首页 > 最新文献

2014 2nd International Conference on Business and Information Management (ICBIM)最新文献

英文 中文
Analysis of one dimentional 5N Cellular Automata 一维5N元胞自动机分析
Pub Date : 2014-12-04 DOI: 10.1109/ICBIM.2014.6970953
V. Saharia, R. Ghosh, J. Alam, Ajay Kumar, Manish Deo
Cellular Automata (CA) is a decentralized computing tool which attracts the researchers from different domains. It comprises of various dimensions and particularly having diverse behavior according to the structure considered. Our main goal regarding this study is to analyze the structure and behavior of one dimensional five neighborhood Cellular Automata keeping in mind the aspects and properties of one dimensional three neighborhood Cellular Automata. We here put our effort to brief the study on cellular automata which might help the researchers from this diverse field.
元胞自动机(CA)是一种分散的计算工具,吸引了不同领域的研究者。它由不同的维度组成,特别是根据所考虑的结构具有不同的行为。本研究的主要目的是分析一维五邻元胞自动机的结构和行为,同时考虑一维三邻元胞自动机的特点和性质。在此,我们将对元胞自动机的研究进行简要介绍,以期对这个多元化领域的研究人员有所帮助。
{"title":"Analysis of one dimentional 5N Cellular Automata","authors":"V. Saharia, R. Ghosh, J. Alam, Ajay Kumar, Manish Deo","doi":"10.1109/ICBIM.2014.6970953","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970953","url":null,"abstract":"Cellular Automata (CA) is a decentralized computing tool which attracts the researchers from different domains. It comprises of various dimensions and particularly having diverse behavior according to the structure considered. Our main goal regarding this study is to analyze the structure and behavior of one dimensional five neighborhood Cellular Automata keeping in mind the aspects and properties of one dimensional three neighborhood Cellular Automata. We here put our effort to brief the study on cellular automata which might help the researchers from this diverse field.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"12 6","pages":"126-131"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91482873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges of establishing a collaborative learning environment using MANET 使用MANET建立协作学习环境的挑战
Pub Date : 2014-12-04 DOI: 10.1109/ICBIM.2014.6970922
Srabasti Mukherjee, Saurabh Pal, Prasenjit Choudhury, S. Nandi
The increased popularity of the smart devices among student community has increased the teacher learner communication and taken learning beyond classroom now. The Mobile based Learning (m-learning) gives learner the flexibility of learning and enables a collaborative learning environment. Involvement, cooperation, team work are the crucial benefits that a student can obtain from the collaborative learning environment. Because of the dynamic nature of m-learning environment, a dynamic self created network or Mobile Ad hoc Network (MANET) would be best suited to establish the collaborative learning environment. Use of MANET in itself raises various issues. For the educational collaboration mobile nodes may frequently exchange data, text, images, transmit audio, video streaming packets to one another or even exchange information from databases thereby causing heavy network traffic. Another important issue to be considered are the malicious attacks-the mobile learning collaborative environment may have to face in absence of centralized authorities and granting access to both legitimate users and attackers. This unconditional trust may not only cause attack on single node, but also on numerous others. Keeping the reputation of participating nodes and to mitigate the attacks against them in the collaborative learning environment has become a challenging issue. This paper will try to jot down these challenges of establishing a Collaborative Learning Environment using the MANET.
智能设备在学生群体中的日益普及,增加了师生之间的交流,使学习超越了课堂。基于移动的学习(m-learning)为学习者提供了学习的灵活性,并实现了协作学习环境。参与、合作、团队合作是学生可以从协作学习环境中获得的重要好处。由于移动学习环境的动态性,动态自创建网络或移动自组织网络(MANET)将最适合建立协作学习环境。MANET的使用本身就引发了各种问题。对于教育协作,移动节点可能频繁地交换数据、文本、图像,彼此之间传输音频、视频流数据包,甚至从数据库交换信息,从而造成沉重的网络流量。另一个需要考虑的重要问题是恶意攻击——移动学习协作环境可能不得不面对缺乏集中权威和向合法用户和攻击者同时授予访问权限的情况。这种无条件信任不仅可能导致对单个节点的攻击,还可能导致对许多其他节点的攻击。在协作学习环境中,保持参与节点的声誉并减轻对它们的攻击已成为一个具有挑战性的问题。本文将尝试记录使用MANET建立协作学习环境的这些挑战。
{"title":"Challenges of establishing a collaborative learning environment using MANET","authors":"Srabasti Mukherjee, Saurabh Pal, Prasenjit Choudhury, S. Nandi","doi":"10.1109/ICBIM.2014.6970922","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970922","url":null,"abstract":"The increased popularity of the smart devices among student community has increased the teacher learner communication and taken learning beyond classroom now. The Mobile based Learning (m-learning) gives learner the flexibility of learning and enables a collaborative learning environment. Involvement, cooperation, team work are the crucial benefits that a student can obtain from the collaborative learning environment. Because of the dynamic nature of m-learning environment, a dynamic self created network or Mobile Ad hoc Network (MANET) would be best suited to establish the collaborative learning environment. Use of MANET in itself raises various issues. For the educational collaboration mobile nodes may frequently exchange data, text, images, transmit audio, video streaming packets to one another or even exchange information from databases thereby causing heavy network traffic. Another important issue to be considered are the malicious attacks-the mobile learning collaborative environment may have to face in absence of centralized authorities and granting access to both legitimate users and attackers. This unconditional trust may not only cause attack on single node, but also on numerous others. Keeping the reputation of participating nodes and to mitigate the attacks against them in the collaborative learning environment has become a challenging issue. This paper will try to jot down these challenges of establishing a Collaborative Learning Environment using the MANET.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"52 5 1","pages":"23-26"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87702204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of a smart job allocation model for a Cloud Service Provider 为云服务提供商开发智能作业分配模型
Pub Date : 2014-12-04 DOI: 10.1109/ICBIM.2014.6970946
Sourav Banerjee, Mainak Adhikari, U. Biswas
Cloud Computing is known as a provider of dynamic services. It utilizes a very large, scalable and virtualized resource over the Internet. So many industries have joined this bandwagon nowadays. One of the major research issues is to maintain good Quality of Service (QoS) of a Cloud Service Provider (CSP). The QoS encompasses different parameters, like, smart job allocation strategy, efficient load balancing, response time optimization, reduction in wastage of bandwidth, accountability of the overall system, etc. The efficient allocation strategy of the independent computational jobs among different Virtual Machines (VM) in a Datacenter (DC) is a distinguishable challenge in the Cloud Computing domain and finding out an optimal job allocation strategy guided by a good scheduling heuristic for such an environment is an NP-complete problem. So different heuristic approaches may be used for better result. The related works with other NP- complete problems have shown that solutions guided by heuristic approaches can often be improved by applying local scheduling procedure for allocating independent jobs in the virtual machines (VM) inside a Datacenter (DC), which, when combined with fast construction heuristics, can find out the shorter schedules on benchmark problems than the other solution methodologies found in different literatures, and in significant less time. This paper highlights a smart job allocation strategy for a CSP by applying Round-Robin (RR) scheduling policy.
云计算被称为动态服务的提供者。它利用Internet上一个非常大的、可伸缩的虚拟化资源。如今,许多行业都加入了这一潮流。如何保持云服务提供商(CSP)的良好服务质量(QoS)是云服务提供商(CSP)的主要研究问题之一。QoS包含不同的参数,如智能作业分配策略、高效负载平衡、响应时间优化、减少带宽浪费、整个系统的问责制等。在数据中心(DC)中,独立计算任务在不同虚拟机(VM)之间的有效分配策略是云计算领域的一个重要挑战,在这种环境下,寻找一个由良好的调度启发式指导的最优任务分配策略是一个np完全问题。因此,不同的启发式方法可能会得到更好的结果。与其他NP完全问题的相关研究表明,采用启发式方法指导的解决方案通常可以通过在数据中心(DC)内的虚拟机(VM)中分配独立作业来改进,当与快速构造启发式方法相结合时,可以找到比其他文献中发现的其他解决方法更短的基准问题的时间表,并且时间显著缩短。提出了一种基于轮询调度策略的CSP智能作业分配策略。
{"title":"Development of a smart job allocation model for a Cloud Service Provider","authors":"Sourav Banerjee, Mainak Adhikari, U. Biswas","doi":"10.1109/ICBIM.2014.6970946","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970946","url":null,"abstract":"Cloud Computing is known as a provider of dynamic services. It utilizes a very large, scalable and virtualized resource over the Internet. So many industries have joined this bandwagon nowadays. One of the major research issues is to maintain good Quality of Service (QoS) of a Cloud Service Provider (CSP). The QoS encompasses different parameters, like, smart job allocation strategy, efficient load balancing, response time optimization, reduction in wastage of bandwidth, accountability of the overall system, etc. The efficient allocation strategy of the independent computational jobs among different Virtual Machines (VM) in a Datacenter (DC) is a distinguishable challenge in the Cloud Computing domain and finding out an optimal job allocation strategy guided by a good scheduling heuristic for such an environment is an NP-complete problem. So different heuristic approaches may be used for better result. The related works with other NP- complete problems have shown that solutions guided by heuristic approaches can often be improved by applying local scheduling procedure for allocating independent jobs in the virtual machines (VM) inside a Datacenter (DC), which, when combined with fast construction heuristics, can find out the shorter schedules on benchmark problems than the other solution methodologies found in different literatures, and in significant less time. This paper highlights a smart job allocation strategy for a CSP by applying Round-Robin (RR) scheduling policy.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"85 1","pages":"114-119"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83912170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An outlier detection method based on cluster pruning 一种基于聚类修剪的离群点检测方法
Pub Date : 2014-01-01 DOI: 10.1109/ICBIM.2014.6970955
R. Pamula, J. Deka, Sukumar Nandi
Outlier detection has a wide range of applications. In this paper we present a new method for detecting outliers, focused on reducing the number of computations. Our method operates on two phases and uses one pruning strategy. Objective is to remove the points which are considered to be inliers. In the first phase a clustering algorithm is applied to partition the data into clusters and make an estimate to prune the clusters, in the second phase we apply a outlier score function to dictate the outliers. The experimental results using real datasets demonstrate the superiority of our method over existing outlier detection method.
异常值检测具有广泛的应用。在本文中,我们提出了一种新的检测异常值的方法,重点是减少计算量。我们的方法操作在两个阶段,并使用一个修剪策略。目的是去除被认为是内线的点。在第一阶段,应用聚类算法将数据划分为簇并进行估计以修剪簇,在第二阶段,我们应用离群值分数函数来指示离群值。实际数据集的实验结果表明,该方法优于现有的离群点检测方法。
{"title":"An outlier detection method based on cluster pruning","authors":"R. Pamula, J. Deka, Sukumar Nandi","doi":"10.1109/ICBIM.2014.6970955","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970955","url":null,"abstract":"Outlier detection has a wide range of applications. In this paper we present a new method for detecting outliers, focused on reducing the number of computations. Our method operates on two phases and uses one pruning strategy. Objective is to remove the points which are considered to be inliers. In the first phase a clustering algorithm is applied to partition the data into clusters and make an estimate to prune the clusters, in the second phase we apply a outlier score function to dictate the outliers. The experimental results using real datasets demonstrate the superiority of our method over existing outlier detection method.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"1 1","pages":"138-141"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75986387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Behavioral factors and their influence on property investment decisions: a study of investors' perspective 行为因素及其对房地产投资决策的影响:投资者视角的研究
Pub Date : 2014-01-01 DOI: 10.1109/ICBIM.2014.6970952
S. Rath, Mousumi Singha Mahapatra, Anupam De
The classical economic theory propounds that human beings are completely rational decision makers who carefully evaluate all facts and evidences before taking decisions that aim at maximizing outcomes. However it has been found that in real life people are not totally rational, rather they are influenced by various behavioral factors while making decisions. This has led to the emergence of the Behavioral Finance that studies the influence of psychology on financial decisions. The losses or suboptimal outcomes resulting from the irrational decision making of individuals serve as a learning tool for market participants. But, many of the unexplainable behaviour, classified as market anomalies remains questionable. The traditional finance theories have not been quite helpful to answer many questions. Behavioral finance and neuro finance are quite successful in answering many of these questions. Research is being conducted at a staggering pace in the area of neurofinance and behavioral finance.
古典经济学理论提出,人类是完全理性的决策者,在做出以结果最大化为目标的决策之前,会仔细评估所有事实和证据。然而,人们发现,在现实生活中,人们并不是完全理性的,而是在做决定时受到各种行为因素的影响。这导致了研究心理对财务决策影响的行为金融学的出现。个人非理性决策导致的损失或次优结果,是市场参与者学习的工具。但是,许多被归类为市场异常的无法解释的行为仍然值得怀疑。传统的金融理论对于回答许多问题并没有太大的帮助。行为金融学和神经金融学在回答这些问题上非常成功。神经金融学和行为金融学领域的研究正在以惊人的速度进行。
{"title":"Behavioral factors and their influence on property investment decisions: a study of investors' perspective","authors":"S. Rath, Mousumi Singha Mahapatra, Anupam De","doi":"10.1109/ICBIM.2014.6970952","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970952","url":null,"abstract":"The classical economic theory propounds that human beings are completely rational decision makers who carefully evaluate all facts and evidences before taking decisions that aim at maximizing outcomes. However it has been found that in real life people are not totally rational, rather they are influenced by various behavioral factors while making decisions. This has led to the emergence of the Behavioral Finance that studies the influence of psychology on financial decisions. The losses or suboptimal outcomes resulting from the irrational decision making of individuals serve as a learning tool for market participants. But, many of the unexplainable behaviour, classified as market anomalies remains questionable. The traditional finance theories have not been quite helpful to answer many questions. Behavioral finance and neuro finance are quite successful in answering many of these questions. Research is being conducted at a staggering pace in the area of neurofinance and behavioral finance.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"19 1","pages":"64-68"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90394032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient realization of digital logic circuit using QCA multiplexer 利用QCA复用器高效实现数字逻辑电路
Pub Date : 2014-01-01 DOI: 10.1109/ICBIM.2014.6970972
Mrinal Goswami, B. Kumar, Harsh Tibrewal, S. Mazumdar
Quantum-dot cellular Automata (QCA), a viable alternative to current CMOS, is gaining its prominence in digital circuit due to its very high device density and clocking speed. This work targets design of efficient logic circuits based on QCA multiplexer. The design capability of the multiplexer in QCA is investigated implementing XOR, XNOR logic gate and arithmetic logic unit. Further, efficient sequential circuits like D latch, T latch, D flip-flop, Scan flip-flop, shift registers are designed using QCA multiplexer. Results obtained supports the fact that the proposed designs achieve significant improvement in terms of device density, cell count as well as clock delay than that of the other previous designs.
量子点元胞自动机(quantum dot cellular Automata, QCA)是目前CMOS的可行替代品,由于其极高的器件密度和时钟速度,在数字电路中越来越受到重视。本文的目标是设计基于QCA复用器的高效逻辑电路。采用异或、异或逻辑门和算术逻辑单元,研究了QCA中多路复用器的设计能力。此外,利用QCA多路复用器设计了D锁存器、T锁存器、D触发器、扫描触发器、移位寄存器等高效顺序电路。所获得的结果支持这样一个事实,即所提出的设计在器件密度、细胞计数以及时钟延迟方面比其他先前的设计有了显着的改进。
{"title":"Efficient realization of digital logic circuit using QCA multiplexer","authors":"Mrinal Goswami, B. Kumar, Harsh Tibrewal, S. Mazumdar","doi":"10.1109/ICBIM.2014.6970972","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970972","url":null,"abstract":"Quantum-dot cellular Automata (QCA), a viable alternative to current CMOS, is gaining its prominence in digital circuit due to its very high device density and clocking speed. This work targets design of efficient logic circuits based on QCA multiplexer. The design capability of the multiplexer in QCA is investigated implementing XOR, XNOR logic gate and arithmetic logic unit. Further, efficient sequential circuits like D latch, T latch, D flip-flop, Scan flip-flop, shift registers are designed using QCA multiplexer. Results obtained supports the fact that the proposed designs achieve significant improvement in terms of device density, cell count as well as clock delay than that of the other previous designs.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"37 1","pages":"165-170"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80923485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Implementing encryption with Enhanced Mobility Aware Routing Protocol for Bluetooth network 基于增强移动感知路由协议的蓝牙网络加密实现
Pub Date : 2014-01-01 DOI: 10.1109/ICBIM.2014.6970974
D. Pradhan, S. Nandi, Prasenjit Choudhury
Enhanced Mobility Aware Routing Protocol (EMOLAR) deals with data loss in Ad-hoc networks ignoring Bluetooth Security mechanism; which is Passkey or PIN, as using PIN in the process of Scatternet formation or reconstruction is highly impracticable. However, sometimes we feel the necessity to send secure data even in insecure networks. So, our algorithm will be useful in such situations. Bluetooth uses PIN authentication and Scatternet is a form of MANET, so end to end Encrypted data transmission can be a practical solution. EMOLAR sustains data loss in a Scatternet considering the mobility of devices, ignoring security. Herein, we are trying to implement Elliptic Curve Cryptography along with EMOLAR to overcome the security issues in Bluetooth Scatternet. Public Key Cryptography algorithms as RSA and ECC are most acceptable for their performance and efficiency; however Bluetooth is basically a low-power, low-memory device, so ECC will be more suitable for such devices.
增强移动感知路由协议(EMOLAR)解决了忽略蓝牙安全机制的Ad-hoc网络中的数据丢失问题;即Passkey或PIN,因为在散射网形成或重建过程中使用PIN是极不可行的。然而,有时我们觉得即使在不安全的网络中也有必要发送安全的数据。所以,我们的算法在这种情况下会很有用。蓝牙采用PIN码认证,而散点网是无线网络的一种形式,因此端到端加密数据传输可以成为一种实用的解决方案。EMOLAR只考虑设备的移动性,忽略了安全性,让数据在散射网中丢失。在此,我们尝试将椭圆曲线加密与EMOLAR一起实现,以克服蓝牙散射网中的安全问题。RSA和ECC等公钥加密算法在性能和效率方面是最容易被接受的;然而,蓝牙基本上是一个低功耗,低内存的设备,所以ECC将更适合这样的设备。
{"title":"Implementing encryption with Enhanced Mobility Aware Routing Protocol for Bluetooth network","authors":"D. Pradhan, S. Nandi, Prasenjit Choudhury","doi":"10.1109/ICBIM.2014.6970974","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970974","url":null,"abstract":"Enhanced Mobility Aware Routing Protocol (EMOLAR) deals with data loss in Ad-hoc networks ignoring Bluetooth Security mechanism; which is Passkey or PIN, as using PIN in the process of Scatternet formation or reconstruction is highly impracticable. However, sometimes we feel the necessity to send secure data even in insecure networks. So, our algorithm will be useful in such situations. Bluetooth uses PIN authentication and Scatternet is a form of MANET, so end to end Encrypted data transmission can be a practical solution. EMOLAR sustains data loss in a Scatternet considering the mobility of devices, ignoring security. Herein, we are trying to implement Elliptic Curve Cryptography along with EMOLAR to overcome the security issues in Bluetooth Scatternet. Public Key Cryptography algorithms as RSA and ECC are most acceptable for their performance and efficiency; however Bluetooth is basically a low-power, low-memory device, so ECC will be more suitable for such devices.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"53 1","pages":"171-175"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88450814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a page segmentation technique for Bangla documents printed in italic style 斜体孟加拉文文档页面分割技术的开发
Pub Date : 2014-01-01 DOI: 10.1109/ICBIM.2014.6970950
P. Singh, Sajal Mahanta, Samir Malakar, R. Sarkar, M. Nasipuri
Optical Character Recognition (OCR) is one of the most imperative prerequisites of electronic document analysis systems. Segmentation is the preliminary step of OCR, which has long been an active area of research. In this paper, we present a hierarchical system towards the segmentation of Bangla script document printed in two different styles viz., italic and bold italic with varying fonts and sizes. At first, the text lines are segmented from the document pages. Next, the words are segmented from the extracted text lines. Finally, the characters are segmented from the extracted word images by using a Trapezoidal Fuzzy membership function, which has been used for the detection of Matra region. The proposed technique is tested on 16 document pages consisting of 1456 words. The average success rates of the technique for text line, word and character segmentation are found to be 99.91%, 98.63% and 89.41% respectively.
光学字符识别(OCR)是电子文档分析系统必不可少的先决条件之一。分割是OCR的第一步,一直是研究的热点。在本文中,我们针对不同字体和大小的斜体和粗体两种不同风格的孟加拉文字文档,提出了一种分层分割系统。首先,文本行从文档页面中分割出来。接下来,从提取的文本行中分割单词。最后,利用梯形模糊隶属函数对提取的词图像进行字符分割,并将其用于Matra区域的检测。该技术在包含1456个单词的16页文档上进行了测试。该方法对文本行、词和字符的平均分割成功率分别为99.91%、98.63%和89.41%。
{"title":"Development of a page segmentation technique for Bangla documents printed in italic style","authors":"P. Singh, Sajal Mahanta, Samir Malakar, R. Sarkar, M. Nasipuri","doi":"10.1109/ICBIM.2014.6970950","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970950","url":null,"abstract":"Optical Character Recognition (OCR) is one of the most imperative prerequisites of electronic document analysis systems. Segmentation is the preliminary step of OCR, which has long been an active area of research. In this paper, we present a hierarchical system towards the segmentation of Bangla script document printed in two different styles viz., italic and bold italic with varying fonts and sizes. At first, the text lines are segmented from the document pages. Next, the words are segmented from the extracted text lines. Finally, the characters are segmented from the extracted word images by using a Trapezoidal Fuzzy membership function, which has been used for the detection of Matra region. The proposed technique is tested on 16 document pages consisting of 1456 words. The average success rates of the technique for text line, word and character segmentation are found to be 99.91%, 98.63% and 89.41% respectively.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"43 1","pages":"120-125"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79956734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Designing process maturity measure of Total Information Quality Management (TIQM) 全面信息质量管理(TIQM)过程成熟度度量的设计
Pub Date : 2014-01-01 DOI: 10.1109/ICBIM.2014.6970948
I. Gunawan, Suhardi
Information plays an important role in decision making process. Poor information quality will have an impact on various organization aspects. Information quality problems can only be solved by implementation an effective and efficient information quality management, so that the information production process can be controlled. Total Information Quality Management (TIQM) is a method for building an effective information quality management with continuous improvement through an increase in whole process. TIQM not have a standard measure in determining the process maturity level. This situation causes TIQM process maturity level can not be determined with certainty. That requires an indicator and standard measure in determining maturity level in TIQM process. TIQM process maturity measure designed by adopting concept the Capability Maturity Model (CMM).
信息在决策过程中起着重要的作用。信息质量差将对组织的各个方面产生影响。只有实施有效、高效的信息质量管理,才能解决信息质量问题,使信息生产过程得到控制。全面信息质量管理(TIQM)是一种通过全过程的增加来建立有效的信息质量管理体系并持续改进的方法。TIQM没有确定过程成熟度级别的标准度量。这种情况导致TIQM过程成熟度等级不能确定。这就需要一个指标和标准度量来确定TIQM过程的成熟度水平。TIQM过程成熟度度量采用能力成熟度模型(CMM)的概念设计。
{"title":"Designing process maturity measure of Total Information Quality Management (TIQM)","authors":"I. Gunawan, Suhardi","doi":"10.1109/ICBIM.2014.6970948","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970948","url":null,"abstract":"Information plays an important role in decision making process. Poor information quality will have an impact on various organization aspects. Information quality problems can only be solved by implementation an effective and efficient information quality management, so that the information production process can be controlled. Total Information Quality Management (TIQM) is a method for building an effective information quality management with continuous improvement through an increase in whole process. TIQM not have a standard measure in determining the process maturity level. This situation causes TIQM process maturity level can not be determined with certainty. That requires an indicator and standard measure in determining maturity level in TIQM process. TIQM process maturity measure designed by adopting concept the Capability Maturity Model (CMM).","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"69 1","pages":"47-52"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80623401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficiency ranking of Indian Oil Companies (DMUs) using DEA techniques 使用DEA技术对印度石油公司(DMUs)进行效率排名
Pub Date : 2014-01-01 DOI: 10.1109/ICBIM.2014.6970969
Banhi Guha, Gautam Bandyopadhyay, Arun Upadhyay
This study offers an application of a non-parametric and quantitative technique (Data envelopment analysis, DEA) in ranking the stock performance of the Indian companies using statistical parameters based on the monthly closing price of Sensex during 2005-2012. The stock performance of any industry plays a very vital role for their survival in such a competitive environment and to attract the investors, financial analysts and the researchers too. In this study DEA has been applied to rank the stock performances of the Indian companies which are taken as DMUs enlisted with BSE and NSE. In the first phase of this paper Mean, SD on the monthly closing price of the Sensex are determined and considered as Input. The second phase of this research paper concentrated on the output selections which are based on the Mean/SD concept. The third phase highlights the productivity of each DMU through the application of input oriented DEA technique and shows identical scores of the DMUs then we observed super efficiency analysis and ranked the DMUs accordingly.
本研究采用非参数和定量技术(数据包络分析,DEA),基于Sensex指数2005-2012年的月度收盘价,使用统计参数对印度公司的股票表现进行排名。在这样一个竞争激烈的环境中,任何行业的股票表现都对其生存和吸引投资者、金融分析师和研究人员起着至关重要的作用。在本研究中,采用DEA对印度公司的股票表现进行了排名,这些公司被视为具有BSE和NSE的DMUs。在本文的第一阶段,确定了Sensex指数月度收盘价的均值和标准差,并将其作为输入。本研究论文的第二阶段集中在基于Mean/SD概念的输出选择上。第三阶段通过应用面向输入的DEA技术来突出每个DMU的生产力,并显示DMU的相同分数,然后我们观察到超效率分析并相应地对DMU进行排名。
{"title":"Efficiency ranking of Indian Oil Companies (DMUs) using DEA techniques","authors":"Banhi Guha, Gautam Bandyopadhyay, Arun Upadhyay","doi":"10.1109/ICBIM.2014.6970969","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970969","url":null,"abstract":"This study offers an application of a non-parametric and quantitative technique (Data envelopment analysis, DEA) in ranking the stock performance of the Indian companies using statistical parameters based on the monthly closing price of Sensex during 2005-2012. The stock performance of any industry plays a very vital role for their survival in such a competitive environment and to attract the investors, financial analysts and the researchers too. In this study DEA has been applied to rank the stock performances of the Indian companies which are taken as DMUs enlisted with BSE and NSE. In the first phase of this paper Mean, SD on the monthly closing price of the Sensex are determined and considered as Input. The second phase of this research paper concentrated on the output selections which are based on the Mean/SD concept. The third phase highlights the productivity of each DMU through the application of input oriented DEA technique and shows identical scores of the DMUs then we observed super efficiency analysis and ranked the DMUs accordingly.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"118 1","pages":"113-118"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88075463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 2nd International Conference on Business and Information Management (ICBIM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1