Advanced Computational and Communication Paradigms - Proceedings of International Conference on ICACCP 2017, Volume 2

von: Siddhartha Bhattacharyya, Nabendu Chaki, Debanjan Konar, Udit Kr. Chakraborty, Chingtham Tejbanta Si

Springer-Verlag, 2018

ISBN: 9789811082375 , 791 Seiten

Format: PDF, Online Lesen

Kopierschutz: Wasserzeichen

Mac OSX,Windows PC für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Online-Lesen für: Mac OSX,Linux,Windows PC

Preis: 213,99 EUR

eBook anfordern eBook anfordern

Mehr zum Inhalt

Advanced Computational and Communication Paradigms - Proceedings of International Conference on ICACCP 2017, Volume 2


 

Preface

7

Contents

9

About the Editors

16

1 A Proposed Artificial Neural Network (ANN) Model Using Geophone Sensors to Detect Elephants Near the Railway Tracks

18

Abstract

18

1 Introduction

18

2 Methodology

19

3 Result Analysis

22

4 Discussion

22

5 Conclusion

23

References

23

2 Local Region with Optimized Boundary Driven Level Set Based Segmentation of Myocardial Ischemic Cardiac MR Images

24

Abstract

24

1 Introduction

25

2 Materials and Methods

26

2.1 Database

26

2.2 Methodology

26

2.3 Validation Measures

27

3 Results and Discussions

28

4 Conclusions

33

References

34

3 An Innovative Approach for Automatic Genre-Based Fine Art Painting Classification

36

Abstract

36

1 Introduction

36

2 Related Work

38

3 Methodology

38

3.1 Data Collection

38

3.2 Feature Selection and Extraction

39

3.3 Classification Algorithm and Ensembling

40

4 Analysis of Results

40

5 Comparison with Previous Work

42

6 Future Works

43

7 Conclusion

43

References

43

4 Asymmetric Cryptosystem Using Affine Transform in Fourier Domain

45

Abstract

45

1 Introduction

45

2 The Principle

46

2.1 Affine Transform

46

2.2 Fourier Transform

47

3 The Proposed Scheme

47

4 Results and Discussion

48

5 Conclusions

53

References

53

5 A Novel Technique for an Adaptive Feedback Canceller for Hearing Aids

54

Abstract

54

1 Introduction

54

1.1 Statement of the Problem

55

2 Background

56

3 Verification and Results

57

3.1 Perceptual Evaluation of Speech Quality

60

3.2 Perceptual Evaluation of Speech Quality for a Speech Signal

62

3.3 Perceptual Evaluation of Speech Quality for a Music Signal

62

4 Conclusions

62

6 Preprocessing of Skin Cancer Using Anisotropic Diffusion and Sigmoid Function

65

Abstract

65

1 Introduction

65

2 Literature Survey

66

3 Proposed Method

67

3.1 Normalization

67

3.2 Anisotropic Diffusion Function

67

3.3 Selecting the Conduction Function

68

3.4 Calculating the Gradient

69

3.5 Estimating Gradient Threshold Parameter

70

3.6 Stopping Criteria

72

3.7 Contrast Adjustment Using Sigmoid Function

73

4 Experimental Results

73

5 Conclusion

74

References

75

7 An Incremental Algorithm for Mining Closed Frequent Intervals

76

Abstract

76

1 Introduction

76

2 Related Works

78

3 Preliminaries and Theoretical Background

78

3.1 Preliminaries

79

3.2 Theoretical Background

79

4 Problem Definition

81

5 Proposed Method

82

5.1 Array Structure to Store a Set of Intervals

82

5.2 Algorithm

82

6 Experimental Results

85

7 Conclusion

85

References

86

Crime Pattern Analysis by Identifying Named Entities and Relation Among Entities

87

1 Introduction

87

2 Proposed Framework

89

2.1 Data Collection and Preparation

89

2.2 Named Entity Recognition

89

2.3 Similarity Among Entity Pairs

90

2.4 Relation Extraction

91

3 Experimental Results

92

4 Conclusion and Future Work

95

References

95

9 A Secure High-Capacity Video Steganography Using Bit Plane Slicing Through (7, 4) Hamming Code

97

Abstract

97

1 Introduction

98

2 Related Work

98

3 Proposed Method

99

3.1 Numerical Illustration

101

4 Experimental Result and Comparison

104

5 Security Analysis

109

6 Conclusion

109

References

110

10 Conceptual Design of Next Generation Security System Based on Thought Form Image Patterns

111

Abstract

111

1 Introduction

111

1.1 Thought Form Images from Theosophical Texts, Why?

113

1.2 Origin and Features of Thought Forms Images

114

2 Advances in Biophotonics Research

114

3 Effect of Thought on Human Biofield

117

4 Imaging Tools Used for Patterns Recognition

117

4.1 HSV Space

118

4.2 Radon Transform (RT) and Histogram

120

5 Thought Forms Images of Undesirable Characteristics

121

6 Design of Thought Form Patterns-Based Security System

122

7 Conclusions

126

References

126

A New Data Hiding Method Using Block Pixel Intensity Range

129

1 Introduction

129

2 Related Work

130

2.1 Data Hiding Based on LBP

130

3 Proposed Method

131

3.1 Data Embedding

132

3.2 Data Extraction

134

4 Experimental Results

135

5 Conclusion

135

References

136

12 Fatigue Detection Based on Eye Tracking

137

Abstract

137

1 Introduction

137

2 Methodology

138

3 Results and Discussions

141

4 Summary and Conclusions

145

Statement on Consent

145

References

145

13 Secure Symmetric Key Transmission of Messages Using Random Shuffling of Spiral Matrix and Multiplicative Inverse (RSSMMI)

147

Abstract

147

1 Introduction

148

2 Proposed Technique with Example

148

2.1 Encryption Technique

148

2.1.1 Generation of First Byte of the Symmetric Key and Randomly Shuffled Matrix

148

2.1.2 Generation of Second Byte of the Symmetric Key

149

2.1.3 Generation of Third Byte of the Symmetric Key

150

2.1.4 Extraction and Swapping of Data Bytes from Randomly Shuffled Matrix

150

2.1.5 Generation of Fourth and Fifth Byte of the Symmetric Key Using Multiplicative Inverse

151

2.1.6 Generation of Sixth Byte of the Symmetric Key

152

2.1.7 Generation of Last (Seventh) Byte of the Symmetric Key and the Ciphertext

152

2.2 Decryption Technique

153

3 Result and Comparison

153

4 Conclusion

153

References

155

Odor Source Localization by Concatenating Particle Swarm Optimization and Grey Wolf Optimizer

156

1 Introduction

156

2 Related Work

157

3 Methodology

158

3.1 Proposed Concatenated Method

158

4 Simulation Setup and Results

161

5 Conclusion and Future Work

163

References

163

Facial Expression Recognition Using Distance Signature Feature

165

1 Introduction

165

2 Proposed System, Landmark Detection and Grid Formation

167

3 Feature Extraction

167

3.1 Distance Signature and Stability Index

168

3.2 Range, Moment, Skewness, Kurtosis, and Entropy

169

4 Classification

169

5 Experiment and Result

169

5.1 Experiment on CK+ and JAFFE Databases

170

5.2 Experiment on MMI and MUG Databases

171

5.3 Compare Analysis with Different State of the Arts

172

6 Conclusion

172

References

173

A Parallel Interval Type-2 Fuzzy Neural Inference System Using Different Similarity Measures: Comparative Study

174

1 Introduction

174

2 IT2SuNFIS and MS-IT2SuNFIS Models

175

3 Subsethood Verses Mutual Subsethood Based Transmission

176

4 Mackey-Glass Time Series Prediction

178

4.1 Simulation Results

179

5 Conclusions

180

References

180

17 A Fuzzy Logic Inspired Approach for Social Media Sentiment Analysis via Deep Neural Network

183

Abstract

183

1 Introduction

184

2 Related Works

184

3 Proposed Method

185

3.1 Text Modeling

185

3.2 Deep Neural Sentiment Classification

186

3.3 Recurrent Fuzzy Neural Classification

187

4 Experimental Results

188

4.1 Experimental Setup

188

4.2 Experimental Analysis

188

5 Conclusion

192

References

192

18 Neighbor Attack Detection in Internet of Things

194

Abstract

194

1 Introduction

194

2 Related Works

196

2.1 Sinkhole Attack

196

2.2 Selective Forward Attack

196

2.3 Black Hole Attack

196

2.4 Sybil Attack

196

2.5 Neighbor Attack

197

2.6 Local Repair Message

197

3 Problem Formulation

197

4 Implementation and Result

198

5 Conclusion and Future Works

203

References

203

19 Human Opinion Inspired Feature Selection Strategy for Predicting the Pleasantness of a Molecule

204

Abstract

204

1 Introduction

204

2 Methodology

205

2.1 Data Set

205

2.2 Continuous Opinion Dynamics Optimizer (CODO)

206

2.3 Implementation of Wrapper Approach Combining CODO and SVM

207

3 Results

208

4 Conclusion

211

References

211

An Ensemble Learning Based Bangla Phoneme Identification System Using LSF-G Features

213

1 Introduction

214

2 Related Works

214

3 Dataset Development

215

4 Feature Extraction

216

4.1 Framing and Windowing

216

4.2 Line Spectral Frequency Extraction

217

4.3 LSF-G Computation

217

5 Ensemble Learning Based Classification

218

6 Result and Discussion

218

7 Conclusion

220

References

220

21 An Efficient Approach for Detecting Wormhole Attacks in AODV Routing Protocol

222

Abstract

222

1 Introduction

222

2 Related Works

223

3 System Model

224

3.1 Network Model

224

3.2 Adversial Model

225

3.3 Power Consumption Model

225

4 Problem Description

226

5 Proposed Approach

226

6 Experimental Results

228

6.1 Simulation Setup

228

6.2 Simulation Studies

229

7 Conclusions

231

References

232

Efficient Contrast Enhancement Based on Local–Global Image Statistics and Multiscale Morphological Filtering

233

1 Introduction

233

2 Background

234

3 Proposed Method

235

4 Experimental Results and Analysis

237

5 Concluding Remarks

242

References

242

23 Bag-of-Tasks Intelligent Scheduling Agent (BISA) in Cloud Computing

243

Abstract

243

1 Introduction

243

2 BIS Agent Framework

244

3 Experimental Setup

247

4 Results and Discussion

248

5 Conclusion and Future Work

250

References

250

24 Modeling a Bioinspired Neuron: An Extension to the H-H Model

251

Abstract

251

1 Introduction

251

1.1 The Hodgkin–Huxley Model of Nerve Axon

252

1.2 The Ion Channels

253

1.3 Modeling the Synapse

254

2 H-H Model for a Synaptic Input—The Proposed Model

255

2.1 Simulation

255

3 Results

256

4 Conclusion

258

Acknowledgements

258

References

258

25 A Nonnegative Matrix Factorization Based Approach to Extract Aspects from Product Reviews

259

Abstract

259

1 Introduction

259

2 Statement of the Problem

261

3 The Proposed Methodology

263

3.1 Data Collection

264

3.2 Data Preprocessing

264

3.3 Nonnegative Matrix Factorization

264

3.4 Aspect Extraction

265

3.5 Sentiment Classification

265

4 Experimental Results

267

5 Conclusion and Scope for the Further Work

269

References

270

26 Extraction of Geometric and Prosodic Features from Human-Gait-Speech Data for Behavioural Pattern Detection: Part II

271

Abstract

271

1 Introduction

272

2 Behavioural Pattern Detection

273

2.1 Clustering of Prosodic Features from Human-Speech Data

273

2.2 Clustering of Geometrical Features from Human-Gait Data

275

2.3 Gradient or Slope of Human-Gait-Speech Data

276

3 Simulated Outcomes and Discussions

278

4 Concluding Remarks and Further Scope of the Work

281

References

282

27 Mutation in Path for the Packets in the Network During Journey from Source to Destination

283

Abstract

283

1 Introduction

283

2 Genetic Algorithm

284

3 Dijkstra’s Algorithm

284

4 Proposed Algorithm

285

5 Mutation

288

6 Results of Mutation

289

7 Complexity and Comparative Study

290

8 Conclusions

291

References

291

Facial Expression Recognition Using 2DPCA on Segmented Images

293

1 Introduction

293

2 The Proposed Method

294

2.1 Image Preprocessing

295

2.2 Feature Extraction

295

2.3 Classification

297

3 Experiment and Evaluation

298

3.1 Description of the Dataset

298

3.2 Experimental Details

298

3.3 Result Analysis

299

4 Conclusions

300

References

300

29 Stable and Consistent Object Tracking: An Active Vision Approach

302

Abstract

302

1 Introduction

302

2 Related Works

304

3 System Architecture and Methodology

305

3.1 Image Acquisition and Object Tracking

305

3.2 Motion Detection and Velocity Estimation

306

3.3 Saccade Control

307

3.4 Smooth Pursuit Control

307

4 Experiments and Result

308

4.1 Smooth Pursuit Mechanism

308

4.1.1 Velocity and Direction Estimation

308

5 Conclusion and Future Work

310

References

310

30 Vision-Based Forward Kinematics Using ANN for Weld Line Detection with a 5-DOF Robot Manipulator

312

Abstract

312

1 Introduction

312

2 Modeling of 5-DOF Robot Manipulator

313

3 Denavit–Hartenberg Parameters

314

4 Forward Kinematics

315

5 Image Processing for Weld Line Detection

315

5.1 Conversion of Image to Grayscale

316

5.2 Sobel Edge Detection

316

5.3 Hough Line Transform

317

6 ANN Modeling for Forward Kinematics

317

6.1 Overview

317

6.2 Dataset and Network Architecture

318

6.3 Methodology

318

7 Results and Discussion

318

7.1 Training the Network with Different Training Algorithms

318

7.2 Training the Network with Different Number of Epochs

320

7.3 Training the Network with Different Activation Functions

320

7.4 Training the Network with Different Number of Neurons in the Hidden Layer

320

8 Conclusion

320

Acknowledgements

321

References

321

Performance Measurement and Evaluation of Pluggable to Scheduler Dynamic Load Balancing Algorithm (P2S_DLB) in Distributed Computing Environment

322

1 Introduction

322

2 Related Work

323

3 System Model

324

4 Implementation Scenario and Input Dataset

325

5 Pluggable to Scheduler Dynamic Load Balancing Algorithm (P2S_DLB)

326

6 Experimental Results and Analysis

326

7 Conclusion

329

References

331

32 Performance Enhancement of Hadoop for Big Data Using Multilevel Queue Migration (MQM) Technique

333

Abstract

333

1 Introduction

334

2 Related Work

335

3 Proposed Solution

336

4 Experimental Setup

338

5 Results and Discussion

338

6 Conclusion

341

References

343

33 Semi-automatic Ontology Builder Based on Relation Extraction from Textual Data

345

Abstract

345

1 Introduction

345

2 Related Work

346

3 Proposed Approach

346

3.1 Analyzer Subsystem

347

3.2 Mapper Subsystem

348

3.3 Triple Validator and Storage

349

4 Experimental Results

349

4.1 Technology Classification Ontology

349

4.2 Rule File Generation

349

4.3 Performance

350

5 Conclusion

352

References

352

34 An Ideal Approach for Medical Color Image Enhancement

353

Abstract

353

1 Introduction

353

2 Related Work and Motivation Toward the Proposed Work

354

3 Steps Involved in the Proposed Algorithm

355

4 Materials and Methods

355

4.1 CIELAB Color Space

355

4.2 Type-2 Fuzzy Set Based Enhancement Technique, Type-2_Fuzzy_Enhnc()

357

4.3 Unsharp Masking, Unsharp_Mask()

358

5 Experiment and Result Discussion

359

5.1 Subjective Evaluations

360

5.2 Objective Evaluation

361

6 Conclusions

362

References

362

35 Score Formulation and Parametric Synthesis of Musical Track as a Platform for Big Data in Hit Prediction

364

Abstract

364

1 Introduction

365

2 Attribute Extraction

365

2.1 Statistical Attributes

366

2.1.1 Slope

366

2.1.2 Period Frequency

366

2.1.3 Entropy

366

2.1.4 RMS Energy

366

2.2 Musical Topographies

367

2.2.1 Danceability

367

2.2.2 Energy

367

2.2.3 Key

368

2.2.4 Liveliness

368

2.2.5 Loudness

368

2.2.6 Speechiness

368

2.2.7 Tempo

368

2.2.8 Valence

369

3 Observation and Score Formulation

369

3.1 USA

369

3.2 India

371

3.3 United Kingdom

372

4 Verdict and Conclusion

374

References

374

Dynamics of Dust-Ion-Acoustic Anti-kink Waves in a Dissipative Nonextensive e-p-i Dusty Plasma

376

1 Introduction

376

2 Model Equations

377

3 Burgers Equation

378

4 One-Dimensional Dynamical System

379

5 Potential Energy

380

6 Anti-kink Wave Solution

381

7 Conclusions

383

References

383

37 Multiple Information Hiding in General Access Structure Visual Cryptography Using Q’tron Neural Network

385

Abstract

385

1 Introduction

385

1.1 Random Grids

386

1.2 General Access Structures

387

1.2.1 Construction of VCS Using Cumulative Arrays

387

1.3 Q’tron Neural Network

388

2 Proposed Methodology

389

3 Design Strategy

390

4 Experimental Results and Analysis

391

4.1 Experimental Results

391

4.2 Analysis—PSNR Calculation and Contrast

391

5 Conclusion

393

References

393

38 Overlapping Community Detection Through Threshold Analysis on Disjoint Network Structures

395

Abstract

395

1 Introduction

395

1.1 Recent Works

396

1.2 Clustering Metrics

397

1.3 Motivation

397

2 Problem Formulation

398

3 Proposed Method

398

3.1 Proposed Algorithm

399

4 Experimental Results

399

4.1 Experiment Setup

399

4.2 Simulator Network

400

4.3 Performance on Benchmark Data

402

5 Conclusion

402

References

402

Chaotic to Periodic Phenomena of Dust-Ion-Acoustic Waves in a Collisional Dusty Plasma

404

1 Introduction

404

2 Model Equations

405

3 Derivation of the DKdV and DmKdV Equations

406

4 Chaotic and Periodic Structure at Critical Values

408

5 Conclusions

410

References

410

40 ICT in Social Development—Context-Sensitive Design Strategies to Develop Mobile Applications for Barefoot Animal Breeders

413

Abstract

413

1 Introduction

414

2 Background

415

3 Design Approach

416

3.1 Custom Dropdown with Search Option

417

3.2 Custom Autocomplete EditBox

417

4 Results

419

5 Conclusion

420

References

420

41 Multiple Solution Sorting Method Using Translocation

422

Abstract

422

1 Introduction

422

2 Definitions and Notifications

423

2.1 Genome

423

2.2 Cycle Graph

424

3 Proposed Algorithm

426

4 Result and Discussion

427

4.1 Discussion

427

4.2 Result

429

5 Conclusion

429

Chaos Control in a Two Prey and One Predator System with Predator Switching

431

1 Introduction

431

2 Model

432

3 Stability Analysis

433

4 Numerical Simulations

434

5 Conclusion

436

References

437

43 An Improved Multi-secret Sharing Visual Cryptography Technique for Color Images Using Sterilization Algorithm

438

Abstract

438

1 Introduction

438

2 Literature Review

439

3 Proposed Work

440

4 Result Analysis and Discussion

445

5 Conclusions

446

References

447

A Morphological Color Image Contrast Enhancement Technique Using Hilbert 3D Space Filling Curve

448

1 Introduction

448

2 Background

449

2.1 Ordering in Color Images

449

2.2 Hilbert Space Curve

450

3 Proposed Method

451

3.1 Mapping of RGB Values to Scalar Value

451

3.2 Multi-scale Morphological Contrast Enhancement

452

4 Experimental Results and Comparisons

454

5 Conclusion

457

References

458

Agent-Based Modelling and Simulation of Religious Crowd Gatherings in India

459

1 Introduction

459

2 Related Work

460

3 Our Approach

461

3.1 Field Survey: Alopi Devi Temple

461

3.2 Our Agent-Based Model

462

4 Simulation: Experiments and Results

463

4.1 Experiments

464

4.2 Results

464

5 Conclusion

465

References

466

46 An Experimental Study of Scalability in Cross-Domain Recommendation Systems

467

Abstract

467

1 Introduction

468

2 Our Contribution

468

2.1 Scalability of the System

468

2.2 Numeric and Non-numeric Data Clustering

468

3 Experiments

469

3.1 Datasets Used

469

3.2 Methodology

469

3.3 Experiment 1: Genre and Rating Based Partitioning

469

3.4 Experiment 2: Numeric Data Clustering

470

3.5 Experiment 3: Non-numeric Data Representation and Nearest Neighbor Approach

471

3.6 Experiment 4: Non-numeric Data Clustering and Subsequent Querying

473

References

475

Document Categorization Using Graph Structuring

476

1 Introduction

476

2 The Methodology

477

2.1 Learning

478

3 Classification

479

4 Experimental Results

482

5 Conclusions

483

References

483

48 An Empirical Analysis for Predicting Source Code File Reusability Using Meta-Classification Algorithms

485

Abstract

485

1 Introduction

485

2 Related Work

487

3 Research Background

488

3.1 Empirical Data Collection

488

3.2 Dependent and Independent Variables

489

4 Research Methodology

489

4.1 Meta-Classification Techniques Employed

489

4.2 Performance Evaluation Measures

490

5 Empirical Analysis

491

5.1 Model Evaluation Results

491

6 Threats to Validity

494

7 Conclusion and Future Work

494

References

495

Non-head-on Non-overtaking Collision of Two Solitary Waves in a Multicomponent Plasma

497

1 Introduction

497

2 Basic Equations

498

3 Numerical Results and Discussion

502

4 Conclusion

504

References

504

Signed Product and Total Signed Product Cordial Labeling of Cartesian Product Between Balanced Bipartite Graph and Path

506

1 Introduction

506

2 Preliminaries

507

3 Labeling of Cartesian Product Between Balanced Bipartite Graph and Path

508

3.1 Algorithm

508

3.2 Algorithm

509

3.3 Algorithm

510

3.4 Algorithm

511

4 Conclusion

512

References

513

51 A Survey on Detection and Mitigation of Interest Flooding Attack in Named Data Networking

514

Abstract

514

1 Introduction

514

2 Interest Flooding Attacks

515

3 Architecture

516

4 Objectives

518

5 Related Works

518

6 Analysis of Survey

520

7 Conclusion

521

52 An Integrated TOPSIS Approach to MADM with Interval-Valued Intuitionistic Fuzzy Settings

523

Abstract

523

1 Introduction

523

2 Preliminaries

524

3 MADM Problems with Three-Parameter Characterization of IVIFNs

526

4 TOPSIS Approach to Solve MADM Problems in IVIF Settings with Three-Parameter Characterization of IFSs

527

4.1 IVIF TOPSIS Method

530

5 Illustrative Example

530

6 Concluding Remarks

532

Acknowledgements

533

References

533

Bounding Stability in Formal Concept Analysis

534

1 Introduction

534

2 Terminology and Main Definitions

535

2.1 Formal Concept Analysis

535

2.2 Stability

536

3 Our Approach to Estimate Stability

536

4 Time Complexity and Performance Analysis

539

5 Conclusion

540

References

541

54 Feature Extraction Using Fuzzy Generalized Two-Dimensional Inverse LDA with Gaussian Probabilistic Distribution and Face Recognition

542

Abstract

542

1 Introduction

543

2 Fuzzy G-2DLDA Method

544

3 Gaussian Probabilistic Fuzzy G-2DILDA Method

545

3.1 Creation of Membership Matrix Using Gaussian Probability Density Function

546

3.2 Creation of Membership Matrix Using Fk-NN

546

3.3 GPFG-2DILDA Algorithm

546

4 Empirical Results

548

5 Conclusion

549

Acknowledgements

550

References

550

55 Secure and Efficient Data Sharing with User Revocation in Cloud

551

Abstract

551

1 Introduction

552

2 Related Work

552

3 System Model and Design Goals

553

3.1 System Model

553

3.2 Design Goals

554

4 The Proposed Scheme

555

4.1 Scheme Description

555

4.1.1 Existing User Registration and Key Generation

555

4.1.2 Data Owner Uploads the Data File

556

4.1.3 User Revocation

556

4.1.4 New User Registration

557

4.1.5 Data File Download

557

5 Security Analysis

558

5.1 Key Distribution

558

5.2 Data Confidentiality

558

5.3 Fine Grain Access Control

559

5.4 Comparative Analysis

560

6 Conclusion

560

References

561

An Adaptive Cluster-Based Ensemble Learner for Computational Biology

562

1 Introduction

562

2 Literature Review

563

3 Proposed Approach

564

4 Experimental Setup

567

5 Results and Discussion

568

6 Conclusions and Future Work

570

References

570

57 Text Document Analysis Using Map-Reduce Framework

572

Abstract

572

1 Introduction

572

2 Background Study

573

3 Problem Statement and Proposed Solution

574

3.1 Map-Reduce Framework

575

3.2 Text Preprocessing

575

3.3 Proposed Methodology

576

3.3.1 Cosine Similarity PLSA-Based Text Analysis

576

4 Experiments and Results Analysis

578

4.1 Comparison Between PLSA and Cosine PLSA

578

5 Conclusion

579

References

580

58 WAPiS: WhatsApp Pattern Identification Algorithm Indicating Social Connection

582

Abstract

582

1 Introduction

582

2 Related Work

584

3 Motivation

584

4 Methodology Adopted

585

5 Algorithm Formulated

585

5.1 Working Steps of WAPiS: WhatsApp Pattern Indicating Social Connection

585

5.2 Mathematical Modeling of WAPiS Algorithm

587

6 Simulation Environment

588

6.1 Visual Studio

588

6.2 MongoDB

588

7 Simulation Performed

588

8 Conclusion and Future Work

590

Acknowledgements and Submission

590

References

590

59 A New DNA Cryptography Based Algorithm Involving the Fusion of Symmetric-Key Techniques

591

Abstract

591

1 Introduction

592

2 DNA Cryptography

592

2.1 DNA Digital Coding

593

2.2 Hao’s Permutation and Fractal Sequence

594

2.3 Polymerase Chain Reaction (PCR)

594

3 Literature Survey

594

4 Proposed Methodology

596

4.1 Proposed Algorithm

596

4.2 Encryption Scheme for Complemented DNA Nucleotide (K)

597

5 Discussion

599

5.1 Illustration of the Proposed Methodology

599

5.2 Security Analysis of the Proposed Methodology

600

6 Conclusion

601

References

601

60 Enhanced Surveillance Using Integration of Gait Analysis with Iris Detection

602

Abstract

602

1 Introduction

603

2 Related Work

603

3 Proposed Work

604

3.1 Overview

604

3.2 Gait Recognition

604

3.3 V2DPCA Feature

605

3.4 Manhattan Distance Classifier

605

3.5 Basic Steps in Iris Recognition

606

3.5.1 Iris Image Acquisition

606

3.5.2 Iris Segmentation

607

3.5.3 Iris Normalization

607

3.5.4 Feature Extraction and Code Generation

607

3.5.5 Fusion

607

4 Result and Discussion

608

5 Gait and Iris Dataset

609

6 Conclusion

610

References

610

61 Effect of Tapering on Swimming Efficiency of Flagellated Microswimmer at Low Reynolds Number

611

Abstract

611

1 Introduction

611

2 Theory of Microswimming

613

2.1 Microswimmer

613

2.2 Dynamical Equations

614

2.3 Free Swimming

616

3 Results and Conclusion

619

Acknowledgment

620

References

620

62 Field Monitoring Using IoT: A Neural Network Approach

622

Abstract

622

1 Introduction

623

2 Problem Statement

623

2.1 Objective

623

3 Proposed Solution

624

3.1 Conceptual Design

625

3.2 Hardware Description

625

4 Implementation and Result Analysis

627

5 Conclusion

632

References

633

63 Nature-Inspired Optimization Techniques in VANETs and FANETs: A Survey

634

Abstract

634

1 Introduction

634

1.1 Motivation for Research

635

1.2 Difference Between VANET and FANET

635

2 VANET

636

2.1 Routing Protocols in VANETs

636

2.2 Ant Colony Optimization

639

2.3 Bee Colony Optimization

639

2.4 Particle Swarm Optimization

640

3 FANET

641

3.1 Routing Protocols in FANET

641

3.2 Ant Colony Optimization

643

3.3 Bee Colony Optimization

644

4 Conclusion

644

References

644

Implementation of Cloud-Assisted Secure Data Transmission in WBAN for Healthcare Monitoring

647

1 Introduction

648

2 Related Work

650

3 Problem Address

650

4 Proposed Algorithm and Implementation of Solution

651

5 Experimental Setup Using Cloud Server

652

6 Result and Analysis

653

7 Conclusion

656

References

656

A Study of Android Application Execution Trends and Their Privacy Threats to a User with Respect to Data Leaks and Compromise

657

1 Introduction

657

2 Related Work

658

3 System Design

659

3.1 Data Collection

661

4 Result and Analysis

661

4.1 Android Permissions

661

4.2 Execution Style Analysis of Android Applications on Device

662

4.3 Pattern Analysis

662

5 Conclusion

663

References

664

66 Three-Dimensional Design of a New Maglev Vehicle and a Study of It Using Computer Vision

665

Abstract

665

1 Introduction

666

2 Review Work

667

3 The Design of the Proposed Vehicle

668

3.1 Gaussian Mixture Model and Computer Vision Study on the Proposed System

668

4 Proposed Method

671

5 Results and Analysis

671

6 Conclusion

673

Acknowledgements

675

References

675

Combining GMM-Based Hidden Markov Random Field and Bag-of-Words Trained Classifier for Lung Cancer Detection Using Pap-Stained Microscopic Images

676

1 Introduction and Literature Survey

677

2 Materials and Methods

678

2.1 Abstract View of the Adopted Algorithm

678

2.2 Sample Image Database Development

678

2.3 Edge-Preserving Bilateral Filtering

679

2.4 Nucleus Segmentation

680

2.5 Nucleus Classification

681

3 Results

683

4 Conclusion

684

References

685

Assessment of Segmentation Techniques for Chronic Wound Surface Area Detection

687

1 Introduction

688

2 Materials and Methods

689

2.1 Wound Image Collection

689

2.2 Multi-expert Wound Region Labelling

689

2.3 Clustering Approach for Wound Region Segmentation

689

2.4 Classification Approach for Wound Region Segmentation

691

3 Results and Discussion

693

4 Conclusion

695

References

695

69 Improved Decision-Making for Navigation Scenarios

697

Abstract

697

1 Introduction

698

2 Database Acquisition

698

3 Proposed Algorithm for Improved Decision Making in Navigation

699

3.1 Image Processing Tasks

699

3.2 Feature Extraction and Creation of Feature Vector

699

3.3 Computation of the Best Feature Set

700

4 Validation of Proposed Model

703

5 Discussions and Conclusions

704

References

706

Pixel-Based Supervised Tissue Classification of Chronic Wound Images with Deep Autoencoder

707

1 Introduction

707

2 Materials and Methods

708

2.1 Sample Wound Image Database

708

2.2 Multi-expert Tissue Region Labelling

709

2.3 Pixel-Based Tissue Classification

710

3 Results and Discussion

714

4 Conclusion

714

References

715

71 A CBIR Technique Based on the Combination of Shape and Color Features

716

Abstract

716

1 Introduction

717

2 Proposed CBIR Technique

718

3 Experimental Results

721

4 Conclusion

722

References

722

Trajectory Forecasting of Entities Using Advanced Deep Learning Techniques

724

1 Introduction

725

2 Related Work

725

3 Methodology

726

3.1 Baseline

726

3.2 Multitarget Trajectory Prediction

727

4 Experiments and Results

729

4.1 Experimental Setup

730

4.2 Results and Analysis

730

5 Conclusion

732

References

732

An Automatic Face Attractiveness Improvement Using the Golden Ratio

734

1 Introduction

734

2 Proposed Method

735

2.1 Facial Beauty Prediction

736

2.2 Golden Ratio-Based Facial Beautification

737

3 Experimental Results

738

4 Conclusion

741

References

742

74 A Trust-Based Intrusion Detection System for Mitigating Blackhole Attacks in MANET

743

Abstract

743

1 Introduction

744

2 Trust and Intrusion Detection System (IDS) in MANETs

744

3 Blackhole Attack

745

4 Related Work

745

5 Proposed Strategy

746

6 Results

749

7 Conclusion

752

References

753

75 Good-Quality Question Generation for Academic Support

754

Abstract

754

1 Introduction

755

2 Proposed Methodology

756

2.1 System Architecture

757

3 Result and Discussion

764

4 Challenges in Question Enhancement

765

4.1 Partial Selection of Answer Phrase

765

4.2 Enclosure of Answer Phrase in a Question

765

4.3 Conjoined Nouns in Answer Phrase

766

5 Conclusion

766

References

766

76 Facial Representation Using Linear Barcode

768

Abstract

768

1 Introduction

769

2 Related Work

770

3 Proposed Method

772

3.1 Image Preprocessing

772

3.2 Feature Extraction

773

3.3 Feature Coding

774

3.4 Barcode Creator

775

4 Experimental Result and Discussions

776

5 Conclusions

777

References

778

77 Bit-Reversal Encryption Towards Secured Storage of Digital Image in Cloud Deployment

779

Abstract

779

1 Introduction

779

1.1 Recent Works

780

1.2 Bit-Reversal Permutation

782

2 Proposed Method

782

2.1 Design Background

782

2.2 Proposed Algorithm

785

3 Experimental Results

785

3.1 Empirical Analysis

787

4 Conclusion

787

References

788

Author Index

789