𝔖 Scriptorium
✦   LIBER   ✦

📁

Advanced Computing and Systems for Security: Volume 13

✍ Scribed by Rituparna Chaki, Nabendu Chaki, Agostino Cortesi, Khalid Saeed


Publisher
Springer
Year
2021
Tongue
English
Leaves
196
Series
Lecture Notes in Networks and Systems
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book features extended versions of selected papers that were presented and discussed at the 8th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2021), held in Kolkata, India, on April 9–10, 2021. Organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology at the University of Calcutta, the symposium’s international partners were Ca' Foscari University of Venice, Italy, and Bialystok University of Technology, Poland. The topics covered include biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks, and security systems, reflecting the various symposium sessions.

✦ Table of Contents


Preface
Contents
Editors and Contributors
Distributed Systems
An Event-B based Device Description Model in IoT with the Support of Multimodal System
1 Introduction
2 Related Work
3 IoT Resource Description Model and Its Implementation in Event-B
3.1 Resource Description in IoT
3.2 Event-B Method
3.3 Event-B Model of Resource Description
3.4 Proof Obligations
4 Illustration of Proposed Model Through a Case Study
4.1 Implementation
4.2 Observation
5 Conclusion
References
Image Data Handling in a Multinode Environment Using MPI
1 Introduction
2 Present State of the Art
3 Experimental Setup
4 Overview of the MPI Cluster Application for Image Data Handling
4.1 Structure of Input Image Dataset
4.2 Flow of the Application
5 Experimental Results
5.1 Performance Gain
6 Observation
7 Conclusion and Future Work
References
A TSV Constrained Algorithm for Designing Balanced Wrapper Chains in 3D SoC
1 Introduction
2 Problem Formulation
3 Proposed Work
3.1 Initial Assignment (Init_Assgn_phase())
3.2 Test-Time Minimization Phase (Minimize_TT_phase())
3.3 TSV Count Minimization Phase (Minimize_TSV_phase())
3.4 Ordering the Scan Chains and Counting TSVs
3.5 Flow of the Scan Chain Distribution Procedure
3.6 Input and Output Cells Assignment
4 Experimental Results
5 Conclusions and Future Work
References
Image Processing
An Efficient Algorithm for Boundary Detection of Noisy or Distorted Eye Pupil
1 Introduction
2 State of Art
3 Proposed Algorithm
4 Experiments
5 Conclusions
References
An Intelligent Scheme for Human Ear Recognition Based on Shape and Amplitude Features
1 Introduction
2 Review of the Existing Works
3 Proposed Methodology
3.1 Pre-processing
3.2 Derivation of Features
3.3 Feature Selection
4 Analysis and Classification
5 Conclusion
References
Iris-Based Approach to Human Identity Recognition by Discrete Fast Fourier Transform Components
1 Introduction
2 How Others See It
3 Proposed Solution
3.1 Iris Segmentation
3.2 Feature Vector Creation
4 Results
4.1 Quality Testing Procedure
5 Conclusions and Future Work
References
Machine Learning
Discrete Genetic Learning-Enabled PSO for Influence Maximization
1 Introduction
2 Related Work
3 Preliminaries and Problem Statement
3.1 Preliminaries
3.2 Influence Maximization Problem Statement
4 Proposed Method
4.1 Discrete Genetic Learning-Based Particle Swarm Optimization
4.2 Local Search Based on Maximum Degree Neighbor Heuristic
5 Experimental Results
5.1 Dataset and Parameters
5.2 Influence Spread Comparison
5.3 Execution Time Comparison
6 Conclusion
References
Deep Classification of Gun Carried by Moving Persons Using Proposed TUVD-CSA Dataset
1 Introduction
2 Database Description
2.1 Class A
2.2 Class B
3 Methodology
4 Evaluation
5 Conclusion
References
A Deep Learning-Based Approach to Single/Mixed Script-Type Identification
1 Introduction
1.1 Script-Type in Documents
2 Literature Study
3 Proposed Method
3.1 Deep Learning-Based Architecture
4 Experiment
4.1 Dataset Preparation & Evaluation Protocol
4.2 Results and Analysis
4.3 Comparison
5 Conclusion
References
Algorithms
An Intelligent PAPR Reduction Technique for OFDM Systems Based on Adaptive Mutation-Oriented Differential Evolution Algorithm
1 Introduction
2 OFDM Systems and PAPR Concept
3 Tone Injection
4 The Proposed DE Algorithm
4.1 Combined Adaptation of Controlling Parameters and Mutation Strategy
4.2 Mutation Strategy
4.3 Recombination Scheme
4.4 Selection Strategy Depending on One-to-One Competition
5 Proposed DE-Based TI Scheme
6 Discussion of Simulation Consequences
6.1 PAPR Decreasing Efficiency
6.2 BER Performance
6.3 Analysis of Computational Complexity
7 Conclusions
References
Solving Sudoku Using Neighbourhood-Based Mutation Approach of Genetic Algorithm
1 Introduction
2 Literature Survey
3 Proposed Algorithm
3.1 Initialization and Subgrid Numbering
3.2 Proposed Neighbourhood Mutation-Based Genetic Algorithm
3.3 Fitness Function
3.4 Crossover, Mutation, and Selection for the Next Generation
4 Results and Discussions
4.1 Exhaustive Run of the Instances and Their Status
4.2 A Brief Comparison with Other Existing Works
5 Conclusions and Further Works
Appendix
Sample Easy Sudoku Instances
Sample Medium Sudoku Instances
Sample Hard Sudoku Instances
References
Shortest n-paths Algorithm for Traffic Optimization
1 Introduction
2 Shortest Alternative Paths
2.1 Related Work
2.2 Plateau Algorithm
2.3 Compilation of Alternative Paths
2.4 Heuristics for Redundant Paths
2.5 Elliptic Filter
2.6 Road Class Filter
2.7 Plateau Algorithm Using Time-Dependent Edge Evaluation
3 Experiments
4 Conclusions and Future Work
References
Steganography Algorithm for Voice Transmission in VHF Band
1 Introduction
2 Motivation and Contribution
3 Audio Steganography Methods
3.1 Temporal Domain Methods
3.2 Frequency Domain
3.3 Cepstral Domain
3.4 Wavelet Domain
4 Human Hearing Sense
5 Proposed Scheme
5.1 Encoder
5.2 Decoder
6 Experiments
6.1 Embedding Data
6.2 Extraction of Data
7 Conclusion
References


📜 SIMILAR VOLUMES


Advanced Computing and Systems for Secur
✍ Rituparna Chaki, Nabendu Chaki, Agostino Cortesi, Khalid Saeed 📂 Library 📅 2021 🏛 Springer 🌐 English

This book features extended versions of selected papers that were presented and discussed at the 8th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2021), held in Kolkata, India, on April 9–10, 2021. Organized by the Departments of Computer Science & Engineering a

Advanced Computing and Systems for Secur
✍ Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki 📂 Library 📅 2019 🏛 Springer Singapore 🌐 English

<p><p></p><p>The book includes extended versions of selected papers discussed and presented at the 5th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2018) held in Kolkata, India on February 9–11, 2018. The symposium was organized by the University of Calcutta’s D

Advanced Computing and Systems for Secur
✍ Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki 📂 Library 📅 2019 🏛 Springer Singapore 🌐 English

<p><p>The book includes extended versions of selected papers discussed and presented at the 5th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2018) held in Kolkata, India on February 9–11, 2018. The symposium was organized by the University of Calcutta’s Departme

Advanced Computing and Systems for Secur
✍ Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki 📂 Library 📅 2020 🏛 Springer Singapore 🌐 English

<p><p></p><p>This book features extended versions of selected papers that were presented and discussed at the 6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2019) held in Kolkata, India on 12–13 March, 2019. Organized by the Departments of Computer Science & E

Advanced Computing and Systems for Secur
✍ Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki 📂 Library 📅 2020 🏛 Springer Singapore 🌐 English

<p><p></p><p>This book features extended versions of selected papers that were presented and discussed at the 6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2019) held in Kolkata, India on 12–13 March, 2019. Organized by the Departments of Computer Science & E

Advanced Computing and Systems for Secur
✍ Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki 📂 Library 📅 2021 🏛 Springer Singapore;Springer 🌐 English

<p>This book features extended versions of selected papers that were presented and discussed at the 7th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2020) held in Kolkata, India on February 28–29, 2020. Organized by the Departments of Computer Science & Engineer