Communication and Intelligent Systems: Proceedings of ICCIS 2019 (Lecture Notes in Networks and Systems, 120)

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book gathers selected research papers presented at the International Conference on Communication and Intelligent Systems (ICCIS 2019), organised by Swami Keshvanand Institute of Technology, Management & Gramothan (SKIT), Jaipur, India and Rajasthan Technical University, Kota, India on 9–10 November 2019.


This book presents a collection of state-of-the-art research work involving cutting-edge technologies for communication and intelligent systems. Over the past few years, advances in artificial intelligence and machine learning have sparked new research efforts around the globe, which explore novel ways of developing intelligent systems and smart communication technologies. The book presents single- and multi-disciplinary research on these themes in order to make the latest results available in a single, readily accessible source.

Author(s): Jagdish Chand Bansal (editor), Mukesh Kumar Gupta (editor), Harish Sharma (editor), Basant Agarwal (editor)
Publisher: Springer
Year: 2020

Language: English
Pages: 533

Organization
General Chairs
Technical Program Chairs
Organizing Chairs
Organizing Secretaries
Coordinators
International Advisory Committee
Technical Program Committee
Preface
Contents
Editors and Contributors
Extremely High-Capacity, Secure Image Steganography Based on Composite Edge Detection, with Message Integrity
1 Introduction
2 Literature Review
3 Proposed Method
4 Simulation of Proposed Model
5 Performance Analysis with Other Existing Schemes
6 Future Work and Conclusion
References
A Dynamic Hand Gesture-Based Password Recognition System
1 Introduction
2 Related Work
3 Methodology
3.1 Video Acquisition
3.2 Background Subtraction and Gesture Segmentation
3.3 Creating an ML Model to Classify Gestures
3.4 Comparing the Gesture from a Database of Gestures
3.5 Gesture Recognition and Corresponding Action
4 Result Analysis
4.1 Performance Comparison
5 Conclusion and Future Work
References
Fuzzy Concepts and Machine Learning Algorithms for Car Park Occupancy and Route Prediction
1 Introduction
2 Background
2.1 Linear Regression
2.2 Linear Regression with Multiple Features
2.3 Overfit in Machine Learning Algorithms
2.4 Ridge Regression
2.5 Lasso Regression
3 Related Work
3.1 Previous Works on Occupancy Prediction
3.2 Route Prediction: Previous Works and Implementation of the Module
4 Theories and Concepts
5 Algorithm Used
6 System Desıgn
7 Results and Discussions
7.1 Comparing Regression Algorithms
7.2 Vehicle Parking Prediction Techniques
8 Conclusion and Future Work
References
A Distributed Algorithm to Create a Minimum Spanning Tree in a Multi-channel Cognitive Radio Network
1 Introduction
2 Related Work
3 System Model
4 Algorithm Description
5 Conclusion
References
A Distributed Fault Analysis (DFA) Method for Fault Tolerance in High-Performance Computing Systems
1 Introduction
2 Literature Survey
2.1 Distributed System-Level Analysis
2.2 Hierarchical Adaptive Distributed System-Level Analysis
2.3 Problems in Fault Diagnostic Approaches
3 Proposed Distributed Fault Analysis (DFA) Method
3.1 System Architecture
4 Experiment Evaluation
4.1 Types of Faults Evaluated
4.2 Evaluation Metrics
4.3 Results
5 Conclusions
References
Ontology-Driven Framework to Automatically Generate University Timetable
1 Introduction
2 Related Work
3 Ontological Model for Timetable Management
4 Constraint Specification
4.1 Hard Constraints
4.2 Soft Constraints
4.3 Temporal Constraints
4.4 Priority Constraints
5 Implementation
6 Conclusion
References
A Survey on Task Scheduling and Resource Allocation Methods in Fog Based IoT Applications
1 Introduction
2 Survey on Tweaking the Performance of Fog Computing
2.1 Survey on Scheduling the Task Technique in Fog
2.2 Survey on Allocating the Resources in Fog Computing
2.3 Survey on Techniques Involved in IoT Applications for Sharing the Resources
3 Conclusion
References
Improved Linear Extrapolation Technique for Crop Health Monitoring Using Hyperspectral Data
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Improved Extrapolation Technique for Red Edge Position Detection
4 Experimental Design and Data Collection
4.1 Experimental Design
4.2 Leaf Spectra Measurements and Data Collection
5 Result and Discussion
6 Conclusion
References
Stratified Sampling-Based Data Reduction and Categorization Model for Big Data Mining
1 Introduction
2 Related Works
3 Data Reduction Techniques for Big Data Environment
3.1 Divide-and-Conquer
3.2 Feature Selection
3.3 Parallel Processing
3.4 Granular Computing
3.5 Incremental Learning
3.6 Sampling
4 Sampling Strategy for Big Data Environment
4.1 Uniform Random Sampling
4.2 Systematic Sampling
4.3 Progressive Sampling
4.4 Reservoir Sampling
4.5 Stratified Sampling
5 Proposed Stratified Sampling-Based Data Reduction and Categorization Model
5.1 Algorithm of Data Reduction and Categorization Model
5.2 Stratification
5.3 Sample Size
5.4 Sample Allocation
6 Computation Analysis of Proposed Data Reduction and Categorization Model
6.1 Computation Tools and Dataset
6.2 Exiting Algorithm for Comparing
6.3 Evaluation Criteria for Validation
6.4 Results
7 Conclusion
References
Product Sentiment Analysis Using Natural Language Understanding
1 Introduction
2 Related Work
3 Product Sentiment Analyzer (PSA) Methodology
4 Results and Discussion
4.1 Use of NLU API
4.2 Dataset
5 Results
6 Conclusion and Future Scope
References
Software Cost Estimation for Python Projects Using Genetic Algorithm
1 Introduction
1.1 Software Cost Estimation
1.2 COCOMO Model
2 Related Work
3 COCOMO Model with Genetic Algorithm
4 Proposed Optimization Algorithm
5 Dataset
6 Discussion
7 Analysis of Results
8 Conclusion and Future Work
References
Prediction of Rise in Violence Inclined Opinions: Utility of Sentiment Analysis in the Modern World
1 Introduction
2 Methodology and Tools Employed
3 Data Analysis
4 Results
5 Conclusion
References
Face Tagging and Recognition Using Inception Network and Triplet Loss Generator Function
1 Introduction
2 Proposed Work
3 Results and Discussion
4 Conclusion
References
Analyses of Factors Influencing Contraceptive Methods and Predicting the Use of Method of Contraception
1 Introduction
2 Related Work
3 Proposed System
3.1 Random Forest Classifier
3.2 Support Vector Classifier
3.3 K-Nearest Neighbor Classifier
4 Experimental Results
4.1 Applications of Result of Various Algorithms
4.2 Comparison of Results
4.3 Analysis of Factors
4.4 Predicting Single Inputs for Classifiers
4.5 Correlation Between Factors (Attributes)
5 Conclusion
References
Off-the-Record (OTR) Security Protocol Application in Cloud Environment
1 Introduction
2 OTR in Communication Protocols: Related Work
3 Theory Behind OTR Protocol
4 Primitives Used in OTR
4.1 Diffie–Hellman Key Exchange
4.2 Authentication
4.3 Digital Signing
4.4 Encryption Using AES Algorithm
5 Implementation of OTR
5.1 Initial Key Exchange
5.2 Authentication
5.3 Perfect Forward Secrecy and Deniability
5.4 Key Forgetting
6 Introduction to Internet of Things
7 Conclusion
References
Agricultural Marketing Transformation Through Crowdsourcing System for Product Price Analysis
1 Introduction
1.1 Problem Statement
1.2 Goal of the Study
1.3 Importance of the Study
2 Literature Review
3 Proposed Design
4 Implementation and Result Discussion
5 Conclusion
References
Malware Detection Using Multilevel Ensemble Supervised Learning
1 Introduction
2 Literature Review
2.1 Monitoring Behavior Using API Calls
2.2 Machine Learning-Based Approaches
3 Proposed Framework
3.1 Data Preprocessing
3.2 Feature Extraction
3.3 Feature Selection
3.4 Classification
4 Experimental Results
4.1 Performance Evaluation Metrics
5 Conclusion and Future Scope
References
Image Splicing Forgery Detection Using DWT and Local Binary Pattern
1 Introduction
2 Related Works
3 Proposed Approach for Splicing Detection
3.1 Preprocessing
3.2 LBP Histogram-Based Features from DWT Domain
3.3 CF-Based Features from DWT Domain
3.4 Ensemble Classifier
4 Experiments and Results
4.1 Datasets and Evaluation Parameter
4.2 Results and Discussion
5 Conclusion
References
Discrete-Time Analysis of Communication Networks with Second Optional Service and Negative User Arrivals
1 Introduction
2 Related Work
3 Model Explanation
4 Performance Analysis
4.1 Probability Computation
5 Performance Indices
5.1 Mean System Size
5.2 Throughput
5.3 Delay
6 Numerical Results
7 Conclusion
References
Emoticon Prediction on Textual Data Using Stacked LSTM Model
1 Introduction
2 Techniques and Concepts Involved
2.1 Word Embeddings
2.2 GloVe
2.3 RNN and LSTM-Based Model
2.4 Stacked LSTM Model
3 Dataset
3.1 Preprocessing of Data
4 Proposed Model
4.1 Working of the Proposed Stacked LSTM Model
4.2 Stacked LSTM Model with Parameters
4.3 Experimental Setup for Stacked LSTM Model
5 Results and Discussions
6 Conclusion and Future Work
References
A Survey on Computational Intelligence Techniques for Internet of Things
1 Introduction
2 Internet of Things
3 Computational Intelligence
4 Techniques Applied for Internet of Things Applied for Internet of Things
4.1 Artificial Neural Network on IoT
4.2 Application of Fuzzy Logic Technique on IoT
4.3 Application of Genetic Algorithms on IoT
4.4 Meta-heuristics and Swarm Intelligence
4.5 Application of Artificial Immune System Techniques on IoT
5 Conclusion and Discussions
References
A Comparative Analysis of Over-the-Top Platforms: Amazon Prime Video and Netflix
1 Introduction
2 Literature Survey
3 Data Collection
4 Result Analysis and Discussion
4.1 Comparison on the Basis of User Preference
4.2 Comparison on the Basis of Total Number of Subscribers
4.3 Comparison on the Basis of Total Annual Revenue and Income
4.4 Comparison on the Basis of Budget for Content
4.5 Comparison on the Basis Genre-Wise Split of Original Content
4.6 Additional Features for Comparison
5 Conclusion
6 Future Scope
References
An Empirical Analysis on Retrieval of Math Information from the Scientific Documents
1 Introduction
2 Related Work
3 Methodology
3.1 Corpus Description
3.2 Preprocessing
3.3 Indexer
3.4 Searcher and Ranker
4 Experimental Results
5 Conclusions and Future Scope
References
Imposition and Transmission of QPSK Communication Through LabVIEW Using USRP
1 Introduction
1.1 Low-Pass Filter
1.2 Sampling
1.3 Quantization
1.4 Encoding
1.5 Modulation
1.6 Regenerative Repeaters
1.7 Demodulation
1.8 Decoding
2 Literature Survey
3 Quadrature Phase Shift Keying (QPSK)
4 Hardware Implementation and Experimental Setup
5 Results and Discussion
5.1 Modulation and Demodulation Without AWGN
5.2 Transmitting and Receiving of Signal with Addition of AWGN
6 Conclusion and Future Work
References
Reflection of IoT Ubiquitous Connectivity and Security in Cross-industry Collaboration
1 Introduction
1.1 Mobile Communication Technology
1.2 Satellite Communication Technology
1.3 Wi-Fi
2 Internet of Things (IoT)
2.1 Ubiquitous Connectivity
3 Architecture for IoT Connectivity
4 Security Framework
4.1 Statistical Data
5 Conclusion
References
A Computationally Efficient Data-Dependent Projection for Dimensionality Reduction
1 Introduction
2 Related Work
3 Random Projection (RP)
4 Proposed Deterministic Construction of Projection Matrix
4.1 Proposed Approach
5 Experimental Evaluation
5.1 Data Sets
5.2 Results and Discussion
6 Concluding Remarks
References
Probabilistic-Based Energy-Efficient Single-Hop Clustering Technique for Sensor Networks
1 Introduction
2 Literature Survey
3 EESCT Algorithm
4 Energy Model
5 Simulation and Performance Evaluation
6 Conclusion and Future Work
References
RFID-Based Smart Shopping in IoT Environment: A Way to Become a Smart Shopper
1 Introduction
2 IoT World Forum Reference Architecture
3 Proposed System
3.1 Working of the Proposed System
3.2 Data Uploading Techniques
4 Case Study on Proposed System
5 How the Proposed System Differs from Others
5.1 To Show the Price and Discount of the Product
5.2 Give Facility to Analyze Popularity of Products to Customers
6 Conclusion
7 Future Scope
References
Area Optimized High-Level Synthesis of Bubble Check Algorithm for Check Node Processing
1 Introduction
2 Check Node Processing
2.1 Decoding of NB-LDPC Codes
2.2 Check Node Processing
2.3 Bubble Check Algorithm
2.4 High-Level Synthesis
3 Implementation of Bubble Check Algorithm Using HLS
4 Results and Discussion
5 Conclusion
References
Identification and Classification of Expertise Using Eye Gaze—Industrial Use Case Study with Software Engineers
1 Introduction
2 Related Work
3 Experiment Design
3.1 Goal and Objective
3.2 Study
3.3 Participants
3.4 Task
3.5 Procedure
3.6 Metrics
3.7 Proposed Method
4 Results and Discussion
4.1 Case Study: Software Engineers Cognitive Behavior
4.2 Case Study: Trainer Effectiveness Based on Trainee Cognitive Behavior
5 Conclusion and Future Work
References
Crypto-Wills: Transferring Digital Assets by Maintaining Wills on the Blockchain
1 Introduction
2 Current Landscape and Background
2.1 Smart Contracts
2.2 Security Tokens
2.3 ERC-20
2.4 ERC-721
2.5 Decentralized Applications
3 Proposed Methodology and Solutıons
3.1 Representation of Wills
3.2 Representation of Participants
3.3 How Will the Assets Be Represented?
3.4 How Will the Digital Will Be Created?
3.5 Verifying Death of Owner
3.6 Distribution of Assets
3.7 Updation
4 Implementation and Results
4.1 Speed of Execution
4.2 Tamper-Resistant and Tamper Evident
4.3 Eliminating a Single Point of Failure
4.4 Security Safeguards
4.5 Legal Issues
5 Conclusion and Future Scope
References
One-Shot Digit Classification Based on Human Concept Learning
1 Introduction
2 Related Work
3 Applying Human Concept Learning for One-Shot Handwritten Digit Classification
3.1 Compositionality
3.2 Causality
3.3 Learning to Learn
4 Proposed Approach
5 Results and Discussion
6 Conclusion and Future Work
References
Genetic Algorithm Tuned Sizing Scheme for Grid Integrated Hybrid Energy System
1 Introduction
2 Solar Power Plant
2.1 Solar Cell
2.2 Modelling of Solar Power
3 Wind Power
3.1 Modelling of Wind Power
4 Optimization
4.1 Reliability Evaluation Based on LPSP
4.2 Economic Analysis
5 Genetic Algorithm
5.1 GA Parameters
5.2 Fitness Function
6 Simulation and Results
7 Conclusion
References
Medical Analysis Methods for Object Identification
1 Introduction
2 Related Work
3 Proposed Method
4 Result Analyses
5 Conclusions
References
Low-Cost Smart Home Using Sensor Fusion and Autonomous Wheel Chair: Caring Lonely Elders Specially in India
1 Introduction
1.1 Motivation
1.2 Problem Statement
1.3 Application
2 Related Work
3 System Design
3.1 Hardware Design
3.2 Software Design
4 Decision-Making Logic by Sensor Integration
5 Experimental Result
5.1 Testing the Client Server
5.2 Testing RFID Card Reading While Having Linear Velocity
5.3 Testing RSSI and Vision-Based Localization
5.4 Testing the Accelerometer Data
6 Conclusion
References
Optimal Reactive Power Dispatch Using Gravitational Search Algorithm to Solve IEEE-14 Bus System
1 Introduction
2 Gravitational Search Algorithm (GSA)
2.1 Procedure of GSA
3 Formation of Reactive Power Dispatch Problem
4 Implementation of GSA on Reactive Power Dispatch Problem
5 Results and Discussion
5.1 IEEE-14 Bus Systems
6 Conclusion
References
Comparative Analysis of Ensemble Classifier and Single Base Classifier in Medical Disease Diagnosis
1 Introduction
2 Method
2.1 Datasets
2.2 Data Conversion and Processing
2.3 Base Classifiers
2.4 Ensembling Process
2.5 Ensemble Classifiers
2.6 Comparison Metric
3 Results and Discussion
4 Conclusion
References
Comparative Study on Punjabi Document Clustering
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Dataset
3.2 Document Preprocessing
3.3 Feature Extraction Techniques
3.4 Clustering Algorithms
3.5 Principal Component Analysis
3.6 Testing Strategy
4 Results
5 Conclusion and Future Work
References
Appropriateness of Machine Learning Techniques for TCP with MANETs
1 Introduction
1.1 TCP with MANET
1.2 TCP Variants
2 Machine Learning
2.1 Phases
2.2 Online Learning
2.3 Offline Learning
3 TCP with Machine Learning
3.1 TCP with Online Learning
3.2 TCP with Offline Learning
4 Appropriateness of Machine Learning
4.1 Type of Machine Learning
4.2 Scope of Machine Learning
5 Conclusion
References
486435_1_En_40_Chapter_OnlinePDF.pdf
40 Correction to: Software Cost Estimation for Python Projects Using Genetic Algorithm
Correction to: Chapter “Software Cost Estimation for Python Projects Using Genetic Algorithm” in: J. C. Bansal et al. (eds.), Communication and Intelligent Systems, Lecture Notes in Networks and Systems 120, https://doi.org/10.1007/978-981-15-3325-9_11