Emerging Research in Computing, Information, Communication and Applications: ERCICA 2016 1st Edition by N. R. Shetty, L. M. Patnaik, N. H. Prasad, N. Nalini – Ebook PDF Instant Download/DeliveryISBN: 9811047411, 9789811047411
Full download Emerging Research in Computing, Information, Communication and Applications: ERCICA 2016 1st Edition after payment.
Product details:
ISBN-10 : 9811047411
ISBN-13 : 9789811047411
Author: N. R. Shetty, L. M. Patnaik, N. H. Prasad, N. Nalini
This book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2016. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.
Emerging Research in Computing, Information, Communication and Applications: ERCICA 2016 1st Table of contents:
1 Development of Accurate Face Recognition Process Flow for Authentication
Abstract
1 Introduction
2 Background Study
3 System Study
4 System Design
5 System Implementation
6 Performance Estimation
7 Results
8 Conclusion
References
2 Simulation and Performance Evaluation of WSN-Based Architecture for Animal Health Monitoring Using
Abstract
1 Introduction
2 Related Work
3 Proposed Architecture
4 Simulation Scenario
4.1 Simulation Process
5 Simulation Result
6 Conclusion
References
3 Random Route Adoption Algorithm to Provide Source Location Privacy in Wireless Sensor Network
Abstract
1 Introduction
2 Related Work
3 Random Route Adoption Algorithm
4 Conclusion
References
4 Improving Energy Efficiency and Reliability of Wireless Sensor Networks with MC-AODV Routing Proto
Abstract
1 Introduction
2 Energy Efficient Methodologies
3 Proposed EC-AODV Routing Protocol
4 Evaluate Routing Parameters
5 Result
6 Conclusion
References
5 Aspect Based Sentiment Analysis Using R Programming
Abstract
1 Introduction
2 Related Work
3 Methodology
3.1 POS Tagging
3.2 Frequent Feature Identification
3.3 Opinion Word Extraction
3.4 Sentiment Orientation Identification
3.5 Classification
3.6 AccuracyCalculation and Comparison
3.7 Result Visualization
4 Experiment Results
5 Future Work
References
6 Frequency Domain Technique to Remove Herringbone Artifact from Magnetic Resonance Images of Brain
Abstract
1 Introduction
2 Methodology
3 Experimental Results & Discussion
4 Conclusion
Refernces
7 Face Recognition Through Symbolic Data Modeling of Local Directional Gradient
Abstract
1 Introduction
2 Symbolic Data Modeling Approach to Face Recognition
3 Symbolic Modeling
3.1 Features for Symbolic Representation
3.2 Symbolic Data Modeling of Face Image
4 Symbolic Similarity Analysis
5 Results and Performance Analysis
6 Conclusion
References
8 Multidimensional Image Indexing Using SR-Tree Algorithm for Content-Based Image Retrieval System
Abstract
1 Introduction
2 Literature Review
3 Feature Extractions
3.1 The Color Histogram
3.2 Color Co-occurrence Matrix
4 Multidimensional Indexing
5 Feature Matching Process
6 Conclusions
References
9 A Novel Approach to Mapping for KBQA System Using Ontology
Abstract
1 Introduction
2 Literature Survey
3 Architecture Diagram
3.1 Question Preprocessing
3.2 Concept Mapping of Tokens
4 Experimental Result
5 Conclusion
References
10 An Adaptive Grouping Scheme for Avoiding Hidden Node Collision in IEEE 802.15.4 LR-WPAN
Abstract
1 Introduction
2 IEEE 802.15.4 Overview
3 Grouping Scheme
4 Experimental Results
5 Conclusion
References
11 An Approach to Classify Engineering Materials Using Machine Learning Algorithm
Abstract
1 Introduction
2 Literature Survey
3 Objective
4 Methodology
5 Conclusion
References
12 Performance Analysis and Assessment of Safety Critical Systems Using Ann
Abstract
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Block Diagram
3.2 Flowchart
4 Implementation
4.1 Modeling of Sensor
4.2 Classification Algorithm
4.3 Prediction Algorithm
5 Results
6 Conclusion
References
13 Functional Mode Analysis of Safety Critical Systems Using Causal Bayesian Networks (CBNs)
Abstract
1 Introduction
2 Background Work
3 Proposed Approach
3.1 Knowledge Modeling and Evidential Reasoning
3.2 Machine Learning
4 Implementation
4.1 Knowledge Modeling and Evidential Reasoning
4.2 Machine Learning
4.2.1 Performance Analysis
4.2.2 Model Inference
4.2.3 Interactive Inference
5 Simulation and Results
5.1 Knowledge Modeling and Evidential Reasoning
5.2 Machine Learning
6 Conclusion & Future Work
Acknowledgements
References
14 Concept-Based Extractive Text Summarization Using Graph Modelling and Weighted Iterative Ranking
Abstract
1 Introduction
2 Related Work
3 System Architecture
4 Experimental Results and Analysis
5 Conclusion
References
15 Kannada Speech Recognition Using Decision Tree Based Clustering
Abstract
1 Introduction
2 System Overview
3 Language Model
3.1 Backed-off Bigram Language Model
3.2 Perplexity
4 Acoustic Model
5 Implementation
6 Conclusion
Acknowledgements
References
16 Automatic Hand Raise Detection by Analyzing the Edge Structures
Abstract
1 Introduction
2 Block Diagram for Hand Raise Detection
3 Hand Raise Detection
4 Results and Analysis
5 Conclusion
References
17 Performance Evaluation and Improvement of R-CTP for Enhanced Packet Transmission and Latency
Abstract
1 Introduction
2 Related Works
3 Performance Analysis of R-CTP, CTP and Other CTP Variants
4 Proposed Work
5 Simulation Results of Proposed Improvements
6 Evaluation of the Improved Results
7 Conclusion and Future Work
References
18 Signal Processing of Motor Imagery EEG Waves Using Empirical Mode Decomposition
Abstract
1 Introduction
1.1 Nonstationarity in EEG Waves
1.2 EEG Waves Features
1.3 EEG Waves Feature Selection
2 Experimentation
2.1 Time Domain EEG Waves of the Subjects
2.2 Power Spectral Density
3 EEG Signal Processing
3.1 Fourier Analysis for EEG Waves
3.2 Time-Frequency Domain Analysis for EEG Signals
3.3 Hilbert Huang Transform
3.4 Empirical Mode Decomposition
4 Results
5 Conclusion
6 Future Work
References
19 Mining Infrequent Itemsets from Text by Applying Recursive Learning and Fuzzy Logic
Abstract
1 Introduction
2 Related Work
3 Methods
4 Evaluation of Results
5 Conclusion
References
20 Mitigating Spam Emails Menace Using Hybrid Spam Filtering Approach
Abstract
1 Introduction
2 Related Work
3 Methodology
3.1 Training of Spam Filter
3.2 Detection of Spam Emails
4 Experimental Results
5 Conclusion and Future Work
References
21 Novel HBM Spacing Policy for Fuzzy Based Forward Collision Avoidance System in Vehicle
Abstract
1 Introduction
2 Spacing Policies
3 Fuzzy Controller for FCAS
4 Test Scenarios and Simulation Result
5 Conclusion
References
22 Comparative Analysis of New Hybrid Approach for Overlay Construction in P2P Live Streaming
Abstract
1 Introduction
2 Overlay
3 New Hybrid Approach
4 Simulation and Result
5 Conclusion
References
23 Ant-AODV-VANET: A Bio-Inspired Routing Protocol for VANET
Abstract
1 Introduction
1.1 Ant Colony Optimization (ACO)
2 Related Work
2.1 AODV-VANET
3 Our Approach: Ant-AODV-VANET
3.1 Working Principle of Proposed Protocol: Ant-AODV-VANET
3.2 Algorithm of Proposed Protocol: Ant-AODV-VANET
4 Results and Analysis
5 Conclusion
References
24 Time Dispersion Parameters for Double Bounce Geometrical Channel Including Rain Fading Effect
Abstract
1 Introduction
2 Proposed Model Description
3 Marginal ToA Pdf
4 Simulation Result
5 Conclusion
References
25 Assistive Text on Hand Held Objects for Blind People
Abstract
1 Introduction
2 Framework
3 Text Detection
4 Text Recognition
5 Experiments
6 Conclusion
References
26 Intra Frame Coding in H.264 to Obtain Consistent PSNR and Reduce Bit Rate for Diagonal Down Right
Abstract
1 Introduction
2 Methodology
3 Proposed Diagram
4 Intra Prediction
5 Gaussian Pulse
6 Diagonal Down Right Intra Prediction
7 Algorithm
8 Experimental Results
9 Conclusion
References
27 iKan—A Kannada Transliteration Tool for Assisted Linguistic Learning
Abstract
1 Introduction
2 Related Work
3 Proposed Transliteration Approach
4 Empirical Results
4.1 Case Study
5 Conclusion and Future Work
References
28 An Exploitation of Postulating Privacy in Utilization of Cloud Services with Crowdsourcing by Imp
Abstract
1 Introduction
1.1 Applications of Mobile Crowdsourcing
1.1.1 Mobile Crowdcomputing
1.1.2 Mobile Crowdsensing
1.2 Key Challenges in Mobile
1.2.1 Egocentrism and Incentive
1.2.2 Task Allocation
1.2.3 Security Threats
1.2.4 PRIVACY LEAKAGE
1.3 Solutions for Mobile Crowdsourcing Applications
1.3.1 Social-Aware Task Allocation for Internet-Based Mobile Crowdcomputing
2 Challenges and Elucidations of Crowdsourcing
2.1 Issues of Crowdsourcing
2.1.1 Service or the Product Being Outsource
2.1.2 Collaborations in Crowdsourcing
2.1.3 Managerial Level of Control Systems
3 Implementation of IRT in Data Analysis
3.1 Key Concepts of IRT
3.1.1 Item Response Function
3.1.2 Computation of Characteristic Curves
4 Implementation of Privacy Framework
4.1 Context Vocabulary
4.2 Sharing the Policy
4.3 Crowdsourcing
4.4 Evaluation of Risk
4.5 Policy Recommendation
5 Determination of Risk Evaluation in Crowdsourcing
5.1 Querying for Privacy Aware
6 Computation of Sensitivity and Risk Evaluation
7 Conclusions
References
29 Music Information Retrieval: A Window into the Needs and Challenges
Abstract
1 Introduction
2 The Reasons for “Music IR Is Hard”
3 Needs for Music Information
4 Audio and Music Representations
5 The Four Parameters for Notes and Music Retrieval
5.1 Pitch Matching and Realistic Databases
5.2 Salience
5.3 Confounds
5.4 Cross-Voice Matching
5.5 Polyphonic Queries
6 Monophonic Feature Selection
6.1 Absolute Measures Vs. Relative
6.2 Unigram Vs. N-Grams
6.3 Shallow Structure
7 Polyphonic Feature Selection
7.1 Monophonic Reduction
7.1.1 Short Sequences
7.1.2 Long Sequences
7.2 Homophonic Reduction
7.3 Monorhythmic and Homorhythmic Reduction
8 Conclusion
References
30 Cuckoo Search-Based View Selection
Abstract
1 Introduction
2 CSA
3 CSVSA
4 Experimental Results
5 Conclusion
References
31 A Regression Model for Estimating the Cooling Time of Material Using Digital Microstructure Image
Abstract
1 Introduction
2 Materials Used
3 Proposed Methodology
3.1 Microstructure Image Analysis
3.2 Regression Analysis
4 Experimental Results and Discussion
5 Conclusion
References
Information
32 SDaaS: Framework of Sensor Data as a Service for Leveraging Services in Internet of Things
Abstract
1 Introduction
2 Related Work
3 Problem Identification
3.1 Ignorance to Type of Data Complexity
3.2 Usage of Unnecessary Cloud Storage
3.3 Problem of Storing Unstructured Data
4 Proposed System
4.1 A Robust Emulation
4.2 A Scalable Storage
4.3 A Simple Knowledge Mining
5 Research Methodology
5.1 Generation of Sensory Data
5.2 Developing a Scalable Storage System
5.3 A Simple Knowledge Mining
6 Algorithm Implementation
7 Result Discussion
7.1 Analysis of Response Time
7.2 Analysis of Memory Usage
8 Conclusion
References
33 An Approach for Efficient Capacity Management in a Cloud
Abstract
1 Introduction
2 Traditional Approaches Vs. Cloud
3 Capacity Planning for Physical Servers
4 Sizing Template
5 Memory Overheads in Virtual Machines
5.1 Overhead in Virtual Machines
6 Research Environment
7 Template Combinations
7.1 Wastage Scenario
7.2 Proposed Plan
8 Conclusions
References
34 Automated Negotiation of QOS Parameters Using Fuzzy Logic Based Concession Strategy for Cloud Com
Abstract
1 Introduction
2 Related Work
3 The Actual Problem Scenario
4 Existing Negotiation Solution: Tradeoff and Simple Concession
5 Fuzzy Logic Based Concession Strategy
6 Comparison of Negotiation Strategies
7 Conclusion and Future Work
References
35 Intrusion Detection System Based on BCS-GA in Cloud Environment
Abstract
1 Introduction
2 Related Work
3 Preliminary Study
4 Proposed Model
5 Performance
6 Conclusion
References
36 Unsupervised Document-Level Sentiment Analysis of Reviews Using Macaronic Parser
Abstract
1 Introduction
2 Related Study
3 Proposed System
4 Proposed Algorithm
5 Evaluation of the System
6 Conclusion
References
37 Efficient Speech Compression Using Waveform Coding in Time Domain
Abstract
1 Introduction
2 Related Work
3 Proposed Method
3.1 Algorithm Strategy
3.2 Algorithm for Compression
3.3 Algorithm for Decompression
3.4 Demo Implementation
3.5 Performance Measures
4 Results
5 Conclusion
References
38 Model Based Algorithm Validation Approach for Safety Critical Applications
Abstract
1 Introduction
2 Related Work
3 Case Study
3.1 Signal Data Validation Algorithm
4 Implementation
4.1 Model Based Analog Signal Validation Algorithm
4.2 Analog Data Conversion Algorithm
5 Analyzing Algorithm Validation by Means of Test Cases
5.1 Algorithm for Generate Test Cases of Pitch Trim Analog Input Range Test
5.2 Algorithm for Analysis Test Conditions of Pitch Trim Analog Input Validation Test
6 Simulation Results
7 Conclusion and Future Work
Acknowledgements
References
39 Impact of Different Ground Plane Structures on Sierpinski Monopole Antenna
Abstract
1 Introduction
2 Concepts and Theory
3 Sierpinski MonopoleAntenna
4 Discussion of the Results
5 Conclusions
References
40 Smart Authentication Using Graphical Password for Android Devices
Abstract
1 Introduction
2 Related Work
2.1 Pass-Points
2.2 Cued Click Points
2.3 Persuasive Cued Click Points
3 Proposed System
4 Implementation
5 Comparion
6 Conclusions and Future Work
References
41 New Security Architecture for Big Data Hadoop
Abstract
1 Introduction
2 Hadoop Security Framework
2.1 Delegation Token
2.2 Block Access Token
2.3 Job Token
3 Limitations
4 Proposed Work
4.1 Modified Tokens
4.1.1 Block Access Token
4.1.2 Delegation Token
4.2 Authentication Protocol
5 Security Analysis of Proposed Work
6 Conclusion
References
42 An Overview of Bio-Inspired Computing
Abstract
1 Introduction
2 Swarm Intelligence
3 Neural Networks
4 Artificial Immune Systems
4.1 Immune Network Theory
4.2 Negative Selection
4.3 Clonal Selection
4.4 Bridge Fault Detection
5 Conclusion
References
43 Providing Cloud Services to an Autonomous Robotic Car in Real-Time Traffic Environment
Abstract
1 Introduction
2 Dynamic Vehicle Traffic Routing Problem
2.1 Definition
2.2 Algorithm Notation
2.3 Algorithm Description
2.4 Additional Constraint
2.5 Heuristic
3 Use of Cloud Computing in Dynamic Vehicle Traffic Routing Algorithm
3.1 Introduction and Necessity of Cloud
3.2 OpenStack
3.3 Other Cloud Computing Platforms
4 Experimental Results
5 Conclusion and Future Work
References
Communication
44 Evaluation Energy Parameter Using Jumper Firefly Algorithm in Wireless Sensor Networks
Abstract
1 Introduction
2 Related Works
3 System Design
3.1 Network Model
3.2 Protocol Description
3.2.1 Attractiveness and Light Intensity
3.2.2 Cluster Setup
3.2.3 Energy Consumption
3.3 Routing Protocol
3.4 Jumper Firefly Algorithm
3.5 Activity Diagram
3.6 Simulation
4 Result Analysis
4.1 Comparison of Number of Nodes Versus Network Lifetime
4.2 Comparison of Number of Nodes Versus Throughput
5 Conclusion
References
45 Developing a Context-Aware Secure Model for Sensor Network Environment
Abstract
1 Introduction
2 Related Work
3 The Approach and Method
4 Ontology Development
5 Conclusion
References
46 Inter Cluster Balanced LEACH Algorithm for Energy Efficient Wireless Sensor Network
Abstract
1 Introduction
2 Related Work
3 System Model and Problem Description
4 Proposed Algorithm
5 Conclusion
References
47 EPCA: Energy Preservation using Clustering Approximation in Sensor Network
Abstract
1 Introduction
2 Related Work
3 Problem Identification
4 Proposed System
5 Algorithm Design
6 Result Analysis
7 Conclusion
References
48 Federating Disjoint Segments in Wireless Sensor Networks Using Jumping Particle Swarm Optimizatio
Abstract
1 Introduction
2 Related Work
3 Proposed Solution
4 Results Discussion
5 Conclusion and Future Scope
References
Applications
49 Enhancing Security of Stature System by Using Sybil Detection
Abstract
1 Introduction
2 Definitions
3 Background
3.1 SybilGuard
3.2 SybilLimit
3.3 SybilInfer
3.4 GateKeeper
3.5 SumUp
3.6 MobID
4 Proof of Proposed Work
4.1 Base Work
4.2 Proposed Work
5 Experimental Evaluation
6 Conclusion
References
50 Word Sense Disambiguation for Indian Languages
Abstract
1 Introduction
1.1 Natural Language Processing
1.2 Wordnet
1.3 Introduction of WSD
1.4 Need of Research
2 Literature Survey
2.1 Approaches to WSD
2.1.1 Knowledge Base Approach
2.1.2 Supervised Approach
2.1.3 Unsupervised Approach
Similarity-Based Methods
Graph-Based Methods
2.2 Working of Graph-Based Algorithm
2.2.1 Global Measures
Compactness
Entropy
Edge Density
2.2.2 Local Measures
Degree Centrality
Key Player Problem (KPP)
3 Implementation
3.1 Implementation Unsupervised Graph-Based Approach in Hindi Language
4 Performance Analysis
5 Conclusion
References
People also search for Emerging Research in Computing, Information, Communication and Applications: ERCICA 2016 1st:
emerging topics in computing
emerging technology in communication
emerging computing technologies
emerging technology research
communication research examples
Tags: Emerging Research, Computing, Information, Communication, Applications, ERCICA, N R Shetty, L M Patnaik, N H Prasad, N Nalini