ebook img

Advances in Communication and Computational Technology: Select Proceedings of ICACCT 2019 PDF

1498 Pages·2021·58.682 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Advances in Communication and Computational Technology: Select Proceedings of ICACCT 2019

Lecture Notes in Electrical Engineering 668 Gurdeep Singh Hura Ashutosh Kumar Singh Lau Siong Hoe   Editors Advances in Communication and Computational Technology Select Proceedings of ICACCT 2019 Lecture Notes in Electrical Engineering Volume 668 SeriesEditors LeopoldoAngrisani,DepartmentofElectricalandInformationTechnologiesEngineering,UniversityofNapoli FedericoII,Naples,Italy MarcoArteaga,DepartamentdeControlyRobótica,UniversidadNacionalAutónomadeMéxico,Coyoacán, Mexico BijayaKetanPanigrahi,ElectricalEngineering,IndianInstituteofTechnologyDelhi,NewDelhi,Delhi,India SamarjitChakraborty,FakultätfürElektrotechnikundInformationstechnik,TUMünchen,Munich,Germany JimingChen,ZhejiangUniversity,Hangzhou,Zhejiang,China ShanbenChen,MaterialsScienceandEngineering,ShanghaiJiaoTongUniversity,Shanghai,China TanKayChen,DepartmentofElectricalandComputerEngineering,NationalUniversityofSingapore, Singapore,Singapore RüdigerDillmann,HumanoidsandIntelligentSystemsLaboratory,KarlsruheInstituteforTechnology, Karlsruhe,Germany HaibinDuan,BeijingUniversityofAeronauticsandAstronautics,Beijing,China GianluigiFerrari,UniversitàdiParma,Parma,Italy ManuelFerre,CentreforAutomationandRoboticsCAR(UPM-CSIC),UniversidadPolitécnicadeMadrid, Madrid,Spain SandraHirche,DepartmentofElectricalEngineeringandInformationScience,TechnischeUniversität München,Munich,Germany FaryarJabbari,DepartmentofMechanicalandAerospaceEngineering,UniversityofCalifornia,Irvine,CA, USA LiminJia,StateKeyLaboratoryofRailTrafficControlandSafety,BeijingJiaotongUniversity,Beijing,China JanuszKacprzyk,SystemsResearchInstitute,PolishAcademyofSciences,Warsaw,Poland AlaaKhamis,GermanUniversityinEgyptElTagamoaElKhames,NewCairoCity,Egypt TorstenKroeger,StanfordUniversity,Stanford,CA,USA QilianLiang,DepartmentofElectricalEngineering,UniversityofTexasatArlington,Arlington,TX,USA FerranMartín,Departamentd’EnginyeriaElectrònica,UniversitatAutònomadeBarcelona,Bellaterra, Barcelona,Spain TanCherMing,CollegeofEngineering,NanyangTechnologicalUniversity,Singapore,Singapore WolfgangMinker,InstituteofInformationTechnology,UniversityofUlm,Ulm,Germany PradeepMisra,DepartmentofElectricalEngineering,WrightStateUniversity,Dayton,OH,USA SebastianMöller,QualityandUsabilityLaboratory,TUBerlin,Berlin,Germany SubhasMukhopadhyay,SchoolofEngineering&AdvancedTechnology,MasseyUniversity, PalmerstonNorth,Manawatu-Wanganui,NewZealand Cun-ZhengNing,ElectricalEngineering,ArizonaStateUniversity,Tempe,AZ,USA ToyoakiNishida,GraduateSchoolofInformatics,KyotoUniversity,Kyoto,Japan FedericaPascucci,DipartimentodiIngegneria,UniversitàdegliStudi“RomaTre”,Rome,Italy YongQin,StateKeyLaboratoryofRailTrafficControlandSafety,BeijingJiaotongUniversity,Beijing,China GanWoonSeng,SchoolofElectrical&ElectronicEngineering,NanyangTechnologicalUniversity, Singapore,Singapore JoachimSpeidel,InstituteofTelecommunications,UniversitätStuttgart,Stuttgart,Germany GermanoVeiga,CampusdaFEUP,INESCPorto,Porto,Portugal HaitaoWu,AcademyofOpto-electronics,ChineseAcademyofSciences,Beijing,China JunjieJamesZhang,Charlotte,NC,USA The book series Lecture Notes in Electrical Engineering (LNEE) publishes the latest developments in Electrical Engineering—quickly, informally and in high quality. While original research reported in proceedings and monographs has traditionallyformedthecoreofLNEE,wealsoencourageauthorstosubmitbooks devoted to supporting student education and professional training in the various fieldsandapplicationsareasofelectricalengineering.Theseriescoverclassicaland emerging topics concerning: (cid:129) Communication Engineering, Information Theory and Networks (cid:129) Electronics Engineering and Microelectronics (cid:129) Signal, Image and Speech Processing (cid:129) Wireless and Mobile Communication (cid:129) Circuits and Systems (cid:129) Energy Systems, Power Electronics and Electrical Machines (cid:129) Electro-optical Engineering (cid:129) Instrumentation Engineering (cid:129) Avionics Engineering (cid:129) Control Systems (cid:129) Internet-of-Things and Cybersecurity (cid:129) Biomedical Devices, MEMS and NEMS For general information about this book series, comments or suggestions, please contact [email protected]. To submit a proposal or request further information, please contact the Publishing Editor in your country: China Jasmine Dou, Associate Editor ([email protected]) India, Japan, Rest of Asia Swati Meherishi, Executive Editor ([email protected]) Southeast Asia, Australia, New Zealand Ramesh Nath Premnath, Editor ([email protected]) USA, Canada: Michael Luby, Senior Editor ([email protected]) All other Countries: Leontina Di Cecco, Senior Editor ([email protected]) ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, SCOPUS, MetaPress, Web of Science and Springerlink ** More information about this series at http://www.springer.com/series/7818 Gurdeep Singh Hura Ashutosh Kumar Singh (cid:129) (cid:129) Lau Siong Hoe Editors Advances in Communication and Computational Technology Select Proceedings of ICACCT 2019 123 Editors Gurdeep SinghHura AshutoshKumar Singh Department ofMathematics Department ofMaster of Computer andComputer Science Applications University of Maryland Eastern Shore National Institute ofTechnology Princess Anne,MD, USA Kurukshetra Kurukshetra, Haryana, India LauSiong Hoe Department ofInformation Science andTechnology Multimedia University Jalan Ayer KerohLama, Melaka, Malaysia ISSN 1876-1100 ISSN 1876-1119 (electronic) Lecture Notesin Electrical Engineering ISBN978-981-15-5340-0 ISBN978-981-15-5341-7 (eBook) https://doi.org/10.1007/978-981-15-5341-7 ©SpringerNatureSingaporePteLtd.2020 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodologynowknownorhereafterdeveloped. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authorsortheeditorsgiveawarranty,expressorimplied,withrespecttothematerialcontainedhereinor for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictionalclaimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSingaporePteLtd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore Contents A Drug Recommendation System for Multi-disease in Health Care Using Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 N. Komal Kumar and D. Vigneswari Smart Mobility: Understanding Handheld Device Adoption . . . . . . . . 13 Latika Kharb, Deepak Chahal, and Vagisha An Efficient Numerical Technique for Solving the Time-Fractional Cahn–Allen Equation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Amit Prakash and Hardish Kaur Image Colorization with Deep Convolutional Neural Networks . . . . . . 45 Sudesh Pahal and Preeti Sehrawat Electroencephalogram Based Biometric System: A Review . . . . . . . . . 57 Kaliraman Bhawna, Priyanka, and Manoj Duhan Improved Neural Network-Based Plant Diseases Identification . . . . . . 79 Ginni Garg and Mantosh Biswas Maximum Power Extraction Using Random Binary Searching Algorithm Under Non-uniform Insolation . . . . . . . . . . . . . . . . . . . . . . 91 Kusum Lata Agarwal and Avdhesh Sharma Prevention Against Internal Attack via Trust-Based Detection for Wireless Mesh Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Amit Kumar Roy and Ajoy Kumar Khan Sensor-Based Alarm System for Preventing Crop Vandalization by Birds in Agricultural Regions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Siddhanta Borah, Ankush Kumar Gaur, and J. Arul Valan Pricing Mechanisms for Fair Bills and Profitable Revenue Share in Cloud Federation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Sameera Dhuria, Anu Gupta, and R. K. Singla v vi Contents Higher Order Squeezing in Pump Mode in Multi-wave Mixing Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Priyanka and Savita Gill Active Power Loss Diminution by Chaotic-Based Adaptive Butterfly Mating Optimization Algorithm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Kanagasabai Lenin Mobile-Based Signature Database (MOBSIGN DB): A New Signature Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Sudhir Rohilla, Anuj Sharma, and R. K. Singla Mining of Association Rules in R Using Apriori Algorithm. . . . . . . . . 181 Anjali Mehta and Deepa Bura Comprehensive and Comparative Analysis of Different Files Using CP-ABE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Sahil Jalwa, Vardaan Sharma, Abdur Rehman Siddiqi, Ishu Gupta, and Ashutosh Kumar Singh Efficient Data Cube Materialization . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Raghu Prashant, Mann Suman, and Raghu Eashwaran Ontology-Based Full-Text Searching Using Named Entity Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Krishna Kumar, Md. Tanwir Uddin Haider, and Shamsh Sameed Ahsan Recognition of Online Handwritten Gurmukhi Characters Through Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Sukhdeep Singh and Anuj Sharma Optimizing Stream Data Classification Using Improved Hoeffding Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Arvind Pillania, Pardeep Singh, and Vrinda Gupta Outline of Lattice Structures: Morphology, Manufacturing, and Material Aspect. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Sakshi Kokil Shah, Mohanish Shah, Anirban Sur, and Sanjay Darvekar Image-Based Recommendation Engine Using VGG Model . . . . . . . . . 257 Smrithi Vasudevan, Nishtha Chauhan, Vergin Sarobin, and S. Geetha Stable Optimized Link Heuristic Using Cross-Layering for QoS of Secured HANETs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 Anita Sethi, Sandip Vijay, and Vishal Gupta Use of EEG as a Unique Human Biometric Trait for Authentication of an Individual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 Bhawna Kaliraman, Priyanka Singh, and Manoj Duhan Contents vii Performance of Feature Extracted on Leaf Images by Discriminant Analysis on Various Classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 Anjali Pathak, Bhawna Vohra, and Kapil Gupta Graph Isomorphism Using Locality Sensitive Hashing. . . . . . . . . . . . . 305 R. Vinit Kaushik and Kadiresan Nalinadevi Comparative Analysis of Image Segmentation Techniques. . . . . . . . . . 317 Snehil Saxena, Sidharth Jain, Saurabh Tripathi, and Kapil Gupta Levels and Classification Techniques for Sentiment Analysis: A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 Devendra Sharma and Anoj Kumar Breast Cancer Recurrence Prediction in Biopsy Using Machine Learning Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 Akriti Sharma, Nishtha Hooda, and Nidhi Rani Gupta Realization of Grounded Inductance Circuit Using Bulk-Driven Current Conveyors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359 Anu Tonk and Neelofer Afzal Neural Network Ensemble-Based Prediction System for Chemotherapy Pathological Response: A Case Study. . . . . . . . . . . 375 Raghvi Bhardwaj and Nishtha Hooda Outage and ABER Analysis for L-MRC on OWDP Fading Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 Suparna Goswami, Laishram Mona Devi, and Aheibam Dinamani Singh Performance Evaluation of Incremental PCA and Its Variants in Face Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 Nitin Kumar and Suresh Madhavan 3-Axis Robot Arm Using Micro-Stepping with Closed-Loop Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409 G. A. Rathy, P. Sivasankar, Aravind Balaji, and K. Gunasekaran False-Positive-Free and Geometric Robust Digital Image Watermarking Method Based on IWT-DCT-SVD . . . . . . . . . . . . . . . . 423 Priyanka Singh, Ashok Kumar Pradhan, and Subhash Chandra Fair Fit—A Load Balance Aware VM Placement Algorithm in Cloud Data Centers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437 Bhavesh N. Gohil, Sachin Gamit, and Dhiren R. Patel Computationally Efficient and Secure Session Key Agreement Techniques for Vehicular Cloud Computing . . . . . . . . . . . . . . . . . . . . 453 Saurabh Rana, Dheerendra Mishra, and Saurabh Gupta viii Contents Recent Trends in Image Processing Using Granular Computing . . . . . 469 Shankar Shambhu and Deepika Koundal Enveloped Inverted Tree Recursive Hashing: An Efficient Transformation for Parallel Hashing . . . . . . . . . . . . . . . . . . . . . . . . . . 481 Neha Kishore and Priya Raina The Techniques of Vedic Mathematics for ECC Over Weierstrass Elliptic Curve Y2 = X3 + Ax + B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501 Ankur Kumar, Pratik Gupta, and Manoj Kumar EEHCR: Energy-Efficient Hierarchical Cluster-Based Routing Protocol for Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . 517 Sakshiwala and M. P. Singh Current-Controlled Chaotic Chua’s Circuit Using CCCII . . . . . . . . . . 535 Manoj Joshi and Ashish Ranjan Phishing URL Detection Using Machine Learning. . . . . . . . . . . . . . . . 547 Preeti, Rainu Nandal, and Kamaldeep Joshi Sybil-Free Hybrid Localization Scheme in Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561 Narendra Dodwaria and Naveen Chauhan Hybrid-RPL: AStepToward EnsuringScalableRoutinginInternet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583 K. V. Amal, J. Jaisooraj, Priya Chandran, and S. D. Madhu Kumar Linear Interpolation-Based Fuzzy Clustering Approach for Missing Data Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597 Sonia Goel and Meena Tushir Dynamic Web View Materialization. . . . . . . . . . . . . . . . . . . . . . . . . . . 605 Akshay Kumar and T. V. Vijay Kumar A Multi-Hop Bit-Map-Assisted Energy-Efficient MAC Protocol for Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617 Kumar Debasis, M. P. Singh, and Rajat Gupta PID Control of a Quadrotor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633 Ritika Thusoo, Sheilza Jain, and Sakshi Bangia Levy Flight-Based White Wolf Algorithm for Solving Optimal Reactive Power Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647 Kanagasabai Lenin Performance of MIMO System—A Review . . . . . . . . . . . . . . . . . . . . . 655 Sweta Sanwal, Aman Kumar, Md. Arib Faisal, and Mohammad Irfanul Hassan Contents ix Incremental Weighted Linear Discriminant Analysis for Face Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677 Nitin Kumar and Suresh Madhavan Capacity Using L-Branch Channel MRC System Over Weibull Fading Channels—A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689 Adarsh Joshi, Aditya Narayan, Mohammad Irfanul Hasan, and Shalini Singh Classification of Static Signature Based on Distance Measure Using Feature Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707 Subhash Chandra and Priyanka Computational Technique for Fractional Model of Electrical Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719 Amit Prakash and Vijay Verma Steganographic Method Based on Interpolation and Cyclic LSB Substitution of Digital Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731 Jyoti Pandey, Kamaldeep Joshi, Mangal Sain, Gurdiyal Singh, and Mohit Jangra Ensuring Food Safety Through Blockchain . . . . . . . . . . . . . . . . . . . . . 745 Ashish Singh, Vineet Kumar, Alok Kumar Ravi, and Kakali Chatterjee Design of Observer-Controller Digital Phase-Locked Loop Using Kalman Filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757 Rachana Arya, B. K. Singh, and Lalit Garia Supervised Machine Learning Algorithms for Fake News Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767 Ankit Kesarwani, Sudakar Singh Chauhan, Anil Ramachandra Nair, and Gaurav Verma Vehicle Tracking System Using GPS and GSM . . . . . . . . . . . . . . . . . . 779 Shreya Verma, Abhay Singh Jamwal, Surabhi Chauhan, and Sribidhya Mohanty Multi-factor Authentication Scheme Using Mobile App and Camera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 787 Sajal Jindal and Manoj Misra Speech Emotion Recognition: A Review. . . . . . . . . . . . . . . . . . . . . . . . 815 Anuja Thakur and Sanjeev Dhull CDMA-Based Security Against Wormhole Attack in Underwater Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829 Nitin Goyal, Jasminder Kaur Sandhu, and Luxmi Verma

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.