ebook img

Advances in Data Sciences, Security and Applications: Proceedings of ICDSSA 2019 PDF

466 Pages·2020·15.315 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Advances in Data Sciences, Security and Applications: Proceedings of ICDSSA 2019

Lecture Notes in Electrical Engineering 612 Vanita Jain Gopal Chaudhary M. Cengiz Taplamacioglu M. S. Agarwal   Editors Advances in Data Sciences, Security and Applications Proceedings of ICDSSA 2019 Lecture Notes in Electrical Engineering Volume 612 SeriesEditors LeopoldoAngrisani,DepartmentofElectricalandInformationTechnologiesEngineering,UniversityofNapoli FedericoII,Naples,Italy MarcoArteaga,DepartamentdeControlyRobótica,UniversidadNacionalAutónomadeMéxico,Coyoacán, Mexico BijayaKetanPanigrahi,ElectricalEngineering,IndianInstituteofTechnologyDelhi,NewDelhi,Delhi,India SamarjitChakraborty,FakultätfürElektrotechnikundInformationstechnik,TUMünchen,Munich,Germany JimingChen,ZhejiangUniversity,Hangzhou,Zhejiang,China ShanbenChen,MaterialsScienceandEngineering,ShanghaiJiaoTongUniversity,Shanghai,China TanKayChen,DepartmentofElectricalandComputerEngineering,NationalUniversityofSingapore, Singapore,Singapore RüdigerDillmann,HumanoidsandIntelligentSystemsLab,KarlsruheInstituteforTechnology,Karlsruhe, Baden-Württemberg,Germany HaibinDuan,BeijingUniversityofAeronauticsandAstronautics,Beijing,China GianluigiFerrari,UniversitàdiParma,Parma,Italy ManuelFerre,CentreforAutomationandRoboticsCAR(UPM-CSIC),UniversidadPolitécnicadeMadrid, Madrid,Spain SandraHirche,DepartmentofElectricalEngineeringandInformationScience,TechnischeUniversität München,Munich,Germany FaryarJabbari,DepartmentofMechanicalandAerospaceEngineering,UniversityofCalifornia,Irvine,CA, USA LiminJia,StateKeyLaboratoryofRailTrafficControlandSafety,BeijingJiaotongUniversity,Beijing,China JanuszKacprzyk,SystemsResearchInstitute,PolishAcademyofSciences,Warsaw,Poland AlaaKhamis,GermanUniversityinEgyptElTagamoaElKhames,NewCairoCity,Egypt TorstenKroeger,StanfordUniversity,Stanford,CA,USA QilianLiang,DepartmentofElectricalEngineering,UniversityofTexasatArlington,Arlington,TX,USA FerranMartin,Departamentd’EnginyeriaElectrònica,UniversitatAutònomadeBarcelona,Bellaterra, Barcelona,Spain TanCherMing,CollegeofEngineering,NanyangTechnologicalUniversity,Singapore,Singapore WolfgangMinker,InstituteofInformationTechnology,UniversityofUlm,Ulm,Germany PradeepMisra,DepartmentofElectricalEngineering,WrightStateUniversity,Dayton,OH,USA SebastianMöller,QualityandUsabilityLab,TUBerlin,Berlin,Germany SubhasMukhopadhyay,SchoolofEngineering&AdvancedTechnology,MasseyUniversity, PalmerstonNorth,Manawatu-Wanganui,NewZealand Cun-ZhengNing,ElectricalEngineering,ArizonaStateUniversity,Tempe,AZ,USA ToyoakiNishida,GraduateSchoolofInformatics,KyotoUniversity,Kyoto,Japan FedericaPascucci,DipartimentodiIngegneria,UniversitàdegliStudi“RomaTre”,Rome,Italy YongQin,StateKeyLaboratoryofRailTrafficControlandSafety,BeijingJiaotongUniversity,Beijing,China GanWoonSeng,SchoolofElectrical&ElectronicEngineering,NanyangTechnologicalUniversity, Singapore,Singapore JoachimSpeidel,InstituteofTelecommunications,UniversitätStuttgart,Stuttgart,Baden-Württemberg, Germany GermanoVeiga,CampusdaFEUP,INESCPorto,Porto,Portugal HaitaoWu,AcademyofOpto-electronics,ChineseAcademyofSciences,Beijing,China JunjieJamesZhang,Charlotte,NC,USA ThebookseriesLectureNotesinElectricalEngineering(LNEE)publishesthelatestdevelopmentsin Electrical Engineering - quickly, informally and in high quality. While original research reported in proceedingsandmonographshastraditionallyformedthecoreofLNEE,wealsoencourageauthorsto submitbooksdevotedtosupportingstudenteducationandprofessionaltraininginthevariousfieldsand applicationsareasofelectricalengineering.Theseriescoverclassicalandemergingtopicsconcerning: (cid:129) CommunicationEngineering,InformationTheoryandNetworks (cid:129) ElectronicsEngineeringandMicroelectronics (cid:129) Signal,ImageandSpeechProcessing (cid:129) WirelessandMobileCommunication (cid:129) CircuitsandSystems (cid:129) EnergySystems,PowerElectronicsandElectricalMachines (cid:129) Electro-opticalEngineering (cid:129) InstrumentationEngineering (cid:129) AvionicsEngineering (cid:129) ControlSystems (cid:129) Internet-of-ThingsandCybersecurity (cid:129) BiomedicalDevices,MEMSandNEMS For general information about this book series, comments or suggestions, please contact leontina. [email protected]. To submit a proposal or request further information, please contact the Publishing Editor in your country: China JasmineDou,AssociateEditor([email protected]) India AnindaBose,SeniorEditor([email protected]) Japan TakeyukiYonezawa,EditorialDirector([email protected]) SouthKorea Smith(Ahram)Chae,Editor([email protected]) SoutheastAsia RameshNathPremnath,Editor([email protected]) USA,Canada: MichaelLuby,SeniorEditor([email protected]) AllotherCountries: LeontinaDiCecco,SeniorEditor([email protected]) **Indexing:ThebooksofthisseriesaresubmittedtoISIProceedings,EI-Compendex,SCOPUS, MetaPress,WebofScienceandSpringerlink** Moreinformationaboutthisseriesathttp://www.springer.com/series/7818 Vanita Jain Gopal Chaudhary (cid:129) (cid:129) M. Cengiz Taplamacioglu (cid:129) M. S. Agarwal Editors Advances in Data Sciences, Security and Applications Proceedings of ICDSSA 2019 123 Editors VanitaJain GopalChaudhary Bharati Vidyapeeth’s College Bharati Vidyapeeth’s College of Engineering of Engineering NewDelhi, Delhi, India NewDelhi, Delhi, India M.Cengiz Taplamacioglu M.S. Agarwal Gazi University Indian Institute of Technology Mumbai Ankara,Turkey Mumbai,Maharashtra, India ISSN 1876-1100 ISSN 1876-1119 (electronic) Lecture Notesin Electrical Engineering ISBN978-981-15-0371-9 ISBN978-981-15-0372-6 (eBook) https://doi.org/10.1007/978-981-15-0372-6 ©SpringerNatureSingaporePteLtd.2020 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodologynowknownorhereafterdeveloped. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained hereinorforanyerrorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregard tojurisdictionalclaimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSingaporePteLtd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore Preface This book majorly covers a wide range of data mining, artificial intelligence, and computational intelligence-related chapters along with their algorithms and appli- cations of current issues of almost all branches of engineering and technology. These topics also include the applications of soft computing, security, cloud computing, big data analytics, and their current trends. ThechaptersinthisbookgathertheproceedingsoftheInternationalConference onDataSciences,SecurityandApplications(ICDSSA2019).Thisconferencewas organized by the Information Technology Department of Bharati Vidyapeeth’s CollegeofEngineering,NewDelhi,duringMarch7–8,2019.Theconferenceheld in Bharati Vidyapeeth’s College of Engineering, New Delhi campus. The ICDSSA 2019 provided an international forum for the presentation of original research findings, as well as exchange and dissemination of innovative, practicaldevelopmentexperiencesindifferentfieldsofengineering.Therehasbeen an overwhelming response, and we have received 210 submissions from different parts of the country and abroad. Each submission was reviewed by at least two anonymousreviewers,andatotalof38paperswereacceptedforpublicationinthis proceedings after the review process on the basis of reviewer comments and technical program committee. Theinauguralfunctionoftheconferencetookplaceinthepresenceofrenowned academicians: Prof. Yogesh Singh, Vice-Chancellor, DTU; Prof. A. P. Mittal, Member Secretary, AICTE; Prof. V. R. Sule, IIT Bombay, Mumbai; Ms. Nidhi Bansal, Scientist G, DRDO; and Dr. Bharat Rawal, Penn State University, Pennsylvania, USA. Many distinguished personalities such as Prof. Navin Rajpal, University School of Information, Communication and Technology, GGSIPU, New Delhi; Prof. Smriti Srivastava, Netaji Subhas University of Technology, New Delhi; Prof. Amit Prakash, University School of Information, Communication and Technology, GGSIPU; Prof. Afshar Alam, Jamia Hamdard, Deemed to be University;Dr.A.K.Mohapatra,IGDTUW,NewDelhi;Dr.RajeevSharma,DST, and many more graced the occasion as distinguished speakers, session chairs, panelist for panel discussions, etc. during the conference days. v vi Preface Mr. Aninda Bose, Senior Editor, Hard Sciences, Springer, delivered a keynote sessiononToolsofScientificPublishing.Wealsoorganizedthreeplenarysessions: first by Dr. Bharat Rawal, Penn State University, Pennsylvania, USA, on the Application of Split Computing Paradigm and other two sessions by Dr. Chuck Easttom, Computer Expert based at Texas, USA, on “Cryptographic Backdoors” and “S-Box Design.” Our sincere thanks to Dr. Vishwajeet Kadam, Secretary, Bharati Vidyapeeth Deemed University, Pune; Prof. Shivajirao Kadam, Pro-Chancellor, Bharati Vidyapeeth Deemed University, Pune; Prof. Manikrao Salunkhe, Vice-Chancellor, Bharati Vidyapeeth Deemed University, Pune; Shri C. B. Sawant; and Prof. Dharmender Saini, Principal, Bharati Vidyapeeth’s College of Engineering, New Delhi, for their excellent support and encouragement to organize this con- ference of such magnitude. We appreciate the work of all the reviewers, session chairs, and members of different committees for their support and expertise. Lastly, we also thank all the authors and participants for their contributions. Theirtechnicalcontributionsmadeourproceedingsrichandpraiseworthy.Wehope that readers will find the chapters useful and interesting. Our sincere thanks to all sponsors, press, print, and electronic media for their excellent coverage of the conference. New Delhi, India Vanita Jain New Delhi, India Gopal Chaudhary Ankara, Turkey M. Cengiz Taplamacioglu Mumbai, India M. S. Agarwal Contents Classification and Analysis of Real-World Earthquake Data Using Various Machine Learning Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . 1 Manka Vasti and Amita Dev Crime Data Set Analysis Using Formal Concept Analysis (FCA): A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Prerna Kapoor, Prem Kumar Singh and Aswani Kumar Cherukuri Analyzing the Patterns of Delhi’s Air Pollution . . . . . . . . . . . . . . . . . . . 33 Shally Sharma and Sandeep Mathur Predictive Analysis of NARX, NLIO, and RNN Networks for Short-Term Wind Power Forecasting. . . . . . . . . . . . . . . . . . . . . . . . 45 Tushar Srivastava and M. M. Tripathi Training Data on Recursive Parallel Processors for Deep Learning. . . . 63 Shipra Raheja and Rajiv Chopra Advanced Anti-theft and Accident Alert System for Two-Wheelers Using Location-Based Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Aditya Arora, Ekagrata Sharma, Manasi Dogra, Neha Paggowal and Jolly Parikh A Data Analytics Framework for Decision-Making in Agriculture. . . . . 85 Sudha Shankar, Madhuri Rao, Prajwala Shetty, Jui Thombre and Harshita Manek DesignFlawsandCryptanalysisofaStandardMutualAuthentication Protocol for Cloud Computing-Based Healthcare System. . . . . . . . . . . . 99 Adesh Kumari, M. Yahya Abbasi, Vinod Kumar and Mansaf Alam Cognitive Radio Based Environmental Health Monitoring and Regulation System for Toxic Gases . . . . . . . . . . . . . . . . . . . . . . . . . 111 Deependra Pandey vii viii Contents How to Help Johnny to Travel in a Brimming Train?. . . . . . . . . . . . . . 123 VanitaJain,GopalChaudhary,NalinLuthra,AkshitRaoandHarmanJolly Soft Computing Paradigms Based Clustering in Wireless Sensor Networks: A Survey. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Richa Sharma, Vasudha Vashisht and Umang Singh ANN Model for Liver Disorder Detection . . . . . . . . . . . . . . . . . . . . . . . 161 Shubham Dhingra, Ishaan Singh, R. Subburaj and Shalini Diwakar Design Flaws and Cryptanalysis of Elliptic Curve Cryptography-Based Lightweight Authentication Scheme for Smart Grid Communication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Vinod Kumar, Akber Ali Khan and Musheer Ahmad Distributed Authentication Security for IOT Using DASS and LOKI91. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Santosh Kumar Sharma and Bonomali Khuntia Macro Factors Affecting Cloud Computing Readiness: A Cross-Country Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 Samit Tripathy and Amalendu Jyotishi Controller Area Network for Battlefield-of-Things. . . . . . . . . . . . . . . . . 211 S. Sundeep Desai, Vincent Varghese and Manisha J. Nene An Experimental Approach to Unravel Effects of Malware on System Network Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 Sikiru Olanrewaju Subairu, John Alhassan, Sanjay Misra, Olusola Abayomi-Alli, Ravin Ahuja, Robertas Damasevicius and Rytis Maskeliunas Smart Ticketing for Academic Campus Shuttle Transportation System Based on RFID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Olusola Abayomi-Alli, Modupe Odusami, Richard Chima, Sanjay Misra, Ravin Ahuja, Robertas Damasevicius and Rytis Maskeliunas Design of Big Data Privacy Framework—A Balancing Act . . . . . . . . . . 253 P. Geetha, Chandrakant Naikodi and Suresh Lakshmi Narasimha Setty Robust Speaker Recognition Based on Low-Level- and Prosodic-Level-Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 S. M. Jagdale, A. A. Shinde and J. S. Chitode Classification of Astronomical Objects Using Various Machine Learning Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Siddharth Sharma and Ruchi Sharma Soundex Algorithm for Hindi Language Names. . . . . . . . . . . . . . . . . . . 285 Rahul Anand, Rohan Mahajan, Nimish Verma and Prabhnoor Singh Contents ix How Do Innovation Lifecycle Phases Affect the Innovation Success of IT Firms? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Senthilkumar Thangavelu and Amalendu Jyotishi Behavioral Analysis of Active Facebook Users Using the NEO PI-R Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 Suhelbeer Singh Sandhu, Ankit Gupta and Garima Srivastav Forecasting Air Quality of Delhi Using ARIMA Model . . . . . . . . . . . . . 315 Gourav, Jusleen Kaur Rekhi, Preeti Nagrath and Rachna Jain ETSP: Enhanced Trust-Based Security Protocol to Handle Blackhole Attacks in Opportunistic Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 Deepak Kumar Sharma, Saksham Agarwal, Sagar Pasrija and Sachin Kumar Proposed Model for Distributed Storage Automation System Using Kubernetes Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 Ashish Sharma, Sarita Yadav, Neha Gupta, Shafali Dhall and Shikha Rastogi A Feature-BasedKinshipVerificationTechniqueUsingConvolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 Apoorv Jain, Naman Bhagat, Varun Srivastava, Priyanshu Tyagi and Pragya Jain Image Encryption Using Permutation–Diffusion Approach . . . . . . . . . . 363 Rachna Tewani, Yash Garg, Jasmeet Singh Bagga, Akash Singh and Rahul Bhalsodia Facial Recognition Using Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . 375 Neelabh Shanker Singh, S. Hariharan and Monika Gupta Implications of Job Loading and Scheduling Structures on Machine Memory Effectiveness. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 Abraham Ayegba Alfa, Sanjay Misra, Francisca N. Ogwueleka, Ravin Ahuja, Adewole Adewumi, Robertas Damasevicius and Rytis Maskeliunas Comparative Study of the Electrical Energy Consumption and Cost for a Residential Building on Fully AC Loads Vis-a-Vis One on Fully DC Loads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395 Oluwasikemi Ogunleye, Adeyemi Alabi, Sanjay Misra, Adewole Adewumi, Ravin Ahuja and Robertas Damasevicius Analysis and Vulnerability Assessment of Various Models and Frameworks in Cloud Computing. . . . . . . . . . . . . . . . . . . . . . . . . . 407 Narendra Mishra, R. K. Singh and Sumit Kumar Yadav

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.