Advances in Computer and Computational Sciences -

Advances in Computer and Computational Sciences (eBook)

Proceedings of ICCCCS 2016, Volume 2
eBook Download: PDF
2017 | 1st ed. 2018
XXIV, 713 Seiten
Springer Singapore (Verlag)
978-981-10-3773-3 (ISBN)
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Exchange of information and innovative ideas are necessary to accelerate the development of technology. With advent of technology, intelligent and soft computing techniques came into existence with a wide scope of implementation in engineering sciences. Keeping this ideology in preference, this book includes the insights that reflect the 'Advances in Computer and Computational Sciences' from upcoming researchers and leading academicians across the globe. It contains high-quality peer-reviewed papers of 'International Conference on Computer, Communication and Computational Sciences (ICCCCS 2016), held during 12-13 August, 2016 in Ajmer, India'. These papers are arranged in the form of chapters. The content of the book is divided into two volumes that cover variety of topics such as intelligent hardware and software design, advanced communications, power and energy optimization, intelligent techniques used in internet of things, intelligent image processing, advanced software engineering, evolutionary and soft computing, security and many more. This book helps the perspective readers' from computer industry and academia to derive the advances of next generation computer and communication technology and shape them into real life applications.



Dr. Sanjiv K. Bhatia received his Ph.D. in Computer Science from the University of Nebraska, Lincoln in 1991. He presently works as Professor and Graduate Director (Computer Science) in the University of Missouri, St. Louis. His primary areas of research include image databases, digital image processing, and computer vision. He has published over 40 articles in those areas. He has also consulted extensively with industry for commercial and military applications of computer vision. He is an expert in system programming and has worked on real-time and embedded applications. He serves on the organizing committee of a number of conferences and on the editorial board of international journals. He has taught a broad range of courses in computer science and was the recipient of Chancellor's Award for Excellence in Teaching in 2015. He is a senior member of ACM.

Dr. Krishn K. Mishra is currently works as a Visiting Faculty, Department of Mathematics & Computer Science, University of Missouri, St. Louis, USA. He is an alumnus of Motilal Nehru National Institute of Technology Allahabad, India which is also his base working institute. His primary area of research includes evolutionary algorithms, optimization techniques, and design and analysis of algorithms. He has published more than 50 publications in International Journals and in Proceedings of International Conferences of repute. He has served as a program committee member of several conferences and also edited Scopus and SCI-indexed journals. He has 15 years of teaching and research experience during which he made all his efforts to bridge the gaps between teaching and research.

Dr. Shailesh Tiwari is currently works as a Professor in Computer Science and Engineering Department, ABES Engineering College, Ghaziabad, India. He is also administratively heading the department. He is an alumnus of Motilal Nehru National Institute of Technology Allahabad, India. He has more than 15 years of experience in teaching, research and academic administration. His primary areas of research are software testing, implementation of optimization algorithms and machine learning techniques in software engineering. He has also published more than 40 publications in International Journals and in Proceedings of International Conferences of repute. He has served as a program committee member of several conferences and edited Scopus and E-SCI-indexed journals. He has also organized several international conferences under the banner of IEEE and Springer. He is a Senior Member of IEEE, member of IEEE Computer Society and Executive Committee member of IEEE Uttar Pradesh section. He is a member of reviewer and editorial board of several International Journals and Conferences.

Dr. Vivek Kumar Singh is Assistant Professor at Department of Computer Science, Banaras Hindu University, India. His major research interest lies in the area of text analytics. Currently, he is working on scientometrics, sentiment analysis, social network analysis; altmetrics which are the broader research area of text analytics. He has developed and coordinated a text analytics laboratory, which works in various text analytics tasks. He is an alumnus of Allahabad University, Allahabad, India. He has published more than 30 publications in International Journals and in Proceedings of International Conferences of repute. He has also served in South Asian University, Delhi, India as an Assistant Professor for more than 4 years. He has also associated with several research projects such as Indo-Mexican Joint Research Project funded jointly by the Department of Science and Technology, Government of India along with the National Council for Science and Technology (CONACYT) of the United Mexican States.


Exchange of information and innovative ideas are necessary to accelerate the development of technology. With advent of technology, intelligent and soft computing techniques came into existence with a wide scope of implementation in engineering sciences. Keeping this ideology in preference, this book includes the insights that reflect the 'Advances in Computer and Computational Sciences' from upcoming researchers and leading academicians across the globe. It contains high-quality peer-reviewed papers of 'International Conference on Computer, Communication and Computational Sciences (ICCCCS 2016), held during 12-13 August, 2016 in Ajmer, India'. These papers are arranged in the form of chapters. The content of the book is divided into two volumes that cover variety of topics such as intelligent hardware and software design, advanced communications, power and energy optimization, intelligent techniques used in internet of things, intelligent image processing, advanced software engineering, evolutionary and soft computing, security and many more. This book helps the perspective readers' from computer industry and academia to derive the advances of next generation computer and communication technology and shape them into real life applications.

Dr. Sanjiv K. Bhatia received his Ph.D. in Computer Science from the University of Nebraska, Lincoln in 1991. He presently works as Professor and Graduate Director (Computer Science) in the University of Missouri, St. Louis. His primary areas of research include image databases, digital image processing, and computer vision. He has published over 40 articles in those areas. He has also consulted extensively with industry for commercial and military applications of computer vision. He is an expert in system programming and has worked on real-time and embedded applications. He serves on the organizing committee of a number of conferences and on the editorial board of international journals. He has taught a broad range of courses in computer science and was the recipient of Chancellor’s Award for Excellence in Teaching in 2015. He is a senior member of ACM. Dr. Krishn K. Mishra is currently works as a Visiting Faculty, Department of Mathematics & Computer Science, University of Missouri, St. Louis, USA. He is an alumnus of Motilal Nehru National Institute of Technology Allahabad, India which is also his base working institute. His primary area of research includes evolutionary algorithms, optimization techniques, and design and analysis of algorithms. He has published more than 50 publications in International Journals and in Proceedings of International Conferences of repute. He has served as a program committee member of several conferences and also edited Scopus and SCI-indexed journals. He has 15 years of teaching and research experience during which he made all his efforts to bridge the gaps between teaching and research. Dr. Shailesh Tiwari is currently works as a Professor in Computer Science and Engineering Department, ABES Engineering College, Ghaziabad, India. He is also administratively heading the department. He is an alumnus of Motilal Nehru National Institute of Technology Allahabad, India. He has more than 15 years of experience in teaching, research and academic administration. His primary areas of research are software testing, implementation of optimization algorithms and machine learning techniques in software engineering. He has also published more than 40 publications in International Journals and in Proceedings of International Conferences of repute. He has served as a program committee member of several conferences and edited Scopus and E-SCI-indexed journals. He has also organized several international conferences under the banner of IEEE and Springer. He is a Senior Member of IEEE, member of IEEE Computer Society and Executive Committee member of IEEE Uttar Pradesh section. He is a member of reviewer and editorial board of several International Journals and Conferences. Dr. Vivek Kumar Singh is Assistant Professor at Department of Computer Science, Banaras Hindu University, India. His major research interest lies in the area of text analytics. Currently, he is working on scientometrics, sentiment analysis, social network analysis; altmetrics which are the broader research area of text analytics. He has developed and coordinated a text analytics laboratory, which works in various text analytics tasks. He is an alumnus of Allahabad University, Allahabad, India. He has published more than 30 publications in International Journals and in Proceedings of International Conferences of repute. He has also served in South Asian University, Delhi, India as an Assistant Professor for more than 4 years. He has also associated with several research projects such as Indo-Mexican Joint Research Project funded jointly by the Department of Science and Technology, Government of India along with the National Council for Science and Technology (CONACYT) of the United Mexican States.

Preface 6
Organizing Committee 8
Technical Program Committee 9
Contents 15
About the Editors 22
Advanced Software Engineering 24
1 Approach for an Opinion Wrapping System–Using Focused Web Crawler 25
Abstract 25
1 Introduction 26
2 Literature Review 26
3 Proposed Methodology 27
4 Proposed Algorithms 28
4.1 URL Retriever 28
4.2 URL Screener 29
4.3 URL Updater 29
4.4 Opinion Hunter 29
4.5 Opinion Screener 30
5 Comparison of Existing Framework with Our Proposed Framework 31
6 Limitation and Future Work 33
7 Conclusion 33
References 33
Improved Environmental Adaption Method with Real Parameter Encoding for Solving Optimization Problems 35
1 Introduction 35
2 Background Details 36
2.1 EAM 36
2.2 IEAM 37
3 Proposed Approach 37
3.1 Algorithms 38
3.2 Details of Algorithm 39
4 Experimental Setup 41
5 Result Analysis 41
6 Conclusion 42
References 42
Grouping-Aware Data Placement in HDFS for Data-Intensive Applications Based on Graph Clustering 43
1 Introduction 44
2 Related Works 45
3 Optimal Data Placement Strategy---Proposed work 46
4 Experimental Results and Analysis 49
5 Conclusion and Future work 52
References 53
4 Parameter Estimation for PID Controller Using Modified Gravitational Search Algorithm 54
Abstract 54
1 Introduction 54
2 Gravitational Search Algorithm (GSA) 55
3 Modification on GSA-PID Controller 57
3.1 Drawback of GSA 57
3.2 Modified GSA (MGSA) 57
4 Numerical Experiments 59
4.1 Induction Motor System 59
4.2 Simulation Results and Analysis 59
5 Conclusion 61
References 61
5 Auto Improved-PSO with Better Convergence and Diversity 63
Abstract 63
1 Introduction 63
2 Related Work 65
2.1 Variants of PSO 65
3 Auto Improved-PSO with Better Convergence and Diversity (AI-PSO) 66
3.1 AI-PSO Procedure 67
4 Test Functions and Experimental Setup 67
4.1 Benchmark Functions 67
4.2 Experimental Setup 68
5 Experimental Results and Discussion 69
5.1 Comparison of Convergence Rate and Solution Accuracy 69
6 Conclusion 70
References 70
6 A Novel Hybrid PSO–WOA Algorithm for Global Numerical Functions Optimization 72
Abstract 72
1 Introduction 73
2 Particle Swarm Optimization 73
3 Whale Optimization Algorithm 74
3.1 Encircling Prey Equation 74
3.2 Bubble-Net Attacking Method 75
4 The Hybrid PSO–WOA Algorithm 77
5 Simulation Results for Unconstraint Test Benchmark Function 78
6 Conclusion 79
References 79
7 Moth-Flame Optimizer Method for Solving Constrained Engineering Optimization Problems 80
Abstract 80
1 Introduction 81
2 Moth-Flame Optimizer 81
3 Constrained Engineering Design Problem 82
3.1 Car Side Impact Design 82
3.2 Multiple Disk Clutch Brake Design Problem 84
3.3 Rolling Element Bearing Design Problem 84
3.4 Speed Reducer Design Problem 84
3.5 Tubular Column Design Problem 85
3.6 Belleville Spring Design Problem 86
4 Conclusion 86
References 87
8 Training Multilayer Perceptrons in Neural Network Using Interior Search Algorithm 88
Abstract 88
1 Introduction 89
2 Feedforward Neural Network and Multilayer Perceptron 89
3 Interior Search Algorithm 90
3.1 Algorithm Description 90
3.2 Parameter Tuning 91
3.3 Nonlinear Constraint Manipulation 92
3.4 ISA-Based MLP Trainer 92
4 Results and Discussion 93
5 Conclusion 95
References 96
9 Sequence Generation of Test Case Using Pairwise Approach Methodology 97
Abstract 97
1 Introduction 98
2 Metaheuristic Algorithms 98
2.1 N-IPO (Novel-IPO) 99
2.2 Pairwise Testing 99
3 Combination Sequence Generation Algorithm (Proposed Algorithm) 99
3.1 Test Case Origination Algorithm 101
4 Experimental Outcomes 102
5 Discussion and Conclusion 102
References 103
10 A Rule Extraction for Outsourced Software Project Risk Classification 104
Abstract 104
1 Introduction 105
2 IVIFS and Its Distance 106
3 Application Example 106
4 Algorithm Steps 109
5 Experimental Results Analysis 112
6 Conclusion 114
Acknowledgements 115
References 115
Prediction of Market Movement of Gold, Silver and Crude Oil Using Sentiment Analysis 117
1 Introduction 117
2 Problem Statement and Proposed Methodology 119
2.1 Generating Public Mood Time Series 120
3 Results and Discussions 122
4 Conclusion and Future Work 123
References 124
12 Social Influence and Learning Pattern Analysis: Case Studies in Stackoverflow 126
Abstract 126
1 Introduction 127
2 Related Works 127
3 HITS Algorithm 128
4 Methodology 129
5 Result 131
6 Conclusion 135
References 135
13 Classification Approach to Extract Strongly Liked and Disliked Features Through Online User Opinions 137
Abstract 137
1 Introduction 137
2 Background 139
3 Experiment Design and Methodology 140
3.1 Crawl Reviews 140
3.2 Preprocessing 140
3.3 POS Tagging 140
3.4 Seed List Preparation 142
3.5 Extracting Opinionated Sentences 142
3.6 Handling Negation 142
3.7 Identifying the Polarity of Reviews 142
3.8 Merging All of the Reviews into a Single File 143
3.9 Extracting the Features 143
3.10 Extracting the Strongly Liked/Disliked Feature 143
4 Experiment Results and Discussion 144
5 Conclusion 148
References 148
Internet of Things 150
14 A Multicriteria Decision-Making Method for Cloud Service Selection and Ranking 151
Abstract 151
1 Introduction 151
2 Related Work 152
3 Service Measurement Index (SMI) of Cloud 153
4 Cloud Service Selection 154
5 Case Study: Using TOPSIS Method to Ranking Cloud Service Based on QoS Requirement 155
6 Conclusion and Future Work 158
References 159
15 Development and Analysis of IoT Framework for Healthcare Application 160
Abstract 160
1 Introduction 161
2 State of Art Techniques 161
3 Proposed Work 162
3.1 Architecture 163
3.2 Use Case 163
3.3 Proposed Design 164
4 Conclusion and Future Work 167
References 167
16 An Effective and Empirical Review on Internet of Things and Real-Time Applications 170
Abstract 170
1 Introduction 171
2 Usage of Sensor Data in Cloud Environment 172
3 Real Life Implementations and Applications of IoT 173
4 Protocols Associated with Internet of Things 174
5 Literature Review 174
6 Conclusion 177
References 178
17 Operations on Cloud Data (Classification and Data Redundancy) 179
Abstract 179
1 Introduction 179
2 Related Work 180
3 Problem Statement 181
4 Proposed Approach 183
5 Results and Analysis 186
6 Conclusion and Future Scope 188
References 189
18 Load Balancing Tools and Techniques in Cloud Computing: A Systematic Review 190
Abstract 190
1 Introduction 190
2 Cloud Virtualization 191
2.1 Full Virtualization 191
2.2 Para Virtualization 192
3 Existing Techniques for Load Balancing 192
3.1 LBVS 192
3.2 Honeybee Foraging Behavior 192
3.3 CLBVM 192
3.4 SBLB for Internet Distributed Services 193
3.5 Join-Idle Queue 193
3.6 Decentralized Content Aware LB 193
3.7 Index Name Server 194
3.8 Stochastic Hill Climbing 194
3.9 HBB-LB 194
3.10 Cloud Server Optimization 194
3.11 Response Time Based LB 195
3.12 Ant Colony Optimization 195
3.13 PLBS 195
3.14 A2LB 196
4 Metrics of Cloud Load Balancing 196
4.1 Throughput 196
4.2 Overhead 196
4.3 Fault Tolerance 197
4.4 Transfer Time 197
4.5 Reaction Time 197
4.6 Resource Utilization 197
4.7 Scalability 197
4.8 Performance 197
5 Comparison of Existing Techniques for Load Balancing 198
6 Tools for Load Balancing 198
6.1 CloudAnalyst 198
6.2 GroudSim 198
6.3 GreenCloud 198
7 Conclusion 203
References 203
19 A Hybrid Optimization Approach for Load Balancing in Cloud Computing 205
Abstract 205
1 Introduction 205
2 Related Work 206
3 Motivation 208
4 Ant Colony Optimization 208
5 Artificial Bee Colony 209
6 Proposed Scheme 209
6.1 Modified ACO Algorithm 210
6.2 Modified Bee Colony 210
6.3 Hybrid Algorithm 211
7 Results and Discussions 211
7.1 Response Time 212
7.2 Data Center Processing Time 212
7.3 Cost 213
8 Conclusion 213
References 213
20 A Comparative Analysis of Cloud Forensic Techniques in IaaS 215
Abstract 215
1 Introduction 215
2 Cloud Forensics Investigation Challenges 216
3 Literature Survey of IaaS-Based Cloud Forensics Techniques 217
3.1 Enabling Cloud Forensic [6] 217
3.2 Cloud Forensic Using VM Snapshot [7] 218
3.3 Introspection of Virtual Machine [12] 218
3.4 Forensically Enabled IaaS Cloud [13] 219
4 Comparative Study 221
5 Conclusion and Future Scope 222
References 223
21 Cloud Detection: A Systematic Review and Evaluation 224
Abstract 224
1 Introduction and Motivation 224
1.1 Motivation for Work 225
2 Background 225
2.1 Various Segmentation Methods 225
2.2 Types of Cloud 226
2.3 Why Segmentation 227
3 Review Method 227
3.1 Research Questions 227
3.2 Systematic Count of Publications 231
4 Evaluation of Cloud Detection Techniques 231
4.1 Evaluation Trends 232
4.2 Evaluation Metrics 232
4.3 Experimental Results 233
5 Discussion 234
6 Conclusion 235
References 235
22 Sentiment Classification for Chinese Micro-blog Based on the Extension of Network Terms Feature 237
Abstract 237
1 Introduction 237
2 Related Work 238
3 Method Overview 239
3.1 Construction of Network Terms Lexicon 240
3.2 Word Segmentation Operation and Optimization 240
3.3 Extended Lexicon and Creation of Sentence Feature 242
3.4 Fusion Sentiment Features 243
4 Experiment 243
4.1 Experiment 1 244
4.1.1 Analysis of the Results of Experiment 1 244
4.2 Experiment 2 244
4.2.1 Analysis of the Results of Experiment 2 245
5 Conclusion 246
References 246
23 Implementation of Stress Measurement System Based on Technology of Internet of Things 248
Abstract 248
1 Introduction 248
2 “Comprehensive Sensing” in Internet of Things 249
3 “Interconnection” of the Internet of Things 251
4 “Smart Operation” of the Network of Things 252
5 System Test 252
6 Conclusions 253
References 254
24 Social Media Big Data Analysis for Global Sourcing Realization 255
Abstract 255
1 Introduction 255
2 Research Methodology 256
2.1 Risk and Uncertainty Ontology (RUO) 257
2.2 Data Extraction 258
3 Results 259
4 Conclusions 260
References 260
25 Based on Hidden Markov Model to Identify the Driver Lane-Changing Behavior of Automobile OBD Internet of Vehicles Research and Design 261
Abstract 261
1 Introduction 261
2 Hidden Markov Model to Identify the Driver Lane-Changing Behavior 262
2.1 The Pilot Lane-Changing Behavior HMM Structure Definition 262
2.2 The HMM Model Parameter Set Training 264
3 Car OBD Car Network Design and Implementation 265
4 The System Evaluation 265
5 Conclusion 267
Acknowledgements 267
References 267
26 The Research on Key Technique of Raw Coal Management Information System 268
Abstract 268
1 Introduction 268
2 System Design 269
2.1 System Structure Design 269
2.2 System Database Design 269
2.3 System Functional Design 271
3 Key Technologies 271
3.1 The Implementation of User Interface Based on Freemarker and Jquery 271
3.2 The Implementation of Report and Graphics Based on Jxl and JfreeChart 272
3.3 The Implementation of User Permission Control with Configurable Function 273
4 Conclusion 273
Acknowledgements 274
References 274
27 Structural Modeling of Implementation Enablers of Cloud Computing 275
Abstract 275
1 Introduction 275
2 Literature Review 277
3 Methodology 278
3.1 Interpretive Structural Modeling Steps 279
3.2 Structural Self-Interaction Matrix (SSIM) 279
3.3 Development of Reachability Matrix 279
3.4 Level Partitions 282
3.5 MICMAC Analysis and TISM Diagraph 282
4 Key Conclusions and Future Directions 282
References 288
28 Labelling and Encoding Hierarchical Addressing for Scalable Internet Routing 289
Abstract 289
1 Introduction 289
2 Variable-Length Encoding Hierarchical Addressing 290
3 Performance Evaluation 292
4 Conclusion 293
Acknowledgements 294
References 294
29 A Cuckoo Search Algorithm-Based Task Scheduling in Cloud Computing 295
Abstract 295
1 Introduction 296
2 Literature Survey 296
3 Proposed Methodology 297
4 Problem Formulation and Our Solution 298
4.1 Task Scheduling 298
4.2 Mathematical Model 299
5 Performance Evaluation 299
6 Conclusion 300
References 300
30 Performance Optimization in Cloud Computing Through Cloud Partitioning-Based Load Balancing 302
Abstract 302
1 Introduction 303
2 Load Balancing 304
3 Literature Review 304
4 Proposed Approach for Load Balancing 306
5 Performance Evaluation and Results 309
6 Conclusion 310
Acknowledgements 311
References 311
Intelligent Image Processing 313
31 An Optimistic Approach of Locking Strategy in Progress Fourth Generation Language 314
Abstract 314
1 Introduction 314
2 Literature Survey 315
3 Overview of Transaction Management 316
3.1 Transaction Failures 317
4 Database Locking 317
5 Traditional Mechanism 318
5.1 Optimistic Locking Strategy 318
6 Simulation Experiments 319
7 Conclusions 320
References 321
32 Combating Clickjacking Using Content Security Policy and Aspect Oriented Programming 322
Abstract 322
1 Introduction 323
2 Related Work and Existing Clickjacking Defenses 323
2.1 Frame Busting 324
2.2 X-Frame-Options HTTP Response Header 324
2.3 Browser Plugins and Add-Ons 324
3 Motivation and Principles 324
3.1 Content Security Policy 324
3.2 Aspect Oriented Programming 325
3.3 X-Frame-Options HTTP Header Versus Content Security Policy Header 326
4 Proposed Work 326
5 Implementation and Results 326
5.1 Designing Content Security Policy for Blocking Clickjacking Attempts 326
5.2 Adding the Content Security Policy Header to a J2EE Aspect and Defining Point Cuts to Bind the Header to GET and Post Calls 327
5.3 Testing Different Policy Combinations on Different Browsers 328
5.4 Implementation Issues 329
6 Conclusion and Future Scope 329
References 329
33 A Conceptual Framework for Analysing the Source Code Dependencies 331
Abstract 331
1 Introduction 331
2 Related Work 333
3 Research Gaps 334
4 Need of the Proposed Framework 334
5 Scope of Proposed Framework 334
6 Working of the Framework 335
6.1 Phase1 335
6.2 Phase 2 336
6.3 Phase 3 336
7 Applications of the Tool 337
8 Conclusion and Future Work 337
References 337
34 DWT-SVD-Based Color Image Watermarking Using Dynamic-PSO 340
Abstract 340
1 Introduction 340
2 Particle Swarm Optimization and Its Variants 341
3 Application of Dynamic-PSO in DWT-SVD-Based Watermarking for Color Images 342
3.1 DWT-SVD-Based Watermarking Scheme 343
3.2 Dynamic-PSO (DPSO) 343
3.3 Fitness Function 343
3.4 Finding Scaling Factor Using Dynamic-PSO 344
4 Results and Discussion 344
5 Conclusion 347
References 347
35 Semi-supervised Spatiotemporal Classification and Trend Analysis of Satellite Images 349
Abstract 349
1 Introduction 349
2 Proposed Work 351
3 Experimental Results 353
3.1 Semi-supervised Classification of Satellite Images 353
3.2 Accuracy Assessment 354
3.3 Kappa Statistic 356
3.4 Trend Analysis 356
4 Conclusion 357
References 358
36 Improved Content-Based Image Classification Using a Random Forest Classifier 360
Abstract 360
1 Introduction 360
2 Materials and Model 362
2.1 Image Features 362
2.1.1 Local Binary Pattern 362
2.1.2 Colour Percentiles 363
2.1.3 Colour Moment 364
2.1.4 Colour Histogram 364
2.2 Image Classification 364
3 Results Analysis 367
4 Conclusions 370
References 370
37 An Advanced Approach of Face Recognition Using HSV and Eigen Vector 372
Abstract 372
1 Introduction 372
2 Related Work 373
3 Color Base Face Detection 374
4 Principal Component 375
5 Proposed Methodology 376
6 Experiment and Graphical Approach 376
6.1 Efficiency Observed Over Proposed Algorithm 376
7 Conclusion 380
References 380
38 RMI Approach to Cluster Based Image Decomposition for Filtering Techniques 382
Abstract 382
1 Introduction 383
2 Literature Survey 384
3 Logical Programming Structure 385
3.1 Median Filter 385
4 Workflow of Given System 386
5 Benefits of Current Approach 388
6 Experimental Setup and Workload Characterization 388
7 Performance Measurements 390
8 Conclusion and Future Scope 393
References 393
39 Segregation of Composite Document Images into Textual and Non-Textual Content 395
Abstract 395
1 Introduction 396
2 Literature Survey 396
3 Image Frame Sets from Videos 397
4 Challenges 400
5 Proposed Approach 401
6 Results 403
7 Applications 405
References 405
40 Optimization of Automatic Test Case Generation with Cuckoo Search and Genetic Algorithm Approaches 406
Abstract 406
1 Introduction 406
1.1 Software Testing Background 407
1.2 Unit Testing 407
1.3 Path Testing 408
2 Genetic Algorithm 409
3 Cuckoo Search 409
4 Genetic Algorithm in Software Testing 410
5 Proposed Method 410
6 Experimental Setup 411
7 Conclusion 415
References 415
41 Impact Analysis of Contributing Parameters in Audio Watermarking Using DWT and SVD 417
Abstract 417
1 Introduction 417
2 Related Work and Contribution 418
2.1 DWT Based Algorithms 418
2.2 SVD-Based Algorithms 419
3 Proposed Algorithm 419
3.1 Watermark Embedding Procedure 419
3.2 Watermark Extracting Procedure 421
4 Experimental Results and Contribution 421
5 Conclusion and Future Work 423
References 424
42 Digital Audio Watermarking: A Survey 425
Abstract 425
1 Introduction 425
2 Classification of Digital Watermarking 426
2.1 Based on Working Domain 426
2.2 Based on Extraction 426
2.3 Based on Human Perception 427
2.4 Based on Data 427
2.5 Based on Key 427
3 Audio Watermarking 427
4 Techniques of Audio Watermarking 428
4.1 Time Domain Methods 428
4.2 Transform Domain Methods 429
5 Literature Survey 430
6 Conclusion 431
References 434
43 Brain CT and MR Image Fusion Framework Based on Stationary Wavelet Transform 436
Abstract 436
1 Introduction 437
2 Methodology of the Proposed Fusion Scheme 438
3 Experimental Setup 441
4 Results and Discussions 443
5 Conclusion 443
References 443
44 A Feature-Based Semi-fragile Watermarking Algorithm for Digital Color Image Authentication Using Hybrid Transform 445
Abstract 445
1 Introduction 445
2 Related Work 446
3 Proposed Algorithm 447
3.1 Generating Watermark and Scrambling Process 448
3.2 Embedment Process 448
3.3 Extraction Process 449
3.4 Reverse Scrambling Process 449
4 Experimental Results 450
5 Conclusion 453
Acknowledgements 454
References 454
Data Set 455
45 Inventory Control Using Fuzzy-Aided Decision Support System 456
Abstract 456
1 Introduction 457
2 Proposed Model of ANFIS-Based DSS for Inventory Control 459
3 Experimental Details and Results 461
4 Conclusion 464
References 464
46 Assessment of Examination Paper Quality Using Soft Computing Technique 466
Abstract 466
1 Introduction 466
2 Literature Review 467
3 Fuzzy Logic 469
4 Proposed Model 469
5 Result 472
6 Conclusion 473
References 473
47 Moving Shadow Detection Using Fusion of Multiple Features 475
Abstract 475
1 Introduction 475
2 The Proposed Shadow Detection Method 476
2.1 The Description of Flowchart 476
2.2 Adaptive Shadow Detection by Improved Local Ternary Pattern 478
2.3 The Fusion of Multiple Features by Genetic Programming Model 479
3 Experimental Results 480
3.1 Dataset and Evaluation Metric 480
3.2 Qualitative and Quantitative Results 481
4 Conclusion 481
References 482
48 Caption Text Extraction from Color Image Based on Differential Operation and Morphological Processing 483
Abstract 483
1 Introduction 483
2 Edge Detection for Caption Text 484
3 Morphological Processing 486
4 Caption Text Location 486
5 Conclusion 489
References 489
49 Reversible Data Hiding Based on Dynamic Image Partition and Multilevel Histogram Modification 491
Abstract 491
1 Introduction 491
2 Proposed Scheme 492
2.1 Dynamic Image Partition 492
2.2 EMD Mechanism 494
2.3 Overflow and Underflow Prevention 494
2.4 Data Embedding 495
2.5 Data Extraction and Image Restoration 496
3 Experimental Results 496
4 Conclusion 497
Acknowledgements 498
References 498
ADBMS and Security 499
50 Threshold-Based Hierarchical Visual Cryptography Using Minimum Distance Association 500
Abstract 500
1 Introduction 500
2 Hierarchical Visual Cryptography 502
2.1 The Model 502
2.2 Thresholding Approach 503
3 Minimum Distance Association of Shares 505
4 Conclusion 507
References 507
51 Security in IoT-Based Smart Grid Through Quantum Key Distribution 509
Abstract 509
1 Introduction 509
1.1 Smart Grid 510
2 Related Work 510
3 Security Issues of IoT-Based Smart Grid 510
4 Preliminaries of Quantum Key Distribution (QKD) 511
4.1 How Quantum Key Distribution Helps to Solve Security Issues 511
5 Proposed Protocol 511
6 Experimental Setup 513
6.1 Key Generation Without Eavesdropping 513
6.2 Key Generation with Eavesdropping 514
6.3 Comparison of Different Authentication Schemes 514
7 Conclusion 515
References 516
52 A Comparative Study on Face Detection Techniques for Security Surveillance 517
Abstract 517
1 Introduction 517
1.1 Face Recognition Approaches 518
2 Literature Review 519
2.1 Face Detection Techniques 519
2.2 Face Recognition Algorithms 520
2.3 Color Images 521
2.4 Classification Methods 521
2.5 Face Recognition Algorithms 522
3 Comparative Result 524
4 Conclusion 526
Acknowledgements 526
References 526
53 Proposed Approach for Book Recommendation Based on User k-NN 528
Abstract 528
1 Introduction 528
2 Theoretical Background 529
2.1 Recommendation System Overview 529
2.2 Performance Measures 530
2.3 Similarity Measures 531
2.4 Collaborative Recommendation 531
2.5 k-NN Algorithm 532
3 Methodology 532
3.1 Data Integration 534
3.2 Data Pre-processing 534
4 Experimental Setup 535
4.1 Dataset Used 535
4.2 Tool Used 535
4.3 Model Construction for Training 535
4.4 Model Construction for Testing 536
5 Result and Analysis 537
5.1 Output 537
5.2 Work Flow of Proposed Model 537
5.3 Performance Measures 539
5.4 Analysis 539
6 Conclusion 543
Acknowledgements 543
References 543
54 Improved FP-Linked List Algorithm for Association Rule Mining 544
Abstract 544
1 Introduction 545
2 FP-Growth Algorithm 546
3 FPBitLink Algorithm 548
4 Transactions-Based FPBitLink Algorithm 550
5 Algorithm Selector 553
6 Conclusion 553
References 554
55 On Hierarchical Visualization of Event Detection in Twitter 555
Abstract 555
1 Introduction 555
1.1 Contribution 556
2 Related Work 557
3 Framework 557
3.1 Preprocessing 557
3.2 Event Detection 558
3.3 Visualization 560
4 Experimental Results 560
4.1 Evaluation Methodology 560
4.2 Parameter Tuning 561
4.3 Results and Discussions 561
5 Conclusion 562
References 562
56 Audio Steganography Techniques: A Survey 564
Abstract 564
1 Introduction 565
2 Audio Steganography 565
2.1 Characteristics 565
3 Techniques of Data Hiding in Audio 566
3.1 Spatial Domain Technique 566
3.2 Transform Domain Technique 569
3.3 Compressed Domain Technique 570
3.4 Coded Domain Technique 571
4 Conclusion 571
References 572
57 Role of Clustering in Crime Detection: Application of Fuzzy K-means 573
Abstract 573
1 Introduction 573
1.1 Fuzzy K-means Approach 574
1.2 Working Steps of Fuzzy K-Means 574
2 Literature Survey 575
3 Proposed Work 576
4 Result Analysis 577
4.1 Results of FKMC 580
4.2 Comparison Results 580
5 Conclusion 581
References 581
58 Implementation of Modified K-means Approach for Privacy Preserving in Data Mining 582
Abstract 582
1 Introduction 583
2 Related Work 583
3 Proposed Solution 584
3.1 Algorithm for Modified K-means 585
4 Experimental Setup 586
5 Results and Analysis 587
5.1 Graphs 588
6 Conclusion 591
References 591
59 Cross-Lingual Information Retrieval: A Dictionary-Based Query Translation Approach 592
Abstract 592
1 Introduction 592
2 Related Work 593
3 Proposed Approach 594
3.1 Pre-processing 594
3.2 Query Translation 595
3.3 OOV Terms Transliteration Mining (OOVTTM) 595
3.4 Indexing, Retrieval and Evaluation 596
4 Experiment Results and Discussions 596
5 Conclusion 598
References 598
60 Predictive Classification of ECG Parameters Using Association Rule Mining 600
Abstract 600
1 Introduction 600
2 Literature Survey 601
2.1 Association Rule Mining 601
2.2 Apriori Association Rule Mining 602
2.3 Predictive Apriori Association Rule Mining 604
3 Experimental Setup 605
4 Results 605
5 Observations 607
6 Conclusion 608
References 608
61 Two-Level Diversified Classifier Ensemble for Classification of Credit Entries 609
Abstract 609
1 Introduction 609
2 Methodology 610
2.1 Experimental Protocol 611
2.2 Model Evaluation 611
2.3 Ensemble Models 611
3 Related Work 613
4 Constructing Two-Level Hybrid Ensemble 613
5 Experiments and Results 614
6 Conclusions and Further Extensions 615
References 616
62 P-RED: Probability Based Random Early Detection Algorithm for Queue Management in MANET 617
Abstract 617
1 Introduction 618
2 Literature Survey 618
3 The P-RED Algorithm 619
4 Simulation for Throughputs and Delay 620
5 Conclusions and Further Work 622
References 622
63 Analyzing Game Stickiness Using Clustering Techniques 624
Abstract 624
1 Introduction 624
2 Literature Review 625
2.1 k-Means 626
2.2 DBSCAN 627
3 Proposed System 627
4 Implementation 628
4.1 Data Collection 628
4.2 Tool Used 629
4.3 Procedure 629
5 Experimental Results 630
6 Conclusion 632
References 632
64 Automated Detection of Acute Leukemia Using K-mean Clustering Algorithm 634
Abstract 634
1 Introduction 635
2 Proposed Methodology 636
2.1 Image Preprocessing 636
2.2 Image Segmentation 637
3 Identification and Classification 641
3.1 Identification of Grouped Leucocytes 642
3.2 Nucleus and Cytoplasm Selection 643
3.3 Feature Extraction 644
3.4 Image Classification 645
4 Conclusion 647
References 647
65 Energy Data Analysis of Green Office Building 650
Abstract 650
1 Introduction 651
2 Basics 651
2.1 DBSCAN Clustering Algorithm 651
2.2 C4.5 Classification Algorithm 652
2.3 Dynamic LOF Algorithm 652
3 Examples of Verification 653
3.1 Data Sorting and Analyzing 653
3.2 Using DBSCAN Algorithm Clustering 654
3.3 Using C4.5 Algorithm to Classify the Clustering Data 654
3.4 Dynamic LOF Algorithms to Detect Outliers 655
4 Summary 657
References 658
66 Location Prediction Model Based on K-means Algorithm 659
Abstract 659
1 Introduction 659
2 Location Prediction Model Based on K-means 661
2.1 Basic Idea of K-means Algorithm 661
2.2 Location Prediction Method Based on K-means 661
3 Experiments and Results 663
4 Conclusion 664
References 665
Visual Tracking via Clustering-Based Patch Weighing and Masking 666
1 Introduction 667
2 The Proposed Method 667
2.1 Framework Overview 667
2.2 Appearance Modeling 667
2.3 Tracking 669
3 Experiments 670
3.1 Experimental Setup 670
3.2 Quantitative and Qualitative Analysis 670
4 Conclusions 671
References 672
68 A Presenter Discovery Method Based on Analysis of Reputation Record 673
Abstract 673
1 Introduction 674
2 Related Work 674
3 Presenter Discovery Method 676
3.1 Presenter Initial Set 676
3.2 Build Presenter Candidate Set 677
3.3 Calculation of the Trust Presenters 678
3.4 Recommendation Record Update 682
4 Experiment and Result Analysis 682
4.1 The Experimental Setting 683
4.2 The Experimental Results and Analysis 683
5 Conclusions 685
References 686
Author Index 687

Erscheint lt. Verlag 3.10.2017
Reihe/Serie Advances in Intelligent Systems and Computing
Zusatzinfo XXIV, 713 p. 254 illus.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Advanced Database Management Systems • Advance Software Engineering • Artificial Intelligence • Computer Communication • Computer Graphics and Multimedia • Computer Security • Distributed and Parallel Processing • Evolutionary Computing • Hardware and Software Design • ICCCCS 2016 • ICCCCS 2016 Proceedings
ISBN-10 981-10-3773-6 / 9811037736
ISBN-13 978-981-10-3773-3 / 9789811037733
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
der Praxis-Guide für Künstliche Intelligenz in Unternehmen - Chancen …

von Thomas R. Köhler; Julia Finkeissen

eBook Download (2024)
Campus Verlag
38,99
Wie du KI richtig nutzt - schreiben, recherchieren, Bilder erstellen, …

von Rainer Hattenhauer

eBook Download (2023)
Rheinwerk Computing (Verlag)
24,90