Proceedings of the International Conference on Data Engineering and Communication Technology (eBook)

ICDECT 2016, Volume 2
eBook Download: PDF
2016 | 1st ed. 2017
XVIII, 841 Seiten
Springer Singapore (Verlag)
978-981-10-1678-3 (ISBN)

Lese- und Medienproben

Proceedings of the International Conference on Data Engineering and Communication Technology -
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10-11, 2016 at Lavasa, Pune, Maharashtra, India. The book discusses recent research technologies and applications in the field of Computer Science, Electrical and Electronics Engineering. The aim of the Proceedings is to provide cutting-edge developments taking place in the field data engineering and communication technologies which will assist the researchers and practitioners from both academia as well as industry to advance their field of study.



Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering at Anil Neerukonda Institute of Technology and Sciences (ANITS), Andhra Pradesh, India. He obtained his Ph.D. in Computer Science and Engineering from JNTU Hyderabad and M.Tech. in CSE from NIT, Rourkela, Odisha, India. He has 26 years of teaching experience. His research interests are data mining, machine intelligence and swarm intelligence. He has acted as program chair of many international conferences and edited 6 volumes of proceedings from Springer LNCS and AISC series. He is currently guiding 8 scholars for Ph.D. Dr. Satapathy is also a Senior Member of IEEE.

Mr. Amit Joshi has an experience of around 6 years in academic and industry in prestigious organizations of Rajasthan and Gujarat. Currently, he is working as an Assistant Professor in Department of Information Technology at Sabar Institute in Gujarat. He is an active member of ACM, CSI, AMIE, IEEE, IACSIT-Singapore, IDES, ACEEE, NPA and many other professional societies. Currently, he is Honorary Secretary of CSI Udaipur Chapter and Honorary Secretary for ACM Udaipur Chapter. He has presented and published more than 40 papers in National and International Journals/Conferences of IEEE, Springer, and ACM. He has also edited three books on diversified subjects including Advances in Open Source Mobile Technologies, ICT for Integrated Rural Development and ICT for Competitive Strategies. He has also organized more than 25 National and International Conferences and Workshops including International Conference ETNCC 2011 at Udaipur through IEEE, International Conference ICTCS 2014 at Udaipur through ACM, International Conference ICT4SD 2015 by Springer. He has also served on Organising and Program Committee of more than 50 Conferences/Seminars/Workshops throughout the World and presented 6 invited talks in various conferences. For his contribution towards the society, The Institution of Engineers (India), ULC, has given him Appreciation award on the celebration of Engineers, 2014 and by SIG-WNs Computer Society of India on ACCE , 2012.

Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Bhateja has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.


This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10-11, 2016 at Lavasa, Pune, Maharashtra, India. The book discusses recent research technologies and applications in the field of Computer Science, Electrical and Electronics Engineering. The aim of the Proceedings is to provide cutting-edge developments taking place in the field data engineering and communication technologies which will assist the researchers and practitioners from both academia as well as industry to advance their field of study.

Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering at Anil Neerukonda Institute of Technology and Sciences (ANITS), Andhra Pradesh, India. He obtained his Ph.D. in Computer Science and Engineering from JNTU Hyderabad and M.Tech. in CSE from NIT, Rourkela, Odisha, India. He has 26 years of teaching experience. His research interests are data mining, machine intelligence and swarm intelligence. He has acted as program chair of many international conferences and edited 6 volumes of proceedings from Springer LNCS and AISC series. He is currently guiding 8 scholars for Ph.D. Dr. Satapathy is also a Senior Member of IEEE.Mr. Amit Joshi has an experience of around 6 years in academic and industry in prestigious organizations of Rajasthan and Gujarat. Currently, he is working as an Assistant Professor in Department of Information Technology at Sabar Institute in Gujarat. He is an active member of ACM, CSI, AMIE, IEEE, IACSIT-Singapore, IDES, ACEEE, NPA and many other professional societies. Currently, he is Honorary Secretary of CSI Udaipur Chapter and Honorary Secretary for ACM Udaipur Chapter. He has presented and published more than 40 papers in National and International Journals/Conferences of IEEE, Springer, and ACM. He has also edited three books on diversified subjects including Advances in Open Source Mobile Technologies, ICT for Integrated Rural Development and ICT for Competitive Strategies. He has also organized more than 25 National and International Conferences and Workshops including International Conference ETNCC 2011 at Udaipur through IEEE, International Conference ICTCS 2014 at Udaipur through ACM, International Conference ICT4SD 2015 by Springer. He has also served on Organising and Program Committee of more than 50 Conferences/Seminars/Workshops throughout the World and presented 6 invited talks in various conferences. For his contribution towards the society, The Institution of Engineers (India), ULC, has given him Appreciation award on the celebration of Engineers, 2014 and by SIG-WNs Computer Society of India on ACCE , 2012. Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Bhateja has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.

Preface 6
Organizing Committee 8
Honorary Chair 8
Organizing Committee 8
Program Committee 8
Publication Chair 8
Publication Co-Chair 8
Technical Review Committee 9
Contents 10
About the Editors 17
1 Experimental Analysis on Big Data in IOT-Based Architecture 19
Abstract 19
1 Introduction 19
2 Related Works 20
3 Proposed Work 20
4 Experimental Results 25
5 Conclusion 26
References 27
2 Morphology Based Approach for Number Plate Extraction 28
Abstract 28
1 Introduction 28
2 Proposed Method for Identification of Letters/Numbers from License Plates 29
2.1 Image Preprocessing 30
2.1.1 Contrast Enhancement 30
2.2 Number Plate Area Detection 30
2.2.1 Plate Area Detection 31
2.3 Character Segmentation 31
2.4 Image Matching 34
3 Conclusion and Future Works 34
References 34
3 NeSeDroid—Android Malware Detection Based on Network Traffic and Sensitive Resource Accessing 36
Abstract 36
1 Introduction 36
2 Objectives 38
3 System Design 41
4 Evaluation 44
5 Conclusion 45
Acknowledgments 45
References 45
4 RiCoBiT—Ring Connected Binary Tree: A Structured and Scalable Architecture for Network-on-Chip Based Systems: an Exclusive Summary 48
Abstract 48
1 Introduction 48
2 Proposed Architecture 49
2.1 RiCoBiT Topology 49
2.2 RiCoBiT Addressing 50
2.3 RiCoBiT Routing Algorithm 51
3 Performance Parameters and Comparison 54
3.1 Maximum Hop Count 55
3.2 Maximum Hop (Average Case) 58
3.3 Number of Wire Segments 59
3.4 Wire Length 61
4 Performance Analysis 64
4.1 Packet Consumption Rate 65
4.2 Throughput 66
5 Conclusion 67
References 67
5 Application of Compressed Sensing (CS) for ECG Signal Compression: A Review 69
Abstract 69
1 Introduction 69
2 Compressed Sensing (CS) Framework 71
2.1 Background 71
2.2 CS Sensing Model 71
2.3 CS Signal Reconstruction Model 72
3 Performance Evaluation Parameters 72
3.1 Percentage Root-Mean Squared Difference (PRD) 73
3.2 Compression Ratio (CR) 73
3.3 Root-Mean Square Error (RMSE) 73
3.4 Signal-to-Noise Ratio (SNR) 74
3.5 Sparsity 74
4 Application of Compressed Sensing (CS) for ECG Signal Compression 74
5 Conclusion 79
References 79
6 Tracking Pointer Based Approach for Iceberg Query Evaluation 82
Abstract 82
1 Introduction 83
2 Related Work 84
3 Details About Proposed Tracking Pointer Strategy 86
3.1 Description of Tracking Pointer-Based IBQ Evaluation Method 86
3.2 Pseudocode for Iceberg Query Evaluation Using Tracking Pointer Concept 87
4 Comparative Study Between Different Algorithms 88
5 Conclusion 89
References 89
7 Performance Evaluation of Shortest Path Routing Algorithms in Real Road Networks 91
Abstract 91
1 Introduction 91
2 Shortest Path Algorithms 92
3 Multi-parameter Dijkstra’s Algorithm Versus Dijkstra’s Algorithm 92
4 Analysis of Time Complexity 96
5 Conclusion 97
Acknowledgments 97
References 97
8 An Outlook in Some Aspects of Hybrid Decision Tree Classification Approach: A Survey 98
Abstract 98
1 Introduction 98
1.1 Decision Tree Construction and Decisive Factors 99
1.2 Decision Tree Learners 100
2 Hybridized Approaches of Decision Tree 101
2.1 Clustering-Based Decision Tree Induction 101
2.2 Height Balanced Decision Tree Induction 102
2.3 Decision Tree with Naïve Bayes Classifier 102
2.4 Decision Tree with Support Vector Machine Classifier 103
2.5 Fuzzy and Evolutionary Approach to Decision Tree 104
3 Scope of Research 105
4 Conclusion 105
References 105
9 Content Search Quaternary Look-Up Table Architecture 109
Abstract 109
1 Introduction 110
2 Inception of Quaternary Number System in Look-Up Tables 110
3 Quaternary Look-Up Table (LUT) 111
3.1 Design of 4 × 1 Data Selector Using Quaternary Transmission Gates 111
3.2 Design of Quaternary SRAM 113
3.3 Design of Quaternary LUT 113
3.4 Working of Quaternary LUT Using Content Based Searching Method 116
4 Capacitance and Power Calculations 117
4.1 Estimation of Input Capacitance 117
4.2 Estimation of Output Capacitance 118
4.2.1 Cov-Gate to Drain Overlap Capacitance 118
4.2.2 Cjb Junction to Body Capacitance 118
4.2.3 Drain Sidewall Capacitance Cjsw 118
4.3 Read/Write Ratio of QCAM Cell 119
5 Conclusion 119
References 119
10 Exhaust Gas Emission Analysis of Automotive Vehicles Using FPGA 121
Abstract 121
1 Introduction 121
2 Methods of Exhaust Gas Analysis 122
2.1 Constituents of Exhaust Gas 122
2.2 Conductivity and Combustion Method of Analysis 123
3 Emission Standards 123
4 Sensors 124
5 FPGA-Based Exhaust System 125
5.1 System Architecture 126
6 Results 126
7 Conclusion and Future Scope 128
References 128
11 A Graph-Based Active Learning Approach Using Forest Classifier for Image Retrieval 130
Abstract 130
1 Introduction 131
2 Related Work 131
3 System Framework 132
4 Mathematical Modeling 134
4.1 Optimum-Path Forest Algorithm 136
4.2 Complexity Analysis 137
5 Experiment and Results 137
6 Conclusion 139
References 139
12 Comparative Analysis of Android Malware Detection Techniques 141
Abstract 141
1 Introduction 141
2 State-of-the-Art 142
2.1 Signature-Based Detection Approach 142
2.1.1 Isohara et al. 142
2.1.2 DroidAnalytics 143
2.1.3 APK Auditor 143
2.2 Machine-Learning-Based Detection Approach 143
2.2.1 DroidMat 144
2.2.2 Crowdroid 144
2.2.3 Yerima et al. 144
2.2.4 Samra et al. 145
2.2.5 Android Application Analyzer (AAA) 145
3 Parametric Evaluation 145
4 Conclusion and Future Work 148
References 148
13 Developing Secure Cloud Storage System Using Access Control Models 150
Abstract 150
1 Introduction 150
2 Methodology 152
3 Performance Analysis of Implemented Scheme 155
3.1 Comparative Analysis of Different Cryptographic Techniques 155
4 Conclusion 156
References 156
14 ETLR—Effective DWH Design Paradigm 157
Abstract 157
1 Introduction 157
2 Related Work 158
3 Problem Definition 159
4 ETLR—Effective DWH Design Paradigm 160
5 Implementation 161
6 Result and Discussion 162
7 Conclusion and Future Work 164
References 164
15 Prediction of Reactor Performance in CATSOL-Based Sulphur Recovery Unit by ANN 166
Abstract 166
1 Introduction 166
2 Process Description 168
2.1 Absorption Section 169
2.2 Regeneration Section 169
2.3 Parameter Selection 170
3 Artificial Neural Network 171
4 Strength of Proposed Technique 174
5 Conclusion 175
6 Future Scope 175
References 175
16 A Multilevel Clustering Using Multi-hop and Multihead in VANET 177
Abstract 177
1 Introduction 178
2 Existing Work 178
3 Proposed Work 180
3.1 Initiating Clustering Process 180
3.2 Head Selection 181
3.3 Slave Selection 181
3.4 Merging of Clusters 182
4 Simulation and Performance Evaluation 182
4.1 Cluster Overhead 183
4.2 Cluster Maintenance 183
4.3 Cluster Stability 183
5 Conclusion 184
References 184
Patient-Specific Cardiac Computational Modeling Based on Left Ventricle Segmentation from Magnetic Resonance Images 185
1 Introduction 185
2 Methodology 188
2.1 Image Segmentation Algorithm 188
2.2 Model Reconstruction Procedure 189
2.3 Image Navigation 189
2.4 Manual Segmentation 189
2.5 Automatic Segmentation 189
2.6 Computational Model Generation 190
3 Results 190
4 Discussion 192
References 192
18 A Cryptographic Key Generation on a 2D Graphics Using RGB Pixel Shuffling and Transposition 194
Abstract 194
1 Introduction 195
2 Related Work 195
3 Proposed System 197
3.1 Architecture of Proposed System 197
3.2 Flow of Proposed System 198
4 Advantages 199
5 Future Scope 199
6 Conclusion 200
References 200
19 Methods for Individual and Group Decision Making Using Interval-Valued Fuzzy Preference Relations 202
Abstract 202
1 Introduction 202
2 Preliminaries 203
3 Priority Vector from Additive Consistent IVFPR 204
4 Priority Vector from Multiplicative Consistent IVFPR 206
5 Extension to Group Decision Making 207
6 Numerical Illustration 210
7 Conclusion 211
References 211
20 A New Approach to Determine Tie-Line Frequency Bias (B) in Interconnected Power System with Integral Control AGC Scheme 212
Abstract 212
1 Introduction 213
2 Procedure 214
2.1 B-Kp Curve 215
2.2 B-Kp Curve for Various Other Values of Regulation 216
2.3 Equations for ‘B’ 216
3 Observations and Concluding Remarks 218
References 220
21 Significance of Frequency Band Selection of MFCC for Text-Independent Speaker Identification 221
Abstract 221
1 Introduction 221
2 Mel Scale and MFCC 223
3 Experimental Set-up 224
4 Results and Discussion 224
5 Conclusion 227
References 227
Ensuring Performance of Graphics Processing Units: A Programmer's Perspective 229
1 Introduction 229
2 Motivation 231
3 Literature Survey 232
3.1 HP QuickTest Professional : 232
3.2 IBM Rational Functional Tester : 232
3.3 Test Automation for Web Applications: 233
4 Challenges and Need 233
5 The Tool 235
5.1 Implementation: 235
5.2 Components of the Tool: 236
6 Results 237
7 Conclusion 238
References 239
23 Analytical Study of Miniaturization of Microstrip Antenna for Bluetooth/WiMax 240
Abstract 240
1 Introduction 240
2 Design 241
2.1 Case I: Study of Inductive Effect by Adding Shorting Plate 242
2.2 Case II: Study of Capacitive Effect by Changing the Feed Position for Dual Band 244
2.3 Case III: Study of Inductive Effect by Adding Shorting Parallel Strips 244
3 Conclusion 246
References 247
24 Novel All-Optical Encoding and Decoding Scheme for Code Preservation 248
Abstract 248
1 Introduction 248
2 System Description and Operation 249
3 Results and Discussion 252
4 Conclusion 253
References 254
25 XPM-Based Bandwidth Efficient WDM-to-OTDM Conversion Using HNLF 255
Abstract 255
1 Introduction 255
2 Functioning Theory 256
3 Supercontinuum Generation 257
4 Simulation Setup 257
5 Results and Discussion 257
6 Conclusion 261
References 261
Analysis of a Sporting Event on a Social Network: True Popularity & Popularity Bond
1 Introduction 262
1.1 Related Work 264
1.2 Limitations and Motivation 265
2 Notations and Definitions 265
3 Dataset 266
3.1 Data Extraction 266
3.2 Data Description 267
4 Experiments and Discussion 268
4.1 Intra-Pool Analysis 268
4.2 Inter-Pool Analysis 269
4.3 Team-Oriented Analysis 270
4.4 Geo-Analysis 272
4.5 Growth and Decay of Popularity 273
5 Conclusion and Future Work 273
References 273
Performance Analysis of LPC and MFCC Features in Voice Conversion Using Artificial Neural Networks 275
1 Introduction 275
2 Motivation 276
3 Corpus 277
4 Feature Extraction Process 277
4.1 Linear Predictive Codig (LPC) 277
4.2 Mel-Frequency Cepstral Coefficients (MFCCs) 278
5 Experiment Simulation 278
6 Result Analysis 278
7 Conclusion and Future Work 279
References 280
28 Person Detection and Tracking Using Sparse Matrix Measurement for Visual Surveillance 281
Abstract 281
1 Introduction 281
2 Related Work 283
3 Methodology 284
3.1 Image Representation 284
3.2 Integral Image 285
3.3 Image Features 285
3.4 Fast Feature Calculation 286
3.5 Classifier Design 287
4 Database Collections 287
5 Experimental Result 289
6 Conclusion 291
References 291
29 Improvisation in Frequent Pattern Mining Technique 294
Abstract 294
1 Introduction 294
2 Related Work 295
2.1 Association Rule Mining 295
2.2 A Priori Algorithm 296
2.3 A Priori Algorithm with Dynamic Programming 296
2.4 Pattern Indexing 296
2.5 AIS Algorithm 297
2.6 Direct Hashing and Pruning 297
2.7 Partition Algorithm 297
2.8 Quantitative Association Rule Generation for Weather Forecast 297
3 Improved Technique 298
4 Experiments and Results 300
5 Conclusion 301
References 301
30 Design and Simulation of Hybrid SETMOS Operator Using Multiple Value Logic at 120 nm Technology 303
Abstract 303
1 Introduction 303
2 Single Electron Transistor 304
3 Quaternary Single Electron Transistor Logical and Arithmetic Operators 305
3.1 Quaternary SETMOS MAX Gate 305
3.2 Quaternary SETMOS MIN Gate 306
3.3 Quaternary SETMOS XOR Gate 307
3.4 Quaternary SETMOS FULL ADDER 307
3.5 Quaternary Hybrid SETMOS Operator 312
4 Conclusion 315
References 315
31 Detailed Survey on Attacks in Wireless Sensor Network 316
Abstract 316
1 Introduction 316
2 Attacks in Wireless Sensor Network 317
2.1 Outsider Versus Insider Attacks 318
2.2 Passive Versus Active Attacks 318
2.3 Physical Attack/Node Capture Attack 318
3 Attacks According to Layers of Network 318
3.1 Physical Layer Attacks 318
3.2 Link Layer Attack 319
3.3 Network and Routing Layer Attacks 320
3.4 Transport Layer Attacks 324
3.5 Application Layer Attacks 324
4 Attacks on Secrecy and Authentication 325
4.1 Node Replication Attack 325
5 Attacks on Privacy 326
5.1 Eavesdropping and Passive Monitoring 326
5.2 Traffic Analysis 326
6 Some Other Security Attacks 326
6.1 Bad Mouthing and Good Mouthing Attack 326
6.2 On-Off Attack 327
7 Conclusion and Future Scope 327
References 327
32 Comparative Analysis of Frontal Face Recognition Using Radial Curves and Back Propagation Neural Network 329
Abstract 329
1 Introduction 329
2 Literature Survey 331
3 Proposed System 333
3.1 Preprocessing 333
3.2 Feature Extraction and Classifiers 333
3.2.1 Principal Component Analysis (PCA) 334
3.2.2 Radial Curves 335
3.3 Back Propagation Neural Network (BPNN) 336
3.4 Euclidean Distance 336
4 Results and Discussion 337
5 Conclusion 339
References 339
33 Data Perturbation: An Approach to Protect Confidential Data in Cloud Environment 341
Abstract 341
1 Introduction 341
2 Related Works 342
2.1 Protecting Outsourced Data 342
2.2 Preserving Query Privacy 343
3 System Architecture 343
3.1 System Module 344
3.1.1 Perturbation 344
3.1.2 Query Transformers 345
3.1.3 Query Processor 345
3.2 Range Query Processing 345
3.3 kNN Query Processing 346
4 Experimental Results 346
5 Conclusion 347
References 347
Biologically Inspired Techniques for Cognitive Decision-Making 349
1 Introduction 349
2 Biologically Inspired Cognitive Information Technology (BICIT) Architecture 350
2.1 Learning, Reasoning and Interfacing in BICIT Architecture 352
3 Related Work: Implementation of Biological-Inspired Techniques for Cognitive Decision Making 352
3.1 Procedure for Problem Solving Using Biologically Inspired Techniques 353
4 Conclusions 356
References 356
35 Analysis of Edge Detection Techniques for Side Scan Sonar Image Using Block Processing and Fuzzy Logic Methods 358
Abstract 358
1 Introduction 358
2 Fuzzy Logic Method 359
2.1 Steps 360
2.2 Rules 361
3 Block Processing 361
3.1 Steps 361
4 Proposed Methodology 361
5 Result and Discussion 362
6 Conclusion and Future Work 364
Acknowledgments 364
References 365
36 Leveraging Virtualization for Optimal Resource Management in a Cloud Environment 366
Abstract 366
1 Introduction 366
2 Resource Management in Cloud 367
2.1 Entities Involved in a Cloud Environment 368
2.2 Goals of Entities 368
2.3 Resources in a Cloud Environment 369
2.4 Virtualization Technology 369
3 Related Work 371
4 Managing Resources Using Virtualization 371
4.1 Server Consolidation 371
4.2 Load Balancing 371
4.3 Hotspot Elimination 373
4.4 System Maintenance 375
5 Conclusion 376
References 376
37 Reconfigurable Circular Microstrip Patch Antenna with Polarization Diversity 378
Abstract 378
1 Introduction 378
2 Proposed Antenna Design 379
3 Simulation Design and Results 381
4 Fabricated Antenna and Results 381
5 Conclusion 384
References 384
38 Issues with DCR and NLSR in Named-Based Routing Protocol 385
Abstract 385
1 Introduction 385
2 Name-Based Content Routing Protocols 386
3 Components of DSR and NSLR 387
4 Security and Performance Issues 387
5 Evaluation 388
6 Conclusion 389
References 390
39 Design and Analysis of Quantum Dot Cellular Automata Technology Based Reversible Multifunction Block 392
Abstract 392
1 Introduction 393
2 Quantum Dot Cellular Automata Terminologies 393
2.1 Quantum Cell 393
2.2 QCA Clock 394
2.3 QCA Logic Gates 394
3 Reversible Logic Gates 395
3.1 Toffoli Gate 395
3.2 Fredkin Gate 396
3.3 Peres Gate 396
4 Proposed Work 396
5 Simulation Result 399
6 Conclusion 401
References 402
Text-Independent Automatic Accent Identification System for Kannada Language 404
1 Introduction 404
2 Literature Survey 405
3 Methodology 407
3.1 Database 407
3.2 Feature Extraction 408
4 Results and Discussion 409
5 Conclusion and Future Work 410
References 411
41 A Study on the Effect of Adaptive Boosting on Performance of Classifiers for Human Activity Recognition 412
Abstract 412
1 Introduction 413
2 Related Work 413
3 Data Collection 414
3.1 Benchmark Dataset 414
3.2 Feature Extraction 415
4 Classification 415
4.1 Adaboost.M1 415
5 Performance Measures 416
5.1 Confusion Matrices 416
5.2 Overall Accuracy 417
5.3 Precision 417
6 Experiment Results 417
7 Conclusion 421
References 421
42 Toward Improved Performance of Emotion Detection: Multimodal Approach 423
Abstract 423
1 Introduction 423
2 Collection of Speech Samples 425
2.1 Algorithms in Work Done 426
3 Parametric Analysis 426
4 Comparison of Results 427
4.1 Vocal Tract Frequency 427
4.2 Pitch 428
4.3 Energy 428
4.4 MFCC 430
5 Discussion 431
6 Conclusion 433
References 434
43 Priority Dissection Supervision for Intrusion Detection in Wireless Sensor Networks 436
Abstract 436
1 Introduction 436
2 Literature Review 437
3 Proposed Approach: Priority Dissection Supervision (PDS) 437
3.1 Intrusion Detection 438
3.2 Tracking 439
3.3 Intelligent Reporting Mechanism 439
3.4 Priority List 441
4 Results 441
5 Simulation Results 442
6 Conclusion 445
References 445
44 Multi-objective Evolution-Based Scheduling of Computational Intensive Applications in Grid Environment 447
Abstract 447
1 Introduction 447
1.1 Purpose of Research 448
1.2 Contribution of the Proposed Work 448
2 The State of the Art 449
3 Proposed Multi-objective Particle Swarm Optimization-Based Scheduling Approach 450
3.1 Problem Formulation 450
3.2 Initial Swarm Formation 450
3.3 Exploitation Using Velocity and Position Vector 451
3.4 Objective Functions 452
3.5 Turbulence Operator and Velocity Constriction 453
4 Experimental Setup and Results 454
4.1 Results for Makespan 454
4.2 Results for Mean Flowtime 455
4.3 Results for Resource Usage Cost 455
4.4 Results for Resource Utilization 456
5 Conclusion and Future Roadmap 456
References 457
45 Selective Encryption Framework for Secure Multimedia Transmission over Wireless Multimedia Sensor Networks 458
Abstract 458
1 Introduction 458
2 Multimedia Security Issues 459
3 Effective Selective Encryption Approach for Multimedia Compression 461
4 Encryption Scheme and Simulation Model 462
5 Results and Discussions 463
6 Conclusion 468
References 469
46 Mining Frequent Quality Factors of Software System Using Apriori Algorithm 470
Abstract 470
1 Introduction 471
2 Problem Identification 471
2.1 Inclusion and Exclusion Criteria 472
2.2 Research Questions 472
3 Related Work 472
4 Experimental Work 474
5 Results 475
6 Conclusion and Future Scope 478
References 479
47 Algorithm for the Enumeration and Identification of Kinematic Chains 480
Abstract 480
1 Introduction 480
1.1 Advantages of the Proposed Method Over Existing Method 481
2 Canonical Numbering 482
3 Property of Canonical Numbering 482
4 Application of Canonical Numbering with Decodability 484
4.1 Decodability 485
5 Algorithm for Structural Enumeration 485
5.1 Assortments of Links 485
6 Maxcode Algorithm for Enumeration of Chains 486
7 Conclusion 487
References 488
48 A New Congestion Avoidance and Mitigation Mechanism Based on Traffic Assignment Factor and Transit Routing in MANET 489
Abstract 489
1 Introduction 489
1.1 Theory of Congestion Control System 490
2 Related Works 491
3 Congestion Avoidance Mechanism 491
3.1 Congestion Detection Mechanism 494
3.2 Congestion Mitigation Technique 495
4 Simulation and Analysis 496
5 Conclusion and Future Directions 498
References 498
49 MRWDPP: Multipath Routing Wormhole Detection and Prevention Protocol in Mobile Ad Hoc Networks 500
Abstract 500
1 Introduction 501
2 Literature Review 502
2.1 Packet Leashes [2] 502
2.2 WAP: Wormhole Attack Prevention Algorithm in MANETs [3] 502
2.3 WARP: Wormhole Avoidance Routing Using Anomaly Detection Mechanism [4] 503
2.4 DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Network [5] 503
3 Proposed Methodology 504
4 Simulation and Performance Parameters 505
4.1 Performance Metrics 506
5 Results and Discussions 506
5.1 Results of Multipath Routing Protocol With and Without Wormhole Attack with Varying Pause Time 506
5.2 Results of MRWDPP with Multipath Routing Under Wormhole Attack With Variable Wormhole Links 507
6 Conclusions 508
References 509
50 Self-coordinating Bus Route System to Avoid Bus Bunching 510
Abstract 510
1 Introduction 510
2 Project Organization and Framework 511
3 Proposed Methodology 512
3.1 ZigBee 512
3.2 Arduino 513
3.3 Android Mobile Application 513
4 System Implementation 515
5 Results and Conclusions 516
References 519
51 Review on Data Hiding in Motion Vectors and in Intra-Prediction Modes for Video Compression 520
Abstract 520
1 Introduction 520
2 Related Work 521
3 Embedding in Motion Vectors 522
4 Intra-PredictionModes 524
5 Conclusion 526
References 526
52 Generation of Product Cipher for Secure Encryption and Decryption Based on Vedic Encryption Ideology and Using Variable and Multiple Keys 527
Abstract 527
1 Introduction 527
2 Cryptosystem 528
2.1 Symmetric Cryptosystem 529
2.2 Characteristics of Cryptographic Model with Respect to the Proposed Algorithm 529
3 Sri Ram Shalaka Prashnavali 530
4 Substitution and Transposition Techniques 531
5 Character Set Used in the Proposed Algorithm 532
6 Proposed Encryption Algorithm 532
7 Proposed Decryption Algorithm 537
8 Results and Discussion 540
9 Conclusion 540
53 A Novel Integer Representation-Based Approach for Classification of Text Documents 542
Abstract 542
1 Introduction 542
2 Literature Survey 543
3 Proposed Model 544
3.1 Text Representation 544
3.2 Regression-Based Searching Stage 545
4 Experiments 547
5 Conclusion 548
References 548
54 Communication Device for Differently Abled People: A Prototype Model 550
Abstract 550
1 Introduction 551
2 Methodology and Implementation 551
2.1 Component Description of Hardware Model 551
2.2 Proposed Methodology 552
2.3 Description of Algorithms 555
2.3.1 Algorithm 1 556
2.3.2 Algorithm 2 557
2.3.3 Algorithm 3 558
3 Conclusion and Future Scope 559
References 559
55 Combination of PCA and Contourlets for Multispectral Image Fusion 561
Abstract 561
1 Introduction 561
2 Proposed Fusion Methodology 563
2.1 Color Transformation 563
2.2 Decomposition into Subbands Coefficients 564
2.3 Dimensionality Reduction Using PCA 565
3 Simulation Results and Discussions 565
3.1 Fusion Metrics for IQA 565
3.2 Simulation Results 566
4 Conclusion 568
References 568
56 A Behavioral Study of Some Widely Employed Partitional and Model-Based Clustering Algorithms and Their Hybridizations 570
Abstract 570
1 Introduction 570
2 Standard K-means (StKM) 571
3 Standard EM (StEM) 572
4 Fuzzy C-means (StFCM) 574
5 Hybridization of K-means, EM and FCM Algorithms 575
6 Clustering Performance Measures 575
7 Experiments and Results 577
8 Conclusion 583
References 583
57 An Adaptive MapReduce Scheduler for Scalable Heterogeneous Systems 585
Abstract 585
1 Introduction 585
2 Background 587
2.1 Heterogeneity and Scalability in MapReduce Environment 587
2.2 MapReduce Schedulers 587
2.3 Performance Metrics 588
2.4 Performance Issues 588
3 Proposed Implementation 588
4 Implementation and Results 590
5 Conclusion and Future Work 592
References 592
Enhancement in Connectivity by Distributed Beamforming in WSN 594
1 Introduction 594
2 Related Work 596
3 Proposed Work 597
3.1 Master--Slave Architecture 597
3.2 Implementation 597
4 Simulation Results 598
5 Conclusion and Future Directions 600
References 601
59 Sparse Representation Based Query Classification Using LDA Topic Modeling 602
Abstract 602
1 Introduction 602
2 Methodology 603
2.1 Statistical Topic Modeling 604
2.2 Sparse Classifier 605
3 Results and Discussion 607
4 Conclusion 609
Acknowledgments 609
References 609
60 Multiple Home Automation on Raspberry Pi 611
Abstract 611
1 Introduction 611
2 Main Features of Home Automation 612
2.1 Light Control 612
2.2 Remote Control 612
2.3 Smart Energy 613
2.4 Remote and Care 613
3 Single Home Automation 613
4 Proposed Work 615
4.1 WebIOPi 615
5 ZigBee-Based Communication 616
6 Multiple Home Automation 616
7 Algorithm for Proposed Method 616
8 Results and Discussions 617
9 Conclusions 619
References 619
61 Sentiment Analysis Based on A.I. Over Big Data 620
Abstract 620
1 Introduction 621
2 Problem Statement 621
3 Proposed System 621
4 Research Methodology 622
5 Solution Approach 623
5.1 Traditional Collaborative Filtering [7, 8] 623
5.2 Dimension Reduction [11] and Single Value Decomposition [12] 626
5.3 Recommendations with the SVD 627
6 Conclusion 627
References 627
Negotiation and Monitoring of Service Level Agreements in Cloud Computing Services 629
1 Introduction 629
2 Related Work 630
3 SLA Negotiation and SLA Monitoring 630
4 Dynamic SLA Negotiation 632
5 Negotiation Architecture and Implementation 633
6 Experimental Evaluation 635
6.1 Results and Discussion 635
7 Conclusion 637
References 637
63 Impact of Performance Management Process on Print Organizational Performance—In Indian Context 638
Abstract 638
1 Introduction 638
2 Aim of the Study 639
3 Research Gap 639
4 Relationship Between Performance Management and Print Organizational Performance 639
4.1 Print Organizational Performance 639
4.2 Performance Management 640
4.3 Link between Performance Management and Print Organizational Performance 640
5 Proposed Conceptual Framework 640
6 Processes of Performance Management 640
6.1 Performance Planning 641
6.2 Performance Development 641
6.3 Performance Appraisal 642
6.4 Reward and Recognition 643
7 Positive Impact of Performance Management Process on Print Organizational Performance 643
7.1 Goal Setting and Development Related Plans 643
7.2 Effective Decisions Related to the Organizational Growth 644
7.3 Meaningful Measurements 644
7.4 Feedback and Coaching 644
7.5 Documented History of Employee’s Performance 644
8 Negative Impact of Performance Management Process on Print Organizational and Employee’s Performance 645
8.1 Discouragement and Lack of Credibility 645
8.2 Implementation Failure 645
8.3 Bias 645
9 Discussions of the Research 646
10 Directions for the Future Study 646
11 Conclusion 646
12 Key Points 647
References 647
64 Mobility Aware Path Discovery for Efficient Routing in Wireless Multimedia Sensor Network 649
Abstract 649
1 Introduction 649
1.1 Multipath Routing 650
2 Path Discovery Methodology 651
3 Mathematical Model for Performance Evaluation 652
3.1 Experimental Setup 653
3.1.1 Case 1: No Mobility Considered 654
3.1.2 Case 2: Mobility Considered 655
4 Conclusion 655
References 656
65 Emerging Internet of Things in Revolutionizing Healthcare 658
Abstract 658
1 Introduction 659
2 Problem Statement 659
3 Related Work 660
3.1 Health Monitoring System 660
3.2 Sensor Networks 660
4 Proposed System 662
4.1 Sensing System 663
4.1.1 Body Temperature Sensor 663
4.1.2 Pulse Rate Counter 663
4.1.3 Accelerometer 664
5 Conclusion and Future Work 664
References 665
66 Swarm Intelligent WSN for Smart City 666
Abstract 666
1 Introduction 667
2 Nature-Inspired Routing Algorithms 667
3 Particle Swarm Optimization 668
4 Smart City Architecture 669
5 Prototype Design 671
5.1 Smart Home 671
5.2 Solid Waste Management 672
6 Conclusion 674
References 674
67 Representing Natural Language Sentences in RDF Graphs to Derive Knowledge Patterns 676
Abstract 676
1 Introduction 676
2 State of Art 678
3 Knowledge Patterns 679
4 Knowledge Patterns for English Sentences 680
5 Conclusion 682
References 682
68 A Framework to Enhance Security for OTP SMS in E-Banking Environment Using Cryptography and Text Steganography 683
Abstract 683
1 Introduction 683
2 Cryptography and Text Steganography 684
3 State of Art 685
4 Motivation 685
5 Methodology for Secure Internet Banking 686
6 Advantages of Proposed Work 687
7 Security Analysis of Proposed Method 688
7.1 Integrity 688
7.2 Confidentiality 688
7.3 Authentication 689
7.4 Availability 689
7.5 Nonr-Repudiation 689
8 Discussion 689
9 Conclusion 690
References 690
69 Study on the Use of Geographic Information Systems (GIS) for Effective Transport Planning for Transport for London (TfL) 692
Abstract 692
1 Introduction 693
1.1 Introduction to the Research Field 693
1.2 Introduction to the Research Focus 693
2 Literature Review 694
2.1 Geographic Information Systems 694
2.1.1 Uses and Examples 694
2.2 Transport for London (TfL) 695
2.3 GIS as an Information System for Transport for London (TfL) 695
2.3.1 Key Features of GIS Used in Transportation 695
3 Research Methodology and Data Collection 696
3.1 Data Collection Method 696
3.1.1 Survey 696
3.1.2 Interviews 696
3.1.3 Choice of Sampling 697
3.1.4 Sampling Size 698
3.2 Data Analysis Tools 698
3.3 Ethical Aspect 698
4 Discussion of Main Findings 698
4.1 Discussion of the Main Findings in the Context of the Literature Reviewed 698
4.2 Conclusion 699
References 700
70 An Integration of Big Data and Cloud Computing 702
Abstract 702
1 Introduction 702
2 Big Data Technologies 703
2.1 Column-Oriented Databases 704
2.2 Hadoop 704
2.3 Hive 704
2.4 Pig 705
3 Cloud Computing Providers Offer Their Services According to Several Fundamental Model 705
3.1 Software as a Service (SaaS) 705
3.2 Platform as a Service (PaaS) 705
3.3 Infrastructure as a Service (Iaas) 705
4 Big Data Characteristics 706
4.1 Variety 706
4.2 Velocity 707
4.3 Volume 707
5 Cloud Computing Characteristics 707
5.1 On Demand Self-services 707
5.2 Rapid Elasticity 708
5.3 Measured Service 708
5.4 Multi Tenacity 708
6 Combined Working of Big Data and Cloud Computing—Benefits 708
7 Conclusion 709
References 709
71 A New Approach for Rapid Dispatch to Remote Cooperative Groups with a Novel Key Archetype Using Voice Authentication 711
Abstract 711
1 Introduction 712
2 Existing Systems 713
3 Prospective System 713
4 Implementation 715
5 Key Management 715
6 Algorithms Used 716
7 Conclusion and Future Enhancements 718
References 719
72 ICT Enabled Proposed Solutions for Soil Fertility Management in Indian Agriculture 720
Abstract 720
1 Introduction 720
2 Literature Survey 721
2.1 Importance of DSS in Fertilizer Recommendations 722
2.2 Challenges for ICT in Indian Farming 723
3 Proposed Multi-model Decision Support System for Fertilizer Recommendations 723
3.1 Cloud-Based Web GIS Multi-model Decision Support System for Fertilizer Recommendations 723
3.2 Cloud-Based Web GIS Enabled Mobile Decision Support System for Fertilizer Recommendations 725
3.3 Cloud-Based Web GISEnabled KIOSK Decision Support System for Fertilizer Recommendations 725
4 Conclusion 727
References 728
73 Software Maintenance: From the Perspective of Effort and Cost Requirement 729
Abstract 729
1 Introduction 730
2 Why Software Maintenance? 731
3 Related Works 731
4 Maintenance Process 733
5 Types of Maintenance Activities 734
6 Case Study 736
7 Conclusion 737
References 737
74 FPGA Implementation of Low Power Pipelined 32-Bit RISC Processor Using Clock Gating 739
Abstract 739
1 Introduction 739
2 Methodology 740
3 Architecure 742
3.1 Instruction Fetch 742
3.2 Instruction Decode/Register Fetch Cycle 742
3.3 Execution/Effective Addresses Cycle 742
4 Clock Gating Methodology 743
4.1 Clock Gating 743
4.2 Clock Gating Styles 744
5 Simulation Results of RISC Processor 744
6 Conclusion 746
References 747
75 Dynamic Software Aging Detection-Based Fault Tolerant Software Rejuvenation Model for Virtualized Environment 748
Abstract 748
1 Introduction 748
2 Related Work 749
3 The Proposed Model 750
3.1 System Model 750
3.2 Dynamic Aging and Fault Prediction 752
3.3 Evaluation of Software Aging 753
3.4 Live Migration Based Software Rejuvenation 753
4 Discussion 754
5 Conclusion 755
References 755
76 Analysis of Group Performance by Swarm Agents in SACA Architecture 757
Abstract 757
1 Introduction 757
2 Proposed System 759
3 Results 762
4 Conclusion 764
References 765
77 Background Modeling and Foreground Object Detection for Indoor Video Sequence 766
Abstract 766
1 Introduction 766
2 Related Work 767
3 Proposed Method 768
3.1 Preprocessing 769
3.2 Homomorphic Filter for Color Images 769
3.3 Gaussian Mixture Model 769
3.4 Foreground Detection 770
4 Result and Performance Evaluation 771
4.1 Performance Evaluation 772
5 Conclusion 773
References 773
78 Agri-Guide: An Integrated Approach for Plant Disease Precaution, Detection, and Treatment 775
Abstract 775
1 Introduction 775
2 Related Work 776
3 Proposed Work 777
3.1 Server Side Processing 777
3.1.1 Disease Precaution 778
3.1.2 Disease Detection 778
3.1.3 Feature Extractor 778
Image Preprocessing and Segmentation 778
Feature Extraction 779
Classification 780
3.1.4 Disease Treatment 780
4 Result and Analysis 780
5 Conclusion 782
Acknowledgments 782
References 782
79 Determination of Area Change in Water Bodies and Vegetation for Geological Applications by Using Temporal Satellite Images of IRS 1C/1D 784
Abstract 784
1 Introduction 784
2 Literature Survey 786
3 Proposed Scheme 787
3.1 Study Area 788
4 Segmentation 789
5 Area Computation 790
6 Conclusion 791
Acknowledgments 791
References 791
80 Significance of Independent Component Analysis (ICA) for Epileptic Seizure Detection Using EEG Signals 793
Abstract 793
1 Introduction 793
2 Selection of Features for EEG Analysis 794
3 Independent Component Analysis (ICA) 796
3.1 Concept of ICA 796
3.2 Processing Steps in ICA for EEG Signal 796
3.2.1 EEG Data 796
3.2.2 Kurtosis for Non-Gaussianity 797
3.2.3 Independent Components 797
4 Significance of ICA in EEG Analysis 799
5 ICA Architectures of EEG Analyzers 800
6 Conclusion 800
References 801
Author Index 803

Erscheint lt. Verlag 24.8.2016
Reihe/Serie Advances in Intelligent Systems and Computing
Zusatzinfo XVIII, 841 p. 391 illus.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Graphics and Image Processing • ICDECT • ICDECT 2016 • Intelligent Communication Technology • machine learning • Web Security, Privacy and E-Commerce
ISBN-10 981-10-1678-X / 981101678X
ISBN-13 978-981-10-1678-3 / 9789811016783
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 22,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90