Proceedings of the First International Conference on Intelligent Computing and Communication -

Proceedings of the First International Conference on Intelligent Computing and Communication (eBook)

eBook Download: PDF
2016 | 1st ed. 2017
XXVII, 707 Seiten
Springer Singapore (Verlag)
978-981-10-2035-3 (ISBN)
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The book covers a wide range of topics in Computer Science and Information Technology including swarm intelligence, artificial intelligence, evolutionary algorithms, and bio-inspired algorithms. It is a collection of papers presented at the First International Conference on Intelligent Computing and Communication (ICIC2) 2016. The prime areas of the conference are Intelligent Computing, Intelligent Communication, Bio-informatics, Geo-informatics, Algorithm, Graphics and Image Processing, Graph Labeling, Web Security, Privacy and e-Commerce, Computational Geometry, Service Orient Architecture, and Data Engineering.



Prof. J.K. Mandal received his M.Sc. in Physics from Jadavpur University in 1986 and M. Tech. in Computer Science from University of Calcutta. Prof. Mandal was awarded Ph.D. in Computer Science and Engineering by the Jadavpur University in 2000. Presently, he is working as Professor of Computer Science and Engineering and former Dean, Faculty of Engineering, Technology and Management, Kalyani University, Kalyani, Nadia, West Bengal for two consecutive terms. He started his career as Lecturer at NERIST, Arunachal Pradesh in September 1988. He has teaching and research experience of 28 years. His areas of research include coding theory, data and network security, remote sensing and GIS based applications, data compression, error correction, visual cryptography, steganography, security in MANET, wireless networks and unify computing. He has produced 15 Ph.D. degrees, 2 submitted (2015-16) and 8 ongoing. He has supervised 3 M.Phils. and more than 50 M.Tech dissertations. He is a life member of the Computer Society of India since 1992, CRSI since 2009, ACM since 2012, IEEE since 2013 and Fellow member of IETE since 2012, Honorary Chairman of CSI Kolkata Chapter. He has chaired more than 30 sessions in various international conferences and delivered more than 50 expert/invited lectures during last 5 years. He has acted as program chair of many international conferences and edited more than 15 volumes of proceedings from Springer Series, Science Direct etc. He is reviewer of various international journals and conferences. He has over 360 articles and 6 books published to his credit. He is one of the editors for Springer AISC Series, FICTA 2014, CSI 2013, IC3T 2015, INDIA 2015, and INDIA 2016. He is also the corresponding editors of CIMTA 2013 (Procedia Technology, Elsevier), INDIA 2015  (AISC Springer) and ICIC2 2016 (AISC Springer).

Dr. Manas Kumar Sanyal obtained his M.Tech. in Computer Science from Calcutta University in 1989. He worked in industries for about 4 years and joined as Lecturer at BCKV in the year 1994 and obtained his Ph.D. in 2003. Presently, he is working as Dean, Faculty of Engineering, Technology and Management in the University of Kalyani, Kalyani, West Bengal. His current research interests include big data, e-governance, e-procurement, data warehousing and data mining. In addition to presenting his work at numerous international conferences, Dr. Sanyal has also organized and chaired several international and national conferences. He has contributed over 100 research papers in various international journals and proceedings of international conferences.

Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of CSE at Anil Neerukonda Institute of Technology and Sciences (ANITS), Andhra Pradesh, India. He obtained his Ph.D. in Computer Science and Engineering from JNTU Hyderabad and M.Tech. in CSE from NIT, Rourkela, Odisha, India. He has 26 years of teaching experience. His research interests include data mining, machine intelligence and swarm intelligence. He has acted as program chair of many international conferences and edited 6 volumes of proceedings from Springer LNCS and AISC series. He is currently guiding 8 scholars for Ph.Ds. Dr. Satapathy is also a Sr. Member of IEEE, Life Member of CSI, Chairman - Division -V (Education and Research) 2015-17, Computer Society of India. He is Editorial Board Member of International Journal of Ambient Computing and Intelligence (IJACI) - indexed in SCOPUS; International Journal of Advanced Intelligence Paradigms  (IJAIP) - indexed in SCOPUS; International Journal of Rough Sets and Data Analysis (IJRSDA) - indexed in DBLP, ACM Digital Lib; International Journal of Statistics, Optimization and Information Computing (IJSOAC) - indexed in SCOPUS; International Journal of Synthetic Emotions (IJSE) - indexed in DBLP, ACM Digital Lib., corresponding editor for Springer AISC Series: FICTA 2013, FICTA 2014, CSI 2013, CSI 2014, IC3T 2015, INDIA 2016, IC3T 2015, ICT4SD 2015.

Dr. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow, India. Presently, he is also the Head (Academics & Quality Control) in the same college. He has a total academic teaching experience of 12 years with more than 100 publications in reputed international conferences, journals and online book chapter contributions. His areas of research include digital image processing, computer vision and medical imaging. His core work in medical imaging includes development of techniques for computer aided analysis and diagnosis of life threatening diseases which are published in IEEE Sensors Journal, IEEE Transactions in Instrumentation and Measurements and Elsevier - Computer Methods and Programs in Biomedicine. Prof. Vikrant has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core technical/editorial teams for international conferences: FICTA 2014, CSI 2014, INDIA 2015 and ICICT 2015 under Springer ASIC Series and INDIA Com 2015, ICACCI 2015 under IEEE. He has been publication chair of Springer INDIA 2016 conference, Vishakhapatnam (India); Proceeding editor for Springer AISC Series for conferences, ICIC2 2016, West Bengal (India) and ICDECT 2016, Pune (India). He has published 3 books under Springer AISC Series and Springer Studies in Computational Intelligence Series as an editor. He is associate editor in International Journals of Convergence Computing (IJConvC), Image Mining (IJIM) and Rough Sets and Data Analysis (IJRSDA) under Inderscience Publishers and IGI Global publications. 


The book covers a wide range of topics in Computer Science and Information Technology including swarm intelligence, artificial intelligence, evolutionary algorithms, and bio-inspired algorithms. It is a collection of papers presented at the First International Conference on Intelligent Computing and Communication (ICIC2) 2016. The prime areas of the conference are Intelligent Computing, Intelligent Communication, Bio-informatics, Geo-informatics, Algorithm, Graphics and Image Processing, Graph Labeling, Web Security, Privacy and e-Commerce, Computational Geometry, Service Orient Architecture, and Data Engineering.

Prof. J.K. Mandal received his M.Sc. in Physics from Jadavpur University in 1986 and M. Tech. in Computer Science from University of Calcutta. Prof. Mandal was awarded Ph.D. in Computer Science and Engineering by the Jadavpur University in 2000. Presently, he is working as Professor of Computer Science and Engineering and former Dean, Faculty of Engineering, Technology and Management, Kalyani University, Kalyani, Nadia, West Bengal for two consecutive terms. He started his career as Lecturer at NERIST, Arunachal Pradesh in September 1988. He has teaching and research experience of 28 years. His areas of research include coding theory, data and network security, remote sensing and GIS based applications, data compression, error correction, visual cryptography, steganography, security in MANET, wireless networks and unify computing. He has produced 15 Ph.D. degrees, 2 submitted (2015-16) and 8 ongoing. He has supervised 3 M.Phils. and more than 50 M.Tech dissertations. He is a life member of the Computer Society of India since 1992, CRSI since 2009, ACM since 2012, IEEE since 2013 and Fellow member of IETE since 2012, Honorary Chairman of CSI Kolkata Chapter. He has chaired more than 30 sessions in various international conferences and delivered more than 50 expert/invited lectures during last 5 years. He has acted as program chair of many international conferences and edited more than 15 volumes of proceedings from Springer Series, Science Direct etc. He is reviewer of various international journals and conferences. He has over 360 articles and 6 books published to his credit. He is one of the editors for Springer AISC Series, FICTA 2014, CSI 2013, IC3T 2015, INDIA 2015, and INDIA 2016. He is also the corresponding editors of CIMTA 2013 (Procedia Technology, Elsevier), INDIA 2015  (AISC Springer) and ICIC2 2016 (AISC Springer). Dr. Manas Kumar Sanyal obtained his M.Tech. in Computer Science from Calcutta University in 1989. He worked in industries for about 4 years and joined as Lecturer at BCKV in the year 1994 and obtained his Ph.D. in 2003. Presently, he is working as Dean, Faculty of Engineering, Technology and Management in the University of Kalyani, Kalyani, West Bengal. His current research interests include big data, e-governance, e-procurement, data warehousing and data mining. In addition to presenting his work at numerous international conferences, Dr. Sanyal has also organized and chaired several international and national conferences. He has contributed over 100 research papers in various international journals and proceedings of international conferences. Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of CSE at Anil Neerukonda Institute of Technology and Sciences (ANITS), Andhra Pradesh, India. He obtained his Ph.D. in Computer Science and Engineering from JNTU Hyderabad and M.Tech. in CSE from NIT, Rourkela, Odisha, India. He has 26 years of teaching experience. His research interests include data mining, machine intelligence and swarm intelligence. He has acted as program chair of many international conferences and edited 6 volumes of proceedings from Springer LNCS and AISC series. He is currently guiding 8 scholars for Ph.Ds. Dr. Satapathy is also a Sr. Member of IEEE, Life Member of CSI, Chairman – Division –V (Education and Research) 2015-17, Computer Society of India. He is Editorial Board Member of International Journal of Ambient Computing and Intelligence (IJACI) – indexed in SCOPUS; International Journal of Advanced Intelligence Paradigms  (IJAIP) – indexed in SCOPUS; International Journal of Rough Sets and Data Analysis (IJRSDA) – indexed in DBLP, ACM Digital Lib; International Journal of Statistics, Optimization and Information Computing (IJSOAC) – indexed in SCOPUS; International Journal of Synthetic Emotions (IJSE) – indexed in DBLP, ACM Digital Lib., corresponding editor for Springer AISC Series: FICTA 2013, FICTA 2014, CSI 2013, CSI 2014, IC3T 2015, INDIA 2016, IC3T 2015, ICT4SD 2015. Dr. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow, India. Presently, he is also the Head (Academics & Quality Control) in the same college. He has a total academic teaching experience of 12 years with more than 100 publications in reputed international conferences, journals and online book chapter contributions. His areas of research include digital image processing, computer vision and medical imaging. His core work in medical imaging includes development of techniques for computer aided analysis and diagnosis of life threatening diseases which are published in IEEE Sensors Journal, IEEE Transactions in Instrumentation and Measurements and Elsevier – Computer Methods and Programs in Biomedicine. Prof. Vikrant has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core technical/editorial teams for international conferences: FICTA 2014, CSI 2014, INDIA 2015 and ICICT 2015 under Springer ASIC Series and INDIA Com 2015, ICACCI 2015 under IEEE. He has been publication chair of Springer INDIA 2016 conference, Vishakhapatnam (India); Proceeding editor for Springer AISC Series for conferences, ICIC2 2016, West Bengal (India) and ICDECT 2016, Pune (India). He has published 3 books under Springer AISC Series and Springer Studies in Computational Intelligence Series as an editor. He is associate editor in International Journals of Convergence Computing (IJConvC), Image Mining (IJIM) and Rough Sets and Data Analysis (IJRSDA) under Inderscience Publishers and IGI Global publications. 

Preface 6
Organizing Committee 8
Chief Patron 8
Honorary Chair 8
Organizing Chair 8
Organizing Co-chair 8
Program Chair 8
Program Co-chair 9
Publication Chair 9
Publication Co-chair 9
Registration Chair 9
Registration Co-chair 9
Reception and Publicity Chair 9
Website Management Chair 10
International Advisory Committee 10
Local Program/Publication Committee 11
Finance Committee 11
Editorial Committee 12
Website Committee 12
Registration Committee 12
Contents 14
List of Reviewers 21
About the Editors 24
Biomedical Image Processing and Bioinformatics 27
1 Altered PPI Due to Mutations in hPER2 and CKI Delta Locus, Causing ASPS 28
Abstract 28
1 Introduction 28
2 Materials and Methods 29
2.1 Sequence Information Search for Wild Type Proteins 29
2.2 Structural Information Searches 30
2.3 Homology Modeling of hPER2 30
2.4 Mutation Generation in Wild Type Structures 30
2.5 Molecular Docking of hPER2 and hCKId Proteins 30
2.6 Structural Comparison 31
2.7 Interaction Energy Calculation 31
3 Results and Discussions 31
3.1 Structural Comparisons 31
3.2 Interaction Energy Comparison 31
4 Conclusion 32
Acknowledgments 32
References 32
2 A Comparative Framework of Probabilistic Atlas Segmentation Method for Human Organ’s MRI 34
Abstract 34
1 Introduction 34
2 Material 35
3 Probabilistic Atlas Based Segmentation in Breast, Heart, Brain, Liver and Chest 36
4 Result and Discussion 36
5 Conclusion 39
References 40
3 Concentration of Acetone Levels in Breath for Monitoring Blood Glucose Level 41
Abstract 41
1 Introduction 41
2 Breath Analysis Procedure 43
2.1 Proposed Analysis 43
2.2 Acetone Level Concentration 44
2.3 Classification 44
3 Result and Discussion 46
4 Conclusion and Future Work 47
References 47
4 Computational Molecular Analysis of Human Rhodopsin, Transducin and Arrestin Interactions: An Insight into Signal Transduction for Ophthalmology 49
Abstract 49
1 Introduction 50
2 Materials and Methods 51
2.1 Sequence Analysis of Human Transducin 51
2.2 Template Search and Homology Modeling of the Modelled Protein 51
2.3 Loop Optimization of the Modeled Transducin Protein 51
2.4 Stereo-Chemical Validation of Transducin Model 52
2.5 Structural Analysis of Human Rhodopsin and Arrestin 52
2.6 Docking Simulations of the Three Human Proteins Sequentially 52
2.7 Energy Optimization and Refinement Using ModRefiner 52
2.8 Simulation Studies via Molecular Dynamics for the Trio-Protein Complex 52
2.9 Protein–Protein Interaction Calculations 53
2.10 Comparative Analysis of Electrostatic Potential and Net Area of Solvent Accessibility upon the Surface of Rhodopsin 53
2.11 Comparative Analysis of Conformational Switches in Rhodopsin 53
3 Results 54
3.1 Structural Demonstration of Human G-Protein Transducin (?-Subunit) 54
3.2 Analysis of the Residues and Binding Pattern in the Protein Complex 54
3.3 Analysis of the Electrostatic Surface Potential and Net Solvent Accessible Surface Area 55
3.4 Comparative Analysis of Conformational Alterations in Rhodopsin 56
4 Discussion 56
5 Conclusion and Future Scope 57
Acknowledgments 58
References 58
5 Evaluating the Performance of State of the Art Algorithms for Enhancement of Seismocardiogram Signals 60
Abstract 60
1 Introduction 61
2 Methodology 62
2.1 Database 62
2.2 Wavelets for Denoising 62
2.2.1 Wavelet-Thresholding for Denoising 63
2.2.2 Multivariate Wavelet Denoising (Wavelet-PCA) 64
2.3 Denoising Using Empirical Mode Decomposition 64
2.4 Adaptive Filtering 65
2.5 Morphological Filtering 65
3 Results Obtained on Denoising 66
4 Conclusion 67
References 67
Common Subcluster Mining to Explore Molecular Markers of Lung Cancer 69
1 Introduction 69
1.1 Our Contribution 70
2 Related Works 70
3 Methods 71
3.1 Common Subcluster Mining (CSM) 71
4 Algorithm 73
5 Results and Discussion 74
5.1 Dataset 74
5.2 CSMC 75
5.3 CSMF 75
5.4 Possible Markers 76
5.5 Sensitivity on Advancement of the Disease 76
6 Conclusion 76
References 77
Cloud Computing 79
7 Progressing the Security Landscape of Cloud by Incorporating Security Service Level Agreement (Sec-SLA) 80
Abstract 80
1 Introduction 81
2 Cloud Architecture 82
3 Cloud Security Issues in Different Layers 83
3.1 Identity Management 83
3.2 Multi Tenancy and VM 84
3.3 Attack on Hypervisor 84
3.4 Availability 84
3.5 Lower Layer Issues 84
4 Protection Methods 85
5 Service Level Agreement in Cloud 85
6 Security SLA 86
7 Future Work and Conclusion 88
References 89
8 On Demand IOPS Calculation in Cloud Environment to Ease Linux-Based Application Delivery 91
Abstract 91
1 Introduction 91
2 Background Study 92
2.1 Basic Definition of IOPS 92
2.2 Frontend IOPS 92
2.3 Backend IOPS 93
2.4 RAID Penalty 93
2.5 IOPS Calculation 93
2.6 Flow Chart of Our Proposed Model 94
2.7 Discussion of Our Proposed Work 95
2.8 Statistical Data Analysis 95
3 Conclusion and Future Work 97
References 97
9 Intelligent Storage Management Using Cloud Shared Disk Architecture 98
Abstract 98
1 Introduction 98
2 Technology Preliminaries 99
3 Proposed System 100
4 Analyses 103
5 Conclusions 104
Acknowledgments 105
References 105
10 Hybrid Application Partitioning and Process Offloading Method for the Mobile Cloud Computing 106
Abstract 106
1 Introduction 106
2 Related Work 109
3 Design and Implementation 109
4 Result Analysis 110
5 Conclusion 113
6 Future Work 113
References 114
11 Encrypted Data Searching Techniques and Approaches for Cloud Computing: A Survey 115
Abstract 115
1 Introduction 115
1.1 Challenges Associated with Cloud Computing 116
1.2 Motivation for a Solution 116
2 Review of Existing Solutions to Enable Encrypted Data Search 116
2.1 Property Preserving Encryptions (PPE) 116
2.2 Functional and Identity-Based Encryption 117
2.3 Fully Homomorphic Encryption 118
2.4 Oblivious RAM 119
3 Conclusion 120
Acknowledgments 121
References 121
12 A Proposed Conceptual Framework to Migrate Microsoft Technology Based Applications to Cloud Environment 123
Abstract 123
1 Introduction 124
2 Literature Review 125
3 Research Methodology 126
4 Conceptual Framework to Migrate Applications to Cloud 126
4.1 Seven Phases Migration Workflow 126
4.2 Migration Tasks Detail 128
5 Simulation and Results 129
References 132
Communication Network and Services 133
13 An Adaptive Cloud Communication Network Using VSAT with Enhanced Security Implementation 134
Abstract 134
1 Introduction 134
2 Related Work 135
3 Proposed Work 136
3.1 Algorithm for Data Sending from Cloud Data Center 137
3.2 Mode Selection Procedure 138
4 Flow Chart 139
5 Result Analysis 140
6 Conclusion 141
References 142
14 Introspecting Effect of Packet Size on End-to-End Network Delay 143
Abstract 143
1 Introduction 143
2 Related Work 144
3 Impact of Packet Size on Delay 144
4 Experimental Result 149
5 Conclusion 150
References 150
15 An Ontology Based Context Aware Protocol in Healthcare Services 152
Abstract 152
1 Introduction 152
2 Related Work 153
3 Methodology 154
4 Ontology Used 155
5 Explanation of Proposed Algorithms 155
5.1 Context Search Technique 155
5.2 Ontology Modification 156
6 Experiment 157
6.1 Data Set 157
6.2 Experimental Metrics 157
6.3 Results 158
6.4 Discussion of Experimental Results 159
7 Conclusion 159
References 160
16 Processing ASP.Net Web Services Using Generic Delegation Approach 162
Abstract 162
1 Introduction 163
2 Related Work 163
3 Proxy Class 163
3.1 Using WSDL Tool 164
3.2 Adding Web Reference in Microsoft Visual Studio 164
4 C# and VB Reflection API 164
5 NET Web Service Authentication 164
6 Proposed Algorithm 165
7 Experimental Results 166
7.1 Authenticated Web Service 166
7.2 Web Services with Client Security Certificate 167
8 Catering of the Algorithm 168
9 Conclusion 170
References 170
17 Link Based Protection of Light Trail in WDM Mesh Networks 171
Abstract 171
1 Introduction 171
2 Related Works 173
3 Light Trail Protection (LTP) 174
3.1 Problem Statement 174
3.2 Overview of the Solution 174
4 The Proposed Heuristic 175
5 Illustration and Discussions 176
6 Conclusion 178
References 178
Data Analytics and Data Mining 179
18 Prediction of Twitter Users’ Interest Based on Tweets 180
Abstract 180
1 Introduction 180
2 Related Work 181
3 Methodology 182
3.1 Data Collection 182
3.2 Sentiment Analysis 182
3.3 Classification of Tweet 183
3.4 Processing 184
3.5 Proposed Method 184
4 Results 185
5 Conclusion and Future Work 187
References 187
19 Event Detection Over Twitter Social Media 189
Abstract 189
1 Introduction 189
2 Related Work 190
3 Proposed Algorithm 192
3.1 Algorithm 192
4 Results 194
5 Conclusion and Future Work 196
References 196
20 DMDAM: Data Mining Based Detection of Android Malware 198
Abstract 198
1 Introduction 198
2 Related Work 199
3 Feature Engineering 200
3.1 Feature Extraction 200
3.2 Preprocessing 200
4 Empirical Validation 201
4.1 Evaluation Metrics 201
4.2 Classifiers 202
5 Conclusion and Future Works 204
References 204
Comparative Study of Parallelism on Data Mining 206
1 Introduction 206
2 Parallel Computer Architectures 208
3 Parallelism in Java 210
3.1 Advantages of Java 211
3.2 Parallel Java Architectures and Libraries 212
4 Conclusion 214
References 214
Brief Review on Optimal Suffix Data Structures 216
1 Introduction 216
2 Terminology 217
2.1 Suffix Tree 217
2.2 Suffix Link 218
2.3 Suffix Array 218
2.4 LCP (Longest Common Prefix) Array 219
3 Optimized Suffix Structure 219
3.1 Space Efficient Structure 220
3.2 Time Efficient Structure 222
3.3 Space and Time Efficient Structures 223
4 Conclusion 224
References 225
23 Demalvertising: A Kernel Approach for Detecting Malwares in Advertising Networks 226
Abstract 226
1 Introduction 227
2 Online Advertisement: Threats 228
3 Attack Methodologies 229
3.1 IFrame Based Attacks 229
3.2 Malicious JavaScript Codes 230
4 Our Methodology 230
5 Design and Implementation 231
6 Evaluation of the System 232
7 Conclusion 233
References 234
Closure Based Integrated Approach for Associative Classifier 236
1 Introduction 237
2 Methodology 238
2.1 Problem Statement 238
2.2 Proposed Approach 238
3 Experimental Results 243
4 Conclusion 245
References 245
25 Approaches and Challenges of Big Data Analytics—Study of a Beginner 247
Abstract 247
1 Introduction 247
2 Related Work 248
3 Data Analytics 248
3.1 Scale of Big Data and Scope of Big Data Analytics 248
3.2 Nature of Alalytics Work 249
4 The Steps of Big Data Analytics and Related Issues 249
4.1 Acquire Data 249
4.2 Choose Architecture 250
4.3 Shape Data into Architecture 250
4.4 Coding 250
4.5 Reflecting and Iterating the Result 250
5 Desirable Algorithms 250
5.1 Naïve Bayes Approach 251
5.2 K-Means Clustering Algorithm 251
5.3 Apriori Algorithm 251
5.4 Frequent Pattern Growth Algorithm 251
5.5 A Comparative Study of These Four Algorithms 251
6 Applications of Big Data Analytics 252
6.1 Social Media and Internet 252
6.2 Government Organizations and Public Sector 253
6.3 Health and Human Welfare 253
6.4 Business and Economy 253
6.5 Experimental Processes and Research 253
7 Conclusion 254
References 254
26 A Novel MapReduce Based k-Means Clustering 256
Abstract 256
1 Introduction 256
2 Proposed Work 258
2.1 An Overview of k-Means 258
2.2 Proposed Algorithm 258
3 Experimental Results 260
3.1 Datasets 260
3.2 Performance Evaluation 261
3.3 Cluster Validation 262
4 Conclusion and Future Work 263
Acknowledgments 263
References 263
27 Supplier Selection in Uncertain Environment: A Fuzzy MCDM Approach 265
Abstract 265
1 Introduction 266
2 Methodology 267
2.1 DEMATEL 267
2.2 Analytic Network Process (ANP) 268
2.3 Fuzzy VIKOR 269
3 Problem Statement of the Company 270
4 Results and Discussion 271
5 Conclusion 273
Appendix 273
References 273
Intelligent Computing for Skill-Set Analytics in a Big Data Framework---A Practical Approach 275
1 Introduction and Motivation 275
2 Methodology 276
3 Big Data Framework 277
4 Related Work 278
5 Results and Discussion 278
5.1 Dataset 278
5.2 Result Inferences: 278
5.3 Performance Analysis 279
6 Conclusion and Future Work 280
7 Appendix 281
References 282
29 Implication of Performance Appraisal Process on Employee Engagement Mediated Through the Development and Innovation Oriented Culture: A Study on the Software Professionals of IT Companies in West Bengal 284
Abstract 284
1 Introduction 285
2 Review of Existing Literatures 287
2.1 Assessment of Employee Performance and Its’ Implication 287
2.2 Goal Setting and Innovation 288
2.3 Performance Monitoring and Management Support to Facilitate Employee Development and Innovation 289
2.4 Effect of Performance Evaluation on Learning and Development and Innovation 289
2.5 Effect of Feedback on Learning and Development and Innovation 290
3 Objectives 291
4 Methodology Used 291
5 Findings 297
6 Implications and Conclusion 298
References 299
Device System and Modeling 302
30 Estimation of MOS Capacitance Across Different Technology Nodes 303
Abstract 303
1 Introduction 303
2 MOSFET Capacitance Model 304
2.1 Gate-to-Bulk Capacitance (CGB) 305
2.2 Gate-to-Source Capacitance (CGS) 306
2.3 Gate-to-Drain Capacitance (CGD) 307
3 Simulation Results and Discussions 307
4 Conclusion 311
References 312
31 Cross-Coupled Dynamic CMOS Latches: Scalability Analysis 313
Abstract 313
1 Introduction 313
2 Cascade Voltage Switch Logic (CVSL) Differential Latches 314
3 Dynamic Single Transistor Clocked (DSTC) Latches 316
4 Dynamic Ratio Insensitive (DRIS) Differential Latches 317
5 Simulation Results and Discussions 317
6 Design of High-Speed Edge Triggered Flip-Flops 319
7 Conclusions 320
References 320
32 Cross-Coupled Dynamic CMOS Latches: Robustness Study of Timing 322
Abstract 322
1 Introduction 322
2 Simulation Setup 324
3 Impact of Process Variations on Timing 324
4 Impact of Supply Voltage Variations on Timing 325
5 Dependence of Timing on Temperature Variations 327
6 Variability Analysis of Dynamic Latches 328
7 Conclusions 329
References 329
A Design of a 4 Dot 2 Electron QCA Full Adder Using Two Reversible Half Adders 331
1 Introduction 331
2 Preliminary Aspects of QCA 332
2.1 QCA Components in Brief 332
2.2 Advantages of QCA 333
2.3 QCA Clocking 333
2.4 Reversible Computing 334
2.5 Advantages of Reversibility 334
3 Design and Implementation 334
4 Simulation Result 335
5 Architecture of Full Adder 336
5.1 Effective Area 338
6 Conclusion 338
References 338
34 Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS) 340
Abstract 340
1 Introduction 341
2 Related Works 342
3 System Model 343
4 Proposed Scheme 343
5 Security and Performance Analysis 345
6 Conclusion 346
References 346
Design of a BCD Adder Using 2-Dimensional Two-Dot One-Electron Quantum-Dot Cellular Automata 347
1 Introduction 347
2 Overview of Two-Dot One-Electron QCA 348
3 Designs Proposed 349
3.1 Full Adder 349
3.2 BCD Adder 350
4 Output Energy State Determination 352
5 Analysis of the BCD Adder Design 352
6 Comparative Study 352
7 Energy and Power Requirements 352
8 Conclusion 355
References 356
36 Design Based New Coupling Metric for Component Based Development Environment 357
Abstract 357
1 Introduction 357
2 The Metric of Software 358
3 Coupling Computation at Package Level with Proposed Approach 359
3.1 Proposed Approach 359
3.2 Calculation of Total Coupling of Components with the Average Coupling of the Project 360
4 Results and Analysis 363
4.1 Conclusions and Future Work 364
References 364
37 Scientific Workflow Management System for Community Model in Data Fusion 365
Abstract 365
1 Introduction 365
2 Scientific Workflow Management System 366
2.1 Configuration Generation Workflow 366
2.2 Analysis Campaign Workflow 367
3 Architecture of Scientific Workflow Management System 367
4 Scientific Workflow Management System for Community Model 368
5 Conclusion 370
References 370
38 An Improved Stator Resistance Adaptation Mechanism in MRAS Estimator for Sensorless Induction Motor Drives 373
Abstract 373
1 Introduction 374
2 MRAS Based Simultaneous Parameter Estimation 375
3 Structure of the Estimator 376
3.1 Reference Model/Adjustable Model for Speed Estimate/ Stator Resistance Estimate 377
3.2 Adjustable Model/Reference Model for Speed Estimate/ Stator Resistance Estimate 377
3.3 Simultaneous Rotor Speed and Stator Resistance Adaptation Mechanism [9] 377
3.4 Estimation of Electromagnetic Torque 380
4 Offline Simulation Results: Analysis and Discussion 380
4.1 MRAS Speed Estimator with PI Based Stator Resistance Adaptation Scheme 381
4.2 MRAS Speed Estimator with Fuzzy Logic Based Stator Resistance Adaptation Scheme 383
5 Conclusions 385
Appendix 386
References 386
39 A New Implementation Scheme in Robotic Vehicle Propulsion Using Brushless DC Motor 388
Abstract 388
1 Introduction 389
2 Description of the Drive System 390
3 Real Time Implementation of BLDC Motor 391
4 Hardware Simulation Results 392
5 Conclusion 393
References 394
40 Binary Fuzzy Goal Programming for Effective Utilization of IT Professionals 396
Abstract 396
1 Introduction 396
2 Fuzzy Subset, Membership Function, and Triangular Fuzzy Number 398
2.1 Fuzzy Subset 398
2.2 Intersection of Two Fuzzy Sets 398
2.3 Triangular Fuzzy Number 398
2.4 Triangular Membership Function 398
3 Binary FGP Problem 399
4 IT Professional Utilization Model for Software Firms 401
4.1 Index, Parameters, and Decision Variable 401
4.2 Goals of the Model 401
4.3 Constraints of the Model 402
5 A Case Example 402
6 Results and Discussion 403
6.1 Comparison with the GP Solution [5] 404
7 Conclusions 405
Acknowledgement 405
References 405
41 AVR Microcontroller Based Conference Presentation Timer 407
Abstract 407
1 Introduction 407
2 Device Hardware Description 408
2.1 Atmega8 Microcontroller Unit 409
2.1.1 Advanced RISC Modified Harvard Architecture 409
2.1.2 High Endurance Memory Segments 409
2.2 16 × 2 LCD Unit 410
2.3 Buzzer 410
2.4 Miscellaneous Items 410
3 Working Algorithm 410
4 Future Scope for Development 410
References 412
Image Processing and Pattern Recognition 413
42 A Person Identification System with Biometrics Using Modified RBFN Based Multiple Classifiers 414
Abstract 414
1 Introduction 414
2 Overview of the Multi-classification System 415
2.1 Preprocessing of Different Biometric Patterns 415
2.1.1 Preprocessing of Fingerprint and Face Images 415
2.1.2 Preprocessing to Extract Iris Images 416
2.2 Theory of the Operation 416
2.2.1 Identification Learning 417
2.2.2 Identification Testing 417
3 Result and Performance Analysis 418
3.1 Performance Evaluation of the Classifiers 418
3.1.1 Fuzzy Confusion Matrix 419
3.2 Experimental Results 420
4 Conclusion 422
References 422
43 An Application of GIS Techniques Towards Pasture Land Use Studies 424
Abstract 424
1 Introduction 425
1.1 The Role of Remote Sensing and Geographical Information System (GIS) 425
1.2 GIS and Its Application 426
2 Methodology 426
3 Result and Discussion 427
3.1 Overlay Analysis 428
4 Conclusions 431
References 431
44 Wavelet-Based Image Compression Using SPIHT and Windowed Huffman Coding with Limited Distinct Symbol and It’s Variant 433
Abstract 433
1 Introduction 433
2 SPIHT Algorithm 434
3 Variants of Huffman Coding 435
4 Proposed Technique 436
5 Results 436
6 Conclusion 438
Acknowledgments 438
References 438
Extraction of Distinct Bifurcation Points from Retinal Fundus Images 440
1 Introduction 441
2 Proposed Method 441
3 Algorithm 443
4 Experimental Result 445
5 Performance Evaluation 446
6 Conclusion 446
References 447
Automatic Measurement and Analysis of Vessel Width in Retinal Fundus Image 448
1 Introduction 448
2 Proposed Method 449
2.1 Algorithm 452
3 Experimental Result 452
4 Complexity Analysis 454
5 Conclusion 455
References 455
47 Recognition of Handwritten Indic Script Numerals Using Mojette Transform 456
Abstract 456
1 Introduction 456
2 Present Work 457
2.1 Mojette Transform 457
2.2 Principal Component Analysis (PCA) 459
3 Experimental Results and Discussion 459
4 Conclusion 462
References 462
A Survey of Prospects and Problems in Hindustani Classical Raga Identification Using Machine Learning Techniques 464
1 Introduction 464
2 Characteristics of Hindustani Ragas 466
2.1 Characteristics 466
2.2 Bhatkhande's Classification 467
3 Problems to Be Addressed in HCM 468
4 Comparison Between HCM and WCM 468
5 Music Information Retrieval(MIR) 468
6 Related Work 469
6.1 Raga Identification 469
6.2 Works Addressing Issues of Section 3 470
7 Prospects 471
References 471
49 A Neuro Fuzzy Based Black Tea Classifying Technique Using Electronic Nose and Electronic Tongue 473
Abstract 473
1 Introduction 473
2 Experimentation 474
3 Data Analysis 474
3.1 POPFNN Model Framework 475
3.2 Fuzzy Model Framework 477
3.3 Neural Network Framework with BP-MLP Topology 478
3.4 Fuzzy Neural Network Framework (FNN) 478
4 Results 479
5 Conclusion 480
References 480
50 Design of Novel Feature Vector for Recognition of Online Handwritten Bangla Basic Characters 481
Abstract 481
1 Introduction 481
2 Bangla Script 483
3 Database Preparation 483
4 Feature Extraction 484
4.1 CG-Based Circle 484
4.1.1 Global Information 484
4.1.2 Local Information 485
5 Result and Discussion 486
6 Conclusion 488
References 489
51 An Eigencharacter Technique for Offline-Tamil Handwritten Character Recognition 491
Abstract 491
1 Introduction 491
2 Motivation 492
3 Methodology 493
3.1 Algorithm1 493
4 Experimentation 495
5 Conclusion 500
References 500
52 Text and Non-text Separation in Handwritten Document Images Using Local Binary Pattern Operator 502
Abstract 502
1 Introduction 502
2 Related Work 503
3 Motivation 503
4 Present Work 504
4.1 Component Extraction 504
4.2 Feature Extraction 504
5 Experimental Results 506
6 Error Case Analysis 508
7 Conclusion 509
References 509
53 Page-to-Word Extraction from Unconstrained Handwritten Document Images 511
Abstract 511
1 Introduction 512
2 Proposed Work 513
2.1 Harris Corner Point Detection 513
2.2 DBSCAN Clustering 515
2.3 Extraction of Word Images 515
2.4 Removal of Over-Segmentation and Under-Segmentation Errors 516
3 Experimental Results and Discussion 516
4 Conclusion 517
References 518
A Computer Vision Framework for Detecting Dominant Points on Contour of Image-Object Through Thick-Edge Polygonal Approximation 520
1 Introduction 521
1.1 Related Work 521
2 Proposed Framework 522
2.1 Thick-Edge Polygonal Approximation of the Contour Using Polyline 522
2.2 Proposed Algorithm 524
3 Experimental Results and Analysis 524
4 Conclusion 528
References 528
55 Kuan Modified Anisotropic Diffusion Approach for Speckle Filtering 529
Abstract 529
1 Introduction 529
2 Proposed Methodology 531
2.1 Background 531
2.2 Kuan Modified AD Filter 532
3 Results and Discussions 533
4 Conclusion 535
References 536
Security and Cryptography 538
Dual-Image Based Reversible Data Hiding Scheme Through Pixel Value Differencing with Exploiting Modification Direction 539
1 Introduction and Related Work 540
1.1 Motivation 540
2 Proposed Scheme 541
2.1 Data Embedding Stage 541
2.2 Extraction Procedure 543
3 Experimental Results 546
4 Conclusion 546
References 546
57 Cryptanalysis of an Asymmetric Image Cryptosystem Based on Synchronized Unified Chaotic System and CNN 548
Abstract 548
1 Introduction 548
2 Cheng et al. Encryption Algorithm 550
3 Cryptanalysis of Cheng et al. Cryptosystem 551
4 Conclusion 555
References 555
58 Chaotic Map Based Image Encryption in Spatial Domain: A Brief Survey 557
Abstract 557
1 Introduction 557
2 Types of Encryption on Spatial Domain 559
3 Chaotic Map 559
4 Chaotic Map Based Encryption and Decryption Model 562
5 Confusion Phases 564
6 Diffusion Phase 564
7 Conclusion 566
References 566
A Novel Approach to E-Voting Using Multi-bit Steganography 568
1 Introduction 568
2 Proposed Method 570
3 Experimental Observations and Contrast with Existing Algorithms 573
3.1 Image Fidelity Analysis 573
3.2 Robustness Against Sample Pair Analysis 575
3.3 Robustness Against Correlation Analysis 575
3.4 Performance Against Existing Techniques 576
4 Conclusion 577
References 577
60 Comparative Analysis of Classification Techniques in Network Based Intrusion Detection Systems 578
Abstract 578
1 Introduction 579
2 Intrusion Detection System 579
3 Related Work 580
4 Research Methodology 582
4.1 Entropy Based Classification 582
4.2 J48 Algorithm 582
4.3 Naïve Bayes (NB) 583
5 Experimental Results 583
6 Conclusions 586
References 587
61 A New and Resilient Image Encryption Technique Based on Pixel Manipulation, Value Transformation and Visual Transformation Utilizing Single–Level Haar Wavelet Transform 589
Abstract 589
1 Introduction 589
2 Related Works 590
2.1 Spatial Domain Cryptography 590
2.2 Frequency Domain Cryptography 591
3 Haar Wavelet 591
4 Proposed Algorithms 592
4.1 Encoding Algorithm 592
4.2 Decryption Algorithm 593
5 Experimental Results and Analysis 594
5.1 Correlation Coefficients 594
5.2 PSNR 595
5.3 NPCR and UACI 595
6 Conclusion 596
References 597
62 A Scheme for QR Code Based Smart Door Locks Security System Using an ARM Computer 598
Abstract 598
1 Introduction 598
2 Schematics 599
2.1 Algorithm and Functional Description 599
2.2 Software Security 602
2.3 Real Time Implementation of the System 603
3 Analysis of Efficacy of the System 603
3.1 Advantages 603
3.1.1 Uniqueness of UQID System Over RFID/Swipe Card Based Systems 603
3.1.2 Uniqueness of UQID System Over Other QR-Code/Bar Code Based Security Systems 604
3.2 Limitations of the System 605
4 Discussions 605
References 606
63 Image Steganography Using BitPlane Complexity Segmentation and Hessenberg QR Method 607
Abstract 607
1 Introduction 607
2 Literature Survey 608
3 Proposed Method 613
4 Results and Analysis 614
5 Conclusion 616
References 616
64 A Novel Scheme for Analyzing Confusion Characteristics of Block Ciphers 618
Abstract 618
1 Introduction 618
2 Proposed Scheme 619
2.1 Algorithm 620
2.2 Objective 621
3 Experimental Results 621
3.1 Experimental Results for DES S-Boxes 621
3.2 Experimental Results for AES S-Box 622
3.3 Discussion 624
4 Conclusion 624
References 625
Wireless Sensor Network 626
65 Source-Initiated Routing to Support Large-Scale Pseudo-Linear ZigBee Networks 627
Abstract 627
1 Introduction 627
2 Related Work 628
3 Proposed Algorithm 629
3.1 Network Formation 629
3.2 Routing 630
3.3 Examples 631
3.4 Restructuring 632
4 Experimental Results 633
5 Summary 634
References 634
66 SSeS: A Self-configuring Selective Single-Path Routing Protocol for Cloud-Based Mobile Wireless Sensor Network 636
Abstract 636
1 Introduction 636
2 State of the Art Review 637
3 Problem Formulation 638
3.1 Determining the Stable Path from Source to Sink Node 638
3.2 Presenting the Number of Links in a Given Path 638
3.3 The Two-State Markov Chain 638
3.4 Computing the Node Stability 639
3.5 Establishing the Relationship Between Link Stability and Node Stabilities 640
3.6 Calculating Path Score 640
3.7 Determining the Highest Path Score to Select the Best Path 641
4 Our Proposed Single-Path Routing Methodology 641
4.1 Neighbor Discovery 641
4.2 Route Establishment 642
5 Experimental Set-Up and Simulation Analysis 645
5.1 Packet Delivery Ratio (PDR) 645
5.2 Average Energy Consumption Rate 647
6 Conclusion and Future Plan 647
References 648
67 Link Quality Modeling for Energy Harvesting Wireless Sensor Networks 649
Abstract 649
1 Introduction 649
2 Related Work 651
3 System Model 651
4 Simulation and Analysis 654
4.1 Simulation Scenario 654
4.2 Results 656
5 Conclusion and Future Scope 657
References 658
GA Based Energy Efficient and Balanced Routing in k-Connected Wireless Sensor Networks 659
1 Introduction 659
2 Proposed Work 661
2.1 Chromosome Representation and Initial Population 661
2.2 Fitness Function 662
2.3 Selection and Crossover 663
2.4 Mutation 663
3 Experimental Results 664
4 Conclusion 665
References 666
69 An Approach Towards Energy Efficient Channel Reduction in Cellular Networks 667
Abstract 667
1 Introduction 667
2 Related Work 668
3 System Model 669
4 Problem Formulation 671
5 Proposed Approach 671
6 Experimental Results 673
7 Conclusions 674
References 675
70 Military Robot Path Control Using RF Communication 676
Abstract 676
1 Introduction 676
2 Working Principle 677
3 Implementation 678
4 Result and Discussion 679
4.1 Test Point-1 680
4.2 Test Point-2 680
5 Conclusions 682
Acknowledgments 682
References 682
Author Index 684

Erscheint lt. Verlag 21.11.2016
Reihe/Serie Advances in Intelligent Systems and Computing
Zusatzinfo XXVII, 707 p. 306 illus.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Business Intelligence • Circuits & Systems • ICIC2 • ICIC2 Proceedings • Image Processing • Intelligent Computing & Communication • Intelligent Embedded Systems • Intelligent Forensics • Nano & Molecular Computing
ISBN-10 981-10-2035-3 / 9811020353
ISBN-13 978-981-10-2035-3 / 9789811020353
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 22,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90