Proceedings of the 2nd International Conference on Data Engineering and Communication Technology -

Proceedings of the 2nd International Conference on Data Engineering and Communication Technology (eBook)

ICDECT 2017
eBook Download: PDF
2018 | 1st ed. 2019
XVIII, 717 Seiten
Springer Singapore (Verlag)
978-981-13-1610-4 (ISBN)
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book features research work presented at the 2nd International Conference on Data Engineering and Communication Technology (ICDECT) held on December 15-16, 2017 at Symbiosis International University, Pune, Maharashtra, India. It discusses advanced, multi-disciplinary research into smart computing, information systems and electronic systems, focusing on innovation paradigms in system knowledge, intelligence and sustainability that can be applied to provide feasible solutions to varied problems in society, the environment and industry. It also addresses the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in a variety of disciplines of computer science and electronics engineering.




Anand J. Kulkarni holds a Ph.D. in Distributed Optimization from Nanyang Technological University, Singapore, an MS in Artificial Intelligence from the University of Regina, Canada, Bachelor of Engineering from Shivaji University, India and Diploma from the Board of Technical Education, Mumbai. He worked as a research fellow on a cross-border, supply-chain disruption project at Odette School of Business, University of Windsor, Canada. Currently, he is working as head and associate professor at the Symbiosis Institute of Technology, Symbiosis International University, Pune, India. His research interests include optimization algorithms, multi-objective optimization, continuous, discrete and combinatorial optimization, multi-agent systems, complex systems, cohort intelligence, probability collectives, swarm optimization, game theory, self-organizing systems and fault-tolerant systems. He is the founder and chairman of the Optimization and Agent Technology (OAT) Research Lab. Anand has published over 30 research papers in peer-reviewed journals and conferences.

Suresh Chandra Satapathy holds a Ph.D. in Computer Science, and is currently working as a professor and head of the Department of CSE, PVPSIT, Vijayawada, Andhra Pradesh, India. In 2015-17 he was the national chairman of the Computer Society of India's Div-V (Educational and Research), which is the largest professional society in India. He was also secretary and treasurer of the Computational Intelligence Society's IEEE Hyderabad Chapter. He is a senior member of IEEE. He has been instrumental in organizing more than 18 international conferences in India and has been corresponding editor for over 30 books. His research activities include swarm intelligence, machine learning, and data mining. He has developed a new optimization algorithm known as Social Group Optimization (SGO) published in a Springer Journal. He has delivered a number of keynote addresses and tutorials at various events in India. He has published over 100 papers in leading journals and conference proceedings. Currently he is on the editorial board of IGI Global, Inderscience, and Growing Science journals and is also guest editor for the Arabian Journal of Science and Engineering.

Kang Tai holds a Bachelor of Engineering degree from the National University of Singapore and a Ph.D. from Imperial College, London. He is currently an associate professor at the School of Mechanical and Aerospace Engineering, Nanyang Technological University, Singapore. He teaches various undergraduate and graduate courses in design, design optimization and finite element analysis. His research interests include optimization, evolutionary computation, collective intelligence, structural topology/shape optimization, compliant/flexural mechanisms, folding/unfolding of 3D folded structures, mathematical modeling of industrial/manufacturing processes, and modeling and vulnerability analysis of critical infrastructure interdependencies.

Ali Husseinzadeh Kashan holds degrees in Industrial Engineering from Amirkabir University of Technology (Polytechnic of Tehran), Iran. He worked as a postdoctoral research fellow at the Department of Industrial Engineering and Management Systems with the financial support of Iran National Elite foundations. Dr. Kashan is currently an assistant professor at the Department of Industrial and Systems Engineering, Tarbiat Modares University and has been active in the applied optimization research field since 2004. His research focuses on modeling and solving combinatorial optimization problems in areas such as logistics and supply networks, revenue management and pricing, resource scheduling, grouping problems, and financial engineering. As solution methodologies for real-world engineering design problems, he has introduced several intelligent optimization procedures, such as the League Championship Algorithm (LCA), Optics Inspired Optimization (OIO), Find-Fix-Finish-Exploit-Analyze (F3EA) metaheuristic algorithm and Grouping Evolution Strategies (GES). Dr. Kashan has published over 70 peer-reviewed journal and conference papers, and has served as a referee for several outstanding journals such as: IEEE Transactions on Evolutionary Computations, Omega, Computers & Operations Research, Journal of the Operational Research Society, Computers & Industrial Engineering, International Journal of Production Research, Information Sciences, Applied Soft Computing, Ecological Informatics, Engineering Optimization, and Optimal Control and Applications. He has received several awards from the Iran National Elite Foundation, and in 2016 he was honored by the Academy of Sciences of Iran as the 'outstanding young scientist of Industrial Engineering'.

 


This book features research work presented at the 2nd International Conference on Data Engineering and Communication Technology (ICDECT) held on December 15-16, 2017 at Symbiosis International University, Pune, Maharashtra, India. It discusses advanced, multi-disciplinary research into smart computing, information systems and electronic systems, focusing on innovation paradigms in system knowledge, intelligence and sustainability that can be applied to provide feasible solutions to varied problems in society, the environment and industry. It also addresses the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in a variety of disciplines of computer science and electronics engineering.

Anand J. Kulkarni holds a Ph.D. in Distributed Optimization from Nanyang Technological University, Singapore, an MS in Artificial Intelligence from the University of Regina, Canada, Bachelor of Engineering from Shivaji University, India and Diploma from the Board of Technical Education, Mumbai. He worked as a research fellow on a cross-border, supply-chain disruption project at Odette School of Business, University of Windsor, Canada. Currently, he is working as head and associate professor at the Symbiosis Institute of Technology, Symbiosis International University, Pune, India. His research interests include optimization algorithms, multi-objective optimization, continuous, discrete and combinatorial optimization, multi-agent systems, complex systems, cohort intelligence, probability collectives, swarm optimization, game theory, self-organizing systems and fault-tolerant systems. He is the founder and chairman of the Optimization and Agent Technology (OAT) Research Lab. Anand has published over 30 research papers in peer-reviewed journals and conferences.Suresh Chandra Satapathy holds a Ph.D. in Computer Science, and is currently working as a professor and head of the Department of CSE, PVPSIT, Vijayawada, Andhra Pradesh, India. In 2015–17 he was the national chairman of the Computer Society of India’s Div-V (Educational and Research), which is the largest professional society in India. He was also secretary and treasurer of the Computational Intelligence Society’s IEEE Hyderabad Chapter. He is a senior member of IEEE. He has been instrumental in organizing more than 18 international conferences in India and has been corresponding editor for over 30 books. His research activities include swarm intelligence, machine learning, and data mining. He has developed a new optimization algorithm known as Social Group Optimization (SGO) published in a Springer Journal. He has delivered a number of keynote addresses and tutorials at various events in India. He has published over 100 papers in leading journals and conference proceedings. Currently he is on the editorial board of IGI Global, Inderscience, and Growing Science journals and is also guest editor for the Arabian Journal of Science and Engineering.Kang Tai holds a Bachelor of Engineering degree from the National University of Singapore and a Ph.D. from Imperial College, London. He is currently an associate professor at the School of Mechanical and Aerospace Engineering, Nanyang Technological University, Singapore. He teaches various undergraduate and graduate courses in design, design optimization and finite element analysis. His research interests include optimization, evolutionary computation, collective intelligence, structural topology/shape optimization, compliant/flexural mechanisms, folding/unfolding of 3D folded structures, mathematical modeling of industrial/manufacturing processes, and modeling and vulnerability analysis of critical infrastructure interdependencies.Ali Husseinzadeh Kashan holds degrees in Industrial Engineering from Amirkabir University of Technology (Polytechnic of Tehran), Iran. He worked as a postdoctoral research fellow at the Department of Industrial Engineering and Management Systems with the financial support of Iran National Elite foundations. Dr. Kashan is currently an assistant professor at the Department of Industrial and Systems Engineering, Tarbiat Modares University and has been active in the applied optimization research field since 2004. His research focuses on modeling and solving combinatorial optimization problems in areas such as logistics and supply networks, revenue management and pricing, resource scheduling, grouping problems, and financial engineering. As solution methodologies for real-world engineering design problems, he has introduced several intelligent optimization procedures, such as the League Championship Algorithm (LCA), Optics Inspired Optimization (OIO), Find-Fix-Finish-Exploit-Analyze (F3EA) metaheuristic algorithm and Grouping Evolution Strategies (GES). Dr. Kashan has published over 70 peer-reviewed journal and conference papers, and has served as a referee for several outstanding journals such as: IEEE Transactions on Evolutionary Computations, Omega, Computers & Operations Research, Journal of the Operational Research Society, Computers & Industrial Engineering, International Journal of Production Research, Information Sciences, Applied Soft Computing, Ecological Informatics, Engineering Optimization, and Optimal Control and Applications. He has received several awards from the Iran National Elite Foundation, and in 2016 he was honored by the Academy of Sciences of Iran as the “outstanding young scientist of Industrial Engineering”.  

Preface 6
Organizing Committee 7
Contents 9
About the Editors 16
Optimization of Constrained Engineering Design Problems Using Cohort Intelligence Method 18
1 Introduction 19
2 Literature Review 20
3 Problem Definition 20
4 Results and Discussion 26
5 Conclusion and Future Work 28
References 28
Application of Blowfish Algorithm for Secure Transactions in Decentralized Disruption-Tolerant Networks 29
1 Introduction and Related Work 29
2 Design of the Proposed System and System Features 30
2.1 Resources Requirement and System Modules 31
2.2 Working of Blowfish Algorithm 33
3 Design and Implementation Constraints 35
4 Result and Discussion 36
5 Conclusion 36
References 37
A Rig-Based Formulation and a League Championship Algorithm for Helicopter Routing in Offshore Transportation 39
1 Introduction 40
2 Problem Definition and Formulation 41
2.1 Notations 42
2.2 The Rig-Based Formulation (RBF) 44
3 League Championship Algorithm for HRP 46
3.1 Idealized Rules of LCA 46
3.2 Generating a League Schedule 48
3.3 Determining Winner/Loser 48
3.4 Building a New Team Formation 49
3.5 Solution Representation 49
3.6 Objective Function 49
3.7 Heuristics 50
4 Computational Experiments and Results 51
5 Conclusions and Future Research 51
References 53
Inclusion of Vertical Bar in the OMR Sheet for Image-Based Robust and Fast OMR Evaluation Technique Using Mobile Phone Camera 55
1 Introduction 56
2 Literature Survey 56
3 Contribution of the Paper 57
3.1 Skew Correction Techniques 58
3.2 Comparison Between PCA and Entropy-Based Skew Correction Technique 59
3.3 Implemented Algorithm 59
4 Experiments and Results 61
5 Conclusion 61
References 62
Music Composition Inspired by Sea Wave Patterns Observed from Beaches 63
1 Introduction 63
2 Methodology 64
2.1 LDS as a Supervised Classifier in Kernel Space 64
3 Extractable Features of Significance 66
4 Experimentation 67
4.1 Music Composed from Turbulent Sea 67
4.2 Music Composed from Calm Sea 67
5 Results and Conclusion 69
References 70
Multi-graph-Based Intent Hierarchy Generation to Determine Action Sequence 71
1 Introduction 72
2 Literature Review 73
3 Context-Based Learning 74
4 Context-Based Learning 77
4.1 Simple Example 77
4.2 Multi-edge Graph Context Representation Model 77
5 Experimental Evaluation 78
6 Conclusion 79
References 79
Predicting the Molecular Subtypes in Gliomas Using T2-Weighted MRI 81
1 Introduction 82
2 Proposed Method for Glioma Classification 83
2.1 Overview 83
2.2 Feature Extraction 83
2.3 Classifier 84
2.4 Algorithm 84
3 Experimental Results 85
3.1 Dataset 85
3.2 Feature Extraction 86
3.3 Classification 87
3.4 Statistical Analysis 87
4 Conclusion and Future Scope 88
References 88
Modeling Runoff Using Feed Forward-Back Propagation and Layer Recurrent Neural Networks 90
1 Introduction 90
2 Study Area 91
3 Methodology 91
3.1 Artificial Neural Network 91
3.2 Feed Forward-Back Propagation Network (FFBPN) 92
3.3 Layer Recurrent Network (LRN) 92
3.4 Processing and Preparation of Data 93
3.5 Evaluating Criteria 94
4 Results and Discussions 95
4.1 Results at Dhankauda 95
5 Simulation 95
5.1 Assessment of Actual Runoff Versus Simulated Runoff at Dhankauda During Testing Phase 98
6 Conclusions 99
References 99
Classification of EEG Signals in Seizure Detection System Using Ellipse Area Features and Support Vector Machine 101
1 Introduction 102
2 Methodology 102
2.1 Data Set 102
2.2 Empirical-Mode Decomposition 103
2.3 Second-Order Difference Plot and Calculation of Ellipse Area 104
2.4 Cosine Similarity Measure Support Vector Machine (CSM-SVM) Classifier 105
2.5 Performance Evaluation 106
3 Results and Discussion 106
4 Conclusion 109
References 110
Explore Web Search Experience for Online Query Grouping and Recommendation by Applying Collaborative Re-ranking Algorithm 111
1 Introduction 111
2 Related Work 112
2.1 String Similarity Functions 112
2.2 K-Means Algorithm and Modified K-Means Algorithm 114
2.3 Bipartite Graph Construction Method 114
2.4 MCTS 115
2.5 Online Clustering Algorithm 116
3 Implementation Details 116
3.1 Collaborative Search History 116
3.2 QFG 116
3.3 Query Relevance Algorithm 117
3.4 Select Next Node to Visit Algorithm 117
3.5 Context Vector 118
3.6 Query Image 118
3.7 SBQG Algorithm 118
3.8 Collaborative Re-ranking 118
4 Results 119
4.1 Database 119
5 Conclusion 120
References 120
S-LSTM-GAN: Shared Recurrent Neural Networks with Adversarial Training 121
1 Introduction 121
2 Background: LSTM 122
3 S-LSTM-GAN: Shared Recurrent Networks with Adversarial Training 122
4 Experimental Setup 125
5 Results 126
6 Conclusion 129
References 129
Hybrid Approach for Recommendation System 130
1 Introduction 131
1.1 User Collaborative Filtering 131
1.2 Item Collaborative Filtering 131
1.3 Association Rule Mining 132
2 Related Work 132
3 Architecture of the Proposed Recommendation System 133
3.1 Computing Nearest Neighbors Corresponding to Target User 133
3.2 Computing Similarity Between Items in the Database 134
3.3 Association Rule Mining to Generate Association Rules 134
3.4 Providing Recommendations to Target User 134
4 Experimental Analysis 135
5 Results 138
5.1 Comparison with User Collaborative Filtering 138
5.2 Comparison with Item Collaborative Filtering 138
5.3 Comparison with Association Rule Mining 139
6 Conclusion 140
References 141
Discussion on Problems and Solutions in Hardware Implementation of Algorithms for a Car-type Autonomous Vehicle 142
1 Introduction 142
2 System Modelling 143
3 Hardware Model of the Car 144
4 Selection of Onboard Computer 146
5 PWM Generation on Raspberry Pi 3B 146
6 Replacing the Radio Control 147
7 Power Supply for the Hardware 148
8 Sensor Data Acquisition 149
9 Conclusion 149
References 149
Software Test Case Allocation 150
1 Introduction 150
2 Proposed Methodology 152
2.1 Expert Judgment on Allocation Factors 152
2.2 Combine Expert Judgments 153
2.3 Fuzzy Failure Probability Proportionality Factor Calculation 153
2.4 Defuzzification 154
2.5 Test Case Allocation 154
3 Results and Validation 155
3.1 Results 155
3.2 Validation 155
4 Conclusions 156
References 156
Seamless Vertical Handover for Efficient Mobility Management in Cooperative Heterogeneous Networks 158
1 Introduction 159
2 Mobility Environment in Heterogeneous Network 159
2.1 Vertical Handover Phases 160
2.2 Vertical Handover Technical Aspects 161
2.3 Network Switching Decision-Making Schemes 161
3 Deployment and Implementation of Scenarios in QualNet 163
3.1 Scenario-1 (UMTS–WiMAX Inter-networking) 163
3.2 Scenario-2 (WiFi–MANET–WiMAX Inter-networking) 165
4 Conclusion 165
References 165
Sentence Similarity Estimation for Text Summarization Using Deep Learning 167
1 Introduction 168
2 Literature Review 168
3 Proposed Method 169
3.1 Lexical Layer Analysis 169
3.2 Sentence Similarity 171
4 Experimental Results and Discussion 174
5 Conclusion and Further Work 175
References 175
Minimization of Clearance Variation of a Radial Selective Assembly Using Cohort Intelligence Algorithm 177
1 Introduction 177
2 Selective Assembly System 178
3 Cohort Intelligence Algorithm 180
4 Results and Discussions 181
5 Conclusion and Future Scope 184
References 184
M-Wallet Technology Acceptance by Street Vendors in India 186
1 Introduction 186
2 Review of Literature 187
2.1 Research Gap 188
2.2 Research Questions 188
3 Research Methodology 189
4 Data Analysis 189
4.1 Results of Hypothesis Testing 190
4.2 Validity Testing 192
5 Conclusion and Discussion 192
References 192
Explore-Exploit-Explore in Ant Colony Optimization 194
1 Introduction 194
2 Literature Review 195
3 Explore-Exploit-Explore Algorithm Using Ant Colony Optimization 195
3.1 Procedure 196
4 Results and Discussions 197
4.1 Stagewise Improvements 197
4.2 Graphical and Statistical Analysis 197
5 Conclusions and Future Directions 199
References 199
An Attention-Based Approach to Text Summarization 201
1 Introduction 201
2 Background 202
3 Dataset Used 203
4 Preprocessing 204
5 Model 205
6 Results 206
7 Conclusion and Future Work 209
References 209
Enhancement of Security for Cloud Data Using Partition-Based Steganography 211
1 Introduction 211
2 Literature Review 212
3 Observations 213
4 Proposed Technique 214
5 Algorithm for Server Side 214
6 Algorithm for Receiver Side 215
7 Experimental Results and Analysis 215
8 Calculation of PSNR (Peak Signal-to-Noise Ratio) and MSE (Mean Square Error) 216
9 Comparison Table and Chart 218
10 Conclusion and Future Scope 219
References 219
Large Scale P2P Cloud of Underutilized Computing Resources for Providing MapReduce as a Service 220
1 Introduction 220
2 Related work 222
3 P2P-Cloud Model 222
3.1 Publication Installation 223
3.2 Job Subscription Installation 224
4 Simulation 225
5 Conclusion 227
References 227
Topic Modelling for Aspect-Level Sentiment Analysis 229
1 Introduction 229
1.1 Sentiment Analysis 230
2 Proposed Approach 232
3 Results 234
4 Conclusion 236
References 236
An Image Deblocking Approach Based on Non-subsampled Shearlet Transform 238
1 Introduction 238
2 Non-subsampled Shearlet Transform (NSST) 240
3 Proposed Method 240
4 Experimental Results and Discussion 242
5 Conclusion 244
References 244
An Effective Video Surveillance Framework for Ragging/Violence Recognition 246
1 Introduction 246
2 Literature Review 247
3 Methodology 248
3.1 Datasets 248
3.2 Proposed Frame Work 249
4 Result and Analysis 251
5 Conclusion 253
References 254
DoT: A New Ultra-lightweight SP Network Encryption Design for Resource-Constrained Environment 256
1 Introduction 256
2 Design Matrices 257
3 Proposed System 258
4 System Components 259
4.1 S-Box 259
4.2 Permutation Layer 259
4.3 Key Scheduling Algorithm 259
5 Performance of the System 260
5.1 GEs 260
5.2 Memory Requirement 261
5.3 Throughput 261
6 Performance of the System 262
6.1 Linear Attack 262
6.2 Differential Attack 262
6.3 Biclique Attack 262
7 Conclusion 263
8 DoT Vectors 263
References 264
A Distributed Application to Maximize the Rate of File Sharing in and Across Local Networks 265
1 Introduction 265
2 Problem Statement 266
3 Proposed Solution 266
3.1 Architecture of the Proposed System 266
3.2 Proposed Methodology 267
4 Advantages 271
4.1 Specific Advantages 271
4.2 Overall Advantages 271
5 Conclusion 273
6 Future Work 273
References 273
Obstacle Detection for Auto-Driving Using Convolutional Neural Network 275
1 Introduction 275
2 Related Work 276
3 Proposed Methodology 277
3.1 Training Dataset Preparation 277
3.2 Feature Extraction 278
3.3 Training Dataset 280
3.4 Flowchart 280
4 Experimental Results 280
5 Conclusion and Future Scope 283
References 284
Leakage Power Improvement in SRAM Cell with Clamping Diode Using Reverse Body Bias Technique 285
1 Introduction 285
2 Transistor Leakage Mechanism 286
3 Leakage Reduction Techniques 287
4 Existing 8T SRAM Cell Design 289
5 Proposed Technique 289
6 Simulation Results 291
7 Conclusions 292
References 293
An Investigation of Burr Formation and Cutting Parameter Optimization in Micro-drilling of Brass C-360 Using Image Processing 294
1 Introduction 294
2 Experimental 295
2.1 Material 295
2.2 Experimental Design 296
2.3 Experimental Procedure 296
3 Data Analysis 300
3.1 Response Surface Analyzer 300
3.2 Genetic Algorithm (GA) 301
3.3 Cohort Intelligence (CI) 302
4 Results and Discussions 302
4.1 Multi-objective GA Optimization Results 303
4.2 Pareto Fronts for Multi-objective Function for Min. Burr Height and Min. Burr Thickness 304
4.3 Cohort Intelligence Optimized Results 304
4.4 Plots for Objective Function Burr Height According to Roulette Wheel Approach 304
4.5 Plots for Objective Function Burr Thickness According to Roulette Wheel Approach 305
5 Burr Analysis 305
6 Conclusion 306
References 307
Effect of Training Sample and Network Characteristics in Neural Network-Based Real Property Value Prediction 308
1 Introduction 308
1.1 Property Valuation Using NN 309
2 Data Preprocessing 310
2.1 Application of Principal Component Analysis (PCA) 310
2.2 Details of Data 311
2.3 Data Transformation 312
3 Application of NN and Parameter Selection for Value Prediction 312
4 Selection of Best-Suited Training Sample 314
5 Conclusion 317
References 318
Comparative Analysis of Hybridized C-Means and Fuzzy Firefly Algorithms with Application to Image Segmentation 319
1 Introduction 319
2 Fuzzy C-Means Algorithm (FCM) 320
3 Intuitionistic Fuzzy C-Means (IFCM) 321
4 Firefly Algorithm 321
5 Fuzzy Firefly Algorithm 322
6 Methodology 323
7 Results 323
7.1 Brain MRI Segmentation 324
7.2 Rice Image Segmentation 324
7.3 Lena 325
8 Conclusion 326
References 326
Sanction Enforcement for Norm Violation in Multi-agent Systems: A Cafe Case Study 328
1 Introduction 328
1.1 Norms 329
1.2 Sanctions 330
2 Background Work 331
3 Sanction Enforcement—A Cafe Case Study 333
3.1 Working Algorithm for Sanction Enforcement 334
3.2 Simulation of Cafe Case Study in NetLogo 335
3.3 Experimental Analysis for Sanction Enforcement 336
4 Conclusions and Future Research Directions 337
References 337
Interdigitated Electrodes and Microcantilever Devices for Sensitive Gas Sensor Using Tungsten Trioxide 339
1 Introduction 339
2 Experimental 340
2.1 Preparation of WO3 Film 340
2.2 Theoretical Considerations for Microdevices 340
3 Morphological and Structural Analysis of WO3 Film 342
4 Design and Fabrication of Microcantilever 343
5 Design and Fabrication of IDEs Device 344
6 Conclusions 345
References 346
Emotion Recognition from Sensory and Bio-Signals: A Survey 347
1 Introduction 347
2 Classification of Emotion Recognition 348
2.1 Behavioral Features 348
2.2 Physiological Features 351
2.3 Psychological Features 353
2.4 Fusion of Multiple Features 355
3 Conclusion 355
References 355
Frequent Itemsets in Data Streams Using Dynamically Generated Minimum Support 358
1 Introduction 358
2 Related Work 359
3 Problem Definition 360
3.1 Preliminaries 360
3.2 Utility of an Itemset 360
4 Frequent Itemset Mining Using Itemset Utility 361
4.1 The Intermediate Summary Data Structure 361
4.2 The Approach 361
4.3 Frequent Pattern Generation Using Dynamically Generated Minimum Support S0 362
4.4 Frequent Pattern Generation 362
5 Experiments 362
5.1 Frequent Itemset Mining Using Itemset Utility 363
5.2 Frequent Pattern Generation Using Dynamically Generated S0 364
6 Conclusion 365
References 366
A Novel Approach for Tumor Segmentation for Lung Cancer Using Multi-objective Genetic Algorithm and Connected Component Analysis 367
1 Introduction 367
2 Related Work 368
3 Proposed Methodology 370
3.1 Multi-objective Fitness Function 370
3.2 Connected Component Analysis 372
4 Experimental Results 373
5 Conclusion and Future Work 375
References 375
Design and Implementation of Data Background Search Model to Support Child Protection Practices in India 377
1 Introduction 378
2 Work Done 378
3 Statistics and Evaluation 379
4 Methodology 379
5 Design 381
6 Development 382
7 Related Work 382
8 Conclusion 384
References 384
The Fog Computing Paradigm: A Rising Need of IoT World 386
1 Introduction 386
2 Internet of Things 388
3 Cloud Computing 388
4 Fog Computing 390
5 Applications of Fog Computing with Internet of Things 390
6 Concluding Remarks 391
References 392
EEG Signal Analysis for Mild Alzheimer’s Disease Diagnosis by Means of Spectral- and Complexity-Based Features and Machine Learning Techniques 393
1 Introduction 393
2 Materials and Methods 394
2.1 Participants Information 394
2.2 EEG Data Acquisition and Recordings 395
3 Analysis of EEG Data 395
3.1 Feature Extraction and Proposed Features 395
3.2 Spectral-Based Features 396
3.3 Complexity-Based Features 397
4 Machine Learning and Classification Techniques 398
4.1 Support Vector Machine (SVM) Classifier 399
4.2 K-Nearest Neighbor (KNN) Classifier 399
4.3 Performance Analysis of the EEG Data 399
5 Conclusion 400
References 401
An Efficient Machine Learning Technique for Protein Classification Using Probabilistic Approach 402
1 Introduction 402
2 Literature Survey 403
3 Materials and Methodology 404
4 Classification Algorithms 405
4.1 Artificial Neural Networks (ANN) 405
4.2 Naïve Bayes Classifier Algorithm 407
4.3 Support Vector Machines [13–15] 407
4.4 Decision Tree Classifier Algorithm 408
5 Proposed Algorithm 408
6 Results and Discussion 408
6.1 Dataset Used 408
6.2 Efficiency 408
6.3 Classifier Comparison 409
6.4 Graphical Representation of Performance of Classifiers 409
7 Conclusion 409
References 410
Allocation of Cloud Resources in a Dynamic Way Using an SLA-Driven Approach 411
1 Introduction 411
2 Related Work 412
3 Cloud Provider's Data Centre 412
4 System Model for Adaptive VM Management 414
4.1 Resource Allocation Decision 415
5 Experimental Analysis 416
6 Conclusion 417
References 418
Safe Path Identification in Landmine Area 419
1 Introduction 419
2 Literature Overview 420
2.1 Landmine Detection 420
2.2 Path Planning 421
3 Design Methodology 422
3.1 Landmine Detection Robot 422
3.2 Safe Path Identification Algorithm 423
4 Results and Discussion 424
5 Conclusion 425
References 426
Cryptography Algorithm Based on Cohort Intelligence 427
1 Introduction 427
2 Proposed Work 429
3 Results Analysis 431
4 Conclusion and Future Scope 433
References 434
Dual-Port Multiband MSA for Airborne Vehicular Applications 436
1 Introduction 437
2 Design Methodology 437
3 Feeding Techniques 438
4 Physical Parameters of Antenna 438
5 Design Analysis 441
5.1 For Inset Feed 441
5.2 For Diagonal Feed 441
6 Analysis of Results 441
7 Conclusion 444
References 445
Predictive Controller Design to Control Angle and Position of DIPOAC 447
1 Introduction 447
2 Modeling 448
2.1 Modeling of POAC 448
3 MPC Design and Comparison with IOPID 450
4 Simulations and Results 451
5 Conclusion 452
References 453
Novel Machine Health Monitoring System 455
1 Introduction 456
2 Time Domain and Frequency Domain Analysis 456
3 Mechatronic Interface and Control System Design 457
3.1 Core Sensor ADXL335 Accelerometer 458
3.2 Analog Low-Pass Filter 459
3.3 Windowing 459
3.4 Fast Fourier Transform (FFT) 459
4 Results and Discussion 460
5 Conclusion 460
References 462
Finite Element Mesh Smoothing Using Cohort Intelligence 463
1 Introduction 463
2 Literature Review 464
3 Mesh Smoothing Algorithm Using Cohort Intelligence (CI) 465
3.1 Procedure 466
4 Results and Discussions 468
4.1 Stage-Wise Improvements 468
4.2 Graphical and Statistical Analysis 470
5 Conclusions and Future Directions 470
References 473
System Models with Threshold Cryptography for Withdrawal of Nodes Certificate in Mobile Ad Hoc Networks 475
1 Introduction 476
1.1 Absence of Centralized Entity or Server 476
1.2 Infrastructure Support Absence 477
1.3 Dynamically Change in Network Topology 477
1.4 Nonexistence of Secure Boundaries 477
2 Related Work 478
2.1 URSA 478
2.2 Voting-Based Scheme 478
2.3 Decentralized Suicide-Based Approach 479
2.4 Working of Existing Methods with Proposed Methods in Comparative Analysis Form 479
3 Planned System Models 480
3.1 Network Model 481
3.2 Trust Model 481
3.3 Attack Model 484
3.4 Planned System Mathematical Model 487
4 Conclusion 489
References 490
A QoS-Aware Hybrid TOPSIS–Plurality Method for Multi-criteria Decision Model in Mobile Cloud Service Selection 492
1 Introduction 492
2 Related Work 493
3 Methodology 494
3.1 Mobile Service Selection Architecture 494
3.2 Hybrid TOPSIS–Plurality Method for Multi-criteria Decision Model 495
4 Experiment and Result 496
5 Performance Analysis 498
6 Conclusion 499
References 499
A Rough Entropy-Based Weighted Density Outlier Detection Method for Two Universal Sets 501
1 Introduction 501
2 Rough Set Theory 502
2.1 Approximation and Membership Relation 502
2.2 Two Universal Sets 503
3 Related Work 503
4 Proposed Approach 504
4.1 Rough Entropy Weighted Density-Based Outlier Detection Algorithm 504
4.2 An Empirical Study on Hiring Dataset 505
5 Conclusion 507
References 508
Automated Traffic Light System Using Blob Detection 509
1 Introduction 509
2 Related Work 510
3 Implementation 511
4 Working 511
5 Performance 514
6 Conclusion 514
References 515
Automatic Attendance System Using Face Recognition Technique 516
1 Introduction 516
2 Paper Preparation 517
2.1 Face Detection 517
2.2 Face Recognition 518
2.3 Clustering 519
3 Related Work 519
4 Methodology 521
4.1 Algorithm 522
5 Conclusion and Future Work 523
References 524
Cloudlet Services for Healthcare Applications in Mobile Cloud Computing 525
1 Introduction 526
2 Background 526
3 Introducing Cloudlet to Overcome Limitations of Mobile Devices 528
4 Simulation Results 529
4.1 The Cloudlet Uses in e-Healthcare Systems 530
5 Conclusion 531
References 532
Customization of LTE Scheduling Based on Channel and Date Rate Selection and Neural Network Learning 534
1 Introduction 535
2 Literature Survey 536
3 Customization of LTE Scheduling Based on Channel and Data Rate Selection and Neural Network Learning 537
4 Conclusion and Extended Work 541
References 541
Edge and Texture Feature Extraction Using Canny and Haralick Textures on SPARK Cluster 542
1 Introduction 542
2 Big Data Processing Framework 543
2.1 Architecture 544
3 Related Work 544
4 Methodology 546
4.1 Canny Edge Descriptor Algorithm 546
4.2 Workflow 547
4.3 Haralick Texture Features 547
5 Results and Discussion 547
6 Conclusion 549
References 549
Improving the Response Time in Smart Grid Using Fog Computing 551
1 Introduction 551
2 Related Work 552
3 System Architecture 554
4 Proposed Model 554
5 Experimental Results and Performance Analysis 556
6 Conclusion 556
References 558
Machine Learning Algorithm-Based Minimisation of Network Traffic in Mobile Cloud Computing 560
1 Introduction 560
1.1 Features of Mobile Cloud Computing 561
2 Related Work 562
3 Proposed Architecture 563
3.1 Data Collection 565
3.2 Preprocessing 565
3.3 Preprocessing Access Log Dataset 565
3.4 Algorithm 568
3.5 Machine Learning Algorithms 568
4 Simulation Results 569
5 Conclusion 570
References 570
POUPR: Properly Utilizing User-Provided Recourses for Energy Saving in Mobile Cloud Computing 572
1 Introduction 573
2 Background 574
2.1 System Model 575
2.2 Problem Formulation 575
3 Task Offloading Using Self-organized Criticality 576
3.1 Description of POUPR 576
3.2 Critical Threshold Design 577
4 Conclusion 581
References 582
Experimental and Comparative Analysis of Packet Sniffing Tools 583
1 Introduction 584
2 Motivation 584
3 Background 585
3.1 Taxonomy 585
3.2 Comparison of Detection Techniques 585
3.3 Pros of IDPS 586
3.4 Cons of IDPS 587
4 Performance Measurement Analysis 587
5 Results and Discussion 588
6 Conclusion 590
References 591
Emerging Trends for Effective Software Project Management Practices 592
1 Introduction 592
2 Literature Survey 593
3 Proposed Theory 594
4 Differences 596
5 Similarities 596
6 Conclusion 598
References 598
Forest Fire Prediction to Prevent Environmental Hazards Using Data Mining Approach 599
1 Introduction 599
2 Literature Survey 600
3 Methodology 600
3.1 Algorithms 602
3.2 Discriminant Analysis Algorithm 602
4 K-Nearest Algorithm 603
4.1 Naïve Bayesian Algorithm 604
5 Implementation 604
5.1 Program Code 604
5.2 Results 604
6 Conclusion 605
References 606
IoT-Based Smart Office System Architecture Using Smartphones and Smart Wears with MQTT and Razberry 607
1 Introduction 608
2 Literature Survey 608
3 Proposed Work 609
3.1 System Architecture 609
3.2 Face Detection Algorithm 609
4 Experimental Results and Analysis 611
5 Comparison Results of AMQP and MQTT 613
6 Conclusion and Future Work 614
References 615
Classification of Sentiments from Movie Reviews Using KNIME 617
1 Introduction 618
2 Literature Work 618
3 Methodology 619
4 Result 621
5 Conclusion 623
References 623
Document-Level Analysis of Sentiments for Various Emotions Using Hybrid Variant of Recursive Neural Network 624
1 Introduction 624
2 Literature Review 625
3 Architectural Framework 626
4 Algorithm 627
5 Dataset 628
6 Results and Discussion 629
7 Conclusion 630
References 631
Optimal Rate Allocation for Multilayer Networks 633
1 Introduction 633
2 Rate Allocation in Networks 635
2.1 Optimal Rate Control Framework 635
2.2 Multilayer System (U, A, B) Problem 635
2.3 Multilayer Network 636
3 Simulation Results 638
3.1 Future Directions 640
References 641
Folding Automaton for Paths and Cycles 642
1 Introduction 642
2 Preliminaries 643
2.1 Definition: Finite Automaton [2] 643
2.2 Definition: Path [3] 643
2.3 Definition: Cycle [3] 643
3 Folding Automata for Paths 644
4 Folding Automata for Cycles 646
5 Conclusions 654
References 654
Decisive Tissue Segmentation in MR Images: Classification Analysis of Alzheimer’s Disease Using Patch Differential Clustering 655
1 Introduction 656
2 Previous Work 656
3 Materials and Methods 657
4 Proposed Methodology 657
4.1 Intensity Normalization 657
4.2 Laplacian of Windowing Filter 657
4.3 Segmentation Using Patch Image Differential Clustering and Volume Calculation 658
5 Nearest Particle Interconnect Classifier 660
6 Results and Discussion 660
7 Conclusion 662
References 663
Verifiable Delegation for Secure Outsourcing in Cloud computing 664
1 Introduction 665
2 Scheme Description 666
2.1 Procedure 666
2.2 System Model 666
2.3 Steps Involved in Outsourced Key Generation and Decryption 667
3 Hybrid VD-CPABE Scheme 668
3.1 System Model 668
4 Results 669
4.1 Performance Analysis 669
5 Conclusion 670
6 Future Scope 670
References 670
Eradication of Rician Noise in Orthopedic Knee MR Images Using Local Mean-Based Hybrid Median Filter 672
1 Introduction 673
2 Previous Works 674
2.1 Characteristics of Rician Noise 674
3 Existing Noise Expatriation Approaches 675
3.1 Gaussian Filter 675
3.2 Wiener Filter 675
3.3 Lee Filter 675
3.4 Frost Filters 676
3.5 Median Filter 676
4 Proposed Hybrid Median Filter 676
5 Results and Discussion 677
6 Conclusion 680
References 680
Segmentation of Tumor Region in Multimodal Images Using a Novel Self-organizing Map-Based Modified Fuzzy C-Means Clustering Algorithm 682
1 Introduction 683
2 Proposed Method 684
3 Result and Discussion 686
3.1 Mean Square Error (MSE) 687
3.2 Peak Signal-to-Noise Ratio (PSNR) 688
3.3 Jaccard (Tanimoto) Index 688
3.4 Dice Overlap Index (DOI) 689
3.5 Computational Time 689
3.6 Memory Requirement 690
4 Conclusion 690
References 691
Author Index 693

Erscheint lt. Verlag 3.10.2018
Reihe/Serie Advances in Intelligent Systems and Computing
Zusatzinfo XVIII, 717 p. 334 illus., 203 illus. in color.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Graphics and Image Processing • ICDECT • ICDECT 2017 • Intelligent Communication Technology • machine learning • Web Security, Privacy and E-Commerce
ISBN-10 981-13-1610-4 / 9811316104
ISBN-13 978-981-13-1610-4 / 9789811316104
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 27,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90