ebook img

Proceedings of International Conference on Communication and Computational Technologies ICCCT-2019 PDF

652 Pages·2020·29.318 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Proceedings of International Conference on Communication and Computational Technologies ICCCT-2019

Algorithms for Intelligent Systems Series Editors: Jagdish Chand Bansal · Kusum Deep · Atulya K. Nagar Sunil Dutt Purohit · Dharm Singh Jat · Ramesh Chandra Poonia · Sandeep Kumar · Saroj Hiranwal   Editors Proceedings of International Conference on Communication and Computational Technologies ICCCT-2019 Algorithms for Intelligent Systems Series Editors Jagdish Chand Bansal, Department of Mathematics, South Asian University, New Delhi, Delhi, India KusumDeep,DepartmentofMathematics,IndianInstituteofTechnologyRoorkee, Roorkee, Uttarakhand, India Atulya K. Nagar, School of Mathematics, Computer Science and Engineering, Liverpool Hope University, Liverpool, UK Thisbookseriespublishesresearchontheanalysisanddevelopmentofalgorithms for intelligent systems with their applications to various real world problems. It covers research related to autonomous agents, multi-agent systems, behavioral modeling, reinforcement learning, game theory, mechanism design, machine learning, meta-heuristic search, optimization, planning and scheduling, artificial neural networks, evolutionary computation, swarm intelligence and other algo- rithms for intelligent systems. The book series includes recent advancements, modification and applications of the artificial neural networks, evolutionary computation, swarm intelligence, artificial immune systems, fuzzy system, autonomous and multi agent systems, machine learning and other intelligent systems related areas. The material will be beneficial for the graduate students, post-graduate students as well as the researchers who want a broader view of advances in algorithms for intelligent systems. The contents will also be useful to the researchers from other fields who have no knowledge of the power of intelligent systems, e.g. the researchers in the field of bioinformatics, biochemists, mechanical and chemical engineers, economists, musicians and medical practitioners. The series publishes monographs, edited volumes, advanced textbooks and selected proceedings. More information about this series at http://www.springer.com/series/16171 Sunil Dutt Purohit Dharm Singh Jat (cid:129) (cid:129) Ramesh Chandra Poonia (cid:129) Sandeep Kumar Saroj Hiranwal (cid:129) Editors Proceedings of International Conference on Communication and Computational Technologies ICCCT-2019 123 Editors Sunil Dutt Purohit Dharm SinghJat RajasthanTechnical University Department ofComputer Science Kota, Rajasthan, India University of Science andTechnology, Namibia RameshChandra Poonia Windhoek, Namibia Department ofICT andNatural Sciences NorwegianUniversity of Science Sandeep Kumar andTechnology Department ofComputer Science Alesund, Norway Amity University Jaipur,Rajasthan, India SarojHiranwal RajasthanInstitute of Engineering andTechnology Jaipur,Rajasthan, India ISSN 2524-7565 ISSN 2524-7573 (electronic) Algorithms for Intelligent Systems ISBN978-981-15-5076-8 ISBN978-981-15-5077-5 (eBook) https://doi.org/10.1007/978-981-15-5077-5 ©SpringerNatureSingaporePteLtd.2021 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodologynowknownorhereafterdeveloped. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained hereinorforanyerrorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregard tojurisdictionalclaimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSingaporePteLtd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore Preface Nature continuously provides inspiration for ways to solve the real-life problems. Nature has progressed over thousands of years and now aids the development of innovative models, techniques and tools for many disciplines of scientific aspira- tion. Humankind has been continuously trying to comprehend and adapt nature in order to develop innovative techniques and tools. The area of nature-inspired computing is a combination of computing science with knowledge from different streams such as mathematics, biology, chemistry, physics and engineering. Basically, the main source of inspiration is nature, and thus, they are called nature-inspired. More than hundred algorithms inspired by nature are available today. These algorithms are able to solve the complex optimization problems very easily and with high efficiency. They always provide optimal or near-to-optimal solutions. Smart and intelligent computing is not complete without nature-inspired algorithms. Therefore, this conference has the main objective of circulating the innovations and advancements of smart and intelligent computing. The International Conference on Communication and Computational Technologies-2019 (ICCCT-2019) was held at Rajasthan Institute of Engineering and Technology, Jaipur, India, from August 30 to 31, 2019. This proceedings consists of 59 research papers from ICCCT-2019. We are thankful to Soft Computing Research Society (SCRS) for providing technical sponsorship for this event. We are also very thankful to Springer for supporting ICCCT-2019. We hope that this conference proceedings will prove to be useful. Jaipur, India Dr. Sunil Dutt Purohit Prof. Dharm Singh Jat Dr. Ramesh Chandra Poonia Dr. Sandeep Kumar Dr. Saroj Hiranwal v About This Book This book features selected papers presented at the International Conference on Communication and Computational Technologies-2019 (ICCCT-2019), held at Rajasthan Institute of Engineering and Technology, Jaipur, India, from August 30 to 31, 2019. Covering recent advances in communication and computing intelli- gence, the bookfocusesontherecent developmentsinintelligent computing,such asintelligentcomputationaltechnologies,intelligentcommunicationandintelligent computing paradigms with applications in every aspect of life. vii Contents 1 AbilityStudyofProximityMeasureforBigDataMiningContext on Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Kamlesh Kumar Pandey and Diwakar Shukla 2 Not Yet Decided . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Anil Kumar and Rajeev Kumar 3 An Approach to Implement MapReduce and Aggregation Pipeline Utilizing NoSql Technologies . . . . . . . . . . . . . . . . . . . . . . . 27 Monika and Vishal Shrivastava 4 Energy Hole Alleviation in Wireless Sensor Networks Through Node Behavior Modeling Using Firefly Algorithm . . . . . . . . . . . . . 35 Sachin Sharma, Saroj Hiranwal, and Kapil Dev Sharma 5 Analysis of Modified LEACH Protocol in Wireless Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Anurag Sharma, Jyoti Khandelwal, and Mukesh Kumar Choudhary 6 Recent Soft Computing Strategies for Induction Motor Analysis and Control: A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Fani Bhushan Sharma and Shashi Raj Kapoor 7 Protection of Wind Farm Integrated Double Circuit Transmission Line Using Walsh–Hadamard Transform-Based Artificial Intelligence Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Gaurav Kapoor 8 Analysis of Ensemble Classifiers with Feature Selection for an Effective Intrusion Detection Model . . . . . . . . . . . . . . . . . . . 85 Atreya Dyaram, V. Manojkumar, J. Sairabanu, and I. Sumaiya Thaseen ix x Contents 9 Color Image Encryption and Compression Using DCT in Joint Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Umesh Maru, Gajendra Sujediya, and Yashika Saini 10 EfficientMethodforPredictionAccuracyofHeartDiseasesUsing Machine Learning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Manoj Raman, Vijay Kumar Sharma, Saroj Hiranwal, and Amit Kumar Bairwa 11 Neighbourhood-Inspired Grey Wolf Optimizer. . . . . . . . . . . . . . . . 123 Priyanka Meiwal, Harish Sharma, and Nirmala Sharma 12 TheAnalysisofMachine LearningTechniques forHeartDisease Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Surendra Singh and Vishal Shrivastava 13 The Analysis of Stock Market Prediction Techniques. . . . . . . . . . . 145 Swati Chedwal and Vishal Shrivastava 14 Mitigating the Impact of DDoS Attack on Upsurge Network Performance in MANET. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 ChourSinghRajpoot,AmitKumarBairwa,andVijayKumarSharma 15 Protection of Wind Farm-Integrated Series Capacitor-Compensated Three-Phase Transmission Line Using Daubechies-7 Wavelet Transform . . . . . . . . . . . . . . . . . 165 Gaurav Kapoor 16 Smart Wireless Reconfigurable Device Using LoRa Technology. . . 177 Ronak Jain, Rekha Mithal, and Naveen Kumar Kedia 17 Microstrip Aerial for 2.45/5.2 GHz by Pin Loading . . . . . . . . . . . . 185 Rajesh Kumar Raj and Himanshu Khandelwal 18 Decision Tree Using Artificial Neural Network: A Proposed Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 Monika Rathore and Shruti Gupta 19 A Comparative Analysis of R and Weka for Market Basket Analysis Using Apriori Algorithm. . . . . . . . . . . . . . . . . . . . . . . . . . 211 Monika Rathore and Shruti Gupta 20 An Energy-Efficient and Secured Hop-by-Hop Authentication Protocol for Wireless Sensor Networks. . . . . . . . . . . . . . . . . . . . . . 221 S. V. N. Santhosh Kumar, M. Selvi, A. Kannan, and S. Ganapathy 21 A Study of Gujarati Character Recognition . . . . . . . . . . . . . . . . . . 229 Arpit A. Jain and Harshal A. Arolkar Contents xi 22 Security-Aware Workflow Allocation Strategy for IaaS Cloud Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 Mohammad Shahid, Mahfooz Alam, Faraz Hasan, and Mohammad Imran 23 Design Coverage and Connectivity Framework for Wireless Sensor Networks Using Optimum Energy. . . . . . . . . . . . . . . . . . . . 253 Sanchit Goyal, Shreshtha Goel, and Vinita Tiwari 24 Hybrid Forecasting Scheme for Enhance Prediction Accuracy of Spambase Dataset. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 Divyanjali Saini and Monalisa Meena 25 AnEnhanceSecurityoftheColorImageUsingAsymmetricRSA Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 Shreya Agrawal, Mayank Patel, and Amit Sinhal 26 Social Media Analytics and Mutual Fund Recommendation. . . . . . 287 Samkit Shah and Harshal Trivedi 27 Hyperspectral Endmember Extraction Algorithm Using Spearman’s Rank Correlation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Dharambhai Shah and Tanish Zaveri 28 Optimization Algorithms for Antenna Design, Array Thinning, and Radiation Pattern Synthesis. . . . . . . . . . . . . . . . . . . . . . . . . . . 319 Madhuri Sahal, Vivekanand Tiwari, and Tejpal 29 Implementation of a Simple Plug-and-Play Module for Vehicle to Vehicle Communication Over 434 Megahertz Band . . . . . . . . . . 327 Anand Sabne, Abruti Panda, Rohan Shevade, Divyansh Kasture, and Dr. Vaishali Ingale 30 Performance Analysis of Hello Flood Attack in WSN. . . . . . . . . . . 335 Sourabh Banga, Himanshu Arora, Smita Sankhla, Gopesh Sharma, and Bhavesh Jain 31 Performance Enhancement of Satellite Communication Subsystem Using 4 (cid:1)(cid:1) 4 MIMO. . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Gopesh Sharma, Himanshu Arora, Sourabh Banga, and Vijay Kumar Sharma 32 Design of Compact Dual-Band Antenna for Wi-Max and WLAN Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 Megha Shringi, Rajveer Singh, and M. L. Meena 33 Quantum Hilbert Image Scrambling and SVD-Based Watermarking Scheme for Rightful Ownership . . . . . . . . . . . . . . . 361 Naveen Kumar and Vijay Kumar Sharma

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.