Proceedings of the First International Conference on Computational Intelligence and Informatics -

Proceedings of the First International Conference on Computational Intelligence and Informatics (eBook)

ICCII 2016
eBook Download: PDF
2016 | 1st ed. 2017
XIV, 724 Seiten
Springer Singapore (Verlag)
978-981-10-2471-9 (ISBN)
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The book covers a variety of topics which include data mining and data warehousing, high performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, image processing, computer networks, wireless networks, social networks, wireless sensor networks, information and network security, web security, internet of things, bioinformatics and geoinformatics. The book is a collection of best papers submitted in the First International Conference on Computational Intelligence and Informatics (ICCII 2016) held during 28-30 May 2016 at JNTUH CEH, Hyderabad, India. It was hosted by Department of Computer Science and Engineering, JNTUH College of Engineering in association with Division V (Education & Research) CSI, India. 



Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS), Vishakhapatnam, Andhra Pradesh, India. He obtained his PhD in Computer Science Engineering from JNTUH, Hyderabad and Master's degree in Computer Science and Engineering from National Institute of Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and research experience. His research interest includes machine learning, data mining, swarm intelligence studies and their applications to engineering. He has more than 98 publications to his credit in various reputed international journals and conference proceedings. He has edited many volumes of Springer AISC and LNCS in past and he is also the editorial board member in reputed international journals. He is a senior member of IEEE and Life Member of Computer Society of India. Currently, he is the National Chairman of Division-V (Education and Research) of Computer Society of India.

Dr. V. Kamakshi Prasad is a Professor and Head of Computer Science and Engineering Department at JNTUH College of Engineering Hyderabad. He completed his PhD in speech recognition from IIT Madras, India. He did his M.Tech. from Andhra University and B.Tech. from K.L. College of Engineering. He has completed over 12 years in JNTU on various positions. He has 21 years of teaching and 11 years of research experience. Dr. Prasad has been teaching subjects like speech processing, pattern recognition, computer networks, digital image processing, artificial neural, artificial intelligence and expert systems, computer graphics, object oriented analysis and design through UML, and soft computing. He has supervised 12 PhD and 2 MS students. His research areas are speech recognition and processing, image processing, neural networks, data mining and ad-hoc networks. He has authored two books published by Lambert Academic Publishing and over 50 papers in national and international level journals.

Dr. B. Padmaja Rani is a Professor in Computer Science and Engineering Department at JNTUH College of Engineering, Hyderabad. Her interest area is information retrieval embedded systems. She has published more than 25 papers in reputed journals and conferences in the areas of agile modeling, web services and mining, etc. She was the former Head of Department of CSE, JNTUH. She is a professional member of CSI.

Dr. Siba K. Udgata is a Professor of School of Computer and Information Sciences, University of Hyderabad, India. He is presently heading Centre for Modeling, Simulation and Design (CMSD), a high performance computing facility at University of Hyderabad. He has got his Master's followed by PhD in Computer Science (mobile computing and wireless communication). His main research interests are wireless communication, mobile computing, wireless sensor networks and intelligent algorithms. He was a United Nations Fellow and worked in the United Nations University/International Institute for Software Technology (UNU/IIST), Macau as research fellow in the year 2001. Dr. Udgata is working as a principal investigator in many Government of India funded research projects mainly for development of wireless sensor network applications and application of swarm intelligence techniques. He has published extensively in refereed international journals and conferences in India as well as abroad. He was also in the editorial board of many Springer LNCS/LNAI and Springer AISC Proceedings. 

Dr. K. Srujan Raju is the Professor and Head, Department of CSE, CMR Technical Campus, Hyderabad, India. Prof. Raju earned his PhD in the field of network security and his current research includes computer networks, information security, data mining, image processing, intrusion detection and cognitive radio networks. He has published several papers in refereed international conferences and peer reviewed journals and also he was in the editorial board of CSI 2014 Springer AISC series; 337 and 338 volumes. In addition to this, he has served as reviewer for many indexed journals. Prof. Raju is also awarded with Significant Contributor, Active Member Awards by Computer Society of India (CSI) and currently he is the Honorary Secretary of CSI Hyderabad Chapter.


The book covers a variety of topics which include data mining and data warehousing, high performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, image processing, computer networks, wireless networks, social networks, wireless sensor networks, information and network security, web security, internet of things, bioinformatics and geoinformatics. The book is a collection of best papers submitted in the First International Conference on Computational Intelligence and Informatics (ICCII 2016) held during 28-30 May 2016 at JNTUH CEH, Hyderabad, India. It was hosted by Department of Computer Science and Engineering, JNTUH College of Engineering in association with Division V (Education & Research) CSI, India. 

Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS), Vishakhapatnam, Andhra Pradesh, India. He obtained his PhD in Computer Science Engineering from JNTUH, Hyderabad and Master’s degree in Computer Science and Engineering from National Institute of Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and research experience. His research interest includes machine learning, data mining, swarm intelligence studies and their applications to engineering. He has more than 98 publications to his credit in various reputed international journals and conference proceedings. He has edited many volumes of Springer AISC and LNCS in past and he is also the editorial board member in reputed international journals. He is a senior member of IEEE and Life Member of Computer Society of India. Currently, he is the National Chairman of Division-V (Education and Research) of Computer Society of India.Dr. V. Kamakshi Prasad is a Professor and Head of Computer Science and Engineering Department at JNTUH College of Engineering Hyderabad. He completed his PhD in speech recognition from IIT Madras, India. He did his M.Tech. from Andhra University and B.Tech. from K.L. College of Engineering. He has completed over 12 years in JNTU on various positions. He has 21 years of teaching and 11 years of research experience. Dr. Prasad has been teaching subjects like speech processing, pattern recognition, computer networks, digital image processing, artificial neural, artificial intelligence and expert systems, computer graphics, object oriented analysis and design through UML, and soft computing. He has supervised 12 PhD and 2 MS students. His research areas are speech recognition and processing, image processing, neural networks, data mining and ad-hoc networks. He has authored two books published by Lambert Academic Publishing and over 50 papers in national and international level journals.Dr. B. Padmaja Rani is a Professor in Computer Science and Engineering Department at JNTUH College of Engineering, Hyderabad. Her interest area is information retrieval embedded systems. She has published more than 25 papers in reputed journals and conferences in the areas of agile modeling, web services and mining, etc. She was the former Head of Department of CSE, JNTUH. She is a professional member of CSI.Dr. Siba K. Udgata is a Professor of School of Computer and Information Sciences, University of Hyderabad, India. He is presently heading Centre for Modeling, Simulation and Design (CMSD), a high performance computing facility at University of Hyderabad. He has got his Master’s followed by PhD in Computer Science (mobile computing and wireless communication). His main research interests are wireless communication, mobile computing, wireless sensor networks and intelligent algorithms. He was a United Nations Fellow and worked in the United Nations University/International Institute for Software Technology (UNU/IIST), Macau as research fellow in the year 2001. Dr. Udgata is working as a principal investigator in many Government of India funded research projects mainly for development of wireless sensor network applications and application of swarm intelligence techniques. He has published extensively in refereed international journals and conferences in India as well as abroad. He was also in the editorial board of many Springer LNCS/LNAI and Springer AISC Proceedings.  Dr. K. Srujan Raju is the Professor and Head, Department of CSE, CMR Technical Campus, Hyderabad, India. Prof. Raju earned his PhD in the field of network security and his current research includes computer networks, information security, data mining, image processing, intrusion detection and cognitive radio networks. He has published several papers in refereed international conferences and peer reviewed journals and also he was in the editorial board of CSI 2014 Springer AISC series; 337 and 338 volumes. In addition to this, he has served as reviewer for many indexed journals. Prof. Raju is also awarded with Significant Contributor, Active Member Awards by Computer Society of India (CSI) and currently he is the Honorary Secretary of CSI Hyderabad Chapter.

Preface 6
Contents 8
About the Editors 14
1 GUI-Based Automated Data Analysis System Using Matlab® 16
Abstract 16
1 Introduction 17
2 Related Work 17
2.1 Data Gathering 19
2.2 Documentation 20
3 Future Work 21
Acknowledgments 21
References 21
2 A Survey Study on Singular Value Decomposition and Genetic Algorithm Based on Digital Watermarking Techniques 22
Abstract 22
1 Introduction 22
2 Digital Watermarking Based on SVD 24
2.1 Embedding Process 25
2.2 Extraction Process 25
3 Digital Watermarking Based on Genetic Algorithm 25
4 Survey of Watermarking Techniques Using SVD and GA 27
5 Conclusion 30
References 30
3 A Robust Authenticated Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks 32
Abstract 32
1 Introduction 33
2 Brief Review of Sarpong et al. Matchmaking Algorithm 34
2.1 Initial Phase 34
2.2 Key Generation 34
2.3 Attribute Certification 34
2.4 Matchmaking Phase 35
3 Cryptanalysis of Sarpong et al. Algorithm 36
4 Pitfalls or Anomalies in Sarpong et al. Algorithm 37
4.1 Requires Huge Communication Cost 37
4.2 Requires Huge Computation Cost 37
5 Our Proposed Scheme 37
5.1 Matchmaking Phase 37
6 Security Strengths of Our Proposed Scheme 39
7 Experimental Implementation 40
8 Conclusion 40
References 41
4 Artificial Neural Networks Model to Improve the Performance Index of the Coil-Disc Assembly in Tube Flow 42
Abstract 42
1 Introduction 43
2 Literature Review 44
3 Problem Statement 45
4 Experimentation 45
5 Mass Transfer 46
6 Artificial Neural Networks 49
7 Backpropagation (BP) Learning Algorithm 51
8 Methodology 52
9 Experimental Results 52
10 Conclusion 54
11 Future Enhancements 55
References 55
5 Handling Wormhole Attacks in WSNs Using Location Based Approach 57
Abstract 57
1 Introduction 58
2 Related Work 59
3 Background Approach 60
4 Proposed Methodology 61
5 Experimental Results 63
6 Conclusion 64
References 65
6 Video Authentication Using Watermark and Digital Signature—A Study 66
Abstract 66
1 Introduction 66
2 Video Authentication 67
3 Watermark Approach 67
3.1 Video Watermarking Based on Watermark Characteristics 68
3.2 Video Watermark Based on Video Domain 69
3.3 Limitations of Watermark Approach 73
4 Digital Signature Approach 73
4.1 Limitations of Digital Signature Approach 75
5 Conclusion and Future Scope 75
References 76
7 A Comparative Study and Performance Analysis Using IRNSS and Hybrid Satellites 78
Abstract 78
1 Introduction 78
2 Methodology 79
3 Math Modeling 80
4 Results and Analysis 81
4.1 Position Error with GPS Mode Only 82
4.2 Position Error with IRNNS Dual Frequency 82
4.3 Position Error for Third User Selection—DF IRNSS + GPS Hybrid Mode 82
5 Conclusion 87
Acknowledgment 87
References 87
Generalized Approach to Enhance the Shared Cache Performance in Multicore Platform 88
1 Introduction 88
2 Background 89
3 ENCAP 92
4 Experimental Setup 93
4.1 Tools Used 93
4.2 System Configuration 93
5 Experimental Results 93
6 Conclusion 94
References 95
9 A Novel Framework for Road Traffic Data Management for Cloud-Based Storage 97
Abstract 97
1 Introduction 98
2 Outcomes of the Parallel Researches 99
3 Components of Traffic Monitoring System 100
4 Proposed Road Traffic Data Management Framework 101
5 Proposed Performance Evaluation Matrix 105
6 Results 106
7 Conclusion 108
References 108
Minimum Description Length (MDL) Based Graph Analytics 110
1 Introduction to MDL and Motivation 110
2 Applying MDL to graphs 111
3 MDL-Sample Example 112
4 Graph Matching 113
4.1 Graph Matching---Our Approach 114
4.2 Interpretation 114
5 Variation of MDL Value w.r.t. Varying Graph Properties 114
5.1 t-Test Statistics 116
5.2 Interpretation 116
6 Conclusion 116
References 116
11 Implementation of Intrusion Detection System Using Artificial Bee Colony with Correlation-Based Feature Selection 118
Abstract 118
1 Introduction 118
2 Literature Review 119
3 Methodology 120
3.1 Description of KDD99 Dataset 120
3.2 Methodology for Feature Selection 121
3.3 Data Mapping Procedure 122
3.4 Artificial Bee Colony (ABC) 123
4 Experiments and Results 124
5 Conclusion 125
References 125
12 Virtualization Security Issues and Mitigations in Cloud Computing 127
Abstract 127
1 Introduction 127
2 Side Channel Attacks and Defences 128
3 Performance-Based Attacks and Defences 130
4 Hypervisor Security Issues and Defences 131
5 VM Isolation Techniques 135
6 Conclusion 136
References 137
13 Secured Three-Tier Architecture for Wireless Sensor Networks Using Chaotic Neural Network 139
Abstract 139
1 Introduction 139
2 Three-Tier Security Scheme 140
2.1 Data Transmission Between the Mobile Node and Sensor Node and Its Key Discovery 141
3 High-Secure Key Generation 141
3.1 Random PairWise Key Pre-distribution 141
3.2 Encryption of Key Using Hopfield Chaotic Neural Networks 142
4 Experimental Analysis 144
5 Conclusion and Future Work 145
References 146
14 A Regularized Constrained Least-Squares De-blurring Method for SPECT Images 147
Abstract 147
1 Introduction 147
2 Methods 148
2.1 Image Blurring Model 148
2.2 Proposed Algorithm 149
3 Results 151
3.1 Simulation Setup 151
3.2 De-blurring Results 151
4 Conclusion 154
References 154
15 Effective Video Data Retrieval Using Image Key Frame Selection 155
Abstract 155
1 Introduction 155
2 Existing System 156
2.1 Drawback of Existing System 156
2.2 Advantage of Proposed System 157
3 Literature Survey 157
4 Experimental Setup 158
4.1 Creation of Admin Database 158
4.1.1 Video Training Set Algorithm 158
4.2 User’s Image Query 159
4.3 Video Frame Retrieval 160
4.4 Creation of Key Frame Indexing 161
5 Conclusion and Future Enhancement 162
5.1 Future Enhancement 162
6 Experimental Output 162
References 165
16 A Review of Joint Channel Assignment and Routing Protocols for Wireless Mesh Networks 166
Abstract 166
1 Introduction 166
2 Joint Channel Assignment and Routing Approaches for WMNs 167
2.1 Robust Joint Channel Assignment and Routing with Time Partitioning (RCART) [4] 167
2.2 Channel Assignment and Routing Using Ant Colony Optimization in Multi-radio Wireless Mesh Networks [5] 168
2.3 Generalized Partitioned Mesh Network Traffic and Interference Aware Channel Assignment (G-PaMeLA) for WMN [6] 169
2.4 Joint Routing and Channel Assignment Protocol (JRCAP) for the IEEE 802.11s Mesh Networks [7] 170
2.5 Joint Routing and Channel Assignment (JRCA) Scheme for WMN [8] 171
2.6 Joint QoS Routing and Channel Assignment (JQRCA) for WMN [9] 171
2.7 Channel and Routing Assignment with Traffic Flow (CRAFT) for WMN [10] 172
2.8 Joint Temporal-Spatial Multi-channel and Routing Assignment for Resource Constrained WMN [11] 173
2.9 QoS Aware Joint Design for WMN [13] 174
2.10 QoS–Aware Routing Protocol on Optimized Link Source Routing (CLQ-OLSR) for IEEE 802.11 MRMC-WMN [14] 175
2.11 Joint Multi-radio Multi-channel Assignment, Scheduling and Routing in WMN [15] 175
2.12 Joint Channel Assignment and Routing in Rate-Variable WMN [16] 176
3 Future Direction 177
4 Conclusion 178
References 178
17 Correlated Cluster-Based Imputation for Treatment of Missing Values 180
Abstract 180
1 Introduction 180
2 Methodology 181
3 Clustering Algorithms for Imputation 183
3.1 Expectation Maximization (EM) 183
3.2 k Means 183
4 Accuracy of Imputation Using Classifiers 184
4.1 J48 Multi-class Classifier 184
4.2 k-Nearest Neighbor (KNN) 184
5 Results 184
6 Conclusion 187
Acknowledgments 187
References 187
18 Application of Pseudo 2-D Hidden Markov Model for Hand Gesture Recognition 188
Abstract 188
1 Introduction 189
2 Proposed Methodology 189
3 Image Database and Pre-Processing 190
4 Feature Extraction and Segmentation 191
5 Classification Based on P2D HMM 192
6 Experimental Results and Discussions 193
7 Conclusions 196
References 196
Cleaning and Sentiment Tasks for News Transcript Data 198
1 Introduction 198
2 Related Work 199
3 System Overview 201
3.1 Data Set Source 201
3.2 Understanding the Data 201
3.3 Building the Data Set 202
3.4 Data Storage 202
3.5 Cleaning of Transcript 203
3.6 Text Segmentation 203
3.7 Sentiment Timeline 204
4 Results and Analysis 205
5 Conclusion and Future Work 207
References 207
20 Inventory Management System Using IOT 210
Abstract 210
1 Introduction 210
2 Literature Review 211
3 Functional Block Diagram of the Proposed Design 212
4 Hardware Implementation and Its Components 214
4.1 Raspberry Pi 214
4.2 Ultrasonic Transducer 215
4.3 Wi-Fi Dongle 215
5 Software Implementation and Its Tools 215
6 Results and Discussions 217
7 Conclusion 218
References 218
21 A Personalized Recommender System Using Conceptual Dynamics 220
Abstract 220
1 Introduction 220
2 Related Work 222
3 Recommender Model with Conceptual Semantics 223
3.1 Conceptual Knowledge Construction 224
3.1.1 Defining Concepts 224
3.2 Sequence Pattern Mining with Concepts 224
3.2.1 Preprocessing 224
3.2.2 Mining Patterns 225
3.3 Recommendation Strategy 226
4 Experimentation Results 227
5 Conclusion 227
References 228
22 Mitigating Replay Attack in Wireless Sensor Network Through Assortment of Packets 229
Abstract 229
1 Introduction 229
2 Related Work 230
2.1 Lamports Password Authentication 230
2.2 Nonce 231
2.3 Timestamps 231
2.4 Sequence Number 232
2.5 Receiver Authentication Protocol 232
2.5.1 Detection Mode 232
2.5.2 Prevention Mode 233
3 The Proposed Algorithm 233
4 Implementation 234
5 Result and Analysis 235
6 Performance Comparison of Bloom Filter with the Proposed Protocol 236
7 Conclusion 237
References 238
23 Progressive Genetic Evolutions-Based Join Cost Optimization (PGE-JCO) for Distributed RDF Chain Queries 239
Abstract 239
1 Introduction 240
2 Related Work 241
3 Progressive Genetic Evolutions-Based Query Chain Join Optimization 242
3.1 Querying RDF 242
3.2 Objective or Cost Function 243
3.2.1 Root Mean Square Distance of the Join Costs 244
3.3 Progressive Genetic Evolution Strategy 245
3.4 The Pseudo Code Representation of the Model Devised 246
3.5 Progressive Genetic Evolutions for Join Cost Optimization 247
4 Experimental Setup and Performance Analysis 248
4.1 The Context of Input Query Formation 248
4.2 Performance Analysis 248
5 Conclusion 250
References 251
24 Improved Apriori Algorithm Using Power Set on Hadoop 253
Abstract 253
1 Introduction 253
2 Background 254
3 Related Work and Problem Statement 256
3.1 Related Work 256
3.2 Problem Statement 257
4 Preliminaries 257
5 The Proposed Algorithm 258
6 Experiment and Results 260
7 Conclusion and Future Work 261
References 261
25 Distributed Cooperative Algorithm to Mitigate Hello Flood Attack in Cognitive Radio Ad hoc Networks (CRAHNs) 263
Abstract 263
1 Introduction 263
1.1 Attacks in CRAHNs 264
1.1.1 Physical Layer Attacks 264
1.1.2 Link Layer Attacks 265
1.1.3 Network Layer Attacks 265
1.1.4 Transport Layer Attacks 265
1.2 Hello Flood Attack and Its Impacts in CRAHNs 265
2 Literature Survey 266
3 Proposed Work 267
3.1 Pre-assumptions 267
3.2 Pre-requisites 268
3.3 Proposed Algorithm 268
3.4 Evaluation 269
4 Conclusion 270
References 270
26 Performance Comparison of Intentional Caching Schemes in Disruption-Tolerant Networks (DTN) 272
Abstract 272
1 Introduction 272
2 Data Access Methods in DTN 273
3 Survey on Various Caching Techniques 273
3.1 Cooperative Caching (CC) 274
3.2 Duration-Aware Caching (DAC) 274
3.3 Adaptive Caching (AC) 275
3.4 Redundancy and Distributed Caching (DC) 276
4 Survey Table 276
5 Performance Evaluation 278
6 Conclusion 279
References 280
27 A Cascaded Method to Reduce the Computational Burden of Nearest Neighbor Classifier 281
Abstract 281
1 Introduction 281
2 Related Work 282
3 Algorithms and Notations 283
3.1 Algorithm: CNN 283
3.2 Algorithm: OCNN 284
3.3 Sequential Forward Selection (SFS) 284
3.4 An Example 286
4 Data Sets 287
5 Experimental Results 288
6 Conclusions and Future Enhancement 293
References 293
28 An Innovative Method to Mitigate DDoS Attacks for Cloud Environment Using Bagging and Stacking 295
Abstract 295
1 Introduction to Cloud Computing [1] 295
2 Introduction to Intruder Detection System 297
3 Previous Work 298
4 Proposed System 300
5 Results 303
6 Conclusion and Future Work 304
References 304
29 A Novel Method for QoS-Based Spectrum Allocation in Cognitive Radio Systems 306
Abstract 306
1 Introduction 306
1.1 Background 306
1.2 Related Works 307
1.3 Purpose of This Paper 307
1.4 Organization of This Paper 308
2 Interference Temperature Model 308
3 Proposed System 309
3.1 Interference Temperature-Based Channel Classification 310
3.2 Channel Allocation 310
4 Experiments and Results 311
5 Conclusion and Future Work 312
References 313
30 A Review on fMRI Signal Analysis and Brain Mapping Methodologies 314
Abstract 314
1 Introduction 314
2 Notable Research Works 316
3 Review Outcomes 318
4 Research Gaps 322
5 Conclusion 323
References 323
Static Program Behavior Tracing for Program Similarity Quantification 326
1 Introduction 327
2 Related Work 328
3 Our Approach 329
3.1 Disassembling the Program and Converting into IR 329
3.2 Extracting the Behavior 330
3.3 Computing the Longest Common Subsequence (LCS) 330
3.4 Classification Strategy 331
4 Experimental Analysis 332
4.1 Synthetic Program Similarity Test 332
4.2 Real-Life Program Similarity Test 333
5 Conclusion and Future Work 333
References 334
32 Ontology-Based Automatic Annotation: An Approach for Efficient Retrieval of Semantic Results of Web Documents 336
Abstract 336
1 Introduction 337
2 Related Work 337
3 Proposed System 338
3.1 Ontology Mapping 339
3.2 Web Crawler 339
3.3 Automatic Semantic Annotation 341
3.4 Searching Information 342
4 Experiment and Result 342
5 Conclusion 344
References 344
33 An Iterative Hadoop-Based Ensemble Data Classification Model on Distributed Medical Databases 345
Abstract 345
1 Introduction 346
2 Related Work 347
3 Proposed Model 349
4 Performance Analysis 354
5 Conclusion 355
References 355
34 A Framework for Secure Mobile Cloud Computing 356
Abstract 356
1 Introduction 356
2 Biometric Authentication Framework for MCC 358
2.1 Fingerprint 358
2.2 Pre-processing 359
2.3 Features Extraction 361
3 Matching Algorithm 362
4 Decision 365
5 Conclusion 365
References 366
35 Intelligent Evaluation of Short Responses for e-Learning Systems 367
Abstract 367
1 Introduction 368
2 Literature Survey 368
3 Problem Definition 369
4 Solution Strategy 371
5 Results and Discussion 373
6 Conclusion 373
References 374
36 Content-Based Video Retrieval Using Dominant Color and Shape Feature 375
Abstract 375
1 Introduction 375
2 Architecture 376
3 Proposed System 377
3.1 Video Segmentation 377
3.2 Key Frame Selection 378
3.3 Dominant Color Identification 378
3.4 Edge Detection 379
3.5 Color Matching 379
3.6 Edge Matching 380
3.7 Similarity Matching 380
4 Experimental Results 381
5 Conclusion 382
References 382
Intelligent SRTF: A New Approach to Reduce the Number of Context Switches in SRTF 383
1 Introduction 384
2 Shortest Next CPU Burst Algorithm 385
3 Intelligent Shortest Remaining Time First 386
3.1 Algorithm for Intelligent SRTF 386
3.2 Case Studies 387
3.3 Case Study 1 387
4 Conclusion and Future Enhancement 389
References 389
38 Anomaly Detection Using New Tracing Tricks on Program Executions and Analysis of System Data 391
Abstract 391
1 Introduction 391
1.1 Importance of Anomaly Detection in Two Levels 392
2 Related Work 393
3 Proposed Work: System Overview 394
4 Datasets: Artificial Datasets as Datasets 396
5 Implementation: Experiments and Results 396
5.1 Discussions 399
6 Conclusion and Future Work 400
References 400
Aesthetics of BharataNatyam Poses Evaluated Through Fractal Analysis 402
1 Introduction 402
2 Related Work 404
3 Problem Statement 405
4 Implementation Details 405
4.1 Box Counting Method 406
4.2 Fractal Analysis of ``Adavus'' 406
4.3 Data Preparation for ImageJ Software 406
4.4 Experimental Results 407
4.5 Estimation of FD Range for BN Dance Classification 407
5 Conclusions 408
References 409
40 Algorithm to Find the Dependent Variable in Large Virtualized Environment 411
Abstract 411
1 Introduction 411
2 Related Works 412
3 Finding Dependent Variables 413
4 Model of Dependent Variables 414
5 Algorithm to Find the Dependent Variables 415
6 A Case Study 417
7 Experiments and Results 420
8 Conclusion 421
References 421
41 Challenges of Modern Query Processing 423
Abstract 423
1 Introduction 423
1.1 Query Processing Architecture 424
2 Centralized Database Systems 425
3 Distributed Database Systems 427
3.1 Challenges in Distributed Database Query Processing 427
3.2 Challenges in Distributed Database Query Execution Process 427
4 Multidatabase System 428
4.1 Challenges in Multidatabase Query Processing 428
5 Query Processing: Work Done So Far 429
6 Analysis and Challenges 429
6.1 Analysis of Impact Parameters 430
6.2 Inherent Challenges of Data 431
References 431
IOT-Based Traffic Signal Control Technique for Helping Emergency Vehicles 433
1 Introduction 434
2 Related Work 435
3 The Proposed System 435
3.1 Proposed Hardware 436
3.2 Resolving Priority of the Emergency Vehicles 436
3.3 The Proposed Android Application Software 437
3.4 Algorithm 438
4 Results 438
5 Enhanced System 439
6 Conclusion 439
References 440
43 Wireless Sensor Sequence Data Model for Smart Home and IoT Data Analytics 441
Abstract 441
1 Introduction 441
2 System Description and Implementation Details 444
3 Experimental Results 444
4 Discussion and Future Work 446
References 447
44 Automatic Detection of Violent Scenes in Tollywood Movies—A Rough Set Approach 448
Abstract 448
1 Introduction 448
2 Existing Work 449
2.1 Data Sets 451
3 Challenges 451
4 Proposed System 453
5 Conclusions 454
References 454
45 Prism Tree Shape Representation Based Recognition of Offline Tamil Handwritten Characters 456
Abstract 456
1 Introduction 457
1.1 Prism Tree 458
2 System Implementation 458
2.1 Feature Pre-extraction 459
2.2 Feature Extraction—Prism Tree 459
2.3 Classification 465
3 Results and Discussion 466
3.1 Data Collection 466
3.2 Experimental Results 466
4 Conclusion 468
References 469
46 The Emergence of Internet Protocol Television as Next Generation Broadcast Network 470
Abstract 470
1 Introduction 471
2 Integration Of WiMAX and GEPON 472
3 Need for QoS and Its Evaluation in IPTV Networks 472
4 Interactive Usage Dynamics of IPTV in Large Scale 473
5 User Behavior Based Model for Minimizing Channel Zapping Time in IPTV 474
6 P2P Approach for IPTV Streaming Over Internet 474
7 Conclusions and Future Work 476
References 477
47 Cognition-as-a-Service: Arbitrage Opportunity of Cognition Algorithms in Cloud Computing 479
Abstract 479
1 Introduction 480
2 What Is Cognition-as-a-Service 480
3 The Limits of Strategic Thinking 481
4 Information Processing Time in Between HDES and AES 482
5 Cognition Algorithms Reasoning in Cognition-as-a Service 483
6 CaaS Limitations 485
7 CaaS Challenges 485
8 Conclusion 486
References 486
Directional Area Based Minutiae Selection and Cryptographic Key Generation Using Biometric Fingerprint 488
1 Introduction 489
2 Proposed Approach 489
2.1 Pre-processing 490
2.2 Directional Areas Extraction 490
2.3 Global Area Estimation for the Reference Points 492
2.4 User Registration Information 493
3 Experiments and Experimental Result 493
3.1 Objectives of Experiments 493
3.2 Experimental Setup 493
3.3 Experimental Results 493
4 Comparison with Related Work 495
5 Conclusion 495
References 496
49 Combined Effect of Soft Computing Methods in Classification 497
Abstract 497
1 Introduction 497
2 Review of Literature 498
3 Dataset Description 499
4 Methods Worked 499
4.1 Support Vector Machine 500
5 Proposed Method 501
6 Experimental Setup and Performance Analysis 502
7 Conclusions 504
References 504
50 Weighted Co-clustering Approach for Heart Disease Analysis 506
Abstract 506
1 Introduction 507
2 Cleveland Dataset Representation 508
3 Subset Clustering Approach 509
3.1 Medical Feature Selection (MFS) 509
3.2 Computer Based Feature Selection (CFS) 509
3.3 MFS-CFS 510
4 Co-clustering Approach [11] 510
5 Weighted ITCC Approach 511
6 Experimental Results 514
7 Conclusion 516
References 517
51 Secure User Authentication with Graphical Passwords and PassText 518
Abstract 518
1 Introduction 519
2 Proposed Work 520
2.1 SPGA Protocol with Mobile Token 520
2.2 Graphical Passwords 522
2.3 Strong Password Generation Algorithm 522
3 Security Analysis of Proposed Method 523
3.1 Security Threats 523
3.2 Formal Verification of Proposed Protocol Using Scyther Tool 525
4 Conclusion 527
Acknowledgments 527
References 527
A Novel Hybrid Fuzzy Pattern Classifier Using Order-Weighted Averaging 529
1 Introduction 529
2 Classification and Fuzzy Pattern Classifier 531
3 Order-Weighted Averaging for Classification 532
3.1 Heuristic Search of OWA Weights 533
3.2 FPC with Learned OWA 534
4 Experimental Evaluation 535
4.1 UCI Data Sets 535
4.2 Accuracy 536
4.3 Learned OWA Operators 538
5 Discussion and Conclusions 540
5.1 Conclusions 540
References 541
53 Efficient Query Analysis and Performance Evaluation of the Nosql Data Store for BigData 542
Abstract 542
1 Introduction 542
2 Related Work 544
3 Cassandra—An Integrated Data Store 545
3.1 Comparison of Nosql with Mysql 545
3.2 Querying Differences 546
4 Result Evaluation for Unstructured Data Using Nosql and Mysql Data Store 547
4.1 Workload Generator 547
4.2 Workload Executor 548
4.3 Statistics/Metrics Collection 548
4.4 Performance Benchmarking 548
4.4.1 Load Process 548
4.4.2 Retrieval Process 549
5 Conclusion and Future Work 550
References 551
54 Performance Evaluation of QoS-Aware Routing Protocols in Wireless Sensor Networks 552
Abstract 552
1 Introduction 552
2 Related Work 553
3 Design Considerations for QoS-Aware Routing 556
4 Performance Comparison 559
5 Conclusion 560
References 560
55 Agent-Based QoS Routing for Intrusion Detection of Sinkhole Attack in Clustered Wireless Sensor Networks 563
Abstract 563
1 Introduction 563
2 Related Work 564
2.1 Data Mining Techniques for Intrusion Detection in CWSN 564
2.2 Integrated IDS for CWSN 564
2.3 Decentralized IDS in CWSN 565
2.4 Rule-Based IDS for Selection of Attribute in CWSN 565
3 Detection of an Intruder Against Sinkhole Attack 565
3.1 Sinkhole Attack 565
3.2 IDS Against Sinkhole Attack 565
3.2.1 Initialization Phase 566
3.2.2 Detection Phase 566
4 Agent-Based QoS Routing Protocol 567
5 Performance Results and Discussions 571
5.1 Performance Analysis 571
5.2 Results 572
6 Conclusion 574
References 574
56 An Efficient Probability of Detection Model for Wireless Sensor Networks 576
Abstract 576
1 Introduction 577
2 System Model and Topology 577
2.1 Basic Information 577
2.2 Network Topology 578
2.3 Degrees and Coverage 579
3 Detection Model in WSNs 579
3.1 Sensing Model Probability 579
3.2 Single-sensing Detection 581
3.3 Multi-sensing Detection 581
4 Simulation Results 582
5 Conclusion 583
References 584
57 Incremental Updating of Mined Association Rules for Reflecting Record Insertions 585
Abstract 585
1 Introduction 586
2 Related Works 587
3 Proposed Methodology 587
4 Experimental Results 589
5 Conclusion and Future Work 591
References 591
58 Pattern Anonymization: Hybridizing Data Restructure with Feature Set Partitioning for Privacy Preserving in Supervised Learning 593
Abstract 593
1 Introduction 594
2 Related Work 595
3 Pattern Anonymization by Feature Set Partitioning and Data Set Restructuring 596
3.1 Notations Used in Model Exploration 596
3.2 Feature Set Partitioning 596
3.3 Data Set Restructuring 597
4 Process Model of the Feature Set Partitioning and Data Restructuring 597
4.1 Further Find All Possible Subsets from All Entries of the R as Follows 598
4.2 Further Find the Coverage of the Each Entry of /overline{R} as Follows 598
4.3 Further Prune l/overline{R} and k/overline{R} as Follows 599
4.4 Restructuring Data for K-Anonymity of the Feature Sets Is as Follows 600
4.5 Add Label to All Trivial Records in /overline{D} as Follows 601
5 Experimental Setup and Results Analysis 601
5.1 The Data Set 602
5.2 Performance Analysis 602
6 Conclusion 603
References 603
Effective Visiting Schedule Generation in a Tourist Recommender System Using Hadoop 605
1 Introduction 605
2 Related Work 606
3 Proposed System Architecture and Algorithms 607
3.1 The Architecture of the Proposed System 607
3.2 Proposed Algorithm 609
4 Prototype System and Results 611
5 Conclusion 612
References 613
60 A Study and Mapping of Radiation Levels from Mobile Towers in and Around Bangalore 615
Abstract 615
1 Introduction 615
2 Present Scenario of Mobile Towers 616
3 Methodology 617
4 Measurement Setup 617
5 Effects on Human Beings 619
6 Radiation Levels Measured and Analysis of the Data Obtained 619
7 Conclusions 625
8 Future Scope of Investigation 625
Acknowledgments 625
References 626
61 Low-Cost Smart Watering System in Multi-soil and Multi-crop Environment Using GPS and GPRS 627
Abstract 627
1 Introduction 627
2 System Working 628
3 Conclusion 632
References 633
62 An Image Encryption Technique Using Scan Based Approach and Image as Key 634
Abstract 634
1 Introduction 634
1.1 Partition Patterns 635
1.2 Basic Scanning Pattern 636
2 Methodology 637
2.1 Algorithm for Encryption 637
2.2 Algorithm for Decryption 638
3 Experimental Results 639
4 Performance Analysis 640
5 Conclusion 641
References 642
63 IPMOntoShare: Merging of Integrated Pest Management Ontologies 643
Abstract 643
1 Introduction 643
2 Literature Survey 644
3 IPMOntoDeveloper 646
4 IPM Ontology Merging with IPMOntoShare 647
5 Implementation 649
6 Conclusion 650
References 650
64 Graph Based Word Sense Disambiguation 652
Abstract 652
1 Introduction 652
2 Related Work 653
3 WordNet 654
4 Algorithms 654
5 Random Walks 655
5.1 Static Page Rank 655
5.2 Personalized Page Rank 655
6 Evaluation Measures 655
6.1 Comparisons 656
7 Conclusions 657
Acknowledgments 657
References 657
65 Enhanced Scaffold Design Pattern for Seculde Multi-tenant SaaS Application 658
Abstract 658
1 Introduction 658
2 Related Work 660
3 State-of-the-Art Studies 661
3.1 Pattern Formulation 661
3.2 NoSQL Data Model 661
4 Malleable Scaffold Design Pattern 662
5 Conclusion 666
References 667
66 Modelling of Three-Phase Asynchronous Motor Using Vector Control Theory 668
Abstract 668
1 Introduction 668
2 Modeling of Squirrel Cage Induction Motor 669
2.1 Current Equations 670
2.2 Flux Linkage Equations 670
2.3 Speed and Electromagnetic Torque 670
2.4 Three-Phase Supply Block 671
2.5 Three-Phase to Two-Phase Synchronous Rotating Axes Transformation Block 671
2.6 Three-Phase to Two-Phase Synchronous Current Axes Transformation Block 671
3 Simulation Results 672
3.1 Procedure to Run the Model 672
3.2 Initialization File for Parameters 673
4 Conclusion 674
67 An Unsupervised Classification of Printed and Handwritten Telugu Words in Pre-printed Documents Using Text Discrimination Coefficient 675
Abstract 675
1 Introduction 676
2 Proposed Methodology 677
2.1 Feature Computation 677
2.1.1 Geometrical Moments 678
2.1.2 Complex Moments 678
2.1.3 Statistical Features 679
2.2 Determination of Text Discrimination Coefficient 680
2.3 Decision Model for Classification of Text 682
3 Experimental Analysis 683
4 Conclusion 685
References 685
68 Neural Nets for Thermodynamic Properties 687
Abstract 687
1 Introduction 688
2 Feature Vector and Architecture of ANN for Thermodynamic Properties of Steam and Water 689
3 Neural Net Implementation of Thermodynamic Properties 693
4 Results and Conclusions 696
Acknowledgments 696
References 697
69 Parallelization of Synthetic Aperture Radar (SAR) Image Formation Algorithm 698
Abstract 698
1 Introduction 698
1.1 Basic SAR Geometry 699
2 SAR Wavefront Algorithm 700
3 Parallel Implementation 701
3.1 Parallel Implementation of FFTs 702
3.2 Parallel Implementation of Wavefront Algorithm 703
4 Experimental Setup 705
5 Results 705
6 Conclusion 706
References 706
Author Index 708

Erscheint lt. Verlag 26.11.2016
Reihe/Serie Advances in Intelligent Systems and Computing
Zusatzinfo XIV, 724 p. 274 illus.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte cognitive computing • Computaional Intelligence • conference proceedings • High Performance Computing • ICCII • ICCII 2016 • internet of things • wireless networks
ISBN-10 981-10-2471-5 / 9811024715
ISBN-13 978-981-10-2471-9 / 9789811024719
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 26,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
der Praxis-Guide für Künstliche Intelligenz in Unternehmen - Chancen …

von Thomas R. Köhler; Julia Finkeissen

eBook Download (2024)
Campus Verlag
38,99
Wie du KI richtig nutzt - schreiben, recherchieren, Bilder erstellen, …

von Rainer Hattenhauer

eBook Download (2023)
Rheinwerk Computing (Verlag)
24,90