Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The book is a collection of high-quality peer-reviewed research papers presented in Proceedings of International Conference on Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (ICAEES 2014) held at Noorul Islam Centre for Higher Education, Kumaracoil, India. These research papers provide the latest developments in the broad area of use of artificial intelligence and evolutionary algorithms in engineering systems. The book discusses wide variety of industrial, engineering and scientific applications of the emerging techniques. It presents invited papers from the inventors/originators of new applications and advanced technologies.

Author(s): L. Padma Suresh, Subhransu Sekhar Dash, Bijaya Ketan Panigrahi (eds.)
Series: Advances in Intelligent Systems and Computing 324
Edition: 1
Publisher: Springer India
Year: 2015

Language: English
Pages: 862
Tags: Computational Intelligence; Artificial Intelligence (incl. Robotics); Signal, Image and Speech Processing

Front Matter....Pages i-xvii
Improvement in Hungarian Algorithm for Assignment Problem....Pages 1-8
Vertex Cover Problem—Revised Approximation Algorithm....Pages 9-16
A Simple Control Strategy Technique for a Single-phase Bridgeless Active Rectifier with High Power Factor and Voltage Stabilization Using Partial Digital Implementation....Pages 17-26
Ensemble Neural Network Algorithm for Detecting Cardiac Arrhythmia....Pages 27-35
An Efficient Invasive Weed Optimization Algorithm for Distribution Feeder Reconfiguration and Loss Minimization....Pages 37-46
Implementation of Generative Crossover Operator in Genetic Algorithm to Solve Traveling Salesman Problem....Pages 47-53
A 4-bit 9 KS/s Distortionless Successive Approximation ADC in 180-nm CMOS Technology....Pages 55-63
EEG-based Automatic Detection of Drowsy State....Pages 65-72
WIDS Real-Time Intrusion Detection System Using Entrophical Approach....Pages 73-79
Optical Character Recognition for Alphanumerical Character Verification in Video Frames....Pages 81-87
Modified AODV Routing Protocol for Multi-hop Cognitive Radio Ad Hoc Networks....Pages 89-97
Theoretical Framework of the Algorithm to Thwart MAC Spoofing DoS Attack in Wireless Local Area Infrastructure Network....Pages 99-107
PCA-Based Feature Selection for MRI Image Retrieval System Using Texture Features....Pages 109-117
A Survey of Location Prediction Using Trajectory Mining....Pages 119-127
Survey on Router Policies Providing Fairness and Service Differentiation Favoring Real-Time Data Transfers in Internet....Pages 129-137
Exploration of the Effect of Demographic and Clinical Confounding Variables on Results of Voxel-Based Morphometric Analysis in Schizophrenia....Pages 139-149
A Novel Method for Secure Image Steganography....Pages 151-158
Techniques for Enhancing the Performance of TCP in Wireless Networks....Pages 159-167
Analysis of Classification Models Using Image Statistics and Data Miner for Grade Prediction of Astrocytoma....Pages 169-180
Object Detection in Cluttered Environment Using 3D Map....Pages 181-186
Smart Energy Meter with Instant Billing and Payment....Pages 187-196
GA-Based Compiler Parameter Set Tuning....Pages 197-203
An Intelligent Intrusion Detection System Using Average Manhattan Distance-based Decision Tree....Pages 205-212
Intelligent Medical Diagnosis System Using Weighted Genetic and New Weighted Fuzzy C-Means Clustering Algorithm....Pages 213-220
Security Analysis in Cloud Environment....Pages 221-228
A Bi-level Clustering Analysis for Studying About the Sources of Vehicular Pollution in Chennai....Pages 229-236
Investigation of Fault Detection Techniques for an Industrial Pneumatic Actuator Using Neural Network: DAMADICS Case Study....Pages 237-246
Design of Portable Security System Using Face Recognition with Back-Propagation Algorithm and MATLAB....Pages 247-255
Model-Based Control for Moisture in Paper Making Process....Pages 257-264
Elimination of Harmonics in Seven-Level Cascaded Multilevel Inverter Using Particle Swarm Optimization Technique....Pages 265-274
Optimization and Quality-of-Service Protocols in VANETs: A Review....Pages 275-284
Object Detection Using Robust Image Features....Pages 285-295
Service-Adaptive Fuzzy Multi Criteria Based Intelligent Vertical Handover Decision Algorithm for Heterogeneous Wireless Networks....Pages 297-304
Automatic Traffic Classification Using Machine Learning Algorithm for Policy-Based Routing in UMTS–WLAN Interworking....Pages 305-312
Sequential Decision Making Using Q Learning Algorithm for Diabetic Patients....Pages 313-321
Design of Quantum Cost and Delay-Optimized Reversible Wallace Tree Multiplier Using Compressors....Pages 323-331
A Novel Authentication Framework for Hadoop....Pages 333-340
Fuzzy ART-Based User Behavior Trust in Cloud Computing....Pages 341-348
Semi-supervised Learning Algorithm for Online Electricity Data Streams....Pages 349-358
An Efficient Continuous Speech Recognition System for Dravidian Languages Using Support Vector Machine....Pages 359-367
Video Surveillance Based Tracking System....Pages 369-378
Stroke Detection in Brain Using CT Images....Pages 379-386
Preemptive Appliances Scheduling in Smart Home Using Genetic Algorithm....Pages 387-393
Credible Secure Data Aggregation in Wireless Sensor Networks....Pages 395-404
Zumkeller Labeling Algorithms for Complete Bipartite Graphs and Wheel Graphs....Pages 405-413
An Unidentified Location-Based Efficient Routing Protocol in VANET....Pages 415-421
A Secure and Efficient Binding Update Scheme with Decentralized Design for Next Generation IP Mobility....Pages 423-431
Stego with Color Cue....Pages 433-445
Secure Seed-Based Sturdy OTP via Convenient Carry-on Device....Pages 447-455
A ( t , n ) Secure Sum Multiparty Computation Protocol Using Multivariate Polynomial Secret Sharing Scheme....Pages 457-463
Small-World Particle Swarm Optimizer for Real-World Optimization Problems....Pages 465-472
A Comparative Study of Feature Ranking Methods in Recognition of Handwritten Numerals....Pages 473-479
Performance Evaluation of PET Image Reconstruction Using Radial Basis Function Networks....Pages 481-489
Clustering for Knowledgeable Web Mining....Pages 491-498
Effective Path Discovery Among Clusters for Secure Transmission of Data in MANET....Pages 499-509
Quality-of-Service Analysis of AOMDV and AOMDV-MIMC Routing Protocols for Mobile Ad hoc Networks....Pages 511-521
Particle Swarm Optimization-Based SONAR Image Enhancement for Underwater Target Detection....Pages 523-531
Intelligent Modeling and Optimization of ECM Process Parameters....Pages 533-541
An Effective Automation Testing Framework for OATS Tool....Pages 543-550
Multimodal Biometric Authentication System Based on Score-Level Fusion of Palmprint and Finger Vein....Pages 551-560
Synergistic Clinical Trials with CAD Systems for the Early Detection of Lung Cancer....Pages 561-567
A Unified Framework for Network Bandwidth and Link Latency Detector Based on Cloud Computing....Pages 569-583
Development of Concatenative Syllable-Based Text to Speech Synthesis System for Tamil....Pages 585-592
Design of Low-Power Blink Detector for Minimally Invasive Implantable Stimulator (SoC) Using 180 nm Technology....Pages 593-600
Energy- and Trust-Based AODV for Quality-of-Service Affirmation in MANETs....Pages 601-607
Classification of Remote Sensing Image Based on Different Similarity Measures....Pages 609-619
A Start to Fail Frequency Technique for Detecting Hardware Trojan....Pages 621-631
A Novel Approach Privacy Security Protocol Based SUPM Method in Near Field Communication Technology....Pages 633-643
Gabor Transform for the Time–Frequency Localization of Impulse Faults in a Transformer....Pages 645-656
A Modified Priority-Based Multischeduler (PBMS) for Optical Network....Pages 657-665
Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform....Pages 667-672
A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP....Pages 673-679
Identifying Sound of RPW In Situ from External Sources....Pages 681-691
VNS-Based Heuristic for Identical Parallel Machine Scheduling Problem....Pages 693-699
Green Algorithm for Virtualized Cloud Systems to Optimize the Energy Consumption....Pages 701-707
Lecture Notes in Computer Science: S Transform for the Analysis of Impulse Faults in Transformer....Pages 709-719
Defensive Mechanism to Guard Against Packet Droppers in Mobile Ad Hoc Network....Pages 721-729
Real-Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm....Pages 731-736
Detection of Power Quality Disturbances Based on Adaptive Neural Net and Shannon Entropy Method....Pages 737-745
Texture Feature Extraction Using MGRLBP Method for Medical Image Classification....Pages 747-753
A Novel Lightweight Protocol for Address Assignment in Ad Hoc Networks Based on Filters....Pages 755-763
Structural Refinement: An Effective OCL-Based Testing Approach....Pages 765-774
Dynamic Architecture and Performance Analysis of Secure and Efficient Key Management Scheme in Multicast Network....Pages 775-784
Mining Undemanding and Intricate Patterns with Periodicity in Time Series Databases....Pages 785-792
Group-Based Access Technique for Effective Resource Utilization and Access Control Mechanism in Cloud....Pages 793-802
Design of Fuzzy Logic-Based pH Controller for High-Pressure-Rated Modified CSTR System....Pages 803-811
Level Control of Quadruple Tank Process with Finite-Time Convergence Using Integral Terminal Sliding Mode Controller....Pages 813-824
An Enhanced Security Framework for a Cloud Application....Pages 825-836
Enhanced Role-Based Access Control for Cloud Security....Pages 837-852
Model Predictive Controllers for Nonminimum-phase Quadruple-tank Process....Pages 853-862