clustering number in K-means clustering algorithm is studied, based on the Bootstrap sampling, a new method is proposed to determine the best clustering number based on the between the actual value of total within-cluster sum of squares and its estimated interval. By UCI Machine Learning Repository and randomly generated artificial simulated test data sets, the expe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Entity Semantic Relation Extraction in Fusion Domain

    Publication Year: 2018, Page(s):84 - 91
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (875 KB) | HTML iconHTML

    Entity relationship extraction is one of the important research topics in the field of information extraction, this paper proposes an improved method for extracting entity semantic relations based on tree kernel function, by adding domain knowledge syntax tree and entity semantic information to improve the performance of relation extraction. This method needs to build a domain knowledge tree that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A VM Memory Demand Prediction Algorithm Based on the RBF-Markov

    Publication Year: 2018, Page(s):92 - 97
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    The utilization of virtual memory is always undefined due to the lasting changes of the service requests and the running programs, so the utilization of the multiple VMs memory particularly complicated. In the existing virtual systems, many resource allocation plans of the VM memory lack an efficient and flexible dynamic adjustment mechanism, which is the main reason of the disharmony state of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Discovery of Micro-Blog Users' Interest Groups Based on SSLOK-Means Clustering Focus on Big Data Improved by Calinski-Harabasz

    Publication Year: 2018, Page(s):98 - 104
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    As a data mining algorithm, the clustering has been widely used in the discovery of micro-blog users' interest groups and provides a new idea to mine users' information for the micro-blog operators. The SSLOK-means algorithm newly proposed can solve the drawback of K-means algorithm when clustering the big data. However, the number of clusters still needs to be set manually in advance, which bring... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.