Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Proceedings of the International Conference on Data Engineering and Communication Technology (eBook)

ICDECT 2016, Volume 1
eBook Download: PDF
2016 | 1st ed. 2017
XVIII, 821 Seiten
Springer Singapore (Verlag)
978-981-10-1675-2 (ISBN)

Lese- und Medienproben

Proceedings of the International Conference on Data Engineering and Communication Technology -
Systemvoraussetzungen
213,99 inkl. MwSt
(CHF 208,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10-11, 2016 at Lavasa, Pune, Maharashtra, India. The book discusses recent research technologies and applications in the field of Computer Science, Electrical and Electronics Engineering. The aim of the Proceedings is to provide cutting-edge developments taking place in the field data engineering and communication technologies which will assist the researchers and practitioners from both academia as well as industry to advance their field of study.



Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering at Anil Neerukonda Institute of Technology and Sciences (ANITS), Andhra Pradesh, India. He obtained his Ph.D. in Computer Science and Engineering from JNTU Hyderabad and M.Tech. in CSE from NIT, Rourkela, Odisha, India. He has 26 years of teaching experience. His research interests are data mining, machine intelligence and swarm intelligence. He has acted as program chair of many international conferences and edited 6 volumes of proceedings from Springer LNCS and AISC series. He is currently guiding 8 scholars for Ph.D. Dr. Satapathy is also a Senior Member of IEEE.

Mr. Amit Joshi has an experience of around 6 years in academic and industry in prestigious organizations of Rajasthan and Gujarat. Currently, he is working as an Assistant Professor in Department of Information Technology at Sabar Institute in Gujarat. He is an active member of ACM, CSI, AMIE, IEEE, IACSIT-Singapore, IDES, ACEEE, NPA and many other professional societies. Currently, he is Honorary Secretary of CSI Udaipur Chapter and Honorary Secretary for ACM Udaipur Chapter. He has presented and published more than 40 papers in National and International Journals/Conferences of IEEE, Springer, and ACM. He has also edited three books on diversified subjects including Advances in Open Source Mobile Technologies, ICT for Integrated Rural Development and ICT for Competitive Strategies. He has also organized more than 25 National and International Conferences and Workshops including International Conference ETNCC 2011 at Udaipur through IEEE, International Conference ICTCS 2014 at Udaipur through ACM, International Conference ICT4SD 2015 by Springer. He has also served on Organising and Program Committee of more than 50 Conferences/Seminars/Workshops throughout the World and presented 6 invited talks in various conferences. For his contribution towards the society, The Institution of Engineers (India), ULC, has given him Appreciation award on the celebration of Engineers, 2014 and by SIG-WNs Computer Society of India on ACCE , 2012.

Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Bhateja has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.


This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10-11, 2016 at Lavasa, Pune, Maharashtra, India. The book discusses recent research technologies and applications in the field of Computer Science, Electrical and Electronics Engineering. The aim of the Proceedings is to provide cutting-edge developments taking place in the field data engineering and communication technologies which will assist the researchers and practitioners from both academia as well as industry to advance their field of study.

Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering at Anil Neerukonda Institute of Technology and Sciences (ANITS), Andhra Pradesh, India. He obtained his Ph.D. in Computer Science and Engineering from JNTU Hyderabad and M.Tech. in CSE from NIT, Rourkela, Odisha, India. He has 26 years of teaching experience. His research interests are data mining, machine intelligence and swarm intelligence. He has acted as program chair of many international conferences and edited 6 volumes of proceedings from Springer LNCS and AISC series. He is currently guiding 8 scholars for Ph.D. Dr. Satapathy is also a Senior Member of IEEE.Mr. Amit Joshi has an experience of around 6 years in academic and industry in prestigious organizations of Rajasthan and Gujarat. Currently, he is working as an Assistant Professor in Department of Information Technology at Sabar Institute in Gujarat. He is an active member of ACM, CSI, AMIE, IEEE, IACSIT-Singapore, IDES, ACEEE, NPA and many other professional societies. Currently, he is Honorary Secretary of CSI Udaipur Chapter and Honorary Secretary for ACM Udaipur Chapter. He has presented and published more than 40 papers in National and International Journals/Conferences of IEEE, Springer, and ACM. He has also edited three books on diversified subjects including Advances in Open Source Mobile Technologies, ICT for Integrated Rural Development and ICT for Competitive Strategies. He has also organized more than 25 National and International Conferences and Workshops including International Conference ETNCC 2011 at Udaipur through IEEE, International Conference ICTCS 2014 at Udaipur through ACM, International Conference ICT4SD 2015 by Springer. He has also served on Organising and Program Committee of more than 50 Conferences/Seminars/Workshops throughout the World and presented 6 invited talks in various conferences. For his contribution towards the society, The Institution of Engineers (India), ULC, has given him Appreciation award on the celebration of Engineers, 2014 and by SIG-WNs Computer Society of India on ACCE , 2012. Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Bhateja has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.

Preface 6
Organizing Committee 8
Honorary Chair 8
Organizing Committee 8
Program Committee 8
Publication Chair 8
Publication Co-Chair 8
Technical Review Committee 9
Contents 10
About the Editors 17
1 Singular Value Decomposition and Discrete Wavelet Transform-Based Fingerprint Gender Classification 19
Abstract 19
1 Introduction 19
2 Literature Review 20
3 System Development 21
3.1 Feature Extraction 21
3.1.1 Feature Extraction Using DWT 21
3.1.2 Feature Extraction Using SVD 22
3.2 Euclidean Distance 22
3.3 Method 22
3.3.1 Process 23
4 Conclusion 24
References 24
2 Isolated Word Speech Recognition System Using Deep Neural Networks 26
Abstract 26
1 Introduction 26
2 Literature Review 27
3 System Overview 28
3.1 Preprocessing 29
3.2 Feature Extraction 29
4 Acoustic Modeling 30
5 Deep Belief Networks 30
6 Restricted Boltzmann Machines 31
7 Experimental Results 32
7.1 Dataset Description 32
7.2 Results 33
8 Conclusion 33
References 34
3 A Proposed Resource Sharing Architecture for Multitenant SaaS Applications 35
Abstract 35
1 Introduction 35
2 Related Work 36
3 Architecture and Design 37
4 Experiments and Results 38
5 Conclusions 41
Acknowledgments 41
References 41
4 Privacy-Preserving Profile Matching System for Trust-Aware Personalized User Recommendations in Social Networks 43
Abstract 43
1 Introduction 44
2 Related Work 44
3 Proposed System 45
4 Experimental Setup 49
5 Results 49
6 Performance Evaluation 49
7 Conclusion and Future Scope 51
References 52
5 Performance Analysis of Single-Phase Bi-directional Converter for Power Factor Correction and Voltage Stabilization 53
Abstract 53
1 Introduction 53
2 System Modeling 55
2.1 Digital Implementation of SPWM Technique 55
2.2 Digital Implementation of SPWM Technique 56
3 Simulated and Experimental Results 57
3.1 Simulated and Experimental Results of Rectification Using CSPWM 57
3.2 Simulated and Experimental Results of Rectification Using SPWM 58
3.3 Simulated and Experimental Results of Inversion Using SPWM 60
3.4 Comparative Study Between Proposed CASES 60
4 Conclusion 61
References 61
6 Ensemble Method Using Correlation Based Feature Selection with Stratified Sampling for Classification 63
Abstract 63
1 Introduction 63
2 Literature Survey 64
3 Proposed Ensemble Method 65
3.1 Feature Subsets Creation 65
3.2 Training Classifiers 67
3.3 Majority Voting 67
4 Experimental Setup and Result Discussion 67
4.1 Datasets 68
4.2 Performance Evaluation 68
4.3 Results 68
5 Conclusion 70
References 70
7 Suffix Array Blocking for Efficient Record Linkage and De-duplication in Sliding Window Fashion 72
Abstract 72
1 Introduction 72
2 Related Work 73
3 Methodology 75
3.1 Proposed System 75
3.2 Algorithm Pseudo Code 76
4 Results and Comparison 77
4.1 Description of System Execution and Results 77
5 Conclusion and Future Scope 79
Acknowledgmens 79
References 79
Robust Dynamic Sliding Mode Control for a Class of Uncertain Multi-variable Process 81
1 Introduction 81
2 Dynamic Sliding Mode Control (DSMC) 82
2.1 Problem Formulation 82
2.2 Design of Controller 83
2.3 Stability Condition 84
3 DSMC Design for SISO Process 84
4 DSMC for MIMO Process 85
5 Simulation Results 89
6 Conclusion 89
References 89
9 Fault Tolerance Communication in Mobile Distributed Networks 91
Abstract 91
1 Introduction 91
1.1 Reliability in Mobile Distributed Networks 92
1.2 Problem Identification 92
2 Methodology 92
2.1 Monitoring the Failures of Multicast Tree Members 93
2.2 Failure Recovery Technique 94
2.3 Selecting the Caching Policy for Content Distribution Based on Game Theory Model 94
3 Simulation Results 96
3.1 Simulation Parameters 96
3.2 Performance Metrics 97
3.3 Results and Analysis 97
3.3.1 Based on Mobile Nodes 97
3.3.2 Based on Cache Size 99
4 Conclusions 100
References 100
10 Analysis of Bathymetry Data for Shape Prediction of a Reservoir 102
Abstract 102
1 Introduction 102
2 Proposed System Design 103
2.1 Bathymetry Data Collection 104
2.2 Preprocessing 104
2.3 Interpolation 104
2.4 Post-processing 105
3 Results and Discussion 105
4 Conclusion 107
Acknowledgments 107
References 107
11 An Extensive Survey on Diagnosis of Diabetes Mellitus in Healthcare 109
Abstract 109
1 Introduction 109
2 Commonly Used Approaches for Diagnosis of Diabetes 110
2.1 Fuzzy Approach 110
2.2 Classification and Decision Tree 111
2.3 Soft Computing Techniques 111
2.4 Support Vector Machine 112
2.5 Artificial Intelligence 113
2.6 Traditional Approach 113
3 Analysis for Existing Literature Work 113
4 Conclusion 114
References 114
12 Convolution Encoder for BER Analysis Using Doppler Frequency Shift in the Packet Erasure Network 117
Abstract 117
1 Introduction 117
2 Rayleigh Model 118
3 Implemented Model 119
4 Results and Discussions 120
5 Conclusion 121
Acknowledgments 121
References 122
13 Study of Variation in Ambient Noise with Fluctuations of Surface Parameters for the Indian Ocean Region 123
Abstract 123
1 Introduction 124
2 Measurement and Processing Methodology 125
3 Results and Discussions 125
3.1 Comparison of Field Environments 127
4 Conclusions 130
Acknowledgments 130
References 130
14 ANIDS: Anomaly Network Intrusion Detection System Using Hierarchical Clustering Technique 132
Abstract 132
1 Introduction 133
2 Related Work 133
3 Implementation Details 134
3.1 Input Dataset 134
3.2 Data Preprocessing 134
3.3 Clustering 136
3.3.1 Hierarchical Clustering Algorithm 136
3.3.2 Pseudo Code 136
3.4 Selection of Dataset and Detector Generation Using Multi-start Metaheuristic Method 136
3.5 Testing Dataset 137
3.6 Performance Analysis Using Training and Testing Dataset 137
4 Experimental Results 137
4.1 False Positive Rate (FPR) 138
4.2 Detector Generation 138
5 Conclusion 139
References 140
15 Semantic-Based Service Recommendation Method on MapReduce Using User-Generated Feedback 141
Abstract 141
1 Introduction 141
1.1 Motivation 142
2 Literature Survey 142
3 Proposed System 143
3.1 Architecture 143
3.2 System Flow 144
4 Implementation Details 146
4.1 Environment 146
4.2 Dataset 147
4.2.1 Conversion of Raw Dataset 147
5 Results 147
5.1 Pre-processing and Semantic Analysis of Previous User Comments 147
5.2 Recommendations Generation 148
6 Performance Evaluation 149
6.1 Comparison of the Recommendation System with and Without Semantic Analysis 149
6.2 Comparison of Pre-processing Time with and Without Using Hadoop 150
7 Conclusion 151
References 152
16 Implementation of DSTC and PSO Algorithm Using CLD to Improve the Performance of MANET 153
Abstract 153
1 Introduction 153
2 Theory 154
2.1 MANET 154
2.2 AODV 155
3 System Modeling 156
3.1 Proposed Cross Layer Design 156
3.2 Proposed System Flow Chart 156
3.3 Steps of DSTC 157
3.4 Steps of PSO 157
4 Implementation of Proposed System 158
5 Simulation Scenario 158
5.1 Simulation Steps 159
6 Results 159
6.1 Throughput Graph for RSS, DSTC and PSO 159
6.2 Packet Delivery Ratio Calculation for RSS, DSTC, and PSO 159
7 Conclusion 160
References 160
17 Progressive Review Towards Deep Learning Techniques 161
Abstract 161
1 Introduction 161
2 Machine Learning Algorithm 162
2.1 Supervised Learning 162
2.2 Unsupervised Learning 162
2.3 Deep Belief Network 162
3 Supervised Learning Algorithm 163
4 Semi-Supervised Learning Algorithm 163
5 Unsupervised Learning Algorithms 164
6 Deep Learning 165
7 Experiments 166
8 Conclusions 167
References 168
18 Design and Simulation of Two Stage Operational Amplifier with Miller Compensation in Nano Regime 169
Abstract 169
1 Introduction 169
2 Miller Compensation 171
3 Design of Two Stages Operational Amplifier 171
4 Simulation Result 173
4.1 Designed CMOS Size 173
4.2 Simulated Output Graphs 173
4.2.1 For 180 nm Technology 174
4.2.2 For 130 nm Technology 174
4.2.3 For 90 nm Technology 175
5 Result Summary 175
6 Result Discussion 176
7 Conclusion 177
References 177
19 Mobile Apps Classification with Risk Score by Exploiting the Enriched Information of App Context 179
Abstract 179
1 Introduction 180
2 Related Work 180
3 Proposed System 182
4 Implementation 185
5 Results 186
6 Performance Evaluation 189
7 Conclusion and Future Scope 189
References 190
20 Ultra-Wideband Differential Fed Antenna with Improved Radiation Pattern 191
Abstract 191
1 Introduction 191
2 Antenna Fabrication 193
3 Performance Improvement Stages 193
3.1 Beveling Technique 193
3.2 Defected Ground Structure Technique 194
3.3 Differential Feed Technique 195
4 Conclusion 198
References 198
21 An Automatic Approach to Segment Retinal Blood Vessels and Its Separation into Arteries/Veins 200
Abstract 200
1 Introduction 200
2 Related Work 201
3 Proposed Method for Artery–Vein Classification 202
3.1 Morphological Segmentation 202
3.2 Nodal Analysis 204
3.3 Artery–Vein Classification 204
4 Experimental Results and Discussion 205
5 Conclusion 206
Acknowledgments 207
References 207
22 Design of Microstrip Antenna with Improved Bandwidth for Biomedical Application 209
Abstract 209
1 Introduction 209
2 Design Procedure 210
3 Results 212
4 Conclusion 223
References 223
23 Extended ExOR Opportunistic Routing Algorithm Based on Broadcasting 224
Abstract 224
1 Introduction 224
2 Proposed Work 225
2.1 Neighborhood Discovery 225
2.2 Capacity Calculation 226
2.3 FORWARDING_CAPACITY 226
3 HELLO Message 226
4 Routing Algorithm 226
5 Conclusion 227
References 227
24 Factors Influencing Group Member Satisfaction in the Software Industry 229
Abstract 229
1 Introduction 230
2 Background and Related Work 230
3 Methodology 232
4 Analysis 233
4.1 Participant Profile 233
4.2 Descriptive Statistics 233
4.3 Regression Analysis 234
5 Conclusion 235
References 236
PI-PD Smith Predictor Based Cascade Controller Designing 237
1 Introduction 237
1.1 Cascade Control Structure 239
1.2 Process Models for Inner and Outer Loop 239
2 Controller Design 240
2.1 Controller Tuning 241
2.2 Inner Loop Controller Tuning 241
2.3 PI-PD Smith Predictor Controller for Outer Loop 243
3 Simulation Results 245
4 Conclusion 245
References 246
26 Speech Enhancement Using Transform Domain Techniques 247
Abstract 247
1 Introduction 248
2 Spectral Subtraction Method (SSM) 249
3 The Wavelet Packet Method (WPM) 249
3.1 Wavelet Packet Decomposition 250
3.2 Entropy 250
3.3 Wavelet Thresholding 251
3.4 Wavelet Reconstruction 251
4 Measures of Performance Parameters 251
4.1 Mean Square Error (MSE) 252
4.2 Average Absolute Distortion (AAD) 252
4.3 Cross-Correlation 252
4.4 Peak Signal-to-Noise Ratio (PSNR) 252
5 Results 253
6 Conclusion and Future Scope 254
References 255
27 Indian Election Using Twitter 257
Abstract 257
1 Introduction 258
1.1 Problem Statement 258
2 Related Work 258
3 Proposed System 259
4 Results 262
4.1 Volume Analysis 263
4.2 Sentiment Analysis 263
4.3 Trend Analysis 263
4.3.1 Trend Analysis Using TF-IDF 264
4.3.2 Trend Analysis Using Geolocation 265
5 Performance Evaluation 266
6 Conclusion and Future Scope 266
References 266
Adaptive Data Transmission in WSN Using Enhanced Path Assured Transmission Protocol 268
1 Introduction 268
2 Transport Layer Protocol Characteristics 269
3 Literature Review 271
3.1 Reliability Guarantee Protocols 272
3.2 Congestion Control Protocols 272
3.3 Reliability and Congestion Guarantee Protocols 273
3.4 Congestion Control with Decentralized Parameters 275
3.5 Congestion Elimination Protocols for Urgent Data 276
4 Proposed System 280
5 Conclusion 281
References 281
29 Cohort Intelligence and Genetic Algorithm Along with Modified Analytical Hierarchy Process to Recommend an Ice Cream to Diabetic Patient 283
Abstract 283
1 Introduction 283
2 Methodology Used for Analyzing Problem Under Consideration 284
2.1 Methodology for Criterion 285
2.2 Methodology for Alternative (Level 2) 285
3 Results of M-AHP 286
3.1 AHP-GA and Algorithm Proposed Set of Equation for Different Variables 287
3.2 Fitness Function and Recommending an Ice Cream to Diabetic Patients 289
3.3 AHP-CI Algorithm 289
4 Conclusions 290
5 Future Work 291
References 291
Theoretical Framework for Privacy in Interpersonal Information Communication 293
1 Introduction 294
2 Related Work 294
3 Model for Interpersonal Information Communication and Privacy 295
4 Conclusion 298
References 298
31 Gist, HOG, and DWT-Based Content-Based Image Retrieval for Facial Images 300
Abstract 300
1 Introduction 300
2 Background 302
3 Proposed Framework 303
3.1 Facial Image Database 303
3.2 Facial Feature Extraction Method 303
3.2.1 DWT Transform 303
3.2.2 Histogram of Oriented Gradients 304
3.2.3 Gist 304
3.2.4 High-Dimensional Indexing Method 305
3.2.5 K-Nearest-Neighbor Classification 307
4 Results and Discussions 307
5 Conclusion and Future Scope 309
References 310
32 Low Cost Intelligent Irrigation System 311
Abstract 311
1 Introduction 311
2 Sensor Hub 313
2.1 Moisture Sensor 313
2.2 Standing Water Level Detector 314
2.3 Temperature Sensor 314
2.4 Microcontroller Atmega328P 314
2.5 Encoder IC HT12E and Radio Frequency Transmitter 316
3 User Interface 316
4 Calculations and Database 317
5 Circuit Diagrams 317
6 Market Analysis 319
References 319
33 IVIFS and Decision-Making 321
Abstract 321
1 Introduction 321
2 Definitions and Notions 322
2.1 IVIFSS 323
3 Application of IVIFSS in DM 323
3.1 Algorithm 324
4 Conclusions 332
References 332
Comparative Analysis of Integer and Fractional Order Controller for Time Delay System 333
1 Introduction 333
2 System Description and Mathematical Modelling 334
3 System Identification, Validation, and Analysis 335
3.1 Identification 335
3.2 Validation 335
3.3 Analysis 336
3.4 Bode Plot 336
4 Representation of IOPI and FOPI Controller 336
4.1 IOPI Controller 336
4.2 FOPI Controller 337
5 Design of Controller 337
5.1 Design Steps of IO-IMC 338
5.2 Design Steps of FO-IMC 338
6 Results 339
6.1 Simulation Result 339
6.2 Experimental Result 340
7 Robustness Analysis 340
8 Conclusion 342
References 342
35 A Secure Authentication Scheme in Multi-operator Domain (SAMD) for Wireless Mesh Network 344
Abstract 344
1 Introduction 345
2 Related Work 346
3 Proposed Technique 347
3.1 Inter-Domain Authentication 348
3.2 Intra-Domain Authentication 349
3.3 Inter-Operator Authentication 351
4 Results 353
5 Conclusion 357
References 357
36 A Wireless Sound Alert and Person Identity Notification System for People with Hearing Disabilities 359
Abstract 359
1 Introduction 359
2 Proposed Solution 360
2.1 Traffic Mode 361
2.2 Interaction Mode 361
3 Implementation 362
3.1 Hardware Implementation 362
3.2 Software Implementation 363
4 Results 364
5 Conclusion 367
Acknowledgments 367
References 367
37 Automatic Language Identification and Content Separation from Indian Multilingual Documents Using Unicode Transformation Format 368
Abstract 368
1 Introduction 369
1.1 Language Identification 369
1.2 State of the Art (Language Identification) 369
1.3 Unicode Transformation Format 369
1.4 Essential of Language Identification 370
1.5 Tools for Language Identification 370
2 Related Work on Language Identification 370
3 Proposed Methodology 372
3.1 Advantages 373
3.2 Disadvantages 373
4 Experimental Results and Evaluation 374
4.1 Tools and Technology 375
4.2 Languages and Data Sets 375
4.3 Results 375
5 Conclusion and Future Work 376
References 376
38 Constrained Power Loss Minimization of DC Microgrid Using Particle Swarm Optimization 378
Abstract 378
1 Introduction 378
2 Modeling of Distributed Generators 379
3 Modeling of Wind Turbine 379
4 Modeling of Solar Cell 380
5 Modeling of Fuel Cell 381
6 Power Loss Minimization Using FW/BW Load Flow Method 382
7 Implementation of Particle Swarm Optimization (PSO) 384
8 Simulation Results 384
9 Conclusion 387
References 387
Selective Cropper for Geometrical Objects in OpenFlipper 389
1 Introduction 389
2 Literature Survey 390
3 Methodology 393
3.1 Cropping Bound Selection 394
3.2 Calculating Normal 394
3.3 Crop Size Selection 394
3.4 Updation 395
4 Results 395
5 Conclusion and Scope for Future Work 396
References 397
40 Opinion Mining Feature Extraction Using Domain Relevance 398
Abstract 398
1 Introduction 398
2 Literature Review 399
3 Proposed System 402
4 Mathematical Model of Proposed System 403
5 Dataset and Expected Results 404
6 Conclusion 405
References 405
41 Imaging-Based Method for Precursors of Impending Disease from Blood Traces 407
Abstract 407
1 Introduction 408
2 Methodology 410
2.1 Microfluidic Blood Drop Spot Drying 410
2.2 Drying Microfluidic Blood Drop Experiment 411
2.2.1 Experimental Protocols 413
2.2.2 Experimental Procedure for Preparation of Blood 414
2.2.3 Measurement of Physical Properties of Blood 414
2.3 Dehydrated Blood Microfluidic Drop Pattern Crack Formation 415
2.4 Dried Blood Spot Specimen 415
3 Results 415
4 Discussion 418
5 Conclusions 418
Acknowledgments 419
References 419
42 A Hybrid of DEA-MLP Model for Stock Market Forecasting 421
Abstract 421
1 Introduction 421
2 Review of Related Literatures 422
3 Objectives and Methodologies 423
4 Preparation of Data 424
5 Models in Use 424
5.1 Data Envelopment Analysis 425
5.2 Multilayer Perceptron 425
6 The Proposed Model 425
7 Output Analyses 427
8 Findings and Concluding Remarks 428
References 429
43 Low-Noise Tunable Band-Pass Filter for ISM 2.4 GHz Bluetooth Transceiver in ±0.7V 32 nm CNFET Technology 430
Abstract 430
1 Introduction 430
2 Overview and Design Issues of Nanotube Transistor 432
3 CMOS and CNFET-Based Designs: Performance and Discussion 433
4 Proposed Band-Pass Filter for Bluetooth Applications 435
5 Simulation Results 435
6 Conclusion 437
References 437
Classification of Punjabi Folk Musical Instruments Based on Acoustic Features 439
1 Introduction 439
2 Literature Review 440
3 Proposed Method 441
4 Experiments and Results 445
5 Summary and Conclusion 447
References 447
45 Combined DWT–DCT-Based Video Watermarking Algorithm Using Arnold Transform Technique 449
Abstract 449
1 Introduction 449
2 Background Theory 450
2.1 Discrete Wavelet Transform (DWT) 451
2.2 Discrete Cosine Transform 451
2.3 Arnold Transform 452
3 Proposed Video Watermarking Algorithm 452
4 Results 454
5 Conclusion 456
References 457
46 A Basic Simulation of ACO Algorithm Under Cloud Computing for Fault Tolerant 458
Abstract 458
1 Foundation 458
1.1 Cloud Computing 458
1.2 Importance of Fault Tolerant 459
1.3 Ant Colony Optimization 460
1.4 CloudSim Simulation Tool 461
2 Literature Review 462
3 Analysis of Results 464
4 Conclusion 464
Acknowledgments 465
References 465
47 A Neuromorphic Majority Function Circuit with O(n) Area Complexity in 180 nm CMOS 466
Abstract 466
1 Introduction 466
2 Proposed Neuron and Synaptic Weight Generation Circuit 468
3 Simulation Results 470
4 Conclusion 473
References 473
48 Human Action Recognition: An Overview 474
Abstract 474
1 Introduction 474
2 Related Work 475
3 Action Representation 476
4 Experimental Analysis 479
5 Conclusion 480
References 480
49 Performance Analysis of CREIDO Enhanced Chord Overlay Protocol for Wireless Sensor Networks 482
Abstract 482
1 Introduction 483
2 Literature Review 483
3 Chord Protocol 484
4 Operation of CREIDO Packets 485
5 Simulation Setup 486
5.1 Network Model 486
5.2 Performance Metrics 486
5.3 Mobility Model 487
5.4 Simulation Parameters 487
6 Performance Analysis and Results 487
7 Conclusion 492
References 492
50 Implementation of Hashing in Virtual Tour 493
Abstract 493
1 Introduction 494
2 Related Work 494
3 Three.Js (JavaScript Library) 495
4 Skybox and Cube Mapping 496
5 Thumbnail Navigation Using OrbitControl.Js 496
6 Hashing 497
7 Selective Navigation 497
8 Methodology 497
9 Future Developments 499
10 Result Analysis 499
11 Conclusion 501
References 501
51 RENT: Regular Expression and NLP-Based Term Extraction Scheme for Agricultural Domain 503
Abstract 503
1 Introduction 504
2 Need of a Novel Approach for Automatic Term Extraction 506
3 The Proposed Scheme 506
4 Results and Analysis 509
5 Conclusion and Future Work 513
References 514
52 Review of Clustering Techniques 515
Abstract 515
1 Introduction 516
1.1 Importance of Clustering 517
1.2 The Goals of Clustering 517
1.3 Clustering Applications 517
2 Literature Survey 518
2.1 Numerical Data 518
2.2 Categorical Data 518
2.3 Mixed Data 518
2.4 Cluster Analysis 518
2.5 Clustering Algorithms 519
2.6 Clustering Algorithms Discussions 519
2.6.1 K-Means Algorithm 522
3 Conclusion 526
4 Future Work 526
References 526
53 Novel Zero Voltage Transition-Based Interleaved Boost Converter 528
Abstract 528
1 Introduction 528
2 Proposed Interleaved Boost Converter 529
2.1 Operation and Analysis of Interleaved Boost Converter 530
3 Simulation Results 533
3.1 Open Loop Interleaved Boost Converter with Zero Voltage Transitions 533
3.2 Closed-Loop Interleaved Boost Converter with Zero Voltage Transitions 535
4 Conclusion 537
References 537
54 A Survey of Cloud Based Healthcare Monitoring System for Hospital Management 539
Abstract 539
1 Introduction 539
1.1 Mobile Cloud Computing 540
2 Review on Existing Works 540
2.1 Secure and Privacy Healthcare Monitoring Preserving Techniques in the Cloud Computing 541
2.1.1 Monitoring System Techniques 541
2.1.2 CMS (Centers for Medicare and Medicaid Services) Technique 542
2.1.3 CAM (Cloud-Assisted mHealth Monitoring System) Technique 542
2.1.4 Traffic-Shaping Technique 542
2.1.5 SPOC (Secure and Privacy-Preserving Opportunistic Computing) Technique 543
2.2 Mobile Healthcare Suggestion Service Techniques 543
2.2.1 Secure Same Symptom-Based Handshake (SSH) Scheme 543
2.2.2 HMASBE (Hierarchical and Multi-authority Attribute Sets-Based Encryption) Technique 543
2.2.3 Privacy-Preserving Scalar Product Computation (PPSPC) Technique 544
2.2.4 Key Search Technique 544
3 Discussion 544
4 Conclusion 546
References 547
55 Design of Common Subexpression Elimination Algorithm for Cyclotomic Fast Fourier Transform Over GF (23) 548
Abstract 548
1 Introduction 549
2 Algorithm for CFFT 549
3 Common Subexpression Elimination Algorithm 552
4 Result and Conclusion 555
Acknowledgments 555
References 555
56 On Analysis of Wheat Leaf Infection by Using Image Processing 557
Abstract 557
1 Introduction 557
2 Literature Survey 558
3 Background 559
3.1 Image Acquisition 559
3.2 Image Preprocessing 559
3.3 Feature Extraction 560
3.4 Classification 560
3.5 Wheat Crop 560
4 Proposed Work 562
4.1 Image Processing Techniques 563
4.2 Pattern Recognition Technique 563
5 Conclusion 564
References 565
57 Divisive Hierarchical Bisecting Min–Max Clustering Algorithm 566
Abstract 566
1 Introduction 566
1.1 Literature Review 567
2 Issues with Bisecting K-Means Clustering 568
3 Proposed Alternative 568
4 The Min–Max Clustering Algorithm 570
5 The Divisive Hierarchical Bisecting Min–Max Clustering Algorithm 570
5.1 Implementation of the Proposed Algorithm 571
5.2 Experimental Results 573
5.3 Comparison with Bisecting K-Means Clustering 575
6 Conclusion 578
Acknowledgments 578
References 578
58 Open Source Big Data Analytics Technique 580
Abstract 580
1 Introduction 580
2 Literature Review 581
3 Proposed Work and Its Implementation 584
3.1 Tools Used 584
4 Implementation Outline 584
4.1 Flow Chart 584
5 Detailed Description 585
6 Analytics Results 586
6.1 Domain Name Based Count 586
6.2 Percentile Gross Margin of Stock Companies 586
6.3 Sector-Wise Gross Margin of Companies 586
6.4 Analytics Parameters on Values 587
6.5 Sector-Wise Companies Count 588
7 Conclusions 589
References 589
Security Analysis of OnlineCabBooking Android Application 590
1 Introduction 590
2 Related Work 591
3 Android OS Architecture and Application Security 592
4 Activity Structure of Application 593
4.1 Wireshark 593
4.2 Maryfi 594
5 Vulnerabilities Found 594
5.1 User Profile 594
5.2 Cab Search 595
5.3 Customer Bookings 595
5.4 Cancel Booking 595
5.5 View Transactions 596
5.6 View Wallet 596
5.7 Recharge Wallet 596
6 Security Framework 597
7 Conclusion 597
References 598
60 Analyzing Security Schemes in Delay Tolerant Networks 599
Abstract 599
1 Introduction 599
2 Reputation-Based and Trust-Based Schemes 600
3 Incentive-Based Schemes 602
4 Game-Theory-Based Schemes 603
5 Summary 605
6 Future Work 605
References 605
61 An Approach to Design an IoT Service for Business—Domain Specific Web Search 607
Abstract 607
1 Introduction 607
2 Domain Specific Web Search 608
3 Proposed Approach 610
3.1 Target Business 610
3.2 Intelligence 610
3.3 User Acquisition & Business Model
4 Ranking 611
4.1 Hyperlink Structure of the Web 611
4.2 Algorithm 612
5 Internet of Things Corner 612
6 Conclusions 613
References 613
62 Weather Forecasting Using ANN with Error Backpropagation Algorithm 615
Abstract 615
1 Introduction 615
2 Related Work 616
3 Techniques Used 618
3.1 Artificial Neural Network 618
3.2 Error Backpropagation Algorithm 618
4 System Design 618
4.1 Data Preprocessing and Cleaning 618
4.2 Initialization of Artificial Neural Network 619
4.2.1 Architecture 619
4.2.2 Weights and Bias 619
4.2.3 Activation Function 619
4.2.4 Learning Rate 620
4.2.5 Number of Epochs 620
4.3 Training Neural Network 620
4.4 Testing Neural Network 620
5 Performance and Results 621
6 Conclusion 623
7 Future Work 624
Acknowledgment 624
References 624
63 Coherent Rule Mining Using AIR 626
Abstract 626
1 Introduction 626
2 Literature Review 627
3 Proposed System 627
3.1 Architecture of Proposed System 627
3.1.1 Dataset and Attribute Selection 627
3.1.2 Index File Generation 628
3.1.3 Applying Set Theory 628
3.1.4 Coherent Rule Mining Algorithm 628
4 Illustration with Example 629
4.1 Dataset 629
4.2 Attribute Selection 630
4.3 Index File 630
4.4 Set Theory 630
4.5 Coherent Rule Mining Algorithm 631
4.6 Pruning Using Recall 631
5 Algorithm 632
5.1 Terminologies 632
5.2 Algotithm 632
6 Result Analyses 633
6.1 Result Analysis of Zoo Dataset 633
6.2 Result Analysis of Retailer Dataset 634
6.3 Performance Analysis 635
6.4 Performance Analysis 637
7 Conclusion 637
References 637
64 Enhanced Data Dissemination in a Mobile Environment 639
Abstract 639
1 Introduction 639
2 Literature Review 640
3 Proposed Work 641
3.1 Proposed System Architecture 641
3.2 Proposed Broadcast Mechanism 643
4 Performance and Result Analysis 645
5 Conclusion and Future Work 646
References 646
65 Adaptive Ontology Construction Method for Crop Pest Management 648
Abstract 648
1 Introduction 649
2 Design and Implementation 650
3 Performance Evaluation 654
4 Conclusion 655
References 656
66 Deployment of Data Aggregation Technique in Wireless Sensor Network 658
Abstract 658
1 Introduction 658
2 Related Work 659
3 Block Diagram of a System 659
4 Algorithm of System 660
5 Result and Discussion 661
6 Conclusion 663
References 663
67 Energy-Efficient Self-organization Wireless Sensor Network for Traffic Management in Smart Cities 664
Abstract 664
1 Introduction 664
2 Solution for Traffic Management 665
3 Long Life of WSN 665
4 Self-organization 666
4.1 Mapping of Self-organization in WSN 666
5 Design Policies for Self-organization Functionality in WSN 667
5.1 Model for Designing a Self-organized WSN 667
6 Proposed Work 668
6.1 Framework of Self-organized Wireless Sensor Network (SOWSN) 668
6.2 Proposed Algorithm 668
6.3 Mathematical Modeling 670
7 Simulation and Results 670
8 Conclusion 672
References 672
68 Inter Area Frequency Monitoring in Large Power Grid Network 674
Abstract 674
1 Introduction 674
2 Modes of Operation of the Grid 675
3 Focus Area 675
4 Frequency Monitoring 676
5 Results and Evaluations 678
6 Conclusion 680
References 681
69 Detection of Rogue Access Point Using Various Parameters 682
Abstract 682
1 Introduction 682
2 Related Works 683
3 Limitations of Existing Methods 684
4 Rogue Access Point Detection Parameters 685
4.1 SSID 685
4.2 MAC Address 685
4.3 RSSI 685
4.4 Channel and Frequency 686
4.5 Authentication Type 686
4.5.1 WEP 686
4.5.2 WPA 686
4.5.3 WPA 2-PSK 686
4.5.4 802.1X Authentication 686
4.6 Radio Type 687
5 System Architecture 687
6 Results 692
7 Conclusion 692
References 692
70 A Survey on Wireless Security: IP Security Concern 694
Abstract 694
1 Introduction 695
2 IPSec Overview 695
3 Related Works on IPSec 697
4 Comparison 702
5 Conclusion 704
References 704
71 An Enhanced Framework to Design Intelligent Course Advisory Systems Using Learning Analytics 706
Abstract 706
1 Introduction 706
2 Literature Review 707
3 Learning Analytics 708
4 Course Advisory Systems as Overlap of Academic and Learning Analytics 709
5 Mapping the Reference Model of LA into Course Advisory System 710
6 Course Advisory Systems as Enhanced Personalized Systems 711
7 Framework 712
8 Challenges 714
9 Conclusion 714
References 714
72 Player Tracking in Sports Video Using Optical Flow Analysis 716
Abstract 716
1 Introduction 716
2 Literature Survey 717
3 Conclusion 720
References 720
73 Integrating Hybrid FMEA Methodology with Path Planning Decisions in Autonomous Vehicles 723
Abstract 723
1 Introduction 723
2 Literature Survey 724
3 Autonomous Vehicle and FMEA 725
4 Defining Quality Attributes of Planned Path 725
4.1 Nearest Distance from Each Obstacle 726
4.2 Average Distance from Obstacles 727
4.3 Design and Execution of Hybrid FMEA 727
4.4 Generalizing the Hybrid FMEA Index 728
5 Data Analysis and Results 729
5.1 Low Traffic Data 729
5.2 Medium Traffic Data 730
5.3 High Traffic Data 730
6 Scope for Further Research and Conclusion 731
References 731
74 An Evaluative Model for Discriminative Dictionary Learning with Hybrid Local Binary Patterns Based Feature Extraction for Bone Age Assessment in Content Based Image Retrieval 733
Abstract 733
1 Introduction 734
2 Proposed Pre-processing and Discriminative Dictionary Learning Methodology 734
2.1 Noise Removal Using Kernel Fisher Discriminant Analysis (KFDA) 735
2.2 Feature Extraction 736
2.3 Relevance Score (RS) Calculation Using Fuzzy Neural Network (FNN) 737
2.4 Tanner-Whitehouse Method 738
2.5 Discriminative Dictionary Learning (DDL) for Similarity Matching 739
3 Experimentation Result 740
4 Conclusion and Future Work 743
References 743
75 Evaluation of Prioritized Splay Tree Rotation Algorithm for Web Page Reorganization 745
Abstract 745
1 Introduction 745
1.1 Web Log Format 746
1.2 Web Log Data Preprocessing 746
2 Data Structure Technique—Splay Tree 747
3 Proposed Approach for Web Page Reorganization 749
4 Experimental Results 752
5 Conclusion 752
References 753
76 A Prototype Model for Deriving Social Media Intelligence Using Opinion Mining from Microblog Data 754
Abstract 754
1 Introduction 754
2 System Architecture 755
2.1 Preprocessing 755
2.2 Rule-Based Annotation 756
2.3 Feature Selection and Feature Extraction 757
2.4 Naive Bayes Classifier 757
2.5 Semantic Similarity Between Lexicons 758
2.6 Training Classifiers in Discrete Polarity Values 758
3 Experimental Results 759
4 Conclusion 761
References 761
77 Implementation for Securing the Cloud Data and Providing Secured Access Across the Network 763
Abstract 763
1 Introduction 763
2 Related Works 765
3 Methodologies 766
3.1 Request Packet 766
3.2 Reply Packet 767
3.3 Cloud Data Storage 767
3.4 Security Factor 767
3.5 Implementation 768
4 Result and Discussion 769
References 769
78 Integration of Mel-frequency Cepstral Coefficients with Log Energy and Temporal Derivatives for Text-Independent Speaker Identification 771
Abstract 771
1 Introduction 771
2 MFCC Feature Extraction Scheme 772
3 Speaker Modelling Using Vector Quantization 774
4 Experimental Results 774
5 Conclusion 776
References 777
79 Traffic Violation Detection and Penalty Generation System at a Street Intersection 778
Abstract 778
1 Introduction 778
2 Traffic Violation Detection 779
2.1 Video Capture and Setting Detection Region 780
2.2 Identifying the Red Signal 781
2.3 Vehicle Detection 782
2.4 Violation Detection 782
2.5 Vehicle License Plate Number Detection and Database up Gradation 783
3 Penalty System 783
3.1 Login Page 784
3.2 Violation Search 784
3.3 Details of Violation Page 784
3.4 Owner Details Page 785
4 Experimental Results 785
5 Conclusion 785
References 786
80 Novel Speech Processing Algorithm for Perception Improvement and Needed Research for Hearing Impaired 787
Abstract 787
1 Introduction 787
1.1 Hearing Mechanism 787
2 Possible Impairment in Auditory System and Causes 789
3 Related Work on Hearing Aids 789
4 Proposed System 790
4.1 Decomposition 790
4.2 Reconstruction 792
5 Results and Discussion 793
6 Conclusion 794
References 795
Author Index 796

Erscheint lt. Verlag 23.8.2016
Reihe/Serie Advances in Intelligent Systems and Computing
Advances in Intelligent Systems and Computing
Zusatzinfo XVIII, 821 p. 383 illus.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Graphics and Image Processing • ICDECT • ICDECT 2016 • Intelligent Communication Technology • machine learning • Web Security, Privacy and E-Commerce
ISBN-10 981-10-1675-5 / 9811016755
ISBN-13 978-981-10-1675-2 / 9789811016752
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 23,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
CHF 78,15
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 34,15