Multi-Objective Genetic Algorithms
for Fuzzy Classification Rule Mining:
A Survey
-- Harihar Kalia, Satchidananda Dehuri and Ashish Ghosh
This paper examines the various multi-criteria approaches of fuzzy classification rule mining. An updated
state-of-the-art multi-objective genetic algorithm is given. Further, various genetic algorithm-based fuzzy classification rule mining
techniques are studied. In view of the intractability and involvement of multiple and very often conflicting criteria of fuzzy
classification rule mining problem, this paper offers a general framework.
© 2011 IUP. All Rights Reserved.
Location Intelligence Mashup
Using Open Source Software
and Google Maps API
-- K V N Rajesh
Business intelligence consists of tools and technologies to access and analyze enterprise information in a useful way
to make better business decisions. Web mapping services like Google
Maps provide the ability to generate and use maps
on the world wide web. Location intelligence consists of
integrating the business intelligence data with location
information using sources like aerial maps and geographical information systems. This paper describes a particular approach
to implement location intelligence mashup by integrating
business intelligence data with Google Maps by using
various open source software and Google Maps Application Program Interface
(API).
© 2011 IUP. All Rights Reserved.
Cybercrimes and the Nigerian Academic
Institution Networks
-- Shafi'i Muhammad Abdulhamid,
Chiroma Haruna
and Adamu Abubakar
All crimes performed or resorted to by abuse of computer network or Internet with the purpose of influencing
the functioning of the computer system and also for financial gains are referred to as cybercrime. This paper
examines different types of cybercrimes that are frequent in Nigeria and also checks the rate at which these crimes are carried
out by the use of academic institution networks as the access point. Data was obtained through questionnaires and
analyzed. Some of the findings show that the Yahoo Boys attack is very popular even in the academia and that students are the
most active participants in cybercrime in the Nigerian institution networks. It is also found that it is possible to create a
taxonomy of scams and scammers and develop tools, measures, campaigns and laws that will hurt their bottom line.
© 2011 IUP. All Rights Reserved.
Determinants of Basic IT Adoption
by Auto Ancillary SMEs in India
-- P Dharmalingam and G Kannabiran
Though Information Technology (IT) has offered many benefits to enterprises all over the world, its adoption
by Small and Medium-sized Enterprises (SMEs) in India remains relatively low. The auto ancillary industry is one of
the key growth drivers of the Indian economy and is rapidly becoming a hub for many of the global and Indian
auto majors. Although there is a wide spread use of IT in different areas of business since the 1960s, IT adoption in
Indian auto ancillary SMEs has lagged behind its global peers. The non-adoption of IT by auto ancillaries is a
major constraint for improving organizational performance and business productivity. This study aims to identify
the determinants of adoption of basic information technologies. A survey was carried out in 85 auto ancillaries
throughout India. The findings show that lack of financial capacity, lack of in-house IT manpower and small-scale operation
are the major determinants which cause the low rate of basic IT adoption among auto ancillary SMEs in India. At
the same time, perceived benefits, perceived competitive pressure and awareness of changes in business environment
are motivating the firms to adopt the basic information technologies. The paper is concluded with implications
for practitioners.
© 2011 IUP. All Rights Reserved.
|