Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Proceedings of the Second International Conference on Computational Intelligence and Informatics -

Proceedings of the Second International Conference on Computational Intelligence and Informatics (eBook)

ICCII 2017
eBook Download: PDF
2018 | 1st ed. 2018
XVIII, 739 Seiten
Springer Singapore (Verlag)
978-981-10-8228-3 (ISBN)
Systemvoraussetzungen
149,79 inkl. MwSt
(CHF 146,30)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The volume contains 69 high quality papers presented at International Conference on Computational Intelligence and Informatics (ICCII 2017). The conference was held during 25-27, September, 2017 at Department of Computer Science and Engineering, JNTUHCEH, Hyderabad, Telangana, India. This volume contains papers mainly focused on data mining, wireless sensor networks, parallel computing, image processing, network security, MANETS, natural language processing, and internet of things.



Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Bhateja has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.  

João Manuel R.S. Tavares graduated in Mechanical Engineering from the University of Porto - Portugal (1992); MSc in Electrical and Computer Engineering, in the field of Industrial Informatics, University of Porto (1995); PhD in Electrical and Computer Engineering, University of Porto (2001). From 1995 to 2000 he was a researcher at the Institute of Biomedical Engineering (INEB). He is co-author of more than 350 scientific papers in national and international journals and conferences, co-editor of 18 international books and guest-editor of several special issues of international journals. In addition, he is Editor-in-Chief of the Computer Methods in Biomechanics and Biomedical Engineering: Imaging ' & ' Visualization (CMBBE: Imaging ' & ' Visualization); Editor-in-Chief of the International Journal of Biometrics and Bioinformatics (IJBB); Co-Editor-in-Chief of the International Journal for Computational Vision and Biomechanics (IJCV' & 'B); Co-Editor of the Lecture Notes in Computational Vision and Biomechanics (LNCV' & 'B); Associate Editor of the EURASIP Journal on Advances in Signal Processing (JASP), Journal of Engineering, ISRN Machine Vision, Advances in Biomechanics ' & ' Applications, and of the Journal of Computer Science (INFOCOMP), and reviewer of several international scientific journals. Since 2001, he has been Supervisor and Co-Supervisor of several MSc and PhD thesis and involved in several research projects, both as researcher and as scientific coordinator. Additionally, he is co-author of 3 international patents and 2 national patents. His main research areas include Computational Vision, Medical Imaging, Computational Mechanics, Scientific Visualization, Human-Computer Interaction and New Product Development.

B. Padmaja Rani is a Professor in Computer Science and Engineering Department at JNTUH College of Engineering, Hyderabad. Her interest area is information retrieval embedded systems. She has published more than 25 papers in reputed journals and conferences in the areas of agile modeling, web services and mining, etc. She was the former Head of Department of CSE, JNTUH. She is a professional member of CSI. 

V. Kamakshi Prasad is a Professor of Computer Science and Engineering Department at JNTUH College of Engineering Hyderabad. He completed his PhD in speech recognition from IIT Madras, India. He did his M.Tech. from Andhra University and B.Tech. from K.L. College of Engineering. He has completed over 12 years in JNTU on various positions. He has 21 years of teaching and 11 years of research experience. Dr. Prasad has been teaching subjects like speech processing, pattern recognition, computer networks, digital image processing, artificial neural, artificial intelligence and expert systems, computer graphics, object oriented analysis and design through UML, and soft computing. He has supervised 12 PhD and 2 MS students. His research areas are speech recognition and processing, image processing, neural networks, data mining and ad-hoc networks. He has authored two books published by Lambert Academic Publishing and over 50 papers in national and international level journals.

K. Srujan Raju is the Professor and Head, Department of CSE, CMR Technical Campus, Hyderabad, India. Prof. Raju earned his PhD in the field of network security and his current research includes computer networks, information security, data mining, image processing, intrusion detection and cognitive radio networks. He has published several papers in refereed international conferences and peer reviewed journals and also he was in the editorial board of CSI 2014 Springer AISC series; 337 and 338 volumes. In addition to this, he has served as reviewer for many indexed journals. Prof. Raju is also awarded with Significant Contributor, Active Member Awards by Computer Society of India (CSI).


The volume contains 69 high quality papers presented at International Conference on Computational Intelligence and Informatics (ICCII 2017). The conference was held during 25-27, September, 2017 at Department of Computer Science and Engineering, JNTUHCEH, Hyderabad, Telangana, India. This volume contains papers mainly focused on data mining, wireless sensor networks, parallel computing, image processing, network security, MANETS, natural language processing, and internet of things.

Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Bhateja has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.  João Manuel R.S. Tavares graduated in Mechanical Engineering from the University of Porto - Portugal (1992); MSc in Electrical and Computer Engineering, in the field of Industrial Informatics, University of Porto (1995); PhD in Electrical and Computer Engineering, University of Porto (2001). From 1995 to 2000 he was a researcher at the Institute of Biomedical Engineering (INEB). He is co-author of more than 350 scientific papers in national and international journals and conferences, co-editor of 18 international books and guest-editor of several special issues of international journals. In addition, he is Editor-in-Chief of the Computer Methods in Biomechanics and Biomedical Engineering: Imaging “ & “ Visualization (CMBBE: Imaging “ & “ Visualization); Editor-in-Chief of the International Journal of Biometrics and Bioinformatics (IJBB); Co-Editor-in-Chief of the International Journal for Computational Vision and Biomechanics (IJCV” & “B); Co-Editor of the Lecture Notes in Computational Vision and Biomechanics (LNCV” & “B); Associate Editor of the EURASIP Journal on Advances in Signal Processing (JASP), Journal of Engineering, ISRN Machine Vision, Advances in Biomechanics “ & “ Applications, and of the Journal of Computer Science (INFOCOMP), and reviewer of several international scientific journals. Since 2001, he has been Supervisor and Co-Supervisor of several MSc and PhD thesis and involved in several research projects, both as researcher and as scientific coordinator. Additionally, he is co-author of 3 international patents and 2 national patents. His main research areas include Computational Vision, Medical Imaging, Computational Mechanics, Scientific Visualization, Human-Computer Interaction and New Product Development.B. Padmaja Rani is a Professor in Computer Science and Engineering Department at JNTUH College of Engineering, Hyderabad. Her interest area is information retrieval embedded systems. She has published more than 25 papers in reputed journals and conferences in the areas of agile modeling, web services and mining, etc. She was the former Head of Department of CSE, JNTUH. She is a professional member of CSI. V. Kamakshi Prasad is a Professor of Computer Science and Engineering Department at JNTUH College of Engineering Hyderabad. He completed his PhD in speech recognition from IIT Madras, India. He did his M.Tech. from Andhra University and B.Tech. from K.L. College of Engineering. He has completed over 12 years in JNTU on various positions. He has 21 years of teaching and 11 years of research experience. Dr. Prasad has been teaching subjects like speech processing, pattern recognition, computer networks, digital image processing, artificial neural, artificial intelligence and expert systems, computer graphics, object oriented analysis and design through UML, and soft computing. He has supervised 12 PhD and 2 MS students. His research areas are speech recognition and processing, image processing, neural networks, data mining and ad-hoc networks. He has authored two books published by Lambert Academic Publishing and over 50 papers in national and international level journals.K. Srujan Raju is the Professor and Head, Department of CSE, CMR Technical Campus, Hyderabad, India. Prof. Raju earned his PhD in the field of network security and his current research includes computer networks, information security, data mining, image processing, intrusion detection and cognitive radio networks. He has published several papers in refereed international conferences and peer reviewed journals and also he was in the editorial board of CSI 2014 Springer AISC series; 337 and 338 volumes. In addition to this, he has served as reviewer for many indexed journals. Prof. Raju is also awarded with Significant Contributor, Active Member Awards by Computer Society of India (CSI).

Preface 6
Organizing Committee 8
Conference Chair 8
Organizing Chairs 8
Technical Chairs 8
Technical Co-Chairs 8
International Advisory Committee 9
Advisory Committee 9
Publication Chair 9
Editorial Board 10
Organizing Committee 10
Technical Committee 10
Web and Publicity Committee 10
Contents 11
About the Editors 17
1 Efficient Video Indexing and Retrieval Using Hierarchical Clustering Technique 19
Abstract 19
1 Introduction 19
1.1 Information Retrieval Based on the Content 20
2 Existing System 20
3 Proposed System 21
3.1 Advantage of Proposed Technique 21
3.2 Proposed Architecture 21
3.3 Proposed Algorithm 22
4 Experimental Setup 22
4.1 Image Elements Extraction 22
4.1.1 Pseudocode for Color Histogram Calculation 22
4.2 Indexing of Images 23
4.3 Image Retrieval Using Clustering Technique 23
4.3.1 Psecudocode for Cluster Calculation 23
5 Experimental Outcomes 23
6 Conclusion 25
References 26
2 A Data Perturbation Method to Preserve Privacy Using Fuzzy Rules 27
Abstract 27
1 Introduction 27
1.1 Privacy Preserving Data Mining 28
1.2 Data Perturbation in PPDM 28
2 Background and Related Work 29
3 Data Perturbation Using Fuzzy Logic 30
3.1 Fuzzy Rule Based Systems 30
4 Proposed Work 31
4.1 Proposed Algorithm 32
5 Results 32
6 Conclusion 33
References 33
3 An Enhanced Unsupervised Learning Approach for Sentiment Analysis Using Extraction of Tri-Co-Occurrence Words Phrases 35
Abstract 35
1 Introduction 36
2 Associated Work 37
3 Proposed Model 38
3.1 Steps for Preprocessing Dataset 38
3.2 Extract Phrase Patterns 39
3.3 Computation of Semantic Orientation 40
3.4 Pseudocode Procedure for Implementation 41
4 Results and Discussions 42
5 Conclusion and Future Scope 43
Acknowledgements 43
References 43
4 Land Use/Land Cover Segmentation of Satellite Imagery to Estimate the Utilization of Earth’s Surface 45
Abstract 45
1 Introduction 45
2 Related Work 46
3 Study Area 47
4 Dataset and Methodology 47
4.1 Dataset Description 47
4.2 Methodology 48
5 Algorithm 50
6 Implementation and Performance Analysis 51
7 Conclusions 53
References 54
5 Grammar Error Detection Tool for Medical Transcription Using Stop Words Parts-of-Speech Tags Ngram Based Model 55
Abstract 55
1 Introduction 56
1.1 Prior Work 57
2 Research Method 58
2.1 Training Stage 59
2.2 Testing Stage 61
2.3 Data Statistics and Parameter Setting 63
3 Results and Analysis 64
4 Conclusion 65
References 66
6 Churn and Non-churn of Customers in Banking Sector Using Extreme Learning Machine 68
Abstract 68
1 Introduction 68
2 Literature Survey 69
3 Methodology 70
3.1 Extreme Learning Machine 70
3.2 Algorithm 72
4 Results and Discussions 72
5 Conclusions 74
References 74
7 Identifying the Local Business Trends in Cities Using Data Mining Techniques 76
Abstract 76
1 Introduction 76
2 Related Work 78
3 Proposed Work 79
3.1 Data Preprocessing 79
3.2 Vector Representation 80
3.3 Clustering 80
4 Experimental Results 80
4.1 Dataset Description 80
4.2 Data Preprocessing 81
4.3 Vector Representation 82
4.4 Clustering 82
4.5 Discussion 82
5 Conclusion and Future Work 83
References 84
8 Relative-Feature Learning through Genetic-Based Algorithm 85
Abstract 85
1 Introduction 85
2 Relative-Feature Learning Algorithm 87
2.1 The Adaptive Propagation Planning 88
2.2 Controls Identified in the Adaptive Propagation Planning Method for Feature Learning 89
3 A Genetic-Based Algorithm 89
3.1 Feature Selection 89
3.2 Population 90
3.3 Fitness and Crossover 91
3.4 Anomaly Detection 94
4 Conclusion and Future Enhancements 94
References 94
9 Performance of Negative Association Rule Mining Using Improved Frequent Pattern Tree 96
Abstract 96
1 Introduction 96
2 Generating NAR Based on Apriori 98
2.1 Frequent Item Sets Generated Using Apriori Method 98
2.2 Generating PAR 98
2.3 Generating Set of Possible NAR from PAR 99
2.4 Generating Valid NAR 99
3 Generating NAR Based on FP-Growth 100
3.1 Generating Frequent Item Sets 100
3.2 Generating PAR 100
3.3 Generating Set of Possible NAR from PAR 101
3.4 Generating Valid Negative Association Rules 101
4 Generating NAR Based on FISM 102
4.1 Frequent Item Sets Generated Using FISM Method 102
4.2 Generating PAR 102
4.3 Generating Set of Possible NAR from PAR 103
4.4 Generating Valid NAR 103
5 Comparative Results 103
6 Conclusion and Future Work 104
References 104
10 Iterative Concept-Based Clustering of Indian Court Judgments 105
Abstract 105
1 Introduction 105
2 Literature Survey 106
3 Court Judgment Dataset 108
4 Decision of Number of Clusters 109
5 Proposed Approach 110
5.1 Preprocessing 111
5.2 Documents Vector Space Model 111
5.3 Latent Semantic Analysis (LSA) 111
5.4 Cosine Similarity 112
5.5 Hierarchical Clustering 113
6 Experimental Setup of Baseline Model 113
7 Experiment Results and Analysis 114
8 Conclusions and Future Work 115
References 116
11 Improving the Spatial Resolution of AWiFS Sensor Data Using LISS III and AWiFS DataPair with Contourlet Transform Learning 118
Abstract 118
1 Introduction 119
1.1 Non-subsampled Contourlet Transform 119
2 Background 121
3 Methodology 122
3.1 Image Registration 122
3.2 Normalization 122
3.3 NSCT Training 123
3.4 NSCT Prediction 123
3.5 Quality Assessment 123
4 Results 124
5 Conclusion 131
Acknowledgements 131
References 132
12 Regular Expression Tagger for Kannada Parts of Speech Tagging 133
Abstract 133
1 Introduction 133
2 Related Work 135
3 Challenges in POS Tagging for Kannada 136
4 Kannada Morphology-Based Parts of Speech Tagging 137
5 Tags and Kannada Tagging 138
6 Experiments and Results 140
6.1 Algorithm Kannada RegEx Tagger 141
6.2 RegEx Tagger Results 141
7 Conclusion and Future Work 142
References 142
13 Design of Conservative Gate and their Novel Application in Median Filtering in Emerging QCA Nanocircuit 143
Abstract 143
1 Introduction 143
2 Preliminaries 144
3 Related Works 145
4 Proposed Gate 146
5 Simulation Results and Comparison 147
6 Logic Synthesis with P-QCA 149
7 Testing and Fault Coverage 151
8 Conclusion 153
References 153
14 A Brief Survey: Features and Techniques Used for Sentiment Analysis 154
Abstract 154
1 Introduction 155
2 Feature Selection 155
2.1 Feature Selection Algorithms 156
2.2 Feature Selection Methods 156
3 Survey on Features, Techniques, and Datasets Used 161
4 Conclusion 161
References 161
15 Content-Centric Global Id Framework for Naming and Addressing for Smart Objects in IoT 164
Abstract 164
1 Introduction 164
2 Related Work 166
3 Content-Centric Global Id Framework 167
3.1 Protocol Stacks of CCGId 168
4 Simulation Result 169
5 Conclusion 172
References 172
16 Road Traffic Management System with Load Balancing on Cloud Using VM Migration Technique 174
Abstract 174
1 Introduction 175
2 Proposed Framework for Road Traffic Data Management Framework 175
2.1 Open Access Control 175
2.2 Optimal Hardware Control 176
2.3 Optimal Replication Control 176
2.4 Service Provider Support for Virtual Machine Migration 177
2.5 Optimal Manageability of Updates 178
3 Proposed Optimal Migration Framework 178
3.1 Virtual Machine Identification 178
3.2 Virtual Machine Allocation 180
3.3 Cost Analysis of Migration 180
4 Results and Discussion 181
5 Conclusion 182
References 183
17 Energy Constraint Service Discovery and Composition in Mobile Ad Hoc Networks 185
Abstract 185
1 Introduction 186
2 Related Work 187
3 System Model 188
3.1 Node Architecture of a Service in MANET 188
3.2 Response Packet 189
4 Energy Constraint Service Discovery and Composition in Mobile Ad Hoc Networks 190
4.1 Service Discovery in MANET 190
4.2 Energy Consumption Evaluation 192
4.2.1 Energy Index Value for Node 192
4.2.2 Energy Index Value for Service 192
4.3 Energy-Aware Service Composition 193
5 Simulation and Performance Evaluation 194
6 Conclusion and Future Work 196
References 196
18 Classifying Aggressive Actions of 3D Human Models Using Correlation Based Affinity Propagation Algorithm 198
Abstract 198
1 Introduction 199
2 Proposed Correlation Based Affinity Propagation Algorithm 200
3 Simulation Results on Benchmark Datasets 201
4 Classification of Aggressive Actions of 3D Human Models 202
5 Conclusions 206
References 206
19 How Safe Is Your Mobile App? Mobile App Attacks and Defense 208
Abstract 208
1 Introduction 208
2 Vulnerability of Smart Phones 210
3 Malware Behavior and Threats 210
3.1 Attacks 211
3.2 Malicious Activities Through Mobile Apps 213
4 Defense Mechanisms 213
4.1 Preventive Measures 213
4.2 Detection Techniques 214
5 Common Attacks on a Mobile Phone/Smartphone 214
6 Algorithm: CURD—Confidential Unrestricted and Restricted Data 215
7 Conclusion 216
References 216
20 An Agile Effort Estimation Based on Story Points Using Machine Learning Techniques 217
Abstract 217
1 Introduction 218
2 Related Work 219
3 Evaluation Criteria 220
4 Proposed Approach 221
4.1 Story Points 221
4.2 Project Velocity 222
4.3 Soft Computing 222
4.3.1 Adaptive Neuro-Fuzzy Interface System 222
4.3.2 Generalized Regression Neural Network 223
4.3.3 Radial Basis Function Networks (RBFNs) 224
5 Experimental Results 225
6 Threats to Validity 226
7 Conclusion 226
References 226
21 OFS-Z: Optimal Features Selection by Z-Score for Malaria-Infected Erythrocyte Detection Using Supervised Learning 228
Abstract 228
1 Introduction 228
2 Related Work 229
3 Optimal Features Selection by Z-Score 231
3.1 Methods and Materials 231
3.1.1 RGB to Grayscale by PCA [20] 231
3.1.2 Gamma Equalization 232
3.1.3 Median Filter 232
3.1.4 Gaussian Filter 232
3.1.5 Canny Filter-Based Edge Detection 233
3.1.6 K-Means Clustering by Optimal Centroids 233
3.1.7 Z-Score 234
3.1.8 Classifiers 234
3.1.9 Features 234
3.2 Preprocessing 235
3.3 Segmenting Erythrocytes by K-Means with Optimal Centroids 235
3.4 Features Extraction 236
3.5 Feature Optimization 236
3.6 Classification 237
3.7 Validation 237
4 Experimental Study and Results Analysis 237
4.1 Performance Analysis 238
5 Conclusion 239
References 239
22 An Effective Hybrid Fuzzy Classifier Using Rough Set Theory for Outlier Detection in Uncertain Environment 242
Abstract 242
1 Introduction 242
2 Related Work 243
3 Proposed Work 244
3.1 Training Pseudocode 244
3.2 Testing Pseudocode 246
3.3 Rule Matcher 248
4 Experimental Results 248
4.1 Accuracy 248
4.2 Area Under Curve 248
4.3 Running Time 249
5 Conclusion 249
References 250
23 CSES: Cuckoo Search Based Exploratory Scale to Defend Input-Type Validation Vulnerabilities of HTTP Requests 251
Abstract 251
1 Introduction 252
2 Related Work 253
3 Cuckoo Search Based Exploratory Scale (CSES) to Defend Input-Type Validation Vulnerabilities 254
3.1 Cuckoo Search 255
3.2 Feature Selection 255
3.2.1 Assessing Hamming Distance is as Follows 256
3.3 Learning Process (the Nest Formation) 256
3.4 Testing Phase (Process of Cuckoo Search) 257
3.4.1 Cuckoo Search on Both Hierarchies 257
3.5 Assessing the State of the Http Request 258
4 Experimental Study 258
4.1 The Dataset Preparation 259
4.2 Implementation Process 259
5 Results and Analysis 259
6 Conclusion 260
References 261
24 Stream Preparation from Historical Data for High-Velocity Financial Applications 263
Abstract 263
1 Introduction 263
1.1 Scope and Objective 264
2 Literature Survey 264
2.1 Disadvantages 265
3 Requirements 265
3.1 Functional 265
3.2 Nonfunctional 266
4 Block Diagram for Creating Virtual Live Stream 266
4.1 Description 266
5 Proposed System of Live Stream Preparation 267
5.1 Description of Data Set 268
5.2 Methodology 269
5.2.1 Algorithm Creation of Virtual Live Streams Takes Place by the Following Steps 269
5.3 Results 271
6 Conclusion 273
Acknowledgements 274
References 274
25 Context-Based Word Sense Disambiguation in Telugu Using the Statistical Techniques 276
Abstract 276
1 Introduction 277
1.1 Motivation 277
1.2 Dealing Word Sense Disambiguation 277
2 Literature Survey 278
3 Proposed Method 279
3.1 Methodology 279
3.2 Modules in the System 280
3.2.1 Module 1: Collect the Documents 280
3.2.2 Module 2: Tokenization 281
3.2.3 Module 3: Statistical Method 281
3.2.4 Module 4: Assigning Correct Sense 281
4 Evaluation 282
4.1 Telugu Text Document 282
4.2 Results 283
5 Conclusion 284
References 284
26 EEG-Controlled Prosthetic Arm for Micromechanical Tasks 286
Abstract 286
1 Introduction 287
2 Literature Survey 287
3 Methodology 288
4 Experimental Setup 288
4.1 Digital Acquisition of EEG Data 289
4.2 Preprocessing of EEG Recording 289
4.3 Extraction of Commands from EEG 289
5 Classification of Blinks Using Machine Learning Techniques 290
5.1 Features of Preprocessed EEG 291
5.1.1 Spectral Energy 291
5.1.2 First and Second Spectral Maxima and Locations 291
5.1.3 Width and Number of Pulses in the Window 291
5.2 Supervised Learning Methods 292
5.2.1 Linear Discriminant Analysis (LDA) 292
5.2.2 K-Nearest Neighbor (KNN) 292
5.3 Performance Evaluation of Classifiers 292
6 Command and Control for Prosthetic Hand 293
6.1 Translation of Commands and Feature Extraction 293
6.2 Arduino NanoV3.0 293
6.3 Prosthetic Arm 293
7 Results and Discussion 294
8 Conclusion 295
Acknowledgements 295
References 295
27 Wilcoxon Signed Rank Based Feature Selection for Sentiment Classification 297
Abstract 297
1 Introduction 298
2 Related Work 299
3 Methods and Materials 300
3.1 Feature Selection Metrics 300
3.1.1 Term Occurrence 300
3.1.2 Term Presence 300
3.1.3 Wilcoxon Signed Rank 301
3.2 Classifiers 301
4 Feature Selection 302
4.1 Corpus Preprocessing 303
4.2 Sentiment Lexicons Selection 303
4.3 Sentiment Term Selection as Features 303
4.4 Optimal Feature Selection 304
5 Experimental Study 308
5.1 Datasets and Statistics 309
5.2 Feature Selection and Performance Statistics 310
6 Conclusion 312
References 312
28 A Color Transformation Approach to Retrieve Cloudy Pixels in Daytime Satellite Images 315
Abstract 315
1 Introduction 315
2 Proposed Approach: Cloud Detection Algorithm 317
2.1 Preprocessing 317
2.2 Detection 318
3 Simulation Results 320
3.1 Test on Combine Approach to Detect Clouds 320
3.2 Comparing Results of Proposed Algorithm Against Existing Algorithm 322
4 Conclusions 322
References 322
29 Identifying Trustworthy Nodes in an Integrated Internet MANET to Establish a Secure Communication 324
Abstract 324
1 Introduction 324
2 Related Work 325
3 Proposed Work 325
3.1 Trust Value Calculation 326
3.2 Algorithm 327
4 Simulation Results 328
4.1 Experimental Setup 328
5 Conclusion and Future Work 331
References 331
30 Energy-Efficient Routing in MANET Using Load Energy Metric 332
Abstract 332
1 Introduction 332
2 Related Work 333
3 Load Energy Metric Algorithm 333
3.1 Update Queue Length at Every Node 334
3.2 Calculate Energy Level of Nodes 334
3.3 Select the Reliable Route 336
4 Simulation Parameters and Performance Evaluation 336
5 Conclusion 339
References 339
31 Design Optimization of Robotic Gripper Links Using Accelerated Particle Swarm Optimization Technique 340
Abstract 340
1 Introduction 340
2 Gripper Configuration Design 342
3 Accelerated Particle Swarm Optimization 345
4 Proposed Methodology 345
5 Result and Discussions 346
6 Conclusion 347
References 348
32 Cognitive Decision Support System for the Prioritization of Functional and Non-functional Requirements of Mobile Applications 349
Abstract 349
1 Introduction 349
2 Related Work 350
3 Proposed Work 351
3.1 Identification of Quality Attributes 351
3.2 Prioritization Using AHP 352
3.2.1 Basic Principles of AHP 352
3.3 Identification of Functional Requirements 353
3.4 Stakeholder Opinion and Triangular Fuzzy Number (TFN) 353
3.5 Defuzzification and Normalization 354
3.6 Alternatives and Evaluation Using CDMOP 354
4 Case Studies 356
5 Results and Discussion 358
6 Conclusions and Future Work 359
References 359
33 Audio CAPTCHA Techniques: A Review 361
Abstract 361
1 Introduction 361
2 Related Work 362
2.1 Speech CAPTCHA 362
2.2 Acoustic CAPTCHA 363
3 Attacks on Audio CAPTCHA 364
4 Techniques to Prevent Attacks on Audio CAPTCHA 365
5 Accessibility 366
6 Conclusion 369
References 369
34 An Efficient Cache Refreshing Policy to Improve QoS in MANET Through RAMP 371
Abstract 371
1 Introduction 372
2 Preliminaries 373
2.1 Overview of DSR 373
2.2 Characterization of RAMP 373
2.3 Role of Cache Optimization Techniques 374
3 Proposed Methodology 375
3.1 Algorithm 1: Add Route 375
3.2 Algorithm 2: Find Route 376
4 Simulation Environment 376
5 Simulations 377
5.1 Packet Delivery Ratio (PDR) 377
5.2 End-to-End Delay 377
5.3 Overhead 378
5.4 Packet Drop 378
5.5 Energy Consumption 378
6 Results and Discussions 379
6.1 PDR 379
6.2 End-to-End Delay 379
6.3 Overhead 379
6.4 Packet Drop 379
6.5 Energy Consumption 381
7 Conclusion 381
References 381
35 A Novel Parity Preserving Reversible Binary-to-BCD Code Converter with Testability of Building Blocks in Quantum Circuit 384
Abstract 384
1 Introduction 385
2 Background of Reversible and Quantum Computing 386
2.1 Reversible and Quantum Computing 386
2.2 Existing Parity Preserving Reversible Gates 387
3 Previous Work 387
4 Synthesis of Proposed Binary-to-BCD Code Converter 388
5 Individual Building Block Testability Methodology 390
6 Conclusions 393
References 393
36 Differentiated WRED Algorithm for Wireless Mesh Networks 395
Abstract 395
1 Introduction 396
2 Related Work 397
3 Proposed Improvements 398
4 Conclusion 401
References 401
37 Robust Estimation of Brain Functional Connectivity from Functional Magnetic Resonance Imaging Using Power, Cross-Correlation and Cross-Coherence 403
Abstract 403
1 Introduction 404
2 Materials and Methods 405
2.1 fMRI Time Series 405
2.2 Cross-Coherence 405
2.3 Cross-Correlation 406
2.4 High-Pass Filter 406
3 fMRI Data Acquisition 408
4 Signal Processing 408
4.1 Program Code 410
5 Results on fMRI Data Set 410
6 Conclusion and Discussion 412
References 413
38 Statistical Analysis of Derivatives of Cranial Photoplethysmogram in Young Adults 415
Abstract 415
1 Introduction 416
1.1 Beer–Lambert’s Law 416
1.2 Sensor Specifications 416
2 Methods 417
2.1 Velocity Photoplethysmogram (VPG) 418
2.2 Acceleration Photoplethysmogram (APG) 418
2.3 Statistical Parameters 420
3 Results 421
4 Discussion 423
5 Conclusion 423
References 424
39 Fuzzy Decision-Based Reliable Link Prediction Routing in MANET Using Belief Propagation 426
Abstract 426
1 Introduction 427
2 Related Research 427
3 Link Prediction with Proposed Approach 428
4 Results and Discussions 430
5 Conclusions 432
References 433
Adaptive PET/CT Fusion Using Empirical Wavelet Transform 434
1 Introduction 434
2 EWT: An Overview 436
2.1 Empirical Wavelets 436
2.2 Empirical Wavelet Transform 437
2.3 Tensor 2D EWT 437
3 Image Fusion with EWT 438
4 Experimental Data and Analysis 439
5 Results and Discussion 440
5.1 Data Set1 440
5.2 Data Set2 441
6 Conclusion 443
References 443
41 Sudoku Game Solving Approach Through Parallel Processing 445
Abstract 445
1 Introduction 446
2 Existing Solutions for Solving Sudoku Serially 447
2.1 Rule-Based Methods 448
3 Algorithm for Serial Code 448
4 Existing Solution for Execution Through Parallel Algorithm 449
4.1 Parallel Algorithm 450
5 Experimental Results 451
6 Conclusion and Future Scope 452
References 452
42 VANET: Security Attacks, Solution and Simulation 454
Abstract 454
1 Introduction 454
2 Requirement of Security 456
2.1 Routing 456
2.2 Integrity 458
2.3 Confidentiality 458
2.4 Availability 458
3 Categories of Attackers 459
4 Security Solution for VANET Attacks 460
5 Simulation Results of VANET 461
References 462
43 A Novel Approach for Efficient Bandwidth Utilization in Transport Layer Protocols 464
Abstract 464
1 Introduction 465
2 Literature Review 466
3 Various Transport Protocols 467
3.1 Sliding Window 467
3.2 Simple Protocol 468
3.3 Stop-and-Wait Protocol 468
3.4 Go-Back-N Protocol (GBN) 469
3.5 Selective Repeat 470
3.6 Automatic Repeat Request 471
4 Proposed Solution 471
4.1 Research Gap 471
4.2 Proposed Solution 471
5 Algorithm 472
5.1 Complexity of the Algorithm: O(n) 473
5.2 Justification of the Study 473
6 Results and Discussions 474
6.1 Increased Bandwidth Utilization 474
6.2 Less Network Congestion 474
6.3 More Robust 474
6.4 Reliable 475
6.5 Higher Efficiency 475
7 Conclusion 475
8 Future Scope and Directions 475
References 476
44 Functional Link Artificial Neural Network-Based Equalizer Trained by Variable Step Size Firefly Algorithm for Channel Equalization 477
Abstract 477
1 Introduction 477
2 Equalization 478
3 Multilayer Perceptron Network-Based Equalizer 479
4 Trigonometric Functional Link ANN 479
5 Chebyshev Functional Link ANN 480
6 Computational Techniques 481
6.1 Particle Swarm Optimization (PSO) 481
6.2 Firefly Algorithm (FFA) 482
6.3 Variable Step Size Firefly Algorithm (VSFFA) 483
7 Simulation Results 483
8 Conclusion 485
References 486
45 Real-Time FPGA-Based Fault Tolerant and Recoverable Technique for Arithmetic Design Using Functional Triple Modular Redundancy (FRTMR) 487
Abstract 487
1 Introduction 488
1.1 Single Event Upset (SEU) 489
1.2 Error-Correction Circuitry (ECC) 489
2 Related Work 489
3 Proposed System 490
3.1 One- and Multi-Bit Voter 490
4 Simulations and Results 493
4.1 Compilation, Analysis, and Synthesis 493
5 Discussion on the Proposed System and Results 493
6 Conclusion 494
References 495
46 A New Approach of Grid Integrated Power System Stability and Analysis Through Fuzzy Inference PSO Algorithm for Handling of Islanding PDCS Mode Datasets 496
Abstract 496
1 Introduction 497
2 An Overview of Particle Swarm Optimization 497
3 Schematic Layout of Model 499
4 Proposed Modified PSO for PDCS Mode of Network 500
5 Fuzzy Inference for Proposed Modified PSO for PDCS Mode of Network 501
6 Results and Discussion 503
7 Conclusion 504
References 505
47 Predictive Methodology for Women Health Analysis Through Social Media 506
Abstract 506
1 Introduction 506
2 Motivation 507
3 Problem Statement 508
4 Existing System 508
5 Proposed System 508
6 Experimental Results 510
7 Conclusion 514
8 Future Work 514
References 514
48 A Reversible Data Embedding Scheme for Grayscale Images to Augment the Visual Quality Using HVS Characteristics 516
Abstract 516
1 Introduction 516
2 Proposed Scheme 517
2.1 Data Embedding Procedure 519
2.2 Data Extraction Procedure 521
3 Results and Discussions 522
4 Conclusion 526
References 526
49 Optimal Feature Selection for Multivalued Attributes Using Transaction Weights as Utility Scale 528
Abstract 528
1 Introduction 528
2 Related Work 530
3 The Utility Scale Design and Optimal Set of Values Selection for Multivalued Attribute 532
4 Experimental Study and Performance Analysis 535
4.1 The Dataset 535
4.2 Assessment Metrics and Strategy 536
4.3 Performance Analysis 536
5 Conclusion 538
References 539
50 Android-Based Security and Tracking System for School Children 541
Abstract 541
1 Introduction 541
2 Related Work 542
3 Proposed System 543
4 Methodology 544
4.1 Child Module 544
4.2 Bus Module 544
5 Results 544
6 Conclusion 549
References 549
51 Video Shot Boundary Detection and Key Frame Extraction for Video Retrieval 551
Abstract 551
1 Introduction 551
2 Shot Boundary Detection 553
2.1 Scale Invariant Feature Transform 553
2.2 Key Point Matching for Shot Boundary Detection 555
3 Key Frame Extraction 555
3.1 Image Information Entropy 556
3.2 Extract Ultimate Key Frames Using Edge Matching Rate 556
4 Framework of the Proposed Method 557
5 Experimental Results 558
6 Conclusion 560
References 560
52 Performance Enhancement of Full Adder Circuit: Current Mode Operated Majority Function Based Design 562
Abstract 562
1 Introduction 563
2 Elements of the Proposed Full Adder 564
2.1 Current Mirror 564
2.2 Sensing Mechanism for the Proposed FA 565
3 State-of-the-Art of Proposed FA 566
3.1 Majority Function 566
3.2 Implementing FA Using Majority Function 567
4 Simulation Results and Discussion 568
5 Conclusion 571
References 571
53 A Tripartite Partite Key Generation and Management for Security of Cloud Data Classes 572
Abstract 572
1 Introduction 572
2 Literature Survey 573
3 Background and Preliminaries 574
3.1 Preliminaries 574
4 The Approach 576
4.1 Class Random Primes 576
4.2 Generation of Key Pairs 576
4.3 Description of Class Data 576
4.4 Tripartite Hives for Key Management 577
4.5 Performance comparisons 579
5 Conclusion 579
References 580
54 Transforming the Traditional Farming into Smart Farming Using Drones 581
Abstract 581
1 Introduction to Smart Farming 581
2 Need for Transforming the Traditional Farming 583
3 Existing Methods 585
4 Case Studies: Applications of Drones in Agriculture 586
5 Proposed Method 587
6 Discussions and Conclusion 589
References 589
55 Implementation of Power Law Model for Assessing Software Reliability 591
Abstract 591
1 Introduction 591
2 Proposed Model 592
3 Related Work 594
4 Results and Analysis 596
4.1 Existing System 596
4.2 Proposed System 596
4.3 Results 597
5 Conclusion 599
References 600
56 Energy Distribution Using Block-Based Shifting in a Smart Grid Tree Network 601
Abstract 601
1 Introduction 601
2 Energy Demand at Grid Based on Load Request in a SGTN 603
3 Adaptive Block-Based Intelligent Shifting Energy Distribution 605
4 Simulation Results 606
5 Conclusions 608
References 608
Properties and Applications of Hermite Matrix Exponential Polynomials 611
1 Introduction 611
2 Hermite Matrix Based Exponential Polynomials 614
3 Operational Representations 617
References 618
58 Economical Home Monitoring System Using IOT 619
Abstract 619
1 Introduction 619
1.1 Overview 619
1.2 Advantages of Home Monitoring System 620
2 Related Work 620
2.1 Remote Home Supervising System by Gowthami T. and More 620
2.2 Waste Electronics for Home Supervision System by Dingrong Yuan and More 621
2.3 Home Intrusion System Using Raspberry Pi by Shivprasad Tavagad, and More 621
2.4 Robot Monitored Home by Madhavi Shinde, and More 621
3 System Analysis 622
3.1 Problem Definition 622
3.2 Proposed System Feature 622
4 System Design and Implementation 622
4.1 Proposed Home Monitoring System 622
4.2 Proposed Home Monitoring System Functions 623
4.3 Software Design 624
4.4 Implementation Setup 624
5 Results and Efficiency 626
6 Conclusion and Future Work 628
6.1 Conclusion 628
6.2 Future Work 628
References 629
59 Hybrid Approach of Feature Extraction and Vector Quantization in Speech Recognition 630
Abstract 630
1 Introduction 630
2 Type of Speech Uttered by Human Beings 631
3 Feature Extraction Techniques 632
4 Feature Matching 634
5 Conclusion and Future Work 635
References 635
60 Security in Home Automation Systems 637
Abstract 637
1 Introduction 637
2 Literature Review 638
2.1 Summary of Papers 638
3 History of Home Automation 638
4 Home Automation Systems Today 639
4.1 Wireless Home Automation Networks (WHAN) 639
4.2 Types of WHANs 640
4.3 Issues with Current Systems 641
4.4 Types of Home Automation Systems Based on WHAN 642
5 Key Findings 644
6 Conclusion 645
References 645
61 A Modified Technique for Li-Fi Range Extension 646
Abstract 646
1 Introduction 646
2 Existing Technology 647
3 Problems with Existing Technology 647
4 How Li-Fi Helps 648
5 Li-Fi—Working 649
6 Limitations of Li-Fi 650
7 Developing a Technique for Range Extension 650
8 Reflecting Devices on Doors 651
9 Reflecting Floors 652
10 Multidirectional Lighting 653
11 Receiver–Transmitter Module 653
12 Li-Fi––Wi-Fi Hybrid System 654
13 Discussion and Future Scope 655
14 Conclusion 656
References 656
62 Accelerating EGENMR Database Operations Using GPU Processing 657
Abstract 657
1 Introduction 657
2 Related Work 659
2.1 GPU Architecture 659
2.2 GPU Memory Hierarchy 661
2.3 GPU Accelerator for Database Operations 661
3 Proposed Model 662
3.1 Hybrid Query Processing Using GPU Co-processor 662
3.1.1 Hybrid Query Processing Works on the Following Algorithm 663
3.1.2 Total Time for Executing the Operations for Hybrid Query Processor on GPU Includes 663
3.2 E-GENMR Model Using GPU Processing 664
3.2.1 EGENMR Query Processing Works on the Following Algorithm 665
3.2.2 Our Proposed Model Takes Total Time to Execute Query on GPU Includes 665
3.3 Comparison of Time and Complexity for Hybrid Query Processing and EGENMR Using GPU 665
4 Conclusion 666
References 666
63 Hardware Implementation of IoT-Based Image Processing Filters 668
Abstract 668
1 Introduction 669
1.1 Purpose of Image Processing 669
1.2 Objectives of This Research 669
2 Related Work 669
3 Proposed Methodology 672
4 Experimental Results 673
5 Conclusion 676
6 Future Scope 677
References 677
64 An Extensive Study on IoRT and Its Connectivity Coverage Limit 679
Abstract 679
1 Introduction 679
2 Literature Survey 681
3 Use of an Interface 682
4 System Description 683
5 Application 684
6 Case Study 685
7 Connectivity Coverage 685
8 Robot–Device Connectivity (RDC) 685
9 Motion Control Strategy 687
10 Interpretation of the Results 688
10.1 Architecture Model 688
10.2 Simulation Parameters 689
10.3 Simulation Results 689
11 Conclusion 690
References 690
65 Statistical Analysis Using Data Mining: A District-Level Analysis of Malnutrition 692
Abstract 692
1 Introduction 693
2 Literature Survey 693
2.1 Data Mining Methods 693
2.2 Clustering 694
2.3 Davies–Bouldin Index 695
2.4 Pearson’s Correlation 695
3 Methodology 696
3.1 Steps Involved 696
3.2 Experimental Setup 697
3.3 Model Structure 698
4 Result and Analysis 699
4.1 Clusterization 699
4.2 Correlations 700
5 Discussion 701
6 Conclusion 705
References 706
66 Traversal-Based Ordering of Arc–Node Topological Dataset of Sewer Network 707
Abstract 707
1 Introduction 707
2 Literature Review 708
3 Methodology 709
3.1 Prerequisites 709
3.2 Dataset 709
3.3 Data Structure Employed 709
3.4 Conceptual Modeling 710
3.5 Automation Rules 711
4 Algorithm 713
5 Implementation 714
5.1 Problem Statement 714
5.2 Implementation Process 715
5.3 Observation 716
5.4 Result 717
6 Future Work 718
References 718
Author Index 720

Erscheint lt. Verlag 23.7.2018
Reihe/Serie Advances in Intelligent Systems and Computing
Advances in Intelligent Systems and Computing
Zusatzinfo XVIII, 739 p. 322 illus.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Naturwissenschaften Biologie
Technik Nachrichtentechnik
Schlagworte cognitive computing • Computaional Intelligence • conference proceedings • Data Mining and Data Warehousing • High Performance Computing • ICCII • ICCII 2017 • internet of things • Parallel and Distributed Computing • wireless networks
ISBN-10 981-10-8228-6 / 9811082286
ISBN-13 978-981-10-8228-3 / 9789811082283
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 29,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
der Praxis-Guide für Künstliche Intelligenz in Unternehmen - Chancen …

von Thomas R. Köhler; Julia Finkeissen

eBook Download (2024)
Campus Verlag
CHF 37,95
Wie du KI richtig nutzt - schreiben, recherchieren, Bilder erstellen, …

von Rainer Hattenhauer

eBook Download (2023)
Rheinwerk Computing (Verlag)
CHF 16,95