Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Networking Communication and Data Knowledge Engineering -

Networking Communication and Data Knowledge Engineering (eBook)

Volume 1
eBook Download: PDF
2017 | 1st ed. 2018
XX, 312 Seiten
Springer Singapore (Verlag)
978-981-10-4585-1 (ISBN)
Systemvoraussetzungen
149,79 inkl. MwSt
(CHF 146,30)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Data science, data engineering and knowledge engineering requires networking and communication as a backbone and have wide scope of implementation in engineering sciences. Keeping this ideology in preference, this book includes the insights that reflect the advances in these fields from upcoming researchers and leading academicians across the globe. It contains high-quality peer-reviewed papers of 'International Conference on Recent Advancement in Computer, Communication and Computational Sciences (ICRACCCS 2016)', held at Janardan Rai Nagar Rajasthan Vidyapeeth University, Udaipur, India, during 25-26 November 2016. The volume covers variety of topics such as Advanced Communication Networks, Artificial Intelligence and Evolutionary Algorithms, Advanced Software Engineering and Cloud Computing, Image Processing and Computer Vision, and Security. The book will help the perspective readers from computer industry and academia to derive the advances of next generation communication and computational technology and shape them into real life applications.



Gregorio Martínez Pérez is Full Professor in the Department of Information and Communication Engineering of the University of Murcia, Murcia, Spain. His research interests include security and management of distributed communication networks. He received Ph.D. degree in Computer Science from the University of Murcia.

Krishn Kumar Mishra is currently working as a Visiting Faculty, Department of Mathematics and Computer Science, University of Missouri, St. Louis, USA. He is an alumnus of Motilal Nehru National Institute of Technology Allahabad, India which is also his base working institute. His primary area of research includes evolutionary algorithms, optimization techniques and design, and analysis of algorithms. He has also published more than 50 publications in International Journals and in Proceedings of Internal Conferences of repute. He is serving as a program committee member of several conferences and also editing Scopus and SCI-indexed journals. He has 15 years of teaching and research experience during which he made all his efforts to bridge the gaps between teaching and research.

Shailesh Tiwari currently works as a Professor in Computer Science and Engineering Department, ABES Engineering College, Ghaziabad, India. He is also administrative head of the department. He is an alumnus of Motilal Nehru National Institute of Technology Allahabad, India. He has more than 15 years of experience in teaching, research and academic administration. His primary areas of research are software testing, implementation of optimization algorithms and machine learning techniques in software engineering. He has published more than 40 publications in International Journals and in Proceedings of International Conferences of repute. He is also serving as a program committee member of several conferences and also editing Scopus and E-SCI-indexed journals. He has organized several international conferences under the banner of IEEE and Springer. He is a Senior Member of IEEE, member of IEEE Computer Society and Executive Committee member of IEEE Uttar Pradesh section. He is a member of reviewer and editorial board of several International Journals and Conferences.

Munesh Chandra Trivedi currently works as a Professor in Computer Science and Engineering Department, ABES Engineering College, Ghaziabad, India. He has rich experience in teaching the undergraduate and postgraduate classes. He has published 20 text books and 80 research publications in different International Journals and Proceedings of International Conferences of repute. He has received Young Scientist Visiting Fellowship and numerous awards from different national as well international forum. He has organized several international conferences technically sponsored by IEEE, ACM and Springer. He has delivered numerous invited and plenary conference talks throughout the country and chaired technical sessions in international and national conferences in India. He is on the review panel of IEEE Computer Society, International Journal of Network Security, Pattern Recognition Letter and Computer & Education (Elsevier's Journal). He is Executive Committee Member of IEEE UP Section, IEEE India Council and also IEEE Asia Pacific Region 10. He is an active member of IEEE Computer Society, International Association of Computer Science and Information Technology, Computer Society of India, International Association of Engineers, and life member of ISTE.


Data science, data engineering and knowledge engineering requires networking and communication as a backbone and have wide scope of implementation in engineering sciences. Keeping this ideology in preference, this book includes the insights that reflect the advances in these fields from upcoming researchers and leading academicians across the globe. It contains high-quality peer-reviewed papers of 'International Conference on Recent Advancement in Computer, Communication and Computational Sciences (ICRACCCS 2016)', held at Janardan Rai Nagar Rajasthan Vidyapeeth University, Udaipur, India, during 25-26 November 2016. The volume covers variety of topics such as Advanced Communication Networks, Artificial Intelligence and Evolutionary Algorithms, Advanced Software Engineering and Cloud Computing, Image Processing and Computer Vision, and Security. The book will help the perspective readers from computer industry and academia to derive the advances of next generation communication and computational technology and shape them into real life applications.

Gregorio Martínez Pérez is Full Professor in the Department of Information and Communication Engineering of the University of Murcia, Murcia, Spain. His research interests include security and management of distributed communication networks. He received Ph.D. degree in Computer Science from the University of Murcia. Krishn Kumar Mishra is currently working as a Visiting Faculty, Department of Mathematics and Computer Science, University of Missouri, St. Louis, USA. He is an alumnus of Motilal Nehru National Institute of Technology Allahabad, India which is also his base working institute. His primary area of research includes evolutionary algorithms, optimization techniques and design, and analysis of algorithms. He has also published more than 50 publications in International Journals and in Proceedings of Internal Conferences of repute. He is serving as a program committee member of several conferences and also editing Scopus and SCI-indexed journals. He has 15 years of teaching and research experience during which he made all his efforts to bridge the gaps between teaching and research. Shailesh Tiwari currently works as a Professor in Computer Science and Engineering Department, ABES Engineering College, Ghaziabad, India. He is also administrative head of the department. He is an alumnus of Motilal Nehru National Institute of Technology Allahabad, India. He has more than 15 years of experience in teaching, research and academic administration. His primary areas of research are software testing, implementation of optimization algorithms and machine learning techniques in software engineering. He has published more than 40 publications in International Journals and in Proceedings of International Conferences of repute. He is also serving as a program committee member of several conferences and also editing Scopus and E-SCI-indexed journals. He has organized several international conferences under the banner of IEEE and Springer. He is a Senior Member of IEEE, member of IEEE Computer Society and Executive Committee member of IEEE Uttar Pradesh section. He is a member of reviewer and editorial board of several International Journals and Conferences. Munesh Chandra Trivedi currently works as a Professor in Computer Science and Engineering Department, ABES Engineering College, Ghaziabad, India. He has rich experience in teaching the undergraduate and postgraduate classes. He has published 20 text books and 80 research publications in different International Journals and Proceedings of International Conferences of repute. He has received Young Scientist Visiting Fellowship and numerous awards from different national as well international forum. He has organized several international conferences technically sponsored by IEEE, ACM and Springer. He has delivered numerous invited and plenary conference talks throughout the country and chaired technical sessions in international and national conferences in India. He is on the review panel of IEEE Computer Society, International Journal of Network Security, Pattern Recognition Letter and Computer & Education (Elsevier’s Journal). He is Executive Committee Member of IEEE UP Section, IEEE India Council and also IEEE Asia Pacific Region 10. He is an active member of IEEE Computer Society, International Association of Computer Science and Information Technology, Computer Society of India, International Association of Engineers, and life member of ISTE.

Preface 6
Technical Program Committee 8
About the Book 14
Contents 15
About the Editors 18
Advanced Communication Networks 20
1 Detection and Prevention of DDoS Attacks in Wireless Sensor Networks 21
Abstract 21
1 Introduction 21
2 Related Work 22
3 Proposed Model 23
3.1 Two Way Authentication 24
3.2 Data Filtration Method 24
3.3 Algorithm Steps 25
4 Implementation Using NS-2 25
5 Result Analysis 27
6 Conclusion 30
References 30
2 Wired LAN and Wireless LAN Attack Detection Using Signature Based and Machine Learning Tools 32
Abstract 32
1 Introduction 32
2 Related Work 33
3 Proposed Approach 34
4 Setup Environment of Lab 35
5 Results and Observations 36
5.1 Manually Through Wireshark 37
5.2 Using Signature Based Tool 38
5.3 Using Machine Learning Tool 38
6 Conclusion and Future Work 40
References 41
3 Enhancing WSN Lifetime Using TLH: A Routing Scheme 42
Abstract 42
1 Introduction 42
2 Literature Survey 43
3 Problem Statement 44
4 Proposed Work 45
4.1 Two Level Heterogeneity (TLH) Scheme 45
4.2 Sensor Radio Model 46
4.3 Workflow of Simulation 47
5 Simulation Study 48
5.1 Network Set Up 48
5.2 Simulation Environment 48
6 Result and Discussion 49
6.1 Advantages of Proposed Scheme with Flat Routing Heterogeneous Model 50
7 Conclusion 51
8 Future Scope 51
References 52
4 IP Traceback Schemes for DDoS Attack 53
Abstract 53
1 Introduction 53
2 Background Details & Related Work
3 IP Traceback Schemes 54
3.1 Reactive Mechanism Based Traceback Schemes: This Section Shows the Different Reactive Mechanism Based Traceback Schemes 57
3.1.1 Link Testing 57
3.1.2 Messaging 58
3.1.3 Packet Marking 58
3.1.4 Packet Logging 60
3.1.5 Overlay 61
3.2 Hybrid Traceback Schemes 61
3.3 Special IP Traceback Schemes 62
3.3.1 Ant Colony System Algorithm for Solving the IP Trace-Back Problem 64
4 Comparison of Different Proposed IP Traceback Schemes 64
5 Conclusions and Future Direction 65
References 66
5 Adaptability of Various Mobility Models for Flying AdHoc Networks—A Review 67
Abstract 67
1 Introduction 67
2 Mobility Models 68
2.1 Temporal Dependency 69
2.1.1 Gauss-Markov 69
2.1.2 Smooth Random 70
2.2 Spatial Dependency 70
2.2.1 Reference Point Group Mobility Model (RPGM) 71
2.2.2 Community Based Mobility Model 71
2.2.3 Pursue Mobility Model 71
2.2.4 Social Network Founded Model 71
2.3 Geographical Restrictions 72
2.3.1 Area-Graph Based Model 72
2.3.2 Map Based Model 72
2.3.3 Manhattan Grid Model 72
2.3.4 Obstacle Model 72
2.4 Hybrid Structure 73
2.4.1 Free Way Mobility 73
2.4.2 Catastrophe-Scenario Model 73
2.4.3 User Oriented Meta Model 73
2.4.4 Disaster Area Model 73
2.5 Random 74
2.5.1 Random-Waypoint 74
2.5.2 Clustered Mobility 74
2.5.3 Random Walk 74
3 Connectivity Graph Metrics 74
3.1 Number of Link Changes 75
3.2 Link Duration 75
3.3 Link Availability 75
4 Conclusion and Future Scope 78
Acknowledgements 78
References 78
6 Reliable Packet Delivery in Vehicular Networks Using WAVE for Communication Among High Speed Vehicles 80
Abstract 80
1 Introduction 81
2 Packet Delivery in Vehicular Ad Hoc Networks 83
3 Performance Evaluation of Proposed Algorithm 84
4 Simulation Parameters and Results 87
5 Conclusion 90
References 90
7 Integration of IEC 61850 MMS and IEEE 802.22 for Smart Grid Communication 93
Abstract 93
1 Introduction 94
2 Smart Grid Communication 95
3 IEC 61850 96
4 IEEE 802.22 WARN 98
5 Integration of IEC 61850 MMS with IEEE 802.22 99
6 Communication Model 100
7 Conclusions 101
References 102
8 KRUSH-D Approach for the Solution to Node Mobility Issue in Underwater Sensor Network (UWSN) 103
Abstract 103
1 Introduction 104
2 Proposed Approach 104
3 Dry Run of Proposed Approach 106
4 Results 109
5 Conclusion and Future Work 112
References 112
9 NS2 Based Structured Network Attack Scrutiny in MANET 113
Abstract 113
1 Introduction 114
2 Routing and Protocols 114
2.1 Routing 115
3 Attacks on Routing and Protocols 116
3.1 Based on Secrecy and Authentication 117
3.2 Based on Integrity 118
3.3 Based on Availability: Denial of Service 120
4 Comparison of Attacks 120
5 Study of Simulations 121
6 Conclusion 124
References 124
10 EKMT-k-Means Clustering Algorithmic Solution for Low Energy Consumption for Wireless Sensor Networks Based on Minimum Mean Distance from Base Station 126
Abstract 126
1 Introduction 126
2 Related Work 127
3 Proposed k-Means Clustering Based Energy Efficient Protocol 128
4 Simulation Results 132
5 Conclusion 135
References 135
11 A Review of FIR Filter Designs 137
Abstract 137
1 Introduction 137
1.1 Filter 138
1.1.1 Need of Filtering 138
1.1.2 Digital and Analog Filtering 138
1.1.3 Finite Impulse Response (FIR) Filter 139
1.1.4 Design Parameters and Constraints 140
2 FIR Filter Design 140
2.1 Observations for FIR Filter 148
3 Conclusions 149
References 150
12 Analysis of Safety Applications in VANET for LTE Based Network 153
Abstract 153
1 Introduction 154
2 Analysis, Design and Related Works 155
3 Proposed Scheduler for VANET Based Safety Application 158
4 Simulation Explanation and Results 160
5 Conclusion 164
References 164
13 Broadcast Storm Problem—A Hidden Consequence of Content Distribution in Content Delivery Networks 167
Abstract 167
1 Introduction 168
2 Literature Survey 169
2.1 Content Distribution and Selection 169
2.2 Broadcast Storm Problem 170
2.3 Solutions to BSP 171
3 Comparative Analysis 173
3.1 Problem Formulation 173
3.2 Comparative Study 174
3.3 BSP in CDN 175
4 Conclusion 176
References 176
Artificial Intelligence and Evolutionary Algorithms 178
Attribute Reduction Method Using the Combination of Entropy and Fuzzy Entropy 179
1 Introduction 179
2 Priliminaries 181
2.1 Entropy Fuzzy Entropy 181
2.2 Nearest Neighbor 182
3 Proposed Method 182
4 Experimental Results 184
5 Conclusion 186
References 186
15 Evaluation of Factors Responsible for Road Accidents in India by Fuzzy AHP 188
Abstract 188
1 Introduction 188
2 Literature Review 189
3 Methodology 191
3.1 AHP and Fuzzy AHP Approach 191
4 Case Study 193
4.1 Problem Definition 193
5 Conclusion 196
References 196
16 Development of Knowledge Capsules for Custom-Tailored Dissemination of Knowledge of Seismic Data Interpretation 198
Abstract 198
1 Introduction 198
2 Related Work 199
3 Proposed Framework 201
4 Experimental Details 202
5 Conclusion 204
Acknowledgements 204
References 204
17 Design of Low Cost Blood Glucose Sensing System Using Diffused Reflectance Near-Infrared Light 206
Abstract 206
1 Introduction 207
2 Research Methodology 208
2.1 Light wavelength selection 209
2.2 In Vitro Prototype Design 210
2.3 In Vivo Prototype Design 211
2.3.1 Calibration Models for Estimation of the Blood Glucose 214
3 Experimental Results 218
3.1 In Vitro Experimentation 218
3.2 In Vivo Experimentation 220
4 Discussion 222
5 Conclusion 223
References 224
18 Hybrid Chunker for Gujarati Language 226
Abstract 226
1 Introduction 226
2 Earlier Relevant Work 227
3 Approach Used 228
4 Architecture of Proposed System 231
5 Experiments 232
6 Results 233
7 Conclusions 234
References 234
19 Sound Localization in 3-D Space Using Kalman Filter and Neural Network for Human like Robotics 236
Abstract 236
1 Introduction 236
1.1 Neurotransmission 237
1.2 Sound Localization 238
1.3 Types of Cues for Sound Localization 238
1.4 Localization Process 239
2 Related Work 240
3 Preliminaries 241
3.1 Coincidence Detectors 241
3.2 Kalman Filters 242
3.2.1 Prediction Step 242
3.2.2 Updation Step 243
4 Proposed System 245
5 Results and Discussion 248
5.1 Conclusion and Future Scope 251
References 251
20 Analysis of Stock Prices and Its Associated Volume of Social Network Activity 253
Abstract 253
1 Introduction 253
2 The Foundations of Social Network Analysis 254
2.1 Terminology 254
2.2 Structure of Social Networks 255
2.3 Network Evolution 255
2.4 Network Density 256
2.5 Network Performance 256
3 Literature Survey 256
3.1 Correlation Between Public Sentiment and Market Sentiment 257
3.2 Sentiment Analysis at the User Level 257
3.3 Logistical Regression Modeling 258
3.4 Disadvantage of Predictive Models 259
4 Volume of Twitter Activity 259
4.1 Procedure 260
5 Analysis 261
6 Mathematical Analysis 261
7 Conclusion 262
References 263
21 On Solutions to Capacitated Vehicle Routing Problem Using an Enhanced Ant Colony Optimization Technique 264
Abstract 264
1 Introduction 264
2 CVRP Formulation 265
3 Enhanced Ant Colony Optimization (ACO) Algorithm 266
4 Computational Results 267
5 Conclusion 272
References 272
22 Music Recommendation System with User-Based and Item-Based Collaborative Filtering Technique 274
Abstract 274
1 Introduction 274
2 Related Work 275
2.1 User-Item Rating Matrix 275
2.2 Collaborative Filtering (CF) Technique 276
2.2.1 User-Based CF 276
2.2.2 Item-Based CF 276
3 Proposed Algorithm 276
3.1 Similarity Measures 277
3.2 Normalization Techniques 277
3.3 Proposed Approach 278
3.3.1 Pre-processing of Data 278
3.3.2 Model Building 279
4 Results 280
4.1 Experimental Results 281
5 Conclusion and Future Scope 283
References 285
23 GLCM Feature Extraction for Insect Bites Pattern Recognition 286
Abstract 286
1 Introduction 287
2 Texture Analysis 287
3 GLCM 288
4 Extraction of Features from GLCM 289
5 Result 290
6 Conclusion and Future Work 291
References 292
24 A Novel Hybrid PSO-DA Algorithm for Global Numerical Optimization 294
Abstract 294
1 Introduction 295
2 Particle Swarm Optimization 295
3 Dragonfly Algorithm 296
4 The Hybrid PSO-DA Algorithm 298
5 Simulation Results for Unconstraint Test Benchmark Function 299
6 Overcurrent Relay Co-ordination with Common Configuration in Power System 300
7 Conclusions 303
Acknowledgements 303
References 304
25 Short-Term Electricity Price Forecasting Using Hybrid SARIMA and GJR-GARCH Model 306
Abstract 306
1 Introduction 307
2 The Proposed Approach 308
2.1 Wavelet Transform 308
2.2 SARIMA Model 310
2.3 GJR-GARCH Model 310
2.4 Hybrid SARIMA-GJR GARCH Model 311
3 Results and Discussion 312
4 Conclusion 316
References 316
Author Index 319
427613_1_En_26_Chapter_OnlinePDF.pdf 0
26 Erratum to: Design of Low Cost Blood Glucose Sensing System Using Diffused Reflectance Near-Infrared Light 318
Erratum to:& #6

Erscheint lt. Verlag 13.11.2017
Reihe/Serie Lecture Notes on Data Engineering and Communications Technologies
Lecture Notes on Data Engineering and Communications Technologies
Zusatzinfo XX, 312 p. 145 illus.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Datenbanken Data Warehouse / Data Mining
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Communication • Computational Sciences • Computer • Distributed Database Systems • ICRACCCS • Network and Information Security • RACCCS 2016
ISBN-10 981-10-4585-2 / 9811045852
ISBN-13 978-981-10-4585-1 / 9789811045851
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 8,3 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Datenschutz und Sicherheit in Daten- und KI-Projekten

von Katharine Jarmul

eBook Download (2024)
O'Reilly Verlag
CHF 24,40