This book features selected papers from the 6th International Conference on Mathematics and Computing (ICMC 2020), organized by Sikkim University, Gangtok, Sikkim, India, during September 2020. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry.
Author(s): Debasis Giri, Rajkumar Buyya, S. Ponnusamy, Debashis De, Andrew Adamatzky, Jemal H. Abawajy
Series: Advances in Intelligent Systems and Computing, 1262
Publisher: Springer Singapore
Year: 2020
Language: English
Pages: 566
City: Singapore
Committee
Technical Program Committee
Message from General Co-chairs
Message from Program Co-chairs
Preface
Contents
About the Editors
Preventing Differential Fault Analysis Attack on AEGIS Family of Ciphers
1 Introduction
2 Background
2.1 AEGIS Family of Ciphers
2.2 Attack Description for AEGIS Family
3 Countermeasures
3.1 Countermeasure for AEGIS-128
3.2 Countermeasure for AEGIS-256
3.3 Countermeasure for AEGIS-128L
4 Comparison of the Modified AEGIS with AEGIS
5 Conclusion
References
A Geometric-Based User Authentication Scheme for Multi-server Architecture: Cryptanalysis and Enhancement
1 Introduction
2 Related Works
3 Brief Review of Lin et al.'s Scheme
4 Weaknesses of Lin et al.'s Scheme
4.1 Minor Error
4.2 Security Weaknesses
5 Our Improved Scheme
6 Analysis of Our Improved Scheme
7 Conclusion
References
Solving the Search-LWE Problem by Lattice Reduction over Projected Bases
1 Introduction
2 Mathematical Preliminaries
2.1 Lattices and Their Bases
2.2 Lattice Basis Reduction
2.3 Typical Reduction Algorithms
3 The LWE Problem and Lattice Problems
3.1 Introduction to the LWE Problem
3.2 Reduction of the Search-LWE Problem to Lattice Problems
4 Solving the Search-LWE Problem Using Projected Lattices
4.1 Our Strategy
4.2 Development of Lattice Reduction for a Projected Basis
5 Experiments for the LWE Challenge
5.1 Implementation
5.2 Details of Experiments and Setting of Parameters
5.3 Experimental Results
6 Conclusion
References
Robust Watermarking Scheme for Compressed Image Through DCT Exploiting Superpixel and Arnold Transform
1 Introduction
2 Related Work
3 Superpixel
4 Proposed Scheme
4.1 Embedding Phase
4.2 Extraction Phase
5 Experimental Results and Comparisons
6 Conclusion
References
User Preference Multi-criteria Recommendations Using Neural Collaborative Filtering Methods
1 Introduction
2 Related Background
2.1 Neural Collaborative Filtering
2.2 Multi-Criteria Recommendation Systems
3 Proposed Approach
3.1 Phase I
3.2 Phase II
4 Performance Evaluation
4.1 Dataset and Evaluation Metrics
4.2 Results and Analysis
5 Conclusion and Future Work
References
Bifurcation Analysis of Tsunami Waves for the Modified Geophysical Korteweg–de Vries Equation
1 Introduction
2 Modified Geophysical Korteweg–de Vries Equation
3 Bifurcation Analysis
4 Different Tsunami Waves
5 Conclusions
References
Effect of Heating Location on Mixed Convection of a Nanofluid in a Partially Heated Enclosure with the Presence of Magnetic Field Using Two-Phase Model
1 Introduction
2 Mathematical Model
2.1 Nusselt Number and Entropy Generation
3 Numerical Methods
4 Grid Independence Test and Validation of Code
5 Results and Discussion
5.1 Study of Flow and Thermal Field
5.2 Effect of Position of the Heat Source on Nuav and Sav
5.3 Effect of Nanoparticle Volume Fraction on Nuav and Sav
5.4 Effect of Magnetic Field on Nuav and Sav
6 Conclusion
References
Weighted Matrix-Based Random Data Hiding Scheme Within a Pair of Interpolated Image
1 Introduction
2 Motivation
3 Proposed Scheme
3.1 Data Embedding
3.2 Data Extraction
4 Experimental Results
5 Conclusion
References
Moller Energy for an Exterior Metric of Relativistic Stars
1 Introduction
2 The Exterior Metric of Relativistic Stars in Scalar-Gauss-Bonnet Gravity
3 Result of Komar Mass
4 Moller Energy-Momentum Complex
5 Discussion
References
Modeling and Multistability of Ion-Acoustic Waves in Titan's Atmosphere
1 Introduction
2 Governing Model
3 The Nonlinear Schrödinger Equation (NLSE)
4 Formation of Dynamical System
5 Multistability Properties
6 Conclusion
References
Cryptanalysis of Kalyna Block Cipher Using Impossible Differential Technique
1 Introduction
2 Related Work
3 Preliminaries
3.1 Key Schedule Algorithm
3.2 Challenges in Kalyna Block Cipher
4 Impossible Differential Attack on Different Variants of Kalyna Block Cipher
4.1 Impossible Differential Attack on Kalyna 128/256
4.2 Impossible Differential Attack on Kalyna 256/512
4.3 Impossible Differential Attack on Kalyna-256/256
4.4 Impossible Differential Attack on Kalyna-512/512
4.5 Impossible Differential Attack on Kalyna-128/128
5 Results
6 Conclusion
References
Weighted Slope One with Threshold Filtering
1 Introduction
2 Related Work
3 Background
4 Weighted Slope Slope One with Threshold Filtering: Proposed Approach
5 Experimental Result
5.1 Metrics
6 Conclusion and Future Work
References
An Intelligent Phishing Detection Scheme Using Machine Learning
1 Introduction
1.1 Contributions
2 Related Work
3 Problem Formulation
4 Proposed Work
4.1 Methodology
5 Results
5.1 Dataset
5.2 Impact of Machine Learning Models
5.3 Impact of Ensemble Approach
5.4 Cross-Validation
6 Conclusion
References
Application of Measure of Non-compactness for the Existence of Solutions of an Infinite System of Differential Equations in the Sequence Spaces of Convergent and Bounded Series
1 Introduction and Preliminaries
2 Infinite System of Second-Order Differential Equations
3 Solvability in cs Space
4 Examples
5 Solvability in bs Space
References
Linear Secret Sharing Schemes with Finer Access Structure
1 Introduction
1.1 Our Contribution
2 Preliminaries
2.1 Coding Theory
2.2 Secret Sharing
3 Proposed Secret Sharing Scheme
3.1 Access Structure
3.2 Share Construction
3.3 Secret Reconstruction
4 Analysis of the Proposed Scheme
4.1 Cheating Detection and Cheating Identification
References
A Deep Learning Approach with Line Drawing for Isolated Online Bangla Character Recognition
1 Introduction
2 Dataset
3 Proposed Method
3.1 Reconstruction of Characters
3.2 Deep Learning Framework
4 Result and Discussion
5 Conclusion
References
Inverse Kinematics Based Computational Framework for Robot Manipulation Inspired by Human Movements
1 Introduction
2 Computational Framework for Vision System
3 Data-Acquisition System
3.1 Design of Bands and Singular Detection
3.2 Combining Multiple Colours to Locate Key-Points
3.3 Experimental Results
4 Forward and Inverse Kinematics
5 Validation
6 Conclusion
References
Slope One Meets Neighbourhood: Revisiting Slope One Predictor in Collaborative Filtering
1 Introduction
2 Related Work
3 Background
4 Proposed Methodology
4.1 Revisiting Slope One Prediction for Personalizing
4.2 Dataset
4.3 Metric for Evaluation
5 Experimental Results and Comparison
6 Conclusion and Future Work
References
Multi-Sensor Tracking Simulator Design and Its Challenges
1 Introduction
1.1 Coordinate Systems
2 Requirements Specifications
2.1 Hardware Requirements
2.2 Software Non-Functional Requirements
2.3 Software Functional Requirements
3 Architectural Design
4 Detailed Design
4.1 Edit Settings, Save Settings, and Load Settings on Initialization
4.2 Graphical Representation of Nominal Data
4.3 Visualization of Flight Parameters
4.4 Formulae Used for the Creation of Packets for EOTS, Radar, and Telemetry
4.5 Create an EOTS/Radar/Telemetry Packet
4.6 Send Packets
4.7 Control of Data Transmission
5 Testing
5.1 Socket Creation and Data Transmission
5.2 Rate of Transmission
5.3 Reading Nominal Files
5.4 Transmission of the Packet of Tracking Sensors
5.5 Graphical Representation and Visualization of Data
5.6 GUI Controls
6 Conclusion and Future Scope
References
Discovering Biomarkers in Parkinson's Disease Using Module Correspondence and Pathway Information
1 Introduction
2 Literature Review
3 Materials and Methods
4 Description
4.1 Topological Aspect of Module Correspondence
4.2 Module Correspondence from Pathway Point of View
5 Identification of Interesting Biomarkers
6 Hub Gene Analysis in Modules Based on Centrality
7 Conclusion and Future Work
References
Indian Regional Spoken Language Identification Using Deep Learning Approach
1 Introduction
2 Literature Review
3 Dataset and Pre-processing
3.1 Dataset Used
3.2 Pre-processing
4 Feature Extraction
4.1 Framing
4.2 Windowing
4.3 Fast Fourier Transform (FFT)
4.4 Mel Frequency Wrapping
4.5 Mel Cepstrum Coefficient
5 Result and Discussion
6 Conclusion
References
A Deep Learning Based Android Application to Detect the Leaf Diseases of Maize
1 Introduction
2 Material and Methods
2.1 About Dataset
2.2 About MobileNet Architecture
2.3 Android Application for Maize Leaf Detection
3 Discussion
4 Conclusion
References
Inversion Formula for the Wavelet Transform Associated with Legendre Transform
1 Introduction
2 Preliminaries
3 Continuous Legendre Wavelet Transformation (CLWT)
3.1 Admissible Legendre Wavelet
3.2 Continuous Legendre Wavelet Transform (CLWT)
4 Basic Properties of CLWT
5 Plancherel and Parseval's Relation for CLWT
References
Android Forensics Using Sleuth Kit Autopsy
1 Introduction
1.1 Android File System
1.2 Android SDK
2 Related Work
3 Methodology
3.1 Data Acquisition Stage
3.2 Artifact Finding Stage
4 Conclusion
References
A New Variant of Genetic Algorithm for Solving Gene Selection Problem
1 Introduction
2 Methodologies
2.1 Simple Genetic Algorithm (SGA)
2.2 Twin Removal Genetic Algorithm (TRGA)
2.3 Elitist Twin Removal Genetic Algorithm (ETRGA)
3 Gene Selection by Sample Classification
4 Experimental Results
4.1 Comparison Among Different Variants of GA Based on Benchmark Functions
4.2 Statistical Test
4.3 Convergence Graph for Benchmark Functions
4.4 Comparison Among Different Variants of GA on Gene Selection
5 Conclusion
References
Smartphone Traffic Analysis: A Contemporary Survey of the State-of-the-Art
1 Introduction
2 Smartphone Platforms
3 Smartphone Security Analysis
3.1 Behaviour Analysis
3.2 System Identification
3.3 Malware Detection
4 Conclusion and Future Direction
References
An Approach Towards IoT-Based Healthcare Management System
1 Introduction
1.1 IMS Layers
1.2 SIP
2 Related Work and Research Gaps
3 Proposed Work
4 Results and Discussions
5 Conclusion and Future Scope
References
DPL Model for Hyperthermia Treatment of Cancerous Cells Using Laser Heating Technique: A Numerical Study
1 Introduction
2 Mathematical Model
3 Computational Scheme
4 Results and Discussion
5 Conclusion
References
Unitary Equivalence of Quantum States in a Bipartite System
1 Introduction
2 Main Results
References
Dynamic Self-dual DeepBKZ Lattice Reduction with Free Dimensions
1 Introduction
2 Preliminaries
2.1 Lattices and Their Bases
2.2 Typical Lattice Problems
3 Lattice Basis Reduction
3.1 Typical Reduction Algorithms
3.2 Measurement of the Output Quality
4 Self-dual DeepBKZ with Free Dimensions
4.1 The Basic Idea of Our Algorithm
4.2 Selection of Free Dimensions
4.3 Detailed Algorithm
5 Experiments
5.1 Implementation
5.2 Experimental Results
6 Conclusion
References
Generation of Pseudorandom Sequence Using Regula-Falsi Method
1 Introduction
2 Regula-Falsi Method
3 Proposed Technique of Pseudorandom Sequence Generation
4 Experimental Results
5 Randomness Test and Security Analysis
5.1 NIST Randomness Test
5.2 Security Analysis
5.3 Information Entropy Analysis
6 Conclusion
References
1D-3v PIC-MCC Based Modeling and Simulation of Magnetized Low-Temperature Plasmas
1 Introduction
2 PIC-MCC Based Kinetic Model
2.1 Constraints
2.2 PIC-MCC Modules
2.3 Plasma Chemistry
2.4 Challenges
3 Plasma Transport in ROBIN Negative Ion Source
4 Comparison of Experimental Results with 1D-3V PIC-MCC Simulation Result
5 Conclusion
References
Dynamical Behavior of Ion-Acoustic Periodic and Solitary Structures in Magnetized Solar Wind Plasma
1 Introduction
2 Model Equations
3 Derivation of the Schamel Equation
4 Dynamical System
5 Exact Solution of the Schamel Equation
6 Conclusion
References
Substructuring Waveform Relaxation Methods with Time-Dependent Relaxation Parameter
1 Introduction
2 Classical DNWR and Its Convergence Results
3 Classical NNWR and Its Convergence Result
4 Analysis with Time-Dependent Parameter
4.1 DNWR Algorithm
4.2 NNWR Algorithm
5 Numerical Illustration
6 Concluding Remarks
References
A Generalized Hilbert Operator on Bloch Space and BMOA Spaces
1 Introduction
2 Main Results
References
Determining the Disease Status Using Gene Expression Analysis
1 Introduction
2 Similarity Identification Problem
3 Methodology
3.1 Data-Driven Grouping
3.2 Benjamini-Hochberg
3.3 Euclidian Distance and Cosine Similarity
4 Data and Experimental Results
4.1 Data and Experimental Setting
4.2 Results and Discussion
5 Conclusion
References
Generalized Double Statistical Convergence in Topological Groups
1 Introduction
2 Definitions and Notation
3 λ-Double Statistical Convergence
References
Exact Soliton Solutions to the Nano-Bioscience and Biophysics Equations Through the Modified Simple Equation Method
1 Introduction
2 Description of the Method
3 Formulation of the Solutions
3.1 The Equation of Nano-Ionic Currents Along MTs
3.2 The Equation of MTs as Nonlinear RLC Transmission Line
4 Graphical Representations and Discussion
4.1 Physical Interpretations of the Soliton Solutions of Nano-Ionic Currents Along MTs
4.2 Physical Interpretations of the Solitons of MTs as Nonlinear RLC Transmission Line
5 Conclusion
References
Design of Optimal Bayesian Reliability Test Plans for a Parallel System Based on Type-II Censoring
1 Introduction
2 Optimal Design of the Problem
3 Numerical Results
4 Conclusions
References
l2 Norm Prior-Based Modified Bright Channel for Low-Illumination Images
1 Introduction
2 Background of Bright Channel
3 Proposed Model
4 Advantage of the Proposed Method
5 Discussion and Results
6 Conclusion
References
Existence Results of Mild Solutions for Impulsive Fractional Differential Equations with Almost Sectorial Operators
1 Introduction
2 Preliminaries
3 Existence Results
3.1 Example
References
Effective Algebraic Methods are Widely Applicable
1 Introduction
2 Reductions of Associative Algebras
2.1 Associative Algebra
2.2 Construction of a Basis
2.3 Discriminant of Algebra
2.4 ALS-Criterion
3 Shemesh Criterion and Its Generalisation
4 Root Classifications of Polynomials
4.1 Discrimination Matrix and Discriminant Sequence
4.2 Number of Positive/Negative Roots
5 Applications
5.1 Dynamical Systems
5.2 Stability of Dynamical Systems
5.3 Decoherence-Free Subspaces
5.4 Cellular Networks
References
n-Fractals in Partial Metric Spaces
1 Introduction
2 Preliminaries
3 n-Fractals in Partial Metric Spaces
References
Some Existence Results on Impulsive Differential Equations
1 Introduction
2 Preliminaries
3 Main Results
4 Integro-Differential Equation
5 Application
References
Weighted Norm Inequality for General One-Sided Vector Valued Maximal Function
1 Introduction
2 Preliminaries
3 Main Results
References
Author Index