Advanced Computational and Communication Paradigms -

Advanced Computational and Communication Paradigms (eBook)

Proceedings of International Conference on ICACCP 2017, Volume 2
eBook Download: PDF
2018 | 1st ed. 2018
XVIII, 815 Seiten
Springer Singapore (Verlag)
978-981-10-8237-5 (ISBN)
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The book titled Advanced Computational and Communication Paradigms: Proceedings of International Conference on ICACCP 2017, Volume 2 presents refereed high-quality papers of the First International Conference on Advanced Computational and Communication Paradigms (ICACCP 2017) organized by the Department of Computer Science and Engineering, Sikkim Manipal Institute of Technology, held from 8- 10 September 2017.

ICACCP 2017 covers an advanced computational paradigms and communications technique which provides failsafe and robust solutions to the emerging problems faced by mankind. Technologists, scientists, industry professionals and research scholars from regional, national and international levels are invited to present their original unpublished work in this conference. There were about 550 technical paper submitted. Finally after peer review, 142 high-quality papers have been accepted and registered for oral presentation which held across 09 general sessions and 05 special sessions along with 04 keynote address and 06 invited talks. This volume comprises 77 accepted papers of ICACCP 2017.



Dr. Siddhartha Bhattacharyya [FIETE, SMIEEE, SMACM, SMIETI, LMCSI, LMOSI, LMISTE, MIET (UK), MIAENG, MIRSS, MIAASSE, MCSTA, MIDES, MIISIP] did his Bachelors in Physics, Bachelors in Optics and Optoelectronics and Masters in Optics and Optoelectronics from University of Calcutta, India in 1995, 1998 and 2000 respectively. He completed PhD in Computer Science and Engineering from Jadavpur University, India in 2008. He is the recipient of the University Gold Medal from the University of Calcutta for his Masters. He is the recipient of the coveted Adarsh Vidya Saraswati Rashtriya Puraskar in 2016, Distinguished HoD and Distinguished Professor wards conferred by Computer Society of India, Mumbai Chapter, India in 2017 and Bhartiya Shiksha Ratan Award conferred by Economic Growth Foundation, New Delhi in 2017.  He received the NACF-SCRA, India award for Best Faculty for Research in 2017. He received Honorary Doctorate Award (D. Litt.) from The University of South America in 2017. He is also the recipient of the South East Asia Regional Computing Confederation (SEARCC) International Digital Award ICT Educator of the Year at Colombo, Sri Lanka in 2017. He is currently the Principal of RCC Institute of Information Technology, Kolkata, India. In addition, he is also serving as the Dean (Research and Development and Academic Affairs) of the institute. He is a co-author of 4 books and the co-editor of 8 books and has more than 170 research publications in international journals and conference proceedings to his credit. He has got a patent on intelligent colorimeter technology.

Dr. Nabendu Chaki is a Professor in the Department Computer Science & Engineering, University of Calcutta, Kolkata, India. He has completed Ph.D. in 2000 from Jadavpur University, India. He is sharing 7 international patents including 4 US patents. Prof. Chaki had been quite active during 2009-2015 towards developing international standards for Software Engineering and Cloud Computing as a member of Global Directory (GD) member for ISO-IEC. Besides editing nearly 30 book volumes, Nabendu has authored 7 text and research books and has more than 160 Scopus Indexed research papers in Journals and International conferences. His areas of research interests include distributed systems, image processing and software engineering.  Dr. Chaki has served as a Research Faculty in the Ph.D. program in Software Engineering in U.S. Naval Postgraduate School, Monterey, CA. He is a visiting faculty member for many Universities in India and abroad. Prof. Chaki is the founder Chair of ACM Professional Chapter in Kolkata.

Mr. Debanjan Konar is currently working as Assistant Professor in the Department of Computer Science and Engineering, Sikkim Manipal Institute of Technology. He is also pursuing his PhD from the Department of Electrical Engineering, IIT Delhi. He is currently associated with the Quantum Inspired Soft Computing research community in India and abroad. His important research contribution include in the field of quantum computing, rough set theory, natural language processing (NLP). He has published in esteemed International journals and conference. He is recognized reviewer of the Journal of Applied Soft Computing. He is a member of IEEE and Computer Society of India.

Mr. Udit Kr. Chakraborty achieved his Bachelors and Masters degrees in Computer Science & Engineering from the North Eastern Regional Institute of Science & Technology and Sikkim Manipal University in 2000 and 2009, respectively. At the time of compilation of this volume, he awaits his thesis defense from the University of Calcutta, Kolkata in the field of Intelligent Learner Computer Interaction. He has 14 years teaching experience prior to which he spent 3 years with the industry working on security systems and telemedicine implementations. His research and teaching interests lie in the areas of soft computing, machine learning, natural language processing and theory of computation. Udit has also co-authored a book on soft computing.

Dr. Tejbanta Singh Chingtham, PhD, is a Professor in Department of Computer Science & Engineering. He has 18 years of teaching experience in Computer Science & Engineering and his areas of interest include robotics, computational intelligence, human computer interaction, artificial intelligence, etc. He has large number of publications both in Journals and Conferences beside he has also served as Associate Editor of many journals and as Technical Programme Committee of many International Conferences of high repute. He has also involved in execution of projects with grant from AICTE, MHRD and Microsoft Research India (MSRI). Currently, he is on board of International Journal of Intelligent Systems and Applications in Robotics. 


The book titled Advanced Computational and Communication Paradigms: Proceedings of International Conference on ICACCP 2017, Volume 2 presents refereed high-quality papers of the First International Conference on Advanced Computational and Communication Paradigms (ICACCP 2017) organized by the Department of Computer Science and Engineering, Sikkim Manipal Institute of Technology, held from 8- 10 September 2017. ICACCP 2017 covers an advanced computational paradigms and communications technique which provides failsafe and robust solutions to the emerging problems faced by mankind. Technologists, scientists, industry professionals and research scholars from regional, national and international levels are invited to present their original unpublished work in this conference. There were about 550 technical paper submitted. Finally after peer review, 142 high-quality papers have been accepted and registered for oral presentation which held across 09 general sessions and 05 special sessions along with 04 keynote address and 06 invited talks. This volume comprises 77 accepted papers of ICACCP 2017.

Dr. Siddhartha Bhattacharyya [FIETE, SMIEEE, SMACM, SMIETI, LMCSI, LMOSI, LMISTE, MIET (UK), MIAENG, MIRSS, MIAASSE, MCSTA, MIDES, MIISIP] did his Bachelors in Physics, Bachelors in Optics and Optoelectronics and Masters in Optics and Optoelectronics from University of Calcutta, India in 1995, 1998 and 2000 respectively. He completed PhD in Computer Science and Engineering from Jadavpur University, India in 2008. He is the recipient of the University Gold Medal from the University of Calcutta for his Masters. He is the recipient of the coveted Adarsh Vidya Saraswati Rashtriya Puraskar in 2016, Distinguished HoD and Distinguished Professor wards conferred by Computer Society of India, Mumbai Chapter, India in 2017 and Bhartiya Shiksha Ratan Award conferred by Economic Growth Foundation, New Delhi in 2017.  He received the NACF-SCRA, India award for Best Faculty for Research in 2017. He received Honorary Doctorate Award (D. Litt.) from The University of South America in 2017. He is also the recipient of the South East Asia Regional Computing Confederation (SEARCC) International Digital Award ICT Educator of the Year at Colombo, Sri Lanka in 2017. He is currently the Principal of RCC Institute of Information Technology, Kolkata, India. In addition, he is also serving as the Dean (Research and Development and Academic Affairs) of the institute. He is a co-author of 4 books and the co-editor of 8 books and has more than 170 research publications in international journals and conference proceedings to his credit. He has got a patent on intelligent colorimeter technology. Dr. Nabendu Chaki is a Professor in the Department Computer Science & Engineering, University of Calcutta, Kolkata, India. He has completed Ph.D. in 2000 from Jadavpur University, India. He is sharing 7 international patents including 4 US patents. Prof. Chaki had been quite active during 2009-2015 towards developing international standards for Software Engineering and Cloud Computing as a member of Global Directory (GD) member for ISO-IEC. Besides editing nearly 30 book volumes, Nabendu has authored 7 text and research books and has more than 160 Scopus Indexed research papers in Journals and International conferences. His areas of research interests include distributed systems, image processing and software engineering.  Dr. Chaki has served as a Research Faculty in the Ph.D. program in Software Engineering in U.S. Naval Postgraduate School, Monterey, CA. He is a visiting faculty member for many Universities in India and abroad. Prof. Chaki is the founder Chair of ACM Professional Chapter in Kolkata. Mr. Debanjan Konar is currently working as Assistant Professor in the Department of Computer Science and Engineering, Sikkim Manipal Institute of Technology. He is also pursuing his PhD from the Department of Electrical Engineering, IIT Delhi. He is currently associated with the Quantum Inspired Soft Computing research community in India and abroad. His important research contribution include in the field of quantum computing, rough set theory, natural language processing (NLP). He has published in esteemed International journals and conference. He is recognized reviewer of the Journal of Applied Soft Computing. He is a member of IEEE and Computer Society of India. Mr. Udit Kr. Chakraborty achieved his Bachelors and Masters degrees in Computer Science & Engineering from the North Eastern Regional Institute of Science & Technology and Sikkim Manipal University in 2000 and 2009, respectively. At the time of compilation of this volume, he awaits his thesis defense from the University of Calcutta, Kolkata in the field of Intelligent Learner Computer Interaction. He has 14 years teaching experience prior to which he spent 3 years with the industry working on security systems and telemedicine implementations. His research and teaching interests lie in the areas of soft computing, machine learning, natural language processing and theory of computation. Udit has also co-authored a book on soft computing. Dr. Tejbanta Singh Chingtham, PhD, is a Professor in Department of Computer Science & Engineering. He has 18 years of teaching experience in Computer Science & Engineering and his areas of interest include robotics, computational intelligence, human computer interaction, artificial intelligence, etc. He has large number of publications both in Journals and Conferences beside he has also served as Associate Editor of many journals and as Technical Programme Committee of many International Conferences of high repute. He has also involved in execution of projects with grant from AICTE, MHRD and Microsoft Research India (MSRI). Currently, he is on board of International Journal of Intelligent Systems and Applications in Robotics. 

Preface 7
Contents 9
About the Editors 16
1 A Proposed Artificial Neural Network (ANN) Model Using Geophone Sensors to Detect Elephants Near the Railway Tracks 18
Abstract 18
1 Introduction 18
2 Methodology 19
3 Result Analysis 22
4 Discussion 22
5 Conclusion 23
References 23
2 Local Region with Optimized Boundary Driven Level Set Based Segmentation of Myocardial Ischemic Cardiac MR Images 24
Abstract 24
1 Introduction 25
2 Materials and Methods 26
2.1 Database 26
2.2 Methodology 26
2.3 Validation Measures 27
3 Results and Discussions 28
4 Conclusions 33
References 34
3 An Innovative Approach for Automatic Genre-Based Fine Art Painting Classification 36
Abstract 36
1 Introduction 36
2 Related Work 38
3 Methodology 38
3.1 Data Collection 38
3.2 Feature Selection and Extraction 39
3.3 Classification Algorithm and Ensembling 40
4 Analysis of Results 40
5 Comparison with Previous Work 42
6 Future Works 43
7 Conclusion 43
References 43
4 Asymmetric Cryptosystem Using Affine Transform in Fourier Domain 45
Abstract 45
1 Introduction 45
2 The Principle 46
2.1 Affine Transform 46
2.2 Fourier Transform 47
3 The Proposed Scheme 47
4 Results and Discussion 48
5 Conclusions 53
References 53
5 A Novel Technique for an Adaptive Feedback Canceller for Hearing Aids 54
Abstract 54
1 Introduction 54
1.1 Statement of the Problem 55
2 Background 56
3 Verification and Results 57
3.1 Perceptual Evaluation of Speech Quality 60
3.2 Perceptual Evaluation of Speech Quality for a Speech Signal 62
3.3 Perceptual Evaluation of Speech Quality for a Music Signal 62
4 Conclusions 62
6 Preprocessing of Skin Cancer Using Anisotropic Diffusion and Sigmoid Function 65
Abstract 65
1 Introduction 65
2 Literature Survey 66
3 Proposed Method 67
3.1 Normalization 67
3.2 Anisotropic Diffusion Function 67
3.3 Selecting the Conduction Function 68
3.4 Calculating the Gradient 69
3.5 Estimating Gradient Threshold Parameter 70
3.6 Stopping Criteria 72
3.7 Contrast Adjustment Using Sigmoid Function 73
4 Experimental Results 73
5 Conclusion 74
References 75
7 An Incremental Algorithm for Mining Closed Frequent Intervals 76
Abstract 76
1 Introduction 76
2 Related Works 78
3 Preliminaries and Theoretical Background 78
3.1 Preliminaries 79
3.2 Theoretical Background 79
4 Problem Definition 81
5 Proposed Method 82
5.1 Array Structure to Store a Set of Intervals 82
5.2 Algorithm 82
6 Experimental Results 85
7 Conclusion 85
References 86
Crime Pattern Analysis by Identifying Named Entities and Relation Among Entities 87
1 Introduction 87
2 Proposed Framework 89
2.1 Data Collection and Preparation 89
2.2 Named Entity Recognition 89
2.3 Similarity Among Entity Pairs 90
2.4 Relation Extraction 91
3 Experimental Results 92
4 Conclusion and Future Work 95
References 95
9 A Secure High-Capacity Video Steganography Using Bit Plane Slicing Through (7, 4) Hamming Code 97
Abstract 97
1 Introduction 98
2 Related Work 98
3 Proposed Method 99
3.1 Numerical Illustration 101
4 Experimental Result and Comparison 104
5 Security Analysis 109
6 Conclusion 109
References 110
10 Conceptual Design of Next Generation Security System Based on Thought Form Image Patterns 111
Abstract 111
1 Introduction 111
1.1 Thought Form Images from Theosophical Texts, Why? 113
1.2 Origin and Features of Thought Forms Images 114
2 Advances in Biophotonics Research 114
3 Effect of Thought on Human Biofield 117
4 Imaging Tools Used for Patterns Recognition 117
4.1 HSV Space 118
4.2 Radon Transform (RT) and Histogram 120
5 Thought Forms Images of Undesirable Characteristics 121
6 Design of Thought Form Patterns-Based Security System 122
7 Conclusions 126
References 126
A New Data Hiding Method Using Block Pixel Intensity Range 129
1 Introduction 129
2 Related Work 130
2.1 Data Hiding Based on LBP 130
3 Proposed Method 131
3.1 Data Embedding 132
3.2 Data Extraction 134
4 Experimental Results 135
5 Conclusion 135
References 136
12 Fatigue Detection Based on Eye Tracking 137
Abstract 137
1 Introduction 137
2 Methodology 138
3 Results and Discussions 141
4 Summary and Conclusions 145
Statement on Consent 145
References 145
13 Secure Symmetric Key Transmission of Messages Using Random Shuffling of Spiral Matrix and Multiplicative Inverse (RSSMMI) 147
Abstract 147
1 Introduction 148
2 Proposed Technique with Example 148
2.1 Encryption Technique 148
2.1.1 Generation of First Byte of the Symmetric Key and Randomly Shuffled Matrix 148
2.1.2 Generation of Second Byte of the Symmetric Key 149
2.1.3 Generation of Third Byte of the Symmetric Key 150
2.1.4 Extraction and Swapping of Data Bytes from Randomly Shuffled Matrix 150
2.1.5 Generation of Fourth and Fifth Byte of the Symmetric Key Using Multiplicative Inverse 151
2.1.6 Generation of Sixth Byte of the Symmetric Key 152
2.1.7 Generation of Last (Seventh) Byte of the Symmetric Key and the Ciphertext 152
2.2 Decryption Technique 153
3 Result and Comparison 153
4 Conclusion 153
References 155
Odor Source Localization by Concatenating Particle Swarm Optimization and Grey Wolf Optimizer 156
1 Introduction 156
2 Related Work 157
3 Methodology 158
3.1 Proposed Concatenated Method 158
4 Simulation Setup and Results 161
5 Conclusion and Future Work 163
References 163
Facial Expression Recognition Using Distance Signature Feature 165
1 Introduction 165
2 Proposed System, Landmark Detection and Grid Formation 167
3 Feature Extraction 167
3.1 Distance Signature and Stability Index 168
3.2 Range, Moment, Skewness, Kurtosis, and Entropy 169
4 Classification 169
5 Experiment and Result 169
5.1 Experiment on CK+ and JAFFE Databases 170
5.2 Experiment on MMI and MUG Databases 171
5.3 Compare Analysis with Different State of the Arts 172
6 Conclusion 172
References 173
A Parallel Interval Type-2 Fuzzy Neural Inference System Using Different Similarity Measures: Comparative Study 174
1 Introduction 174
2 IT2SuNFIS and MS-IT2SuNFIS Models 175
3 Subsethood Verses Mutual Subsethood Based Transmission 176
4 Mackey-Glass Time Series Prediction 178
4.1 Simulation Results 179
5 Conclusions 180
References 180
17 A Fuzzy Logic Inspired Approach for Social Media Sentiment Analysis via Deep Neural Network 183
Abstract 183
1 Introduction 184
2 Related Works 184
3 Proposed Method 185
3.1 Text Modeling 185
3.2 Deep Neural Sentiment Classification 186
3.3 Recurrent Fuzzy Neural Classification 187
4 Experimental Results 188
4.1 Experimental Setup 188
4.2 Experimental Analysis 188
5 Conclusion 192
References 192
18 Neighbor Attack Detection in Internet of Things 194
Abstract 194
1 Introduction 194
2 Related Works 196
2.1 Sinkhole Attack 196
2.2 Selective Forward Attack 196
2.3 Black Hole Attack 196
2.4 Sybil Attack 196
2.5 Neighbor Attack 197
2.6 Local Repair Message 197
3 Problem Formulation 197
4 Implementation and Result 198
5 Conclusion and Future Works 203
References 203
19 Human Opinion Inspired Feature Selection Strategy for Predicting the Pleasantness of a Molecule 204
Abstract 204
1 Introduction 204
2 Methodology 205
2.1 Data Set 205
2.2 Continuous Opinion Dynamics Optimizer (CODO) 206
2.3 Implementation of Wrapper Approach Combining CODO and SVM 207
3 Results 208
4 Conclusion 211
References 211
An Ensemble Learning Based Bangla Phoneme Identification System Using LSF-G Features 213
1 Introduction 214
2 Related Works 214
3 Dataset Development 215
4 Feature Extraction 216
4.1 Framing and Windowing 216
4.2 Line Spectral Frequency Extraction 217
4.3 LSF-G Computation 217
5 Ensemble Learning Based Classification 218
6 Result and Discussion 218
7 Conclusion 220
References 220
21 An Efficient Approach for Detecting Wormhole Attacks in AODV Routing Protocol 222
Abstract 222
1 Introduction 222
2 Related Works 223
3 System Model 224
3.1 Network Model 224
3.2 Adversial Model 225
3.3 Power Consumption Model 225
4 Problem Description 226
5 Proposed Approach 226
6 Experimental Results 228
6.1 Simulation Setup 228
6.2 Simulation Studies 229
7 Conclusions 231
References 232
Efficient Contrast Enhancement Based on Local–Global Image Statistics and Multiscale Morphological Filtering 233
1 Introduction 233
2 Background 234
3 Proposed Method 235
4 Experimental Results and Analysis 237
5 Concluding Remarks 242
References 242
23 Bag-of-Tasks Intelligent Scheduling Agent (BISA) in Cloud Computing 243
Abstract 243
1 Introduction 243
2 BIS Agent Framework 244
3 Experimental Setup 247
4 Results and Discussion 248
5 Conclusion and Future Work 250
References 250
24 Modeling a Bioinspired Neuron: An Extension to the H-H Model 251
Abstract 251
1 Introduction 251
1.1 The Hodgkin–Huxley Model of Nerve Axon 252
1.2 The Ion Channels 253
1.3 Modeling the Synapse 254
2 H-H Model for a Synaptic Input—The Proposed Model 255
2.1 Simulation 255
3 Results 256
4 Conclusion 258
Acknowledgements 258
References 258
25 A Nonnegative Matrix Factorization Based Approach to Extract Aspects from Product Reviews 259
Abstract 259
1 Introduction 259
2 Statement of the Problem 261
3 The Proposed Methodology 263
3.1 Data Collection 264
3.2 Data Preprocessing 264
3.3 Nonnegative Matrix Factorization 264
3.4 Aspect Extraction 265
3.5 Sentiment Classification 265
4 Experimental Results 267
5 Conclusion and Scope for the Further Work 269
References 270
26 Extraction of Geometric and Prosodic Features from Human-Gait-Speech Data for Behavioural Pattern Detection: Part II 271
Abstract 271
1 Introduction 272
2 Behavioural Pattern Detection 273
2.1 Clustering of Prosodic Features from Human-Speech Data 273
2.2 Clustering of Geometrical Features from Human-Gait Data 275
2.3 Gradient or Slope of Human-Gait-Speech Data 276
3 Simulated Outcomes and Discussions 278
4 Concluding Remarks and Further Scope of the Work 281
References 282
27 Mutation in Path for the Packets in the Network During Journey from Source to Destination 283
Abstract 283
1 Introduction 283
2 Genetic Algorithm 284
3 Dijkstra’s Algorithm 284
4 Proposed Algorithm 285
5 Mutation 288
6 Results of Mutation 289
7 Complexity and Comparative Study 290
8 Conclusions 291
References 291
Facial Expression Recognition Using 2DPCA on Segmented Images 293
1 Introduction 293
2 The Proposed Method 294
2.1 Image Preprocessing 295
2.2 Feature Extraction 295
2.3 Classification 297
3 Experiment and Evaluation 298
3.1 Description of the Dataset 298
3.2 Experimental Details 298
3.3 Result Analysis 299
4 Conclusions 300
References 300
29 Stable and Consistent Object Tracking: An Active Vision Approach 302
Abstract 302
1 Introduction 302
2 Related Works 304
3 System Architecture and Methodology 305
3.1 Image Acquisition and Object Tracking 305
3.2 Motion Detection and Velocity Estimation 306
3.3 Saccade Control 307
3.4 Smooth Pursuit Control 307
4 Experiments and Result 308
4.1 Smooth Pursuit Mechanism 308
4.1.1 Velocity and Direction Estimation 308
5 Conclusion and Future Work 310
References 310
30 Vision-Based Forward Kinematics Using ANN for Weld Line Detection with a 5-DOF Robot Manipulator 312
Abstract 312
1 Introduction 312
2 Modeling of 5-DOF Robot Manipulator 313
3 Denavit–Hartenberg Parameters 314
4 Forward Kinematics 315
5 Image Processing for Weld Line Detection 315
5.1 Conversion of Image to Grayscale 316
5.2 Sobel Edge Detection 316
5.3 Hough Line Transform 317
6 ANN Modeling for Forward Kinematics 317
6.1 Overview 317
6.2 Dataset and Network Architecture 318
6.3 Methodology 318
7 Results and Discussion 318
7.1 Training the Network with Different Training Algorithms 318
7.2 Training the Network with Different Number of Epochs 320
7.3 Training the Network with Different Activation Functions 320
7.4 Training the Network with Different Number of Neurons in the Hidden Layer 320
8 Conclusion 320
Acknowledgements 321
References 321
Performance Measurement and Evaluation of Pluggable to Scheduler Dynamic Load Balancing Algorithm (P2S_DLB) in Distributed Computing Environment 322
1 Introduction 322
2 Related Work 323
3 System Model 324
4 Implementation Scenario and Input Dataset 325
5 Pluggable to Scheduler Dynamic Load Balancing Algorithm (P2S_DLB) 326
6 Experimental Results and Analysis 326
7 Conclusion 329
References 331
32 Performance Enhancement of Hadoop for Big Data Using Multilevel Queue Migration (MQM) Technique 333
Abstract 333
1 Introduction 334
2 Related Work 335
3 Proposed Solution 336
4 Experimental Setup 338
5 Results and Discussion 338
6 Conclusion 341
References 343
33 Semi-automatic Ontology Builder Based on Relation Extraction from Textual Data 345
Abstract 345
1 Introduction 345
2 Related Work 346
3 Proposed Approach 346
3.1 Analyzer Subsystem 347
3.2 Mapper Subsystem 348
3.3 Triple Validator and Storage 349
4 Experimental Results 349
4.1 Technology Classification Ontology 349
4.2 Rule File Generation 349
4.3 Performance 350
5 Conclusion 352
References 352
34 An Ideal Approach for Medical Color Image Enhancement 353
Abstract 353
1 Introduction 353
2 Related Work and Motivation Toward the Proposed Work 354
3 Steps Involved in the Proposed Algorithm 355
4 Materials and Methods 355
4.1 CIELAB Color Space 355
4.2 Type-2 Fuzzy Set Based Enhancement Technique, Type-2_Fuzzy_Enhnc() 357
4.3 Unsharp Masking, Unsharp_Mask() 358
5 Experiment and Result Discussion 359
5.1 Subjective Evaluations 360
5.2 Objective Evaluation 361
6 Conclusions 362
References 362
35 Score Formulation and Parametric Synthesis of Musical Track as a Platform for Big Data in Hit Prediction 364
Abstract 364
1 Introduction 365
2 Attribute Extraction 365
2.1 Statistical Attributes 366
2.1.1 Slope 366
2.1.2 Period Frequency 366
2.1.3 Entropy 366
2.1.4 RMS Energy 366
2.2 Musical Topographies 367
2.2.1 Danceability 367
2.2.2 Energy 367
2.2.3 Key 368
2.2.4 Liveliness 368
2.2.5 Loudness 368
2.2.6 Speechiness 368
2.2.7 Tempo 368
2.2.8 Valence 369
3 Observation and Score Formulation 369
3.1 USA 369
3.2 India 371
3.3 United Kingdom 372
4 Verdict and Conclusion 374
References 374
Dynamics of Dust-Ion-Acoustic Anti-kink Waves in a Dissipative Nonextensive e-p-i Dusty Plasma 376
1 Introduction 376
2 Model Equations 377
3 Burgers Equation 378
4 One-Dimensional Dynamical System 379
5 Potential Energy 380
6 Anti-kink Wave Solution 381
7 Conclusions 383
References 383
37 Multiple Information Hiding in General Access Structure Visual Cryptography Using Q’tron Neural Network 385
Abstract 385
1 Introduction 385
1.1 Random Grids 386
1.2 General Access Structures 387
1.2.1 Construction of VCS Using Cumulative Arrays 387
1.3 Q’tron Neural Network 388
2 Proposed Methodology 389
3 Design Strategy 390
4 Experimental Results and Analysis 391
4.1 Experimental Results 391
4.2 Analysis—PSNR Calculation and Contrast 391
5 Conclusion 393
References 393
38 Overlapping Community Detection Through Threshold Analysis on Disjoint Network Structures 395
Abstract 395
1 Introduction 395
1.1 Recent Works 396
1.2 Clustering Metrics 397
1.3 Motivation 397
2 Problem Formulation 398
3 Proposed Method 398
3.1 Proposed Algorithm 399
4 Experimental Results 399
4.1 Experiment Setup 399
4.2 Simulator Network 400
4.3 Performance on Benchmark Data 402
5 Conclusion 402
References 402
Chaotic to Periodic Phenomena of Dust-Ion-Acoustic Waves in a Collisional Dusty Plasma 404
1 Introduction 404
2 Model Equations 405
3 Derivation of the DKdV and DmKdV Equations 406
4 Chaotic and Periodic Structure at Critical Values 408
5 Conclusions 410
References 410
40 ICT in Social Development—Context-Sensitive Design Strategies to Develop Mobile Applications for Barefoot Animal Breeders 413
Abstract 413
1 Introduction 414
2 Background 415
3 Design Approach 416
3.1 Custom Dropdown with Search Option 417
3.2 Custom Autocomplete EditBox 417
4 Results 419
5 Conclusion 420
References 420
41 Multiple Solution Sorting Method Using Translocation 422
Abstract 422
1 Introduction 422
2 Definitions and Notifications 423
2.1 Genome 423
2.2 Cycle Graph 424
3 Proposed Algorithm 426
4 Result and Discussion 427
4.1 Discussion 427
4.2 Result 429
5 Conclusion 429
Chaos Control in a Two Prey and One Predator System with Predator Switching 431
1 Introduction 431
2 Model 432
3 Stability Analysis 433
4 Numerical Simulations 434
5 Conclusion 436
References 437
43 An Improved Multi-secret Sharing Visual Cryptography Technique for Color Images Using Sterilization Algorithm 438
Abstract 438
1 Introduction 438
2 Literature Review 439
3 Proposed Work 440
4 Result Analysis and Discussion 445
5 Conclusions 446
References 447
A Morphological Color Image Contrast Enhancement Technique Using Hilbert 3D Space Filling Curve 448
1 Introduction 448
2 Background 449
2.1 Ordering in Color Images 449
2.2 Hilbert Space Curve 450
3 Proposed Method 451
3.1 Mapping of RGB Values to Scalar Value 451
3.2 Multi-scale Morphological Contrast Enhancement 452
4 Experimental Results and Comparisons 454
5 Conclusion 457
References 458
Agent-Based Modelling and Simulation of Religious Crowd Gatherings in India 459
1 Introduction 459
2 Related Work 460
3 Our Approach 461
3.1 Field Survey: Alopi Devi Temple 461
3.2 Our Agent-Based Model 462
4 Simulation: Experiments and Results 463
4.1 Experiments 464
4.2 Results 464
5 Conclusion 465
References 466
46 An Experimental Study of Scalability in Cross-Domain Recommendation Systems 467
Abstract 467
1 Introduction 468
2 Our Contribution 468
2.1 Scalability of the System 468
2.2 Numeric and Non-numeric Data Clustering 468
3 Experiments 469
3.1 Datasets Used 469
3.2 Methodology 469
3.3 Experiment 1: Genre and Rating Based Partitioning 469
3.4 Experiment 2: Numeric Data Clustering 470
3.5 Experiment 3: Non-numeric Data Representation and Nearest Neighbor Approach 471
3.6 Experiment 4: Non-numeric Data Clustering and Subsequent Querying 473
References 475
Document Categorization Using Graph Structuring 476
1 Introduction 476
2 The Methodology 477
2.1 Learning 478
3 Classification 479
4 Experimental Results 482
5 Conclusions 483
References 483
48 An Empirical Analysis for Predicting Source Code File Reusability Using Meta-Classification Algorithms 485
Abstract 485
1 Introduction 485
2 Related Work 487
3 Research Background 488
3.1 Empirical Data Collection 488
3.2 Dependent and Independent Variables 489
4 Research Methodology 489
4.1 Meta-Classification Techniques Employed 489
4.2 Performance Evaluation Measures 490
5 Empirical Analysis 491
5.1 Model Evaluation Results 491
6 Threats to Validity 494
7 Conclusion and Future Work 494
References 495
Non-head-on Non-overtaking Collision of Two Solitary Waves in a Multicomponent Plasma 497
1 Introduction 497
2 Basic Equations 498
3 Numerical Results and Discussion 502
4 Conclusion 504
References 504
Signed Product and Total Signed Product Cordial Labeling of Cartesian Product Between Balanced Bipartite Graph and Path 506
1 Introduction 506
2 Preliminaries 507
3 Labeling of Cartesian Product Between Balanced Bipartite Graph and Path 508
3.1 Algorithm 508
3.2 Algorithm 509
3.3 Algorithm 510
3.4 Algorithm 511
4 Conclusion 512
References 513
51 A Survey on Detection and Mitigation of Interest Flooding Attack in Named Data Networking 514
Abstract 514
1 Introduction 514
2 Interest Flooding Attacks 515
3 Architecture 516
4 Objectives 518
5 Related Works 518
6 Analysis of Survey 520
7 Conclusion 521
52 An Integrated TOPSIS Approach to MADM with Interval-Valued Intuitionistic Fuzzy Settings 523
Abstract 523
1 Introduction 523
2 Preliminaries 524
3 MADM Problems with Three-Parameter Characterization of IVIFNs 526
4 TOPSIS Approach to Solve MADM Problems in IVIF Settings with Three-Parameter Characterization of IFSs 527
4.1 IVIF TOPSIS Method 530
5 Illustrative Example 530
6 Concluding Remarks 532
Acknowledgements 533
References 533
Bounding Stability in Formal Concept Analysis 534
1 Introduction 534
2 Terminology and Main Definitions 535
2.1 Formal Concept Analysis 535
2.2 Stability 536
3 Our Approach to Estimate Stability 536
4 Time Complexity and Performance Analysis 539
5 Conclusion 540
References 541
54 Feature Extraction Using Fuzzy Generalized Two-Dimensional Inverse LDA with Gaussian Probabilistic Distribution and Face Recognition 542
Abstract 542
1 Introduction 543
2 Fuzzy G-2DLDA Method 544
3 Gaussian Probabilistic Fuzzy G-2DILDA Method 545
3.1 Creation of Membership Matrix Using Gaussian Probability Density Function 546
3.2 Creation of Membership Matrix Using Fk-NN 546
3.3 GPFG-2DILDA Algorithm 546
4 Empirical Results 548
5 Conclusion 549
Acknowledgements 550
References 550
55 Secure and Efficient Data Sharing with User Revocation in Cloud 551
Abstract 551
1 Introduction 552
2 Related Work 552
3 System Model and Design Goals 553
3.1 System Model 553
3.2 Design Goals 554
4 The Proposed Scheme 555
4.1 Scheme Description 555
4.1.1 Existing User Registration and Key Generation 555
4.1.2 Data Owner Uploads the Data File 556
4.1.3 User Revocation 556
4.1.4 New User Registration 557
4.1.5 Data File Download 557
5 Security Analysis 558
5.1 Key Distribution 558
5.2 Data Confidentiality 558
5.3 Fine Grain Access Control 559
5.4 Comparative Analysis 560
6 Conclusion 560
References 561
An Adaptive Cluster-Based Ensemble Learner for Computational Biology 562
1 Introduction 562
2 Literature Review 563
3 Proposed Approach 564
4 Experimental Setup 567
5 Results and Discussion 568
6 Conclusions and Future Work 570
References 570
57 Text Document Analysis Using Map-Reduce Framework 572
Abstract 572
1 Introduction 572
2 Background Study 573
3 Problem Statement and Proposed Solution 574
3.1 Map-Reduce Framework 575
3.2 Text Preprocessing 575
3.3 Proposed Methodology 576
3.3.1 Cosine Similarity PLSA-Based Text Analysis 576
4 Experiments and Results Analysis 578
4.1 Comparison Between PLSA and Cosine PLSA 578
5 Conclusion 579
References 580
58 WAPiS: WhatsApp Pattern Identification Algorithm Indicating Social Connection 582
Abstract 582
1 Introduction 582
2 Related Work 584
3 Motivation 584
4 Methodology Adopted 585
5 Algorithm Formulated 585
5.1 Working Steps of WAPiS: WhatsApp Pattern Indicating Social Connection 585
5.2 Mathematical Modeling of WAPiS Algorithm 587
6 Simulation Environment 588
6.1 Visual Studio 588
6.2 MongoDB 588
7 Simulation Performed 588
8 Conclusion and Future Work 590
Acknowledgements and Submission 590
References 590
59 A New DNA Cryptography Based Algorithm Involving the Fusion of Symmetric-Key Techniques 591
Abstract 591
1 Introduction 592
2 DNA Cryptography 592
2.1 DNA Digital Coding 593
2.2 Hao’s Permutation and Fractal Sequence 594
2.3 Polymerase Chain Reaction (PCR) 594
3 Literature Survey 594
4 Proposed Methodology 596
4.1 Proposed Algorithm 596
4.2 Encryption Scheme for Complemented DNA Nucleotide (K) 597
5 Discussion 599
5.1 Illustration of the Proposed Methodology 599
5.2 Security Analysis of the Proposed Methodology 600
6 Conclusion 601
References 601
60 Enhanced Surveillance Using Integration of Gait Analysis with Iris Detection 602
Abstract 602
1 Introduction 603
2 Related Work 603
3 Proposed Work 604
3.1 Overview 604
3.2 Gait Recognition 604
3.3 V2DPCA Feature 605
3.4 Manhattan Distance Classifier 605
3.5 Basic Steps in Iris Recognition 606
3.5.1 Iris Image Acquisition 606
3.5.2 Iris Segmentation 607
3.5.3 Iris Normalization 607
3.5.4 Feature Extraction and Code Generation 607
3.5.5 Fusion 607
4 Result and Discussion 608
5 Gait and Iris Dataset 609
6 Conclusion 610
References 610
61 Effect of Tapering on Swimming Efficiency of Flagellated Microswimmer at Low Reynolds Number 611
Abstract 611
1 Introduction 611
2 Theory of Microswimming 613
2.1 Microswimmer 613
2.2 Dynamical Equations 614
2.3 Free Swimming 616
3 Results and Conclusion 619
Acknowledgment 620
References 620
62 Field Monitoring Using IoT: A Neural Network Approach 622
Abstract 622
1 Introduction 623
2 Problem Statement 623
2.1 Objective 623
3 Proposed Solution 624
3.1 Conceptual Design 625
3.2 Hardware Description 625
4 Implementation and Result Analysis 627
5 Conclusion 632
References 633
63 Nature-Inspired Optimization Techniques in VANETs and FANETs: A Survey 634
Abstract 634
1 Introduction 634
1.1 Motivation for Research 635
1.2 Difference Between VANET and FANET 635
2 VANET 636
2.1 Routing Protocols in VANETs 636
2.2 Ant Colony Optimization 639
2.3 Bee Colony Optimization 639
2.4 Particle Swarm Optimization 640
3 FANET 641
3.1 Routing Protocols in FANET 641
3.2 Ant Colony Optimization 643
3.3 Bee Colony Optimization 644
4 Conclusion 644
References 644
Implementation of Cloud-Assisted Secure Data Transmission in WBAN for Healthcare Monitoring 647
1 Introduction 648
2 Related Work 650
3 Problem Address 650
4 Proposed Algorithm and Implementation of Solution 651
5 Experimental Setup Using Cloud Server 652
6 Result and Analysis 653
7 Conclusion 656
References 656
A Study of Android Application Execution Trends and Their Privacy Threats to a User with Respect to Data Leaks and Compromise 657
1 Introduction 657
2 Related Work 658
3 System Design 659
3.1 Data Collection 661
4 Result and Analysis 661
4.1 Android Permissions 661
4.2 Execution Style Analysis of Android Applications on Device 662
4.3 Pattern Analysis 662
5 Conclusion 663
References 664
66 Three-Dimensional Design of a New Maglev Vehicle and a Study of It Using Computer Vision 665
Abstract 665
1 Introduction 666
2 Review Work 667
3 The Design of the Proposed Vehicle 668
3.1 Gaussian Mixture Model and Computer Vision Study on the Proposed System 668
4 Proposed Method 671
5 Results and Analysis 671
6 Conclusion 673
Acknowledgements 675
References 675
Combining GMM-Based Hidden Markov Random Field and Bag-of-Words Trained Classifier for Lung Cancer Detection Using Pap-Stained Microscopic Images 676
1 Introduction and Literature Survey 677
2 Materials and Methods 678
2.1 Abstract View of the Adopted Algorithm 678
2.2 Sample Image Database Development 678
2.3 Edge-Preserving Bilateral Filtering 679
2.4 Nucleus Segmentation 680
2.5 Nucleus Classification 681
3 Results 683
4 Conclusion 684
References 685
Assessment of Segmentation Techniques for Chronic Wound Surface Area Detection 687
1 Introduction 688
2 Materials and Methods 689
2.1 Wound Image Collection 689
2.2 Multi-expert Wound Region Labelling 689
2.3 Clustering Approach for Wound Region Segmentation 689
2.4 Classification Approach for Wound Region Segmentation 691
3 Results and Discussion 693
4 Conclusion 695
References 695
69 Improved Decision-Making for Navigation Scenarios 697
Abstract 697
1 Introduction 698
2 Database Acquisition 698
3 Proposed Algorithm for Improved Decision Making in Navigation 699
3.1 Image Processing Tasks 699
3.2 Feature Extraction and Creation of Feature Vector 699
3.3 Computation of the Best Feature Set 700
4 Validation of Proposed Model 703
5 Discussions and Conclusions 704
References 706
Pixel-Based Supervised Tissue Classification of Chronic Wound Images with Deep Autoencoder 707
1 Introduction 707
2 Materials and Methods 708
2.1 Sample Wound Image Database 708
2.2 Multi-expert Tissue Region Labelling 709
2.3 Pixel-Based Tissue Classification 710
3 Results and Discussion 714
4 Conclusion 714
References 715
71 A CBIR Technique Based on the Combination of Shape and Color Features 716
Abstract 716
1 Introduction 717
2 Proposed CBIR Technique 718
3 Experimental Results 721
4 Conclusion 722
References 722
Trajectory Forecasting of Entities Using Advanced Deep Learning Techniques 724
1 Introduction 725
2 Related Work 725
3 Methodology 726
3.1 Baseline 726
3.2 Multitarget Trajectory Prediction 727
4 Experiments and Results 729
4.1 Experimental Setup 730
4.2 Results and Analysis 730
5 Conclusion 732
References 732
An Automatic Face Attractiveness Improvement Using the Golden Ratio 734
1 Introduction 734
2 Proposed Method 735
2.1 Facial Beauty Prediction 736
2.2 Golden Ratio-Based Facial Beautification 737
3 Experimental Results 738
4 Conclusion 741
References 742
74 A Trust-Based Intrusion Detection System for Mitigating Blackhole Attacks in MANET 743
Abstract 743
1 Introduction 744
2 Trust and Intrusion Detection System (IDS) in MANETs 744
3 Blackhole Attack 745
4 Related Work 745
5 Proposed Strategy 746
6 Results 749
7 Conclusion 752
References 753
75 Good-Quality Question Generation for Academic Support 754
Abstract 754
1 Introduction 755
2 Proposed Methodology 756
2.1 System Architecture 757
3 Result and Discussion 764
4 Challenges in Question Enhancement 765
4.1 Partial Selection of Answer Phrase 765
4.2 Enclosure of Answer Phrase in a Question 765
4.3 Conjoined Nouns in Answer Phrase 766
5 Conclusion 766
References 766
76 Facial Representation Using Linear Barcode 768
Abstract 768
1 Introduction 769
2 Related Work 770
3 Proposed Method 772
3.1 Image Preprocessing 772
3.2 Feature Extraction 773
3.3 Feature Coding 774
3.4 Barcode Creator 775
4 Experimental Result and Discussions 776
5 Conclusions 777
References 778
77 Bit-Reversal Encryption Towards Secured Storage of Digital Image in Cloud Deployment 779
Abstract 779
1 Introduction 779
1.1 Recent Works 780
1.2 Bit-Reversal Permutation 782
2 Proposed Method 782
2.1 Design Background 782
2.2 Proposed Algorithm 785
3 Experimental Results 785
3.1 Empirical Analysis 787
4 Conclusion 787
References 788
Author Index 789

Erscheint lt. Verlag 20.4.2018
Reihe/Serie Advances in Intelligent Systems and Computing
Zusatzinfo XVIII, 815 p. 321 illus.
Verlagsort Singapore
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Adaptive Computation and Machine Learning • Advanced Computational Paradigms • Computer Vision and Image Processing • cyber security • Human Computer Interaction • ICACCP 2017 • Networking and Data Communications • Signal Processing
ISBN-10 981-10-8237-5 / 9811082375
ISBN-13 978-981-10-8237-5 / 9789811082375
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 27,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Martin Linten; Axel Schemberg; Kai Surendorf

eBook Download (2023)
Rheinwerk Computing (Verlag)
29,90
Das umfassende Handbuch

von Michael Kofler; Charly Kühnast; Christoph Scherbeck

eBook Download (2024)
Rheinwerk Computing (Verlag)
44,90
Grundlagen der IPv4- und IPv6-Kommunikation

von Anatol Badach; Erwin Hoffmann

eBook Download (2022)
Carl Hanser Verlag GmbH & Co. KG
69,99