Intelligent Computing and Information and Communication -

Intelligent Computing and Information and Communication (eBook)

Proceedings of 2nd International Conference, ICICC 2017
eBook Download: PDF
2018 | 1st ed. 2018
XVIII, 747 Seiten
Springer Singapore (Verlag)
978-981-10-7245-1 (ISBN)
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The volume presents high quality research papers presented at Second International Conference on Information and Communication Technology for Intelligent Systems (ICICC 2017). The conference was held during 2-4 August 2017, Pune, India and organized communally by Dr. Vishwanath Karad MIT World Peace University, Pune, India at MIT College of Engineering, Pune and supported by All India Council for Technical Education (AICTE) and Council of Scientific and Industrial Research (CSIR). The volume contains research papers focused on ICT for intelligent computation, communications and audio, and video data processing.



Prof. Subhash Bhalla joined as a faculty of Jawaharlal Nehru University (JNU), New Delhi in 1986, at the School of Computer and Systems Sciences. He was a Visiting Scientist at Sloan School of Management, Massachusetts Institute of Technology (MIT), Cambridge, Massachusetts, USA (1987-88). He is a member of the Computer Society of IEEE and SIGMOD of ACM. He is associated with the Department of Computer Software at the University of Aizu, Japan. He has also toured and lectured at many industries for conducting feasibility studies and for adoption of modern techniques. He has received several grants for research projects. Prof. Bhalla currently participates in the Intelligent Dictionary System Project. He is exploring database designs to support models for Information Interchange through the World Wide Web. He is working with a study team on creating user interfaces for web users and transaction management system for mobile computing. He is studying transaction management and algorithmic designs for Distributed Real-Time Systems. He is also pursuing performance evaluation and modeling of distributed algorithms. His research interests include managing components and application services; distributed client/middleware/service oriented computing; XML, e-commerce; mobile database management systems; web query and web data mining; synchronization and crash recovery; and integration of technologies.

Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Bhateja has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.

Dr. Anjali Chandavale is currently working as Associate Professor (Information Technology) in Maharashtra Academy of Engineering and Educational Research's Maharashtra Institute of Technology College of Engineering, Pune, India. She has over 18 years of teaching and over 6 years of industrial experience in the field of Process Instrumentation. Her research interests include Internet Security, Image Processing and Embedded Systems. Dr. Chandavale has worked as Research and Development Engineer in Lectrotek Systems Pvt. Ltd., Pune, for 4 years and also as a Software Engineer (Design and Development) in Ajay Electronics Pvt. Ltd. (1997-1998), Pune. She has several publications in journals as well as in conference proceedings of international repute.

Prof. Anil S. Hiwale is currently working as Professor and Head of Department of Information Technology, MIT College of Engineering, Pune. He completed his Ph.D. from SGB Amravati University, Amravati. Prof. Hiwale has 28 years of teaching experience and published over 50 research papers in National/International Journals and conferences. His areas of research include signal processing, digital communications, multi-antenna systems and satellite communications. He is presently supervising four Ph.D. scholars. He is a Fellow of Institution of Engineers (India) and a member of IET, CSI, ISTE and Broadcast Engineering Society of India. 

Prof. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering at PVP Siddhartha Institute of Technology, Andhra Pradesh, India. He obtained his Ph.D. in Computer Science and Engineering from JNTU Hyderabad and M.Tech. in CSE from NIT, Rourkela, Odisha, India. He has 26 years of teaching experience. His research interests are data mining, machine intelligence and swarm intelligence. He has acted as program chair of many international conferences and edited 6 volumes of proceedings from Springer LNCS and AISC series. He is currently guiding 8 Ph.D. scholars. Dr. Satapathy is also a Senior Member of IEEE.


The volume presents high quality research papers presented at Second International Conference on Information and Communication Technology for Intelligent Systems (ICICC 2017). The conference was held during 2-4 August 2017, Pune, India and organized communally by Dr. Vishwanath Karad MIT World Peace University, Pune, India at MIT College of Engineering, Pune and supported by All India Council for Technical Education (AICTE) and Council of Scientific and Industrial Research (CSIR). The volume contains research papers focused on ICT for intelligent computation, communications and audio, and video data processing.

Prof. Subhash Bhalla joined as a faculty of Jawaharlal Nehru University (JNU), New Delhi in 1986, at the School of Computer and Systems Sciences. He was a Visiting Scientist at Sloan School of Management, Massachusetts Institute of Technology (MIT), Cambridge, Massachusetts, USA (1987-88). He is a member of the Computer Society of IEEE and SIGMOD of ACM. He is associated with the Department of Computer Software at the University of Aizu, Japan. He has also toured and lectured at many industries for conducting feasibility studies and for adoption of modern techniques. He has received several grants for research projects. Prof. Bhalla currently participates in the Intelligent Dictionary System Project. He is exploring database designs to support models for Information Interchange through the World Wide Web. He is working with a study team on creating user interfaces for web users and transaction management system for mobile computing. He is studying transaction management and algorithmic designs for Distributed Real-Time Systems. He is also pursuing performance evaluation and modeling of distributed algorithms. His research interests include managing components and application services; distributed client/middleware/service oriented computing; XML, e-commerce; mobile database management systems; web query and web data mining; synchronization and crash recovery; and integration of technologies. Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Bhateja has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.Dr. Anjali Chandavale is currently working as Associate Professor (Information Technology) in Maharashtra Academy of Engineering and Educational Research’s Maharashtra Institute of Technology College of Engineering, Pune, India. She has over 18 years of teaching and over 6 years of industrial experience in the field of Process Instrumentation. Her research interests include Internet Security, Image Processing and Embedded Systems. Dr. Chandavale has worked as Research and Development Engineer in Lectrotek Systems Pvt. Ltd., Pune, for 4 years and also as a Software Engineer (Design and Development) in Ajay Electronics Pvt. Ltd. (1997-1998), Pune. She has several publications in journals as well as in conference proceedings of international repute.Prof. Anil S. Hiwale is currently working as Professor and Head of Department of Information Technology, MIT College of Engineering, Pune. He completed his Ph.D. from SGB Amravati University, Amravati. Prof. Hiwale has 28 years of teaching experience and published over 50 research papers in National/International Journals and conferences. His areas of research include signal processing, digital communications, multi-antenna systems and satellite communications. He is presently supervising four Ph.D. scholars. He is a Fellow of Institution of Engineers (India) and a member of IET, CSI, ISTE and Broadcast Engineering Society of India. Prof. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering at PVP Siddhartha Institute of Technology, Andhra Pradesh, India. He obtained his Ph.D. in Computer Science and Engineering from JNTU Hyderabad and M.Tech. in CSE from NIT, Rourkela, Odisha, India. He has 26 years of teaching experience. His research interests are data mining, machine intelligence and swarm intelligence. He has acted as program chair of many international conferences and edited 6 volumes of proceedings from Springer LNCS and AISC series. He is currently guiding 8 Ph.D. scholars. Dr. Satapathy is also a Senior Member of IEEE.

Preface 6
Organizing Committee 8
Contents 9
About the Editors 16
1 35 W GaN Solid-State Driver Power Amplifier for L-Band Radar Applications 18
Abstract 18
1 Introduction 18
2 GaN Device Technology 19
3 GaN SSPA Design 20
4 Results 21
4.1 DC Analysis 21
4.2 Stability Analysis 21
4.3 Load Pull Analysis 22
4.4 Impedance Matching Network Design and Complete Amplifier Performance 22
5 Conclusion 24
References 24
2 Validation of Open Core Protocol by Exploiting Design Framework Using System Verilog and UVM 25
Abstract 25
1 Introduction 25
2 Project Scope 26
3 OCP Protocol 27
3.1 OCP Signal Description 27
4 Functional Description 28
4.1 Master 28
4.2 Slave Block 29
5 Timing Analysis 30
5.1 Basic Mode of OCP 30
5.2 Burst Mode of Operation 31
6 Simulation Results 31
6.1 Simple Mode of Operation (Both Write and Read) 32
6.2 Burst Mode of Operation (Both Write and Read) 32
7 Conclusion 33
References 33
3 Cellular Automata Logic Block Observer Based Testing for Network-on-Chip Architecture 34
Abstract 34
1 Introduction 34
2 Background 35
3 Cellular Automata Logic Block Observer 35
3.1 CALBO as Test Pattern Generator 36
3.2 CALBO as Multiple-Input Signature Register 37
4 NoC Architecture Testing with CALBO 37
4.1 NoC Architecture 37
4.2 CALBO-Based Testing for NoC 37
5 Results and Discussion 39
6 Conclusion 40
References 41
4 Structural Strength Recognizing System with Efficient Clustering Technique 42
Abstract 42
1 Introduction 42
1.1 Structural Strength Recognition 43
1.2 Structural Damage Detection 44
2 Related Work 44
2.1 SSR Techniques 44
2.2 Strength Recognizing Components 44
2.3 Advantages of SSR 45
2.4 System Integration 45
3 Problem Statement 46
4 Proposed Solution 46
5 Proposed Model 46
6 Proposed Methodology 48
6.1 SSR Application Execution Based on Proposed Methodology 48
7 Conclusion 50
References 50
5 Trajectory Outlier Detection for Traffic Events: A Survey 52
Abstract 52
1 Introduction 52
2 Related Concepts 53
2.1 Basic Concepts 53
2.1.1 Trajectory data 53
2.1.2 Trajectory outlier 53
2.2 Similarity Measures 54
2.3 Map Matching 54
2.4 Outlier Detection Techniques 54
3 Related Work 55
4 Issues and Challenges Identified 57
4.1 Trajectory Length and Sampling 57
4.2 Low and Uneven Sampling Rates 57
4.3 Trajectory Directions, Regions, and Road Networks 57
4.4 Similarity Measures 57
4.5 Map Matching Challenges 58
4.6 Outlier Detection Challenges 58
5 Research Problem 58
6 Conclusion 59
7 Future Scope 60
References 60
6 A Privacy-Preserving Approach to Secure Location-Based Data 62
Abstract 62
1 Introduction 63
2 Review of Literature 63
3 System Overview 66
4 System Architecture 66
5 Mathematical Model 67
6 Expected Results 68
7 Conclusion 69
Acknowledgements 69
References 69
7 Analysis of Blind Image Watermarking Algorithms 71
Abstract 71
1 Introduction 71
2 Literature Review 72
3 Proposed Algorithm 77
4 Conclusion 78
References 78
8 ClustMap: A Topology-Aware MPI Process Placement Algorithm for Multi-core Clusters 80
Abstract 80
1 Introduction 81
2 Topology-Aware Process Placement 81
2.1 Process Placement Techniques 81
2.2 Data Structure for System and Application Topology 82
3 Topology-Aware Process Placement Algorithm 83
3.1 The Process Mapping Problem 83
3.2 The “ClustMap” Algorithm 84
4 Related Work 85
5 Results 86
5.1 Experimental Setup 86
5.2 Latency Reduction for MPI Communication 86
5.3 Performance Evaluation of “ClustMap” Algorithm 86
6 Conclusion 87
References 89
9 Mobile Agent-Based Frequent Pattern Mining for Distributed Databases 90
Abstract 90
1 Introduction 91
2 Related Works 91
3 Proposed MADFPM Algorithm 92
4 Performance Analysis 93
4.1 Comparison with Client–Server Approach 93
4.2 Comparison with PMFI-A Approach 96
5 Conclusion 97
References 97
10 A Hybrid Approach for Preprocessing of Imbalanced Data in Credit Scoring Systems 99
Abstract 99
1 Introduction 99
2 Related Work 100
3 Proposed Model 101
4 Experimental Design 102
4.1 Experimental Setup 102
4.2 Datasets 103
4.3 Evaluation Parameters 103
5 Results and Discussion 104
6 Conclusion 106
References 107
11 Vision-Based Target Tracking Intelligent Robot Using NI myRIO with LabVIEW 108
Abstract 108
1 Introduction 108
2 Problem Definition 109
3 System Overview 109
4 Algorithm 110
5 Experimental Results 112
6 Conclusion 113
Acknowledgements 114
References 114
12 Detection of Misbehaviors Nodes in Wireless Network with Help of Pool Manager 115
Abstract 115
1 Introduction 115
2 Related Work 118
2.1 Detection of Blackhole Attacks 118
2.2 Detection of Grayhole Attacks 118
2.3 Use of DTN for Detection of Routing Attacks 119
2.4 Detection of Blackhole and Grayhole Attacks on Same Network 119
3 Proposed Methodology 120
3.1 Create Pool Manager 120
3.2 Select Destination Node 121
3.3 Shortest Path Estimation 121
3.4 Use of Hash Key 121
3.5 Identification of Malicious Nodes 122
4 Results and Discussions 123
5 Conclusion and Future scope 123
References 124
13 Evaluation of Multi-label Classifiers in Various Domains Using Decision Tree 126
Abstract 126
1 Introduction 126
2 Multi-label Classification (MLC) 127
3 Various Methods 129
4 Experimentation and Results 132
5 Conclusion 135
References 136
14 An Effective Multilabel Classification Using Feature Selection 137
Abstract 137
1 Introduction 138
2 Related Work 138
3 Implementation Details 139
3.1 FSVIG Multilabel Feature Selection Algorithm Details 139
3.2 CK-STC Multilabel Classification Algorithm Details 139
4 Experimental Setup 140
5 Experimental Results 141
6 Conclusions 149
References 149
15 High-Performance Pipelined FFT Processor Based on Radix-22 for OFDM Applications 151
Abstract 151
1 Introduction 151
2 Proposed FFT Processor Design Based on Radix-22 CFA 152
3 Data Flow of Proposed 256-Point FFT Processor 155
4 Comparison 157
5 Conclusions 158
References 159
16 An Image Processing Approach to Blood Spatter Source Reconstruction 160
Abstract 160
1 Introduction 160
2 Methodology 162
2.1 Orthorectification and Interpolation 162
2.2 Blood Droplet Segmentation 162
2.3 Ellipse Detection 163
2.4 Major and Minor Axes Analysis of Individual Ellipses 164
2.4.1 The y-z Plane Projection 164
2.4.2 Projection in the x Dimension 165
2.4.3 Plotting of the Projections 165
2.5 Gravity Correction 166
3 The Dataset 166
4 Result 168
5 Conclusion and Future Scope 168
Disclaimers 168
References 169
17 Overlapping Character Recognition for Handwritten Text Using Discriminant Hidden Semi-Markov Model 170
Abstract 170
1 Introduction 170
2 Methodology 172
2.1 Preprocessing 172
2.1.1 Thresholding 172
2.1.2 Skew Correction 173
2.1.3 Character Segmentation 173
2.2 Character Feature Recognition Using HsMM 174
2.3 Feature Function Extraction 175
2.3.1 Appearance of Character 175
2.3.2 Character Gradients 176
2.3.3 Overlap in Characters 176
2.3.4 Gap Between Characters 176
2.3.5 Sparse-Based Parsing 176
3 Experiment and Analysis 177
4 Results and Discussion 178
5 Conclusion 178
References 178
18 A Literature Survey on Authentication Using Behavioural Biometric Techniques 180
Abstract 180
1 Introduction 180
2 Classification of Behavioural Biometrics 181
3 Evaluation Metrics 182
4 Survey of Techniques 183
4.1 Keystroke Dynamics 183
4.2 Mouse Dynamics 183
4.3 Haptics 184
4.4 Gait 184
4.5 Log Files 185
5 Comparative Study 185
6 Conclusion 186
References 186
19 Number System Oriented Text Steganography in English Language for Short Messages: A Decimal Approach 189
Abstract 189
1 Introduction 190
2 Steganography 191
3 Previous Work 191
3.1 Use of Markup Languages in Text Steganography 192
3.2 Text Steganography in Explicit Characters in Words 192
3.3 Line Shifting Technique 193
3.4 The Altering of Words 193
3.5 Syntactic Scheme 193
3.6 Semantic Schemes 193
4 Recommended Method 194
5 Technical Background 195
6 Proposed Algorithm 196
6.1 Encoding Algorithm 197
6.2 Decoding Algorithm 197
7 Conclusion 198
References 198
20 Novel Robust Design for Reversible Code Converters and Binary Incrementer with Quantum-Dot Cellular Automata 200
Abstract 200
1 Introduction 200
2 Previous Work 201
3 Building Blocks of Code Converter and Binary Incremental 202
3.1 Ex-OR Gate in QCA 202
3.2 Reversible Code Converter Implementation in QCA 202
3.3 Reversible Binary Incrementer in QCA 205
3.4 Reversible 1-Bit Binary Incrementer 205
3.5 2-Bit Reversible Binary Incrementer 206
3.6 3-Bit Reversible Binary Incrementer 207
3.7 Reversible n-Bit Binary Incrementer 207
4 Comparative Statistics 207
5 Conclusion 209
References 209
21 Routing with Secure Alternate Path Selection for Limiting the Sink Relocation and Enhanced Network Lifetime 211
Abstract 211
1 Introduction 212
2 Literature Survey 213
3 Implementation Details 214
3.1 System Overview 214
3.2 Mathematical Model 216
3.3 Algorithm 216
3.4 Experimental Setup 217
4 Results Discussion 218
5 Conclusion 219
References 219
22 Gene Presence and Absence in Genomic Big Data for Precision Medicine 221
Abstract 221
1 Introduction 222
2 Methods 224
3 Results and Discussion 226
3.1 Case Study (RNA) 227
3.2 Estimating Presence/Absence of Genes Using Exome Data 227
4 Conclusion 228
References 229
23 A Survey on Service Discovery Mechanism 231
Abstract 231
1 Introduction 231
2 Motivation 232
3 Related Work 234
4 Comparative Analysis 238
5 Conclusions and Future Work 239
References 239
24 Analysis of Multiple Features and Classifier Techniques Combination for Image Pattern Recognition 241
Abstract 241
1 Introduction 241
2 Feature Extraction for Pattern Recognition 242
2.1 Radon Signature Features 242
2.2 Projection of Rotated Gradient Features 244
2.3 Quantized Histogram of Orientated Gradient Features 245
3 Comparative Implementation and Analysis 246
4 Results and Discussion 248
5 Conclusion 249
References 249
25 Smart and Precision Polyhouse Farming Using Visible Light Communication and Internet of Things 250
Abstract 250
1 Introduction 251
2 Methodology 252
2.1 Sensor Network 252
2.2 Visible Light Communication (VLC) 254
2.3 Cloud Computing and Analytics 255
2.4 Fertilizer Suggestion 255
3 Experimental Results and Analysis 256
4 Conclusion 258
5 Future Scope 258
References 258
26 Acceleration of CNN-Based Facial Emotion Detection Using NVIDIA GPU 260
Abstract 260
1 Introduction 260
2 Background 261
3 JAFFE Database and Proposed CNN Architecture 263
4 Results and Discussions 264
5 Conclusion and Future Scope 265
References 266
27 Research Issues for Energy-Efficient Cloud Computing 268
Abstract 268
1 Introduction 268
2 Survey of Work Done 270
3 Mathematical Model for Energy Efficient Cloud 272
4 Simulation Result with MATLAB 273
5 Research Issues 273
6 Conclusion 274
References 274
28 Implementation of REST API Automation for Interaction Center 276
Abstract 276
1 Introduction 276
2 Related Work 277
3 Proposed Work 277
4 Result 279
5 Conclusion 280
Acknowledgements 280
References 280
29 Predictive Analysis of E-Commerce Products 281
Abstract 281
1 Introduction 282
2 Related Works 282
3 Proposed Scheme 283
4 Algorithm 284
5 Result 288
6 Conclusion 290
References 290
30 User Privacy and Empowerment: Trends, Challenges, and Opportunities 292
Abstract 292
1 Introduction 293
2 Users, Data Brokers, and Privacy Concerns 294
2.1 Internet User 294
2.2 How Do Data Brokers Work? 294
2.3 Who Are the Data Brokers? 295
3 State-of-the-Art Technologies and Frameworks 295
3.1 Tools to Support Privacy 296
3.2 Privacy Enhancing Technologies 296
4 Privacy Issues from Users and Service Providers View 296
4.1 User Understanding and Awareness About Privacy 299
4.2 Privacy Policy Understanding 299
4.3 User Control 299
4.4 Service Provider’s Issues 299
5 New Challenges and Recommendations 300
5.1 User Awareness and Personal Flow Visualization 300
5.2 Assurance and Truth 301
5.3 Privacy Protection 301
5.4 User Consent Gaining 301
5.5 User-Centric Businesses with Transparency 302
6 Privacy Protection Parties and Responsibilities 302
6.1 Individual Users 302
6.2 Service Providers 303
6.3 Government and Governing Bodies 303
6.4 Data Brokers/Advertisers/Third Party App Developers 303
7 Conclusion 303
References 304
31 Evolution Metrics for a BPEL Process 306
Abstract 306
1 Introduction 307
2 Related Work 308
3 BPEL Process 309
4 Evolution Metrics 309
5 Metrics Formal Validation 310
5.1 BEMI Metric Formal Validation 310
5.2 BEMI and the Modified Extensive Structure 312
5.3 BEMI and the Independence Conditions 312
5.4 BEMI and the Modified Relation of Belief 313
6 Metrics Computation Algorithm 314
7 Cohesiveness of Changes in a BPEL Process Vis-à-Vis Changes in a Service 314
8 Conclusion 316
References 316
32 Development of Performance Testing Suite Using Apache JMeter 318
Abstract 318
1 Introduction 318
2 Existing System 319
3 Literature Survey 320
4 Architecture 320
5 Results and Analysis 324
6 Conclusion 325
Acknowledgements 326
References 326
33 Characterizing Network Flows for Detecting DNS, NTP, and SNMP Anomalies 328
Abstract 328
1 Introduction 328
2 Problem Definition 329
3 Dataset Used 330
3.1 Network Architecture 330
3.2 Data Collection 331
4 Analysis of Flows 331
4.1 Research Goal 1 331
4.2 Research Goal 2 332
4.3 Research Goal 3 338
5 Conclusion and Future Work 340
References 340
34 Periocular Region Based Biometric Identification Using the Local Descriptors 342
Abstract 342
1 Introduction 342
2 Proposed Methodology 344
2.1 Face Recognition Grand Challenge (FRGC) 344
2.2 Pre-processing of Face/Periocular Images 345
2.3 Periocular Region Extraction 345
2.4 Feature Extraction 345
2.4.1 Local Binary Pattern (LBP) 345
2.4.2 Local Phase Quantization 346
2.4.3 Histogram of Oriented Gradients (HOG) 347
2.4.4 Weber Local Descriptor (WLD) 347
2.5 Classification Using City Block Distance Metric 347
3 Performance Measures 348
4 Results 348
5 Conclusion 350
References 351
35 Model-Based Design Approach for Software Verification Using Hardware-in-Loop Simulation 353
Abstract 353
1 Introduction 353
2 Literature Survey 354
3 Traditional Design Approach of Application Control Units (ACU) 355
3.1 Concept of Model-Based Design (MBD) 356
4 Hardware-in-Loop Simulation 356
4.1 Plant Modeling 357
5 Model Fidelity 358
5.1 Scaling-Based Approach to Determine Model Fidelity 358
5.2 HIL and Model Fidelity 358
6 Case Study: Temperature Sensor Modeling 359
7 Conclusion 360
References 360
36 Silhouette-Based Human Action Recognition by Embedding HOG and PCA Features 362
Abstract 362
1 Introduction 362
2 Previous Work 363
3 Proposed Framework 364
3.1 Foreground Segmentation and Silhouette Extraction 364
3.2 HOG Feature Vector 365
3.3 PCA Feature Vector 366
3.4 HOG-PCA Feature Vector 366
3.5 KNN Classifier 366
4 Experimental Setup 366
4.1 Weizmann Dataset 366
4.2 KTH Dataset 367
5 Experimental Results 367
5.1 Results with Weizmann Dataset 367
5.2 Results with KTH Dataset 368
6 Conclusion 368
References 369
37 Unified Algorithm for Melodic Music Similarity and Retrieval in Query by Humming 371
Abstract 371
1 Introduction 371
2 Music Background and Contemplations 373
3 Related Work 374
4 Basic Framework and Pattern Matching Algorithms 375
5 Mode Normalized Frequency (MNF) Algorithm 376
6 Analysis of Results 377
7 Summary and Future Directions 378
Acknowledgements 379
References 379
38 Predict Stock Market Behavior: Role of Machine Learning Algorithms 380
Abstract 380
1 About Stock Markets 380
1.1 Stock Market Prediction Methods 381
1.2 Models Used for Stock Market Prediction 382
2 Methodologies: Machine Learning (ML) Algorithms 383
2.1 Analysis of Various Machine Learning Algorithms Used by Data Scientists 384
2.2 The Challenge 389
3 Conclusion 390
References 390
39 Stability of Local Information-Based Centrality Measurements Under Degree Preserving Randomizations 392
Abstract 392
1 Introduction 392
2 Background 394
2.1 Local Information-Based Centrality Measure 394
2.2 Degree Preserving Randomization 394
2.3 Related Work 395
2.4 Stability 396
3 Experiments and Results 397
4 Conclusion 399
References 399
40 Hybrid Solution for E-Toll Payment 401
Abstract 401
1 Introduction 401
2 Related Work 402
3 Proposed Idea 405
4 How Will ETC Work in India 406
5 Strategy Used for Govt. Vehicles and Ambulance 406
6 How the Payment Can Be Made 406
7 Violation Handling 407
8 Implementation Procedure of the Idea 407
9 Documents Needed to Apply for FASTag 409
10 Procedure of Getting the FASTag 409
11 Advantages 409
12 Conclusion 409
References 410
41 Enhancing Distributed Three Hop Routing Protocol in Hybrid Wireless Network Through Data Weight-Based Scheme 411
Abstract 411
1 Introduction 412
2 Related Work 414
2.1 Shortest Path Identification 414
2.2 Analyze Response Delay 414
2.3 Weight-Based Data Assignment Technique 415
2.4 Hop Routing 415
3 Proposed Methodology 415
3.1 Create Base Station 416
3.2 Shortest Path Identification Using Fuzzy Logic 416
3.3 Analyze Response Delay 417
3.4 Data Fragmentation Using Weight-Based Assignment Scheme 417
3.5 Data Routing 418
4 Results and Discussions 418
5 Conclusion and Future Scope 419
References 420
42 VLSI-Based Data Hiding with Transform Domain Module Using FPGA 421
Abstract 421
1 Introduction 421
2 Related Work 422
3 Proposed Research Work 423
3.1 Embedder 424
3.2 Extractor 424
3.3 Embedding Algorithm 424
3.4 Extractor Algorithm 425
3.5 Hardware-Experimental Setup 426
4 Results 428
4.1 Experimental Results 428
4.2 Performance Evaluation 428
5 Conclusions and Future Scope 429
References 429
43 A Novel Approach of Frequent Itemset Mining Using HDFS Framework 431
Abstract 431
1 Introduction 431
2 Related Work 432
3 Problem Statement 434
4 System Architecture 434
4.1 Objectives of Proposed System 434
5 System Analysis 436
5.1 Algorithm for Frequent 1 Itemsets [3] 436
5.2 Algorithm for Frequent-K-Itemsets 437
5.3 Algorithm for FIMMA 438
5.4 Mathematical Model 438
6 Experimental Results 439
7 Conclusion 441
References 441
44 Issues of Cryptographic Performance in Resource-Constrained Devices: An Experimental Study 443
Abstract 443
1 Introduction 443
2 Architectures of Mobile Device Operating System 445
3 Security Aspects and Analysis in Mobile Devices 446
4 Cryptographic Experiments 448
5 Results and Discussions 449
6 Conclusion 450
References 451
45 Assessment of Object Detection Using Deep Convolutional Neural Networks 452
Abstract 452
1 Introduction 453
2 Object Detection 453
3 Building Blocks of Convolutional Neural Network 454
3.1 CNN Architecture 454
3.2 Pooling Layers 455
3.3 Regularization 456
4 State-of-the-Art Object Detection Approaches Using DCNN 457
5 Conclusion 460
References 460
46 Implementation of Credit Card Fraud Detection System with Concept Drifts Adaptation 462
Abstract 462
1 Introduction 462
2 Related Work 463
3 Proposed Work 464
3.1 Overview of Credit Card Processing 464
3.2 Proposed System 465
3.3 Implementation 466
3.3.1 DB Design 467
3.3.2 Algorithm 468
3.3.3 Project Results 469
3.4 Fraud Detection System Evaluation 469
4 Conclusion 471
References 471
47 Intelligent Traffic Control by Multi-agent Cooperative Q Learning (MCQL) 473
Abstract 473
1 Introduction 474
2 Related Work 474
2.1 Traffic Estimation Parameters 475
2.2 Reinforcement Learning 476
3 Multi-agent Cooperative Q Learning (MCQL) 476
4 Model Design 478
5 Experimental Results 480
6 Conclusion 482
References 482
48 Digital Tokens: A Scheme for Enabling Trust Between Customers and Electronic Marketplaces 484
Abstract 484
1 Introduction 484
2 Related Work 485
3 Proposed System: Architecture and Processes 486
3.1 Entities 486
3.2 Digital Token 486
3.3 Architecture 486
3.4 Processes 487
4 Implementation 489
4.1 Features and Assumptions 489
4.2 Digital Token Encoding 490
4.3 Schema 491
4.4 Communication Between Vendor and DTSP 492
4.5 Screenshots 492
5 Performance Analysis 493
5.1 Time Taken to Generate a Digital Token 493
5.2 Time Taken for Authentication and Validation 493
5.3 Analysis 494
6 Conclusion and Future Work 495
References 495
49 BMWA: A Novel Model for Behavior Mapping for Wormhole Adversary Node in MANET 497
Abstract 497
1 Introduction 497
2 Related Work 498
3 Problem Description 499
4 Proposed Methodology 499
5 Algorithm Implementation 500
6 Results Discussion 502
7 Conclusion 503
References 504
50 AWGN Suppression Algorithm in EMG Signals Using Ensemble Empirical Mode Decomposition 506
Abstract 506
1 Introduction 507
2 Proposed AWGN Suppression Algorithm 508
2.1 EEMD 508
2.2 Morphological Filtering 509
3 Results and Discussions 510
3.1 Analysis of the Structuring Element 511
3.2 Analysis of Filtered EMG Signals 511
4 Conclusion 513
References 514
51 Visible-Infrared Image Fusion Method Using Anisotropic Diffusion 516
Abstract 516
1 Introduction 517
2 Proposed Visible-Infrared Fusion Method 518
2.1 Anisotropic Diffusion (AD) Filtering 518
2.2 Image Fusion Algorithm Based on the Combination of AD and Max-Min Rule 519
3 Results and Discussions 520
4 Conclusion 522
References 522
52 Fast Radial Harmonic Moments for Invariant Image Representation 524
Abstract 524
1 Introduction 524
2 Proposed Work 525
2.1 Radial Harmonic Fourier Moments 525
3 Reconstruction of Image and Error in Reconstruction 527
4 Experiment Result 527
5 Conclusions 529
References 529
53 A Wide-Area Network Protection Method Using PMUs 530
Abstract 530
1 Introduction 530
2 Proposed Protection Scheme 531
2.1 Identification of Faulted Bus 532
2.2 Identification of Faulted Line 532
2.3 Flowchart of the Proposed Protection Scheme 533
3 Simulation Results 534
3.1 Results from Identification of Faulted Bus 534
3.2 Results from Identification of Faulted Line 535
4 Conclusion 536
References 537
54 Analysis and Prediction of the Effect of Surya Namaskar on Pulse of Different Prakruti Using Machine Learning 538
Abstract 538
1 Introduction 539
2 Proposed Framework 540
2.1 Data Acquisition 540
2.2 Data Preprocessing 542
2.3 Feed Forward Neural Network 543
3 Observations and Discussion 544
4 Conclusion 546
References 546
55 Cognitive Depression Detection Methodology Using EEG Signal Analysis 548
Abstract 548
1 Introduction 549
2 Previous Work 549
3 Data Collection 550
4 Methodology 550
4.1 Occipito-Parietal Wave 550
4.2 Feature Extraction 551
5 Analysis 553
5.1 Square Mean Voltage 553
5.2 Low-Frequency Activity 553
5.3 Classification 554
6 Results 555
7 Conclusion 555
References 556
56 Biogas Monitoring System Using DS18B20 Temperature Sensor and MQTT Protocol 558
Abstract 558
1 Introduction 559
2 Message Queuing Telemetry Transport 560
3 Sensor 563
4 Raspberry Pi 564
5 Web Interface 564
6 Android Application 565
7 Design and Implementation 565
8 Conclusion and Future Scope 567
References 568
57 Time-Efficient and Attack-Resistant Authentication Schemes in VANET 569
Abstract 569
1 Introduction 569
2 Existing Authentication Schemes in VANET 571
3 Experimental Analysis of Authentication in VANET 571
3.1 Mathematical Analysis of Time Required for Authentication and Vehicles Serves by the RSU 571
3.2 Analysis of Time Required for Authentication and Vehicles Serves by RSU with Respective Key Size (RSA Algorithm) 573
3.3 Analysis of Time Required for Authentication and Vehicles Serves by RSU with Respective Key Size (ECC Algorithm) 574
4 Presented Authentication Schemes for VANET 574
4.1 Simulation 576
4.2 Algorithms/Processing 576
4.2.1 AECC (Adaptive Elliptic Curve Cryptography)-Based Authentication 576
4.2.2 EECC (Enhanced Elliptic Curve Cryptography)-Based Authentication 577
4.3 RSU and Server 578
5 Conclusion 578
References 579
58 Inferring User Emotions from Keyboard and Mouse 580
Abstract 580
1 Introduction 580
2 Literature Survey 581
2.1 Affective Haptics 581
2.1.1 Applications of Affective Haptics 581
2.2 Detecting and Recognizing Emotional Information 582
2.3 Emotions in Machines 583
3 Mathematical Modeling 583
4 Proposed Work 583
5 Implementation 585
5.1 Detecting User Web Activities 585
5.2 Material Used for Physiological Signals 585
6 Results 587
7 Emotion Detection 590
8 Conclusion 590
References 590
59 An Overview of Automatic Speaker Verification System 591
Abstract 591
1 Introduction 591
2 Automatic Speaker Verification 592
2.1 Feature Extraction 594
2.2 Speaker Modeling and Classifiers 594
2.3 System Fusion 595
3 Experiment Information 595
3.1 Information of Database 596
4 Experimental Results 596
5 Conclusion 597
References 598
60 Topic Modeling on Online News Extraction 599
Abstract 599
1 Introduction 599
2 Literature Survey 601
3 System Architecture/System Overview 602
3.1 Problem Statement 602
3.2 Proposed System Overview 603
3.3 Algorithm 605
3.4 Mathematical Model 605
4 System Analysis 606
4.1 Experimental Setup 606
4.2 Dataset 606
4.3 Performance Measures 607
4.4 Result 607
5 Conclusion and Future Scope 609
References 609
61 Spam Mail Detection Using Classification Techniques and Global Training Set 611
Abstract 611
1 Introduction 612
1.1 Why We Need Spam Filtering and Advantages of Classification Techniques for Spam Filtering 612
1.2 Type of Spam Mail and Their Composition 613
2 Related Works 613
3 Problem Statement 614
4 Implementation 614
5 Knowledge Engineering 615
6 Classification Techniques 615
6.1 Naïve Bayesian Classifier 615
6.2 k-Nearest Neighbor 615
6.3 Support Vector Machine Classifier Method 616
6.4 Artificial Neural Network 616
7 Proposed Work 617
8 Result 618
9 Conclusion 619
References 619
62 Smart Gesture Control for Home Automation Using Internet of Things 621
Abstract 621
1 Introduction 622
2 Literature Review 622
3 Analysis 623
4 Gesture Recognition 623
5 Proposed Work 625
5.1 Methodology Adopted 625
5.2 Proposed Model 626
6 Conclusion 628
Acknowledgements 628
References 628
63 A Proposed Maturity Model for Himachal Pradesh Government e-Services 630
Abstract 630
1 Introduction 630
2 Literature Survey 631
3 Methodology Adopted 633
4 Proposed Maturity Model 633
5 Information Security Model 636
6 Conclusion 638
Acknowledgements 638
References 638
64 Malaria Detection Using Improved Fuzzy Algorithm 640
Abstract 640
1 Introduction 641
2 Literature Survey 641
3 Fuzzy Logic System 642
4 Methodology 643
4.1 Data Collection 643
4.2 Input Data 644
4.3 Fuzzification 644
4.4 Data Store 644
4.5 Fuzzy Inference Engine 646
4.6 Defuzzification 646
5 Algorithm 647
6 Research Experimentation 648
7 Comparing Results of Malaria Diagnosis 648
8 Results 650
9 Conclusion 650
References 652
65 Feature Extraction Techniques Based on Human Auditory System 653
Abstract 653
1 Introduction 653
2 Human Auditory System 655
3 Issues in ASR System 655
4 Overview of Feature Extraction in Speech Recognition 656
5 Feature Extraction Techniques 657
5.1 Perceptual Linear Prediction (PLP) 658
5.2 Zero Crossing with Peak Amplitude (ZCPA) 659
5.3 Mel Frequency Cepstral Coefficient 660
6 Conclusion 661
References 662
66 Movie Recommendation System: Hybrid Information Filtering System 663
Abstract 663
1 Introduction 663
2 Literature Review 664
3 Proposed System 666
3.1 Architecture 666
3.2 Working of the Hybrid Filtering System 667
3.3 Proposed Algorithm 667
4 Data 668
5 Results 669
6 Conclusion 671
References 672
67 Eco-Friendly Green Computing Approaches for Next-Generation Power Consumption 673
Abstract 673
1 Introduction 673
2 Investigating the Power Consumption 674
2.1 Advantage of Using Thin Clients 674
2.2 Consideration for General Changes 675
2.3 Converting a Company into Green Company 675
3 Feasible Green Computing Trends 676
3.1 Virtualization 676
3.2 PC Energy Usage 677
3.3 Recycling Devices 678
4 Conclusion 679
References 679
68 Implementing Test Automation Framework Using Model-Based Testing Approach 681
Abstract 681
1 Introduction 682
2 Related Work 683
3 Solution for Test Designing Using Model Based Testing 684
3.1 Features of the Solution 684
4 Proposed Approach for Test Automation Using Model Based Testing 685
4.1 Integration with Test Automation Frameworks 688
5 Conclusion and Future Scope 689
References 689
69 Improved Exemplar-Based Image Inpainting Approach 691
Abstract 691
1 Introduction 692
1.1 Texture Synthesis 692
1.2 Partial Differential Equation Based 693
1.3 Exemplar and Search Based 693
2 Literature Review 694
3 Methodology 694
4 About the Tool 696
4.1 Structuring Element 697
4.2 Dilation 697
5 Results 698
6 Conclusion 702
References 702
70 The Hidden Truth Anonymity in Cyberspace: Deep Web 704
Abstract 704
1 Introduction 704
1.1 Dark Web Services 705
1.2 Deep Web Services 706
2 Related Work 707
3 Methodology 708
4 Results 709
5 Conclusion 713
6 Future Work 713
References 714
71 Test Case Optimization and Prioritization of Web Service Using Bacteriologic Algorithm 716
Abstract 716
1 Introduction 717
2 Terminologies 718
2.1 Test Case 718
2.2 Test Suite 718
2.3 Test Case Minimization 718
2.4 Test Case Prioritization 718
2.5 Exhaustive Testing 719
2.6 Web Service 719
2.7 Genetic Algorithm 719
2.8 Bacteriologic Algorithm 720
3 Related Works 720
4 Architecture and Algorithm Used 722
4.1 Flow Diagram 722
4.2 Algorithm Applied 723
4.3 Formula Required 724
5 Case Study 724
6 Results and Discussion 725
7 Conclusions and Future Work 728
References 728
Author Index 730

Erscheint lt. Verlag 19.1.2018
Reihe/Serie Advances in Intelligent Systems and Computing
Advances in Intelligent Systems and Computing
Zusatzinfo XVIII, 747 p. 323 illus.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Datenbanken Data Warehouse / Data Mining
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte bio-informatics • Cloud Computing • Geo-informatics Algorithm • Graphics and Image processing, Graph labeling • ICICC • ICICC 2017 • Intelligent Communication • intelligent computing • Intelligent Embedded Systems • Intelligent Forensics • Web Security, Privacy and E-Commerce
ISBN-10 981-10-7245-0 / 9811072450
ISBN-13 978-981-10-7245-1 / 9789811072451
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 21,2 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Datenschutz und Sicherheit in Daten- und KI-Projekten

von Katharine Jarmul

eBook Download (2024)
O'Reilly Verlag
24,99