Suche
Lesesoftware
Info / Kontakt
Advanced Computational and Communication Paradigms - Proceedings of International Conference on ICACCP 2017, Volume 2
von: Siddhartha Bhattacharyya, Nabendu Chaki, Debanjan Konar, Udit Kr. Chakraborty, Chingtham Tejbanta Si
Springer-Verlag, 2018
ISBN: 9789811082375 , 791 Seiten
Format: PDF, Online Lesen
Kopierschutz: Wasserzeichen
Preis: 213,99 EUR
eBook anfordern
Mehr zum Inhalt
Advanced Computational and Communication Paradigms - Proceedings of International Conference on ICACCP 2017, Volume 2
Preface
7
Contents
9
About the Editors
16
1 A Proposed Artificial Neural Network (ANN) Model Using Geophone Sensors to Detect Elephants Near the Railway Tracks
18
Abstract
18
1 Introduction
18
2 Methodology
19
3 Result Analysis
22
4 Discussion
22
5 Conclusion
23
References
23
2 Local Region with Optimized Boundary Driven Level Set Based Segmentation of Myocardial Ischemic Cardiac MR Images
24
Abstract
24
1 Introduction
25
2 Materials and Methods
26
2.1 Database
26
2.2 Methodology
26
2.3 Validation Measures
27
3 Results and Discussions
28
4 Conclusions
33
References
34
3 An Innovative Approach for Automatic Genre-Based Fine Art Painting Classification
36
Abstract
36
1 Introduction
36
2 Related Work
38
3 Methodology
38
3.1 Data Collection
38
3.2 Feature Selection and Extraction
39
3.3 Classification Algorithm and Ensembling
40
4 Analysis of Results
40
5 Comparison with Previous Work
42
6 Future Works
43
7 Conclusion
43
References
43
4 Asymmetric Cryptosystem Using Affine Transform in Fourier Domain
45
Abstract
45
1 Introduction
45
2 The Principle
46
2.1 Affine Transform
46
2.2 Fourier Transform
47
3 The Proposed Scheme
47
4 Results and Discussion
48
5 Conclusions
53
References
53
5 A Novel Technique for an Adaptive Feedback Canceller for Hearing Aids
54
Abstract
54
1 Introduction
54
1.1 Statement of the Problem
55
2 Background
56
3 Verification and Results
57
3.1 Perceptual Evaluation of Speech Quality
60
3.2 Perceptual Evaluation of Speech Quality for a Speech Signal
62
3.3 Perceptual Evaluation of Speech Quality for a Music Signal
62
4 Conclusions
62
6 Preprocessing of Skin Cancer Using Anisotropic Diffusion and Sigmoid Function
65
Abstract
65
1 Introduction
65
2 Literature Survey
66
3 Proposed Method
67
3.1 Normalization
67
3.2 Anisotropic Diffusion Function
67
3.3 Selecting the Conduction Function
68
3.4 Calculating the Gradient
69
3.5 Estimating Gradient Threshold Parameter
70
3.6 Stopping Criteria
72
3.7 Contrast Adjustment Using Sigmoid Function
73
4 Experimental Results
73
5 Conclusion
74
References
75
7 An Incremental Algorithm for Mining Closed Frequent Intervals
76
Abstract
76
1 Introduction
76
2 Related Works
78
3 Preliminaries and Theoretical Background
78
3.1 Preliminaries
79
3.2 Theoretical Background
79
4 Problem Definition
81
5 Proposed Method
82
5.1 Array Structure to Store a Set of Intervals
82
5.2 Algorithm
82
6 Experimental Results
85
7 Conclusion
85
References
86
Crime Pattern Analysis by Identifying Named Entities and Relation Among Entities
87
1 Introduction
87
2 Proposed Framework
89
2.1 Data Collection and Preparation
89
2.2 Named Entity Recognition
89
2.3 Similarity Among Entity Pairs
90
2.4 Relation Extraction
91
3 Experimental Results
92
4 Conclusion and Future Work
95
References
95
9 A Secure High-Capacity Video Steganography Using Bit Plane Slicing Through (7, 4) Hamming Code
97
Abstract
97
1 Introduction
98
2 Related Work
98
3 Proposed Method
99
3.1 Numerical Illustration
101
4 Experimental Result and Comparison
104
5 Security Analysis
109
6 Conclusion
109
References
110
10 Conceptual Design of Next Generation Security System Based on Thought Form Image Patterns
111
Abstract
111
1 Introduction
111
1.1 Thought Form Images from Theosophical Texts, Why?
113
1.2 Origin and Features of Thought Forms Images
114
2 Advances in Biophotonics Research
114
3 Effect of Thought on Human Biofield
117
4 Imaging Tools Used for Patterns Recognition
117
4.1 HSV Space
118
4.2 Radon Transform (RT) and Histogram
120
5 Thought Forms Images of Undesirable Characteristics
121
6 Design of Thought Form Patterns-Based Security System
122
7 Conclusions
126
References
126
A New Data Hiding Method Using Block Pixel Intensity Range
129
1 Introduction
129
2 Related Work
130
2.1 Data Hiding Based on LBP
130
3 Proposed Method
131
3.1 Data Embedding
132
3.2 Data Extraction
134
4 Experimental Results
135
5 Conclusion
135
References
136
12 Fatigue Detection Based on Eye Tracking
137
Abstract
137
1 Introduction
137
2 Methodology
138
3 Results and Discussions
141
4 Summary and Conclusions
145
Statement on Consent
145
References
145
13 Secure Symmetric Key Transmission of Messages Using Random Shuffling of Spiral Matrix and Multiplicative Inverse (RSSMMI)
147
Abstract
147
1 Introduction
148
2 Proposed Technique with Example
148
2.1 Encryption Technique
148
2.1.1 Generation of First Byte of the Symmetric Key and Randomly Shuffled Matrix
148
2.1.2 Generation of Second Byte of the Symmetric Key
149
2.1.3 Generation of Third Byte of the Symmetric Key
150
2.1.4 Extraction and Swapping of Data Bytes from Randomly Shuffled Matrix
150
2.1.5 Generation of Fourth and Fifth Byte of the Symmetric Key Using Multiplicative Inverse
151
2.1.6 Generation of Sixth Byte of the Symmetric Key
152
2.1.7 Generation of Last (Seventh) Byte of the Symmetric Key and the Ciphertext
152
2.2 Decryption Technique
153
3 Result and Comparison
153
4 Conclusion
153
References
155
Odor Source Localization by Concatenating Particle Swarm Optimization and Grey Wolf Optimizer
156
1 Introduction
156
2 Related Work
157
3 Methodology
158
3.1 Proposed Concatenated Method
158
4 Simulation Setup and Results
161
5 Conclusion and Future Work
163
References
163
Facial Expression Recognition Using Distance Signature Feature
165
1 Introduction
165
2 Proposed System, Landmark Detection and Grid Formation
167
3 Feature Extraction
167
3.1 Distance Signature and Stability Index
168
3.2 Range, Moment, Skewness, Kurtosis, and Entropy
169
4 Classification
169
5 Experiment and Result
169
5.1 Experiment on CK+ and JAFFE Databases
170
5.2 Experiment on MMI and MUG Databases
171
5.3 Compare Analysis with Different State of the Arts
172
6 Conclusion
172
References
173
A Parallel Interval Type-2 Fuzzy Neural Inference System Using Different Similarity Measures: Comparative Study
174
1 Introduction
174
2 IT2SuNFIS and MS-IT2SuNFIS Models
175
3 Subsethood Verses Mutual Subsethood Based Transmission
176
4 Mackey-Glass Time Series Prediction
178
4.1 Simulation Results
179
5 Conclusions
180
References
180
17 A Fuzzy Logic Inspired Approach for Social Media Sentiment Analysis via Deep Neural Network
183
Abstract
183
1 Introduction
184
2 Related Works
184
3 Proposed Method
185
3.1 Text Modeling
185
3.2 Deep Neural Sentiment Classification
186
3.3 Recurrent Fuzzy Neural Classification
187
4 Experimental Results
188
4.1 Experimental Setup
188
4.2 Experimental Analysis
188
5 Conclusion
192
References
192
18 Neighbor Attack Detection in Internet of Things
194
Abstract
194
1 Introduction
194
2 Related Works
196
2.1 Sinkhole Attack
196
2.2 Selective Forward Attack
196
2.3 Black Hole Attack
196
2.4 Sybil Attack
196
2.5 Neighbor Attack
197
2.6 Local Repair Message
197
3 Problem Formulation
197
4 Implementation and Result
198
5 Conclusion and Future Works
203
References
203
19 Human Opinion Inspired Feature Selection Strategy for Predicting the Pleasantness of a Molecule
204
Abstract
204
1 Introduction
204
2 Methodology
205
2.1 Data Set
205
2.2 Continuous Opinion Dynamics Optimizer (CODO)
206
2.3 Implementation of Wrapper Approach Combining CODO and SVM
207
3 Results
208
4 Conclusion
211
References
211
An Ensemble Learning Based Bangla Phoneme Identification System Using LSF-G Features
213
1 Introduction
214
2 Related Works
214
3 Dataset Development
215
4 Feature Extraction
216
4.1 Framing and Windowing
216
4.2 Line Spectral Frequency Extraction
217
4.3 LSF-G Computation
217
5 Ensemble Learning Based Classification
218
6 Result and Discussion
218
7 Conclusion
220
References
220
21 An Efficient Approach for Detecting Wormhole Attacks in AODV Routing Protocol
222
Abstract
222
1 Introduction
222
2 Related Works
223
3 System Model
224
3.1 Network Model
224
3.2 Adversial Model
225
3.3 Power Consumption Model
225
4 Problem Description
226
5 Proposed Approach
226
6 Experimental Results
228
6.1 Simulation Setup
228
6.2 Simulation Studies
229
7 Conclusions
231
References
232
Efficient Contrast Enhancement Based on Local–Global Image Statistics and Multiscale Morphological Filtering
233
1 Introduction
233
2 Background
234
3 Proposed Method
235
4 Experimental Results and Analysis
237
5 Concluding Remarks
242
References
242
23 Bag-of-Tasks Intelligent Scheduling Agent (BISA) in Cloud Computing
243
Abstract
243
1 Introduction
243
2 BIS Agent Framework
244
3 Experimental Setup
247
4 Results and Discussion
248
5 Conclusion and Future Work
250
References
250
24 Modeling a Bioinspired Neuron: An Extension to the H-H Model
251
Abstract
251
1 Introduction
251
1.1 The Hodgkin–Huxley Model of Nerve Axon
252
1.2 The Ion Channels
253
1.3 Modeling the Synapse
254
2 H-H Model for a Synaptic Input—The Proposed Model
255
2.1 Simulation
255
3 Results
256
4 Conclusion
258
Acknowledgements
258
References
258
25 A Nonnegative Matrix Factorization Based Approach to Extract Aspects from Product Reviews
259
Abstract
259
1 Introduction
259
2 Statement of the Problem
261
3 The Proposed Methodology
263
3.1 Data Collection
264
3.2 Data Preprocessing
264
3.3 Nonnegative Matrix Factorization
264
3.4 Aspect Extraction
265
3.5 Sentiment Classification
265
4 Experimental Results
267
5 Conclusion and Scope for the Further Work
269
References
270
26 Extraction of Geometric and Prosodic Features from Human-Gait-Speech Data for Behavioural Pattern Detection: Part II
271
Abstract
271
1 Introduction
272
2 Behavioural Pattern Detection
273
2.1 Clustering of Prosodic Features from Human-Speech Data
273
2.2 Clustering of Geometrical Features from Human-Gait Data
275
2.3 Gradient or Slope of Human-Gait-Speech Data
276
3 Simulated Outcomes and Discussions
278
4 Concluding Remarks and Further Scope of the Work
281
References
282
27 Mutation in Path for the Packets in the Network During Journey from Source to Destination
283
Abstract
283
1 Introduction
283
2 Genetic Algorithm
284
3 Dijkstra’s Algorithm
284
4 Proposed Algorithm
285
5 Mutation
288
6 Results of Mutation
289
7 Complexity and Comparative Study
290
8 Conclusions
291
References
291
Facial Expression Recognition Using 2DPCA on Segmented Images
293
1 Introduction
293
2 The Proposed Method
294
2.1 Image Preprocessing
295
2.2 Feature Extraction
295
2.3 Classification
297
3 Experiment and Evaluation
298
3.1 Description of the Dataset
298
3.2 Experimental Details
298
3.3 Result Analysis
299
4 Conclusions
300
References
300
29 Stable and Consistent Object Tracking: An Active Vision Approach
302
Abstract
302
1 Introduction
302
2 Related Works
304
3 System Architecture and Methodology
305
3.1 Image Acquisition and Object Tracking
305
3.2 Motion Detection and Velocity Estimation
306
3.3 Saccade Control
307
3.4 Smooth Pursuit Control
307
4 Experiments and Result
308
4.1 Smooth Pursuit Mechanism
308
4.1.1 Velocity and Direction Estimation
308
5 Conclusion and Future Work
310
References
310
30 Vision-Based Forward Kinematics Using ANN for Weld Line Detection with a 5-DOF Robot Manipulator
312
Abstract
312
1 Introduction
312
2 Modeling of 5-DOF Robot Manipulator
313
3 Denavit–Hartenberg Parameters
314
4 Forward Kinematics
315
5 Image Processing for Weld Line Detection
315
5.1 Conversion of Image to Grayscale
316
5.2 Sobel Edge Detection
316
5.3 Hough Line Transform
317
6 ANN Modeling for Forward Kinematics
317
6.1 Overview
317
6.2 Dataset and Network Architecture
318
6.3 Methodology
318
7 Results and Discussion
318
7.1 Training the Network with Different Training Algorithms
318
7.2 Training the Network with Different Number of Epochs
320
7.3 Training the Network with Different Activation Functions
320
7.4 Training the Network with Different Number of Neurons in the Hidden Layer
320
8 Conclusion
320
Acknowledgements
321
References
321
Performance Measurement and Evaluation of Pluggable to Scheduler Dynamic Load Balancing Algorithm (P2S_DLB) in Distributed Computing Environment
322
1 Introduction
322
2 Related Work
323
3 System Model
324
4 Implementation Scenario and Input Dataset
325
5 Pluggable to Scheduler Dynamic Load Balancing Algorithm (P2S_DLB)
326
6 Experimental Results and Analysis
326
7 Conclusion
329
References
331
32 Performance Enhancement of Hadoop for Big Data Using Multilevel Queue Migration (MQM) Technique
333
Abstract
333
1 Introduction
334
2 Related Work
335
3 Proposed Solution
336
4 Experimental Setup
338
5 Results and Discussion
338
6 Conclusion
341
References
343
33 Semi-automatic Ontology Builder Based on Relation Extraction from Textual Data
345
Abstract
345
1 Introduction
345
2 Related Work
346
3 Proposed Approach
346
3.1 Analyzer Subsystem
347
3.2 Mapper Subsystem
348
3.3 Triple Validator and Storage
349
4 Experimental Results
349
4.1 Technology Classification Ontology
349
4.2 Rule File Generation
349
4.3 Performance
350
5 Conclusion
352
References
352
34 An Ideal Approach for Medical Color Image Enhancement
353
Abstract
353
1 Introduction
353
2 Related Work and Motivation Toward the Proposed Work
354
3 Steps Involved in the Proposed Algorithm
355
4 Materials and Methods
355
4.1 CIELAB Color Space
355
4.2 Type-2 Fuzzy Set Based Enhancement Technique, Type-2_Fuzzy_Enhnc()
357
4.3 Unsharp Masking, Unsharp_Mask()
358
5 Experiment and Result Discussion
359
5.1 Subjective Evaluations
360
5.2 Objective Evaluation
361
6 Conclusions
362
References
362
35 Score Formulation and Parametric Synthesis of Musical Track as a Platform for Big Data in Hit Prediction
364
Abstract
364
1 Introduction
365
2 Attribute Extraction
365
2.1 Statistical Attributes
366
2.1.1 Slope
366
2.1.2 Period Frequency
366
2.1.3 Entropy
366
2.1.4 RMS Energy
366
2.2 Musical Topographies
367
2.2.1 Danceability
367
2.2.2 Energy
367
2.2.3 Key
368
2.2.4 Liveliness
368
2.2.5 Loudness
368
2.2.6 Speechiness
368
2.2.7 Tempo
368
2.2.8 Valence
369
3 Observation and Score Formulation
369
3.1 USA
369
3.2 India
371
3.3 United Kingdom
372
4 Verdict and Conclusion
374
References
374
Dynamics of Dust-Ion-Acoustic Anti-kink Waves in a Dissipative Nonextensive e-p-i Dusty Plasma
376
1 Introduction
376
2 Model Equations
377
3 Burgers Equation
378
4 One-Dimensional Dynamical System
379
5 Potential Energy
380
6 Anti-kink Wave Solution
381
7 Conclusions
383
References
383
37 Multiple Information Hiding in General Access Structure Visual Cryptography Using Q’tron Neural Network
385
Abstract
385
1 Introduction
385
1.1 Random Grids
386
1.2 General Access Structures
387
1.2.1 Construction of VCS Using Cumulative Arrays
387
1.3 Q’tron Neural Network
388
2 Proposed Methodology
389
3 Design Strategy
390
4 Experimental Results and Analysis
391
4.1 Experimental Results
391
4.2 Analysis—PSNR Calculation and Contrast
391
5 Conclusion
393
References
393
38 Overlapping Community Detection Through Threshold Analysis on Disjoint Network Structures
395
Abstract
395
1 Introduction
395
1.1 Recent Works
396
1.2 Clustering Metrics
397
1.3 Motivation
397
2 Problem Formulation
398
3 Proposed Method
398
3.1 Proposed Algorithm
399
4 Experimental Results
399
4.1 Experiment Setup
399
4.2 Simulator Network
400
4.3 Performance on Benchmark Data
402
5 Conclusion
402
References
402
Chaotic to Periodic Phenomena of Dust-Ion-Acoustic Waves in a Collisional Dusty Plasma
404
1 Introduction
404
2 Model Equations
405
3 Derivation of the DKdV and DmKdV Equations
406
4 Chaotic and Periodic Structure at Critical Values
408
5 Conclusions
410
References
410
40 ICT in Social Development—Context-Sensitive Design Strategies to Develop Mobile Applications for Barefoot Animal Breeders
413
Abstract
413
1 Introduction
414
2 Background
415
3 Design Approach
416
3.1 Custom Dropdown with Search Option
417
3.2 Custom Autocomplete EditBox
417
4 Results
419
5 Conclusion
420
References
420
41 Multiple Solution Sorting Method Using Translocation
422
Abstract
422
1 Introduction
422
2 Definitions and Notifications
423
2.1 Genome
423
2.2 Cycle Graph
424
3 Proposed Algorithm
426
4 Result and Discussion
427
4.1 Discussion
427
4.2 Result
429
5 Conclusion
429
Chaos Control in a Two Prey and One Predator System with Predator Switching
431
1 Introduction
431
2 Model
432
3 Stability Analysis
433
4 Numerical Simulations
434
5 Conclusion
436
References
437
43 An Improved Multi-secret Sharing Visual Cryptography Technique for Color Images Using Sterilization Algorithm
438
Abstract
438
1 Introduction
438
2 Literature Review
439
3 Proposed Work
440
4 Result Analysis and Discussion
445
5 Conclusions
446
References
447
A Morphological Color Image Contrast Enhancement Technique Using Hilbert 3D Space Filling Curve
448
1 Introduction
448
2 Background
449
2.1 Ordering in Color Images
449
2.2 Hilbert Space Curve
450
3 Proposed Method
451
3.1 Mapping of RGB Values to Scalar Value
451
3.2 Multi-scale Morphological Contrast Enhancement
452
4 Experimental Results and Comparisons
454
5 Conclusion
457
References
458
Agent-Based Modelling and Simulation of Religious Crowd Gatherings in India
459
1 Introduction
459
2 Related Work
460
3 Our Approach
461
3.1 Field Survey: Alopi Devi Temple
461
3.2 Our Agent-Based Model
462
4 Simulation: Experiments and Results
463
4.1 Experiments
464
4.2 Results
464
5 Conclusion
465
References
466
46 An Experimental Study of Scalability in Cross-Domain Recommendation Systems
467
Abstract
467
1 Introduction
468
2 Our Contribution
468
2.1 Scalability of the System
468
2.2 Numeric and Non-numeric Data Clustering
468
3 Experiments
469
3.1 Datasets Used
469
3.2 Methodology
469
3.3 Experiment 1: Genre and Rating Based Partitioning
469
3.4 Experiment 2: Numeric Data Clustering
470
3.5 Experiment 3: Non-numeric Data Representation and Nearest Neighbor Approach
471
3.6 Experiment 4: Non-numeric Data Clustering and Subsequent Querying
473
References
475
Document Categorization Using Graph Structuring
476
1 Introduction
476
2 The Methodology
477
2.1 Learning
478
3 Classification
479
4 Experimental Results
482
5 Conclusions
483
References
483
48 An Empirical Analysis for Predicting Source Code File Reusability Using Meta-Classification Algorithms
485
Abstract
485
1 Introduction
485
2 Related Work
487
3 Research Background
488
3.1 Empirical Data Collection
488
3.2 Dependent and Independent Variables
489
4 Research Methodology
489
4.1 Meta-Classification Techniques Employed
489
4.2 Performance Evaluation Measures
490
5 Empirical Analysis
491
5.1 Model Evaluation Results
491
6 Threats to Validity
494
7 Conclusion and Future Work
494
References
495
Non-head-on Non-overtaking Collision of Two Solitary Waves in a Multicomponent Plasma
497
1 Introduction
497
2 Basic Equations
498
3 Numerical Results and Discussion
502
4 Conclusion
504
References
504
Signed Product and Total Signed Product Cordial Labeling of Cartesian Product Between Balanced Bipartite Graph and Path
506
1 Introduction
506
2 Preliminaries
507
3 Labeling of Cartesian Product Between Balanced Bipartite Graph and Path
508
3.1 Algorithm
508
3.2 Algorithm
509
3.3 Algorithm
510
3.4 Algorithm
511
4 Conclusion
512
References
513
51 A Survey on Detection and Mitigation of Interest Flooding Attack in Named Data Networking
514
Abstract
514
1 Introduction
514
2 Interest Flooding Attacks
515
3 Architecture
516
4 Objectives
518
5 Related Works
518
6 Analysis of Survey
520
7 Conclusion
521
52 An Integrated TOPSIS Approach to MADM with Interval-Valued Intuitionistic Fuzzy Settings
523
Abstract
523
1 Introduction
523
2 Preliminaries
524
3 MADM Problems with Three-Parameter Characterization of IVIFNs
526
4 TOPSIS Approach to Solve MADM Problems in IVIF Settings with Three-Parameter Characterization of IFSs
527
4.1 IVIF TOPSIS Method
530
5 Illustrative Example
530
6 Concluding Remarks
532
Acknowledgements
533
References
533
Bounding Stability in Formal Concept Analysis
534
1 Introduction
534
2 Terminology and Main Definitions
535
2.1 Formal Concept Analysis
535
2.2 Stability
536
3 Our Approach to Estimate Stability
536
4 Time Complexity and Performance Analysis
539
5 Conclusion
540
References
541
54 Feature Extraction Using Fuzzy Generalized Two-Dimensional Inverse LDA with Gaussian Probabilistic Distribution and Face Recognition
542
Abstract
542
1 Introduction
543
2 Fuzzy G-2DLDA Method
544
3 Gaussian Probabilistic Fuzzy G-2DILDA Method
545
3.1 Creation of Membership Matrix Using Gaussian Probability Density Function
546
3.2 Creation of Membership Matrix Using Fk-NN
546
3.3 GPFG-2DILDA Algorithm
546
4 Empirical Results
548
5 Conclusion
549
Acknowledgements
550
References
550
55 Secure and Efficient Data Sharing with User Revocation in Cloud
551
Abstract
551
1 Introduction
552
2 Related Work
552
3 System Model and Design Goals
553
3.1 System Model
553
3.2 Design Goals
554
4 The Proposed Scheme
555
4.1 Scheme Description
555
4.1.1 Existing User Registration and Key Generation
555
4.1.2 Data Owner Uploads the Data File
556
4.1.3 User Revocation
556
4.1.4 New User Registration
557
4.1.5 Data File Download
557
5 Security Analysis
558
5.1 Key Distribution
558
5.2 Data Confidentiality
558
5.3 Fine Grain Access Control
559
5.4 Comparative Analysis
560
6 Conclusion
560
References
561
An Adaptive Cluster-Based Ensemble Learner for Computational Biology
562
1 Introduction
562
2 Literature Review
563
3 Proposed Approach
564
4 Experimental Setup
567
5 Results and Discussion
568
6 Conclusions and Future Work
570
References
570
57 Text Document Analysis Using Map-Reduce Framework
572
Abstract
572
1 Introduction
572
2 Background Study
573
3 Problem Statement and Proposed Solution
574
3.1 Map-Reduce Framework
575
3.2 Text Preprocessing
575
3.3 Proposed Methodology
576
3.3.1 Cosine Similarity PLSA-Based Text Analysis
576
4 Experiments and Results Analysis
578
4.1 Comparison Between PLSA and Cosine PLSA
578
5 Conclusion
579
References
580
58 WAPiS: WhatsApp Pattern Identification Algorithm Indicating Social Connection
582
Abstract
582
1 Introduction
582
2 Related Work
584
3 Motivation
584
4 Methodology Adopted
585
5 Algorithm Formulated
585
5.1 Working Steps of WAPiS: WhatsApp Pattern Indicating Social Connection
585
5.2 Mathematical Modeling of WAPiS Algorithm
587
6 Simulation Environment
588
6.1 Visual Studio
588
6.2 MongoDB
588
7 Simulation Performed
588
8 Conclusion and Future Work
590
Acknowledgements and Submission
590
References
590
59 A New DNA Cryptography Based Algorithm Involving the Fusion of Symmetric-Key Techniques
591
Abstract
591
1 Introduction
592
2 DNA Cryptography
592
2.1 DNA Digital Coding
593
2.2 Hao’s Permutation and Fractal Sequence
594
2.3 Polymerase Chain Reaction (PCR)
594
3 Literature Survey
594
4 Proposed Methodology
596
4.1 Proposed Algorithm
596
4.2 Encryption Scheme for Complemented DNA Nucleotide (K)
597
5 Discussion
599
5.1 Illustration of the Proposed Methodology
599
5.2 Security Analysis of the Proposed Methodology
600
6 Conclusion
601
References
601
60 Enhanced Surveillance Using Integration of Gait Analysis with Iris Detection
602
Abstract
602
1 Introduction
603
2 Related Work
603
3 Proposed Work
604
3.1 Overview
604
3.2 Gait Recognition
604
3.3 V2DPCA Feature
605
3.4 Manhattan Distance Classifier
605
3.5 Basic Steps in Iris Recognition
606
3.5.1 Iris Image Acquisition
606
3.5.2 Iris Segmentation
607
3.5.3 Iris Normalization
607
3.5.4 Feature Extraction and Code Generation
607
3.5.5 Fusion
607
4 Result and Discussion
608
5 Gait and Iris Dataset
609
6 Conclusion
610
References
610
61 Effect of Tapering on Swimming Efficiency of Flagellated Microswimmer at Low Reynolds Number
611
Abstract
611
1 Introduction
611
2 Theory of Microswimming
613
2.1 Microswimmer
613
2.2 Dynamical Equations
614
2.3 Free Swimming
616
3 Results and Conclusion
619
Acknowledgment
620
References
620
62 Field Monitoring Using IoT: A Neural Network Approach
622
Abstract
622
1 Introduction
623
2 Problem Statement
623
2.1 Objective
623
3 Proposed Solution
624
3.1 Conceptual Design
625
3.2 Hardware Description
625
4 Implementation and Result Analysis
627
5 Conclusion
632
References
633
63 Nature-Inspired Optimization Techniques in VANETs and FANETs: A Survey
634
Abstract
634
1 Introduction
634
1.1 Motivation for Research
635
1.2 Difference Between VANET and FANET
635
2 VANET
636
2.1 Routing Protocols in VANETs
636
2.2 Ant Colony Optimization
639
2.3 Bee Colony Optimization
639
2.4 Particle Swarm Optimization
640
3 FANET
641
3.1 Routing Protocols in FANET
641
3.2 Ant Colony Optimization
643
3.3 Bee Colony Optimization
644
4 Conclusion
644
References
644
Implementation of Cloud-Assisted Secure Data Transmission in WBAN for Healthcare Monitoring
647
1 Introduction
648
2 Related Work
650
3 Problem Address
650
4 Proposed Algorithm and Implementation of Solution
651
5 Experimental Setup Using Cloud Server
652
6 Result and Analysis
653
7 Conclusion
656
References
656
A Study of Android Application Execution Trends and Their Privacy Threats to a User with Respect to Data Leaks and Compromise
657
1 Introduction
657
2 Related Work
658
3 System Design
659
3.1 Data Collection
661
4 Result and Analysis
661
4.1 Android Permissions
661
4.2 Execution Style Analysis of Android Applications on Device
662
4.3 Pattern Analysis
662
5 Conclusion
663
References
664
66 Three-Dimensional Design of a New Maglev Vehicle and a Study of It Using Computer Vision
665
Abstract
665
1 Introduction
666
2 Review Work
667
3 The Design of the Proposed Vehicle
668
3.1 Gaussian Mixture Model and Computer Vision Study on the Proposed System
668
4 Proposed Method
671
5 Results and Analysis
671
6 Conclusion
673
Acknowledgements
675
References
675
Combining GMM-Based Hidden Markov Random Field and Bag-of-Words Trained Classifier for Lung Cancer Detection Using Pap-Stained Microscopic Images
676
1 Introduction and Literature Survey
677
2 Materials and Methods
678
2.1 Abstract View of the Adopted Algorithm
678
2.2 Sample Image Database Development
678
2.3 Edge-Preserving Bilateral Filtering
679
2.4 Nucleus Segmentation
680
2.5 Nucleus Classification
681
3 Results
683
4 Conclusion
684
References
685
Assessment of Segmentation Techniques for Chronic Wound Surface Area Detection
687
1 Introduction
688
2 Materials and Methods
689
2.1 Wound Image Collection
689
2.2 Multi-expert Wound Region Labelling
689
2.3 Clustering Approach for Wound Region Segmentation
689
2.4 Classification Approach for Wound Region Segmentation
691
3 Results and Discussion
693
4 Conclusion
695
References
695
69 Improved Decision-Making for Navigation Scenarios
697
Abstract
697
1 Introduction
698
2 Database Acquisition
698
3 Proposed Algorithm for Improved Decision Making in Navigation
699
3.1 Image Processing Tasks
699
3.2 Feature Extraction and Creation of Feature Vector
699
3.3 Computation of the Best Feature Set
700
4 Validation of Proposed Model
703
5 Discussions and Conclusions
704
References
706
Pixel-Based Supervised Tissue Classification of Chronic Wound Images with Deep Autoencoder
707
1 Introduction
707
2 Materials and Methods
708
2.1 Sample Wound Image Database
708
2.2 Multi-expert Tissue Region Labelling
709
2.3 Pixel-Based Tissue Classification
710
3 Results and Discussion
714
4 Conclusion
714
References
715
71 A CBIR Technique Based on the Combination of Shape and Color Features
716
Abstract
716
1 Introduction
717
2 Proposed CBIR Technique
718
3 Experimental Results
721
4 Conclusion
722
References
722
Trajectory Forecasting of Entities Using Advanced Deep Learning Techniques
724
1 Introduction
725
2 Related Work
725
3 Methodology
726
3.1 Baseline
726
3.2 Multitarget Trajectory Prediction
727
4 Experiments and Results
729
4.1 Experimental Setup
730
4.2 Results and Analysis
730
5 Conclusion
732
References
732
An Automatic Face Attractiveness Improvement Using the Golden Ratio
734
1 Introduction
734
2 Proposed Method
735
2.1 Facial Beauty Prediction
736
2.2 Golden Ratio-Based Facial Beautification
737
3 Experimental Results
738
4 Conclusion
741
References
742
74 A Trust-Based Intrusion Detection System for Mitigating Blackhole Attacks in MANET
743
Abstract
743
1 Introduction
744
2 Trust and Intrusion Detection System (IDS) in MANETs
744
3 Blackhole Attack
745
4 Related Work
745
5 Proposed Strategy
746
6 Results
749
7 Conclusion
752
References
753
75 Good-Quality Question Generation for Academic Support
754
Abstract
754
1 Introduction
755
2 Proposed Methodology
756
2.1 System Architecture
757
3 Result and Discussion
764
4 Challenges in Question Enhancement
765
4.1 Partial Selection of Answer Phrase
765
4.2 Enclosure of Answer Phrase in a Question
765
4.3 Conjoined Nouns in Answer Phrase
766
5 Conclusion
766
References
766
76 Facial Representation Using Linear Barcode
768
Abstract
768
1 Introduction
769
2 Related Work
770
3 Proposed Method
772
3.1 Image Preprocessing
772
3.2 Feature Extraction
773
3.3 Feature Coding
774
3.4 Barcode Creator
775
4 Experimental Result and Discussions
776
5 Conclusions
777
References
778
77 Bit-Reversal Encryption Towards Secured Storage of Digital Image in Cloud Deployment
779
Abstract
779
1 Introduction
779
1.1 Recent Works
780
1.2 Bit-Reversal Permutation
782
2 Proposed Method
782
2.1 Design Background
782
2.2 Proposed Algorithm
785
3 Experimental Results
785
3.1 Empirical Analysis
787
4 Conclusion
787
References
788
Author Index
789