Lecture Notes in Electrical Engineering
Volume 601
Series Editors
Leopoldo Angrisani, Department of Electrical and Information Technologies Engineering, University of NapoliFederico II, Naples, ItalyMarco Arteaga, Departament de Control y Robótica, Universidad Nacional Autónoma de México, Coyoacán,MexicoBijaya Ketan Panigrahi, Electrical Engineering, Indian Institute of Technology Delhi, New Delhi, Delhi, IndiaSamarjit Chakraborty, Fakultät für Elektrotechnik und Informationstechnik, TU München, Munich, GermanyJiming Chen, Zhejiang University, Hangzhou, Zhejiang, ChinaShanben Chen, Materials Science and Engineering, Shanghai Jiao Tong University, Shanghai, ChinaTan Kay Chen, Department of Electrical and Computer Engineering, National University of Singapore,Singapore, SingaporeRüdiger Dillmann, Humanoids and Intelligent Systems Laboratory, Karlsruhe Institute for Technology,Karlsruhe, GermanyHaibin Duan, Beijing University of Aeronautics and Astronautics, Beijing, ChinaGianluigi Ferrari, Università di Parma, Parma, ItalyManuel Ferre, Centre for Automation and Robotics CAR (UPM-CSIC), Universidad Politécnica de Madrid,Madrid, SpainSandra Hirche, Department of Electrical Engineering and Information Science, Technische UniversitätMünchen, Munich, GermanyFaryar Jabbari, Department of Mechanical and Aerospace Engineering, University of California, Irvine, CA,USALimin Jia, State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, ChinaJanusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, PolandAlaa Khamis, German University in Egypt El Tagamoa El Khames, New Cairo City, EgyptTorsten Kroeger, Stanford University, Stanford, CA, USAQilian Liang, Department of Electrical Engineering, University of Texas at Arlington, Arlington, TX, USAFerran Martín, Departament d’Enginyeria Electrònica, Universitat Autònoma de Barcelona, Bellaterra,Barcelona, SpainTan Cher Ming, College of Engineering, Nanyang Technological University, Singapore, SingaporeWolfgang Minker, Institute of Information Technology, University of Ulm, Ulm, GermanyPradeep Misra, Department of Electrical Engineering, Wright State University, Dayton, OH, USASebastian Möller, Quality and Usability Laboratory, TU Berlin, Berlin, GermanySubhas Mukhopadhyay, School of Engineering & Advanced Technology, Massey University,Palmerston North, Manawatu-Wanganui, New ZealandCun-Zheng Ning, Electrical Engineering, Arizona State University, Tempe, AZ, USAToyoaki Nishida, Graduate School of Informatics, Kyoto University, Kyoto, JapanFederica Pascucci, Dipartimento di Ingegneria, Università degli Studi “Roma Tre”, Rome, ItalyYong Qin, State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, ChinaGan Woon Seng, School of Electrical & Electronic Engineering, Nanyang Technological University,Singapore, SingaporeJoachim Speidel, Institute of Telecommunications, Universität Stuttgart, Stuttgart, GermanyGermano Veiga, Campus da FEUP, INESC Porto, Porto, PortugalHaitao Wu, Academy of Opto-electronics, Chinese Academy of Sciences, Beijing, ChinaJunjie James Zhang, Charlotte, NC, USA
The book series Lecture Notes in Electrical Engineering (LNEE) publishes thelatest developments in Electrical Engineering - quickly, informally and in highquality. While original research reported in proceedings and monographs hastraditionally formed the core of LNEE, we also encourage authors to submit booksdevoted to supporting student education and professional training in the variousfields and applications areas of electrical engineering. The series cover classical andemerging topics concerning:
• Communication Engineering, Information Theory and Networks• Electronics Engineering and Microelectronics• Signal, Image and Speech Processing• Wireless and Mobile Communication• Circuits and Systems• Energy Systems, Power Electronics and Electrical Machines• Electro-optical Engineering• Instrumentation Engineering• Avionics Engineering• Control Systems• Internet-of-Things and Cybersecurity• Biomedical Devices, MEMS and NEMS
For general information about this book series, comments or suggestions, pleasecontact [email protected].
To submit a proposal or request further information, please contact thePublishing Editor in your country:
China
Jasmine Dou, Associate Editor ([email protected])
India, Japan, Rest of Asia
Swati Meherishi, Executive Editor ([email protected])
Southeast Asia, Australia, New Zealand
Ramesh Nath Premnath, Editor ([email protected])
USA, Canada:
Michael Luby, Senior Editor ([email protected])
All other Countries:
Leontina Di Cecco, Senior Editor ([email protected])
** Indexing: The books of this series are submitted to ISI Proceedings,EI-Compendex, SCOPUS, MetaPress, Web of Science and Springerlink **
More information about this series at http://www.springer.com/series/7818
Amit Kumar • Marcin Paprzycki •
Vinit Kumar GunjanEditors
ICDSMLA 2019Proceedings of the 1st InternationalConference on Data Science, MachineLearning and Applications
123
EditorsAmit KumarBioAxis DNA Research Centre Private LtdHyderabad, Telangana, India
Marcin PaprzyckiPolish Academy of ScienceSystems Research InstituteWarsaw, Poland
Vinit Kumar GunjanDepartment of Computer Scienceand EngineeringCMR Institute of TechnologyHyderabad, Telangana, India
ISSN 1876-1100 ISSN 1876-1119 (electronic)Lecture Notes in Electrical EngineeringISBN 978-981-15-1419-7 ISBN 978-981-15-1420-3 (eBook)https://doi.org/10.1007/978-981-15-1420-3
© Springer Nature Singapore Pte Ltd. 2020This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or partof the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmissionor information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilarmethodology now known or hereafter developed.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exempt fromthe relevant protective laws and regulations and therefore free for general use.The publisher, the authors and the editors are safe to assume that the advice and information in thisbook are believed to be true and accurate at the date of publication. Neither the publisher nor theauthors or the editors give a warranty, expressed or implied, with respect to the material containedherein or for any errors or omissions that may have been made. The publisher remains neutral with regardto jurisdictional claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,Singapore
Contents
Intrusion Detection System Using Soft Computing Techniques:A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Pooja Agarwal
Machine Learning Based Outlook for the Analysis of SNP-SNPInteraction for Biomedical Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Nadeem Ahmad, Almas Jabeen, and Khalid Raza
A Compendium on Network and Host Based Intrusion DetectionSystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23K. Rahul-Vigneswaran, Prabaharan Poornachandran, and KP Soman
Performance Evaluation of Stochastic Gammatone Filters . . . . . . . . . . 31N. Nikhitha, G. L. Sumalata, and Ch. Pratyusha Chowdari
Optimization of Multi-way Join Cost Using SystemR* and SharesSkew . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42Chittem Leela Krishna and Poli Venkata Subba Reddy
Study of K-Means Clustering Algorithm for Identification of DengueFever Hotspots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51Nikhita Siringi, Shuchi Mala, and Ashok Rawat
WhatsApp: A Business Tool in Unorganized Retail with Referenceto TAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62Md. Faiz Ahmad and Md. Rashid Farooqi
A Framework for the RNA-Seq Based Classification and Predictionof Disease . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74Naiyar Iqbal and Pradeep Kumar
Bio-Inspired AI Optimization Techniques to Evaluate Data Rateand Minimize Interference in Cognitive Cellular Network . . . . . . . . . . 82Sharada N. Ohatkar and Dattatraya S. Bormane
v
Reduction of PAPR in OFDM Signals Using Grey Wolf OptimizationCombined with SLM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90Reddi Sridevi and T. Madhavi
Idiom Recommendation Using POS Tagging and Sentence Parsing . . . 100Nikhil Anand
Indian and European Script Identification: A Review . . . . . . . . . . . . . 110Aditi R. Gaygole and Dinesh V. Rojatkar
Analysis of Iris Identification System by Using HybridBased PSO Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117Aparna Gale and Suresh Salankar
A Review on Handwritten Indian Script Identification . . . . . . . . . . . . . 131Lalit P. Ganorkar and Dinesh V. Rojatkar
Intelligent Medicine Box for Medication Management UsingInternet-of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139Aishwarya Jagtap, Akshay Chougule, Seema Pujari, Arati Khamkar,and Gurunath Machhale
A Novel Approach of Object Oriented Image SteganographyUsing LSB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144Archana O. Vyas and Sanjay V. Dudul
Power-Cognizant Proactive Routing Protocol for Amending Energyin Ad-hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152B. Devika and P. N. Sudha
Dimensional Insight to Innovations in Security Aspects of CloudComputing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160C. V. Manjushree and A. N. Nandakumar
Classification and Validation of MRI Brain Tumor Using OptimisedMachine Learning Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172Prabhpreet Kaur, Gurvinder Singh, and Parminder Kaur
Automatic Classification of Parkinson’s Disease Based on SeverityEstimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190Kartikay Gupta, Aayushi Khajuria, Deepak Joshi, and Niladri Chatterjee
Grocery Product Classification and Recommendation System Basedon Machine Learning and Customer Profile Identity . . . . . . . . . . . . . . 199R. HanumanthaRaju and Tejas N. Murthy
Enhancing Embedding Capacity of JPEG Images in Smartphonesby Selection of Suitable Cover Image . . . . . . . . . . . . . . . . . . . . . . . . . . 211Dipti Watni and Sonal Chawla
vi Contents
Image Compression Using Convolutional Autoencoder . . . . . . . . . . . . 221Yash Raut, Tasmai Tiwari, Pooja Pande, and Prachi Thakar
IoT Based Reconnaissance Framework for Utilizing DifferentThresholding Algorithms for Detecting Motion by UsingRaspberry Pi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231Prachi Soni, Shrish Verma, and Sudhakar Pandey
A*-Reduct: A Heuristic Rough Set Based Feature SelectionAlgorithm and Its Application to Text Summarization . . . . . . . . . . . . . 239Nidhika Yadav and Niladri Chatterjee
Random Indexing and Centroid Based Technique for MultiDocument Summarization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246Nidhika Yadav, Tanya Aggarwal, and Niladri Chatterjee
Script Identification of South-East and South-West Asia:A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253Sandeepa V. Zakarde and Dinesh V. Rojatkar
A Comparative Study Between Artificial Neural Networksand Conventional Classifiers for Predicting Diagnosis of BreastCancer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261Gunjan Rawal, Rakesh Rawal, Hirav Shah, and Kamlesh Patel
Efficient SBT Architecture for HEVC . . . . . . . . . . . . . . . . . . . . . . . . . 272T. Bharath Kumar and Mamatha Samson
Audio Opinion Mining and Sentiment Analysis of Customer Productor Services Reviews . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282Archana L. Rane and Ankita R. Kshatriya
Effect of Power Distribution of Raman Pumps on the Gain, Flatness,NF, and System Performance of a Hybrid Optical Amplifier . . . . . . . . 294Ajaybeer Kaur, Manjit Singh Bhamrah, and Ahmad Atieh
A Study on Analysis of Noise with Filters for the MRI Imagesof Alzheimer’s Disease . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306Aziz Makandar and Rashmi Somshekhar
A Survey: 5G in IoT is a Boon for Big Data Communicationand Its Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318Prathyusha Mudigonda and Srirama Kanakaratnam Abburi
Probabilistic Framework for Location Prediction Based on TemporalDensity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328Darshan Solanki and Rishabh Singh
Contents vii
Microcontroller Based ANN for Pick and Place Robot CoordinateMonitoring System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340S. Raghul and N. Mohankumar
BCGV: Blockchain Enabled Certificate Generation, Verificationand Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349Amal C Saji, V V Nandakishore, Akshay Vijayan,and John Prakash Joseph
Human Activity Recognition on Multivariate Time Series Data:A Technical Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356I. Anitha Rani and A. Vadivel
Ontological Based Approach of Integrating Big Data:Issues and Prospects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365Jeelani Ahmed and Muqeem Ahmed
Abnormal Human Behavior Detection in Video Using SuspiciousObject Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379Sapna Sharma and Vikrant Dhama
A Decision Support System for MRI Spinal Cord TumorDetection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389S. Shyni Carmel Mary and S. Sasikala
An Approach for Efficient Classification of CT Scan BrainHaemorrhage Types Using GLCM Features with MultilayerPerceptron . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400A. Aafreen Nawresh and S. Sasikala
A Survey—Vanets and Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413Sripada Soumya and V. A. Sankar Ponnapalli
Survey on Fuzzy Associative Classifications Techniquesand Their Performance Evaluation with Different Fuzzy ClusteringTechniques Over Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420Raghuram Bhukya and Jayadev Gyani
A Combined Fuzzy Soft Set—Machine Learning Approachfor Effective Party Recommendation . . . . . . . . . . . . . . . . . . . . . . . . . . 432Sharanya Nagarjan and Anuj Mohamed
Time Division Bargaining for Cognitive Radio EmergencyNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439S. Roy Chatterjee, S. Ghosh, and M. Chakraborty
Detection of Malignant Melanoma Using Various Classifiers . . . . . . . . 448Savy Gulati and Rosepreet Kaur Bhogal
viii Contents
Comparative Analysis of Serial and Parallel Satellite PositioningAlgorithms for GPS and NavIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458K. Sudershan Reddy, Md. Khaja Rahmatullah, Sameeha Fahmeen,Quddusa Sultana, and D. Krishna Reddy
Implementation of Code Cleanup and Code Standard Refactoringwith PMD and UCD Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466Ganesh B. Regulwar, V. M. Thakare, and R. M. Tugnayat
Block Chain Technology: An Outline . . . . . . . . . . . . . . . . . . . . . . . . . . 474Jayasudha Subburaj, V. Ragavi, P. Keerthana, and C. Soundarya Veni
Rotating Solar Trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482Odugu Rama devi, K. Venkateswara Rao, and Sanka Sowmya
Video Super Resolution: A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488Mrunmayee V. Daithankar and Sachin D. Ruikar
Nonlinear Motion and Occlusion Handling for Pedestrian Tracking:Kalman Filter Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496Rohini Devagiri, Nalini C. Iyer, Shruti Maralappanavar, and V. K. Pushkar
Smart Surveillance and Real-Time Human Action RecognitionUsing OpenPose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504Vatsal Rathod, Rishvanth Katragadda, Saurabh Ghanekar, Saurav Raj,Pushyamitra Kollipara, I. Anitha Rani, and A. Vadivel
Case Study: Lead Conversion of Digital Marketing DataUsing Predictive Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510Pedda Vukkalam Vedanth Karthik, Pejawara Guru Prasad Rao,and Madduri Narsimlu
Object Tracking in Videos Using CNN . . . . . . . . . . . . . . . . . . . . . . . . . 520Upasna Singh, Anjali Saini, and Ravi Domala
Performance of EMOTIV EPOC in Unguided Training Schemein Casual User BCI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528Satyajit Sen Purkayastha, V. K. Jain, and H. K. Sardana
A Review of Various Techniques Related to Feature Extractionand Classification for Speech Signal Analysis . . . . . . . . . . . . . . . . . . . . 534Satyajit Pangaonkar and Ashish Panat
Blockchain as a Service for Cloud Storage (BaaS) . . . . . . . . . . . . . . . . 550Manas Singh, Jitendra Nirban, Siddhant Singh, Akshat Raina,and Sujata Oak
Contents ix
A Case Study on Correctness Evaluation of Content BasedRecommender System Based on Text, Semantic Textand Visual Similarity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558Tilottama Goswami and Y. Vaisshnavi
64-Bit Custom Math ISA in Configurable 32-Bit RISC Processor . . . . 564Abhishek Bit
Optimization Scheme for Text Classification Using MachineLearning Naïve Bayes Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576Venkatesh, K. V. Ranjitha, and B. S. Venkatesh Prasad
An Empirical Study of Visual Data Analytics in-Line of IndexingApproach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587A. Nageswara Rao, Bendi Venkata Ramana, and Vijender Kumar Solanki
Unit Testing of ETSI Cellular Text Telephone Modem . . . . . . . . . . . . 593Arvind Vishnubhatla
Parallelized Heat Map Algorithm Using Multiple Cores . . . . . . . . . . . 602Kolasani Lahari and M. Supriya
Planar Inverted-F Antenna Using Defected Ground Surfacefor Mobile Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611Tejaswi Jadhav and Shraddha Deshpande
An Overview of Microservices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620Roshni Pradhan and Amiya Kumar Dash
Emotional Intelligence of People Towards Political Parties in AndhraPradesh Based on Twitter Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626R. Kiran Kumar and P. Bharathi Devi
Survey on Blockchain Consensus Strategies . . . . . . . . . . . . . . . . . . . . . 637H. S. Jennath and S. Asharaf
A Novel Approach for Enhancement of Security and Compressionfor Cloud Data Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655R. Kiran Kumar, D. Rathna Kishore, and D. Suneetha
Cross Platform Recommendation System . . . . . . . . . . . . . . . . . . . . . . . 663Anusha Kanungo, Shweta Kamath, Simran Gosai, and Ravita Mishra
Improved Honey Cipher Structure Using Least Significant BitTechniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671M. Rambabu and N. Ramana
Compound Poisson Process and Its Applications in Business . . . . . . . . 678Prasun Chakrabarti, Siddhant Bane, Biswajit Satpathy, Mark Goh,Biswa Nath Datta, and Tulika Chakrabarti
x Contents
An Efficient Approach for Document CategorizationUsing Weighted Sum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686Vimuktha E. Salis, Ranjana S. Chakrasali, and Chowdaiah Pathanjali
Survey on 6LoWPAN Security Protocols in IoT Communication . . . . . 696G. Kalyani and Shilpa Chaudhari
Two Class Motor Imagery Classification Based on ANFIS . . . . . . . . . . 703Rahul Kumar, Mridu Sahu, and Samrudhi Mohdiwale
Video Optimization for Testing Load Balancing of ApplicationDelivery Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712Azra Nasreen, I. Pooja, Christen Dsouza, and G. Shobha
Exploring and Designing of Data Warehouse in Coal . . . . . . . . . . . . . 717N. Vijay Kumar and K. Rajendra Prasad
Design of Delay and Energy Efficient Low Voltage Dual TailComparator by Using Sleep Transistor . . . . . . . . . . . . . . . . . . . . . . . . 724Laxman Anantoju, Padmavathi Kora, and Mamatha Samson
Framework for Monitoring and Recognition of the Activitiesfor Elderly People from Accelerometer Sensor Data Using ApacheSpark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734Shubham Gaur and Govind P. Gupta
A Study on Sign Language Recognition-A Literature Survey . . . . . . . 745P. V. Naresh, R. Visalakshi, and B. Satyanarayana
Survey on MTC Group Authentication and Key Managementfor MTC in LTE Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753K. Krishna Jyothi and Shilpa Chaudhari
Role-Based Authorization and Authentication Frameworkfor Remote Service Access by In-Vehicle Users . . . . . . . . . . . . . . . . . . 760Diksha Goel and Megha Quamara
Word Clustering on Small Corpuses . . . . . . . . . . . . . . . . . . . . . . . . . . 770G. Swetha, S. Arvind, S. P. Singh, and Prashant Johri
Concatenated Global Average Pooled Deep ConvolutionalEmbedded Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 778Morarjee Kolla and T. Venugopal
Parallel PageRank Algorithm Using MapReduce . . . . . . . . . . . . . . . . . 787Hemalatha Eedi and Manoj Kumar Kokkula
Power Quality Problems Mitigation by DVR Using SC StructuredCascaded MPAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796Sneha Mohite, V. S. Jape, and D. S. Bankar
Contents xi
A Comprehensive Survey on Applications of Wireless SensorNetworks and Approaches to Control Congestion . . . . . . . . . . . . . . . . 805Pokala Rupa, S. P. Singh, S. Arvind, and Prashant Johri
Evolution of Optimal MLFFNN Design: A Novel VLC-GAApproach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813Ravi Domala and Upasna Singh
Improving Topic Coherence Using Parsimonious Language Modeland Latent Semantic Indexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 823Jitesh Kumar Dewangan, Aakanksha Sharaff, and Sudhakar Pandey
Feature Selection Algorithms in Medical Data Classification:A Brief Survey and Experimentation . . . . . . . . . . . . . . . . . . . . . . . . . . 831Suja S. Panicker and P. Gayathri
Efficient and Scalable Job Recommender System Using CollaborativeFiltering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 842Ravita Mishra and Sheetal Rathi
Review of Skin Diseases Classification Methods Using Different ColorPhase Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 857Ashvini V. Ubale and Prashant L. Paikrao
Deep Learning for Agricultural Plant Disease Detection . . . . . . . . . . . 864Shantala Giraddi, Shrinivas Desai, and Anupama Deshpande
Ranking Hotels Based on Online Hotel Attribute Ratings UsingNeutrosophic AHP and Stochastic Dominance . . . . . . . . . . . . . . . . . . . 872Himanshu Sharma, Abhishek Tandon, and Anu G. Aggarwal
Two-Dimensional Release Policy for Software Systems IncorporatingFRF, Opportunity Cost and Environment Factor . . . . . . . . . . . . . . . . . 879Vibha Verma and Sameer Anand
Object Oriented Fault Prediction Analysis Using Machine LearningAlgorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 886Neha, Ajay Jaiswal, and Abhishek Tandon
An Analysis of EWOM Text that Contribute to EWOMHelpfulness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 893Aakash and Anu Gupta Aggarwal
Multi-attribute Based Resource Allocation Using Fuzzy AHP . . . . . . . 901Rajat Arora and Abhishek Tandon
Experimental Analysis of Optimization Techniques for Placementand Routing in ASIC Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 908Shaik Karimullah and D. Vishnuvardhan
xii Contents
An Approach Supported by the Search Query for the EntityDecision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 918Lakshmi Prasanna Appari and Madhavi Pingili
A Survey on Stock Market Prediction Using Machine LearningTechniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923Polamuri Subba Rao, K. Srinivas, and A. Krishna Mohan
Improve the Efficiency of the Classifiers Using Resample Techniqueon Image Segmentation Dataset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932G. Naga RamaDevi, M. Janga Reddy, and D. Baswaraj
Minimization of Deformation of Sensor Data with EnhancedProbabilistic Maximum like Hood Selection Process (PMSP) . . . . . . . . 942Tushar and Abhijit Nayak
Analyzing the Understandability of Data Warehouse ConceptualModel Using Fuzzy Logic Techniques . . . . . . . . . . . . . . . . . . . . . . . . . 949Aakansha Singh, Jagriti Garg, Apoorva Rastogi, and Naveen Dahiya
A Survey on Reversible Data Hiding Techniques . . . . . . . . . . . . . . . . . 960Bethala Shirisha and Kamakshi Prasad
Predictive Analytics in Mining of Educational Data: A ResearchTravelogue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 966V. Kamakshamma and K. F. Bharati
Machine Learning and Deep Learning in Cyber Security for IoT . . . . 975S. Velliangiri and Kenanya Kumar Kasaraneni
K-NN SEMANTIC Inquiry on Scrambled Social InformationBASE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 982Sheo Kumar and Mrutyunjaya S. Yalawar
A Study on Mining and Analysis of Trajectory Databaseswith Multi-dimensional Feature Sets . . . . . . . . . . . . . . . . . . . . . . . . . . 992K. Arun Kumar and S. Vasundra
Prediction of Housing Prices Using Machine Learning, Time SeriesARIMA Model and Artificial Neural Network . . . . . . . . . . . . . . . . . . . 1002Shivani Mangaleswaran and S. Vigneshwari
PRSSDF: Page Rank Specific Student Discussion Forum . . . . . . . . . . . 1009Bala Koteswara Reddy Kunam, Akhil Reddy Mallidi, and S. Vigneshwari
A Comparative Study of Recommender Systems . . . . . . . . . . . . . . . . . 1021Yash Mehta, Aditya Singhania, Ayush Tyagi, Pranav Shrivastava,and Mahesh Mali
Contents xiii
An Overview on Blockchain Technology and Its Applications . . . . . . . 1030Swathi Tejah Yalla and PNS Nikhilendra
Performance Analysis of 8-Bit Vedic Multipliers Using HDLProgramming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1036Bindu Swetha Pasuluri and V. J. K. Kishor Sonti
CMOS Implementation of Comparators for ADCs . . . . . . . . . . . . . . . 1047Pasuluri Bindu Swetha, S. Fowzia Sultana, K. C. T. Swamy,and Nadhindla Bala Dastagiri
Capable and Verification Protocol for Restricting InformationStorage in Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1058K. Kishore Kumar and K. Rajendra Prasad
Outlying Info Integrity-Checking Protocol with Augmented Stabilityto Secure Storage in Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1066K. Kishore Kumar, Vinit Kumar Gunjan, and K. Laxmi Prasanna
Challenges and Uses of Big Data Analytics for Social Media . . . . . . . . 1074Mudassir Khan, Mohd Dilshad Ansari, and Syed Yasmeen Shahdad
Sub-scene Target Detection and Recognition Using Deep LearningConvolution Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1082Suresh Merugu, Kamal Jain, Anshul Mittal, and Balasubramanian Raman
IoT Based Garbage Disposer for Educating Rural India . . . . . . . . . . . 1102Syed Musthak Ahmed, T. Sai Chandu, U. Rohith, G. Naveen,and S. Naveen
Powered Wheelchair for Mobility with Features to AddressPhysical Strength, Cognitive Response, and Motor ActionDevelopment Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1110Syed Musthak Ahmed, Ayesha Shireen, B. Jagadeesh Babu, and Shruti
Face Recognition Using Open CV with Deep Learning . . . . . . . . . . . . 1118Sheo Kumar and G. V. R. Sai Lavanya
Effect of Transition Metal Doped ZnO Coated on Al WorkingElectrode Prepared by Sol-Gel CWD for ElectrochemicalBiosensor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1125Usharani Panda, Arun K. Das, Farida A. Ali, Priyabrata Pattanaik,and Sushant K. Kamilla
Cuckoo Search Algorithm: A Review . . . . . . . . . . . . . . . . . . . . . . . . . . 1136Mitali Madhusmita Sahoo, Rasmita Dash, Rajashree Dash,and Rasmita Rautray
xiv Contents
Analysis of Open, Closed Loop PI, PID, FLC and ANN ControllableWind Energy System Using C-ZSI with PMSM . . . . . . . . . . . . . . . . . . 1143A Jaffar Sadiq Ali and G. P. Ramesh
A Multimodality Medical Image Fusion Method Using RegionBased Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1156Bikash Meher and S. Agrawal
Dynamic Stability Enhancement of STATCOM Operated PowerSystem Using Optimized Improved Sliding Mode Controller . . . . . . . . 1163Tanmoy Parida, Niranjan Nayak, and Himanshu Shekhar Sahoo
Plant Sustainability Monitoring Using Unmanned Aerial Vehicle . . . . 1175Raghavendra Vedula, Amitash Nanda, Keshab Kishor Swain,Siddharth Das, and Mihir Narayan Mohanty
Dual Notch Band Rejected Filter with Defected Slot for WLANand Satellite Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1184Sanjay Kumar Sahu, Bhukya Arun Kumar, and Kaibalya Kumar Sethi
Vehicle Detection Using Faster Recurrent Convolution NeuralNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1190Manisha Chate and Vinaya Gohokar
Effective Pedestrian Detection and Tracking in Varying LightConditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1196Manisha Chahande and Vinaya Gohokar
CTS: A Channel-Aware Trust System to Alleviate the NegativeEffects Caused by Sinkhole and Selective Forwarding Attacksin Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1203Alamuru Susmitha, Lipsa Dash, and Sanjeev Sharma
Estimation of Solar Irradiance on a Contoured Platform forOptimized Solar Power Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . 1218Kuntal Ghosh, Smriti Gupta, Sabita Pal, and Sirshendu Arosh
Reactive Power Compensation by TSC-TCR Using Fuzzy LogicController . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1226Krunal Shah, Swapnil Arya, and Divyesh Harwani
A Tool for Statistical Analysis of Alphabets and Words of Hindi . . . . 1237Barkha Sahu and Brijendra Kumar Joshi
A Comparative Study of Various Approaches to Adaptive WebScraping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1245Kunal Mehta, Maya Salvi, Rumil Dand, Vineet Makharia, and Prachi Natu
Contents xv
A Review on Blockchain Technology: Components, Issuesand Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1257Vishwani Patel, Fenil Khatiwala, Kaushal Shah, and Yashi Choksi
A Survey on the Internet of Things: Applications, Challengesand Opportunities with India Perspective . . . . . . . . . . . . . . . . . . . . . . 1263Sandip Thite and Devendrasingh Thakore
Technology Enabled Pathways for a Waste Free Village . . . . . . . . . . . 1273P. Sharath Kumar, N. Pranay, G. Ilam Bharathi, Y. Suchit, R. Saravanan,Krishna Nandanan, and Renjith Mohan
An Approach to Alert the Drowsy Driver Using Combined Systemof IR Camera and EEG Headset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1284Raj Tiwary, Janhavi Patil, Abhiksha Bhandary, and Mayura Gavhane
Role of Technology in Utilizing Water as a Resource for SustainableDevelopment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1295S. Akshaya, Nivedika Padmashree, Ajai Simmon, P. Geetha,and Krishna Nandanan
Biometric Recognition Using Fusion . . . . . . . . . . . . . . . . . . . . . . . . . . . 1320Milind Rane, Tejas Latne, and Umesh Bhadade
Technologies for Efficient Water Utilization in the Villageof Maira, Punjab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1330Ravilla Jayanth Prasad, R. Ashwath, V. Dinesh Babu,A. Krishnan, C. R. Kavitha, V. Vignesh, and Renjith Mohan
NFC Based Mobile Device Verification and Reporting Systemfor Prohibited Region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1341Nilakshi Joshi, Renuka Ghate, Chaitanya Pradhan, and Sonali Vaidya
A Novel Approach for E-Waste Management . . . . . . . . . . . . . . . . . . . 1349Lotlikar Swapnali and Khunteta Ajay
Grain Size Regulation During LDH Test . . . . . . . . . . . . . . . . . . . . . . . 1358Anil Mashalkar, Sushil Mishra, Vilas Nandedkar, and Rupesh Bobade
Employing Sustainable Advances in Technology to Address theRising Unemployment Levels in Muljipura, Madhya Pradesh . . . . . . . 1366T. Neethi Thevan, Yashaswini C. Shekar, M. Poojith, R. Sai Surya,Nidhi Gangrade, Sagar Basavaraju, and Renjith Mohan
Thinking Beyond Agriculture Through Technological Interventionsin the Village of Moti Borvai, Gujarat . . . . . . . . . . . . . . . . . . . . . . . . . 1381K. S. Gautam, G. Kishore, V. Vaishnavi, R. K. Anandhu,Krishna Nandanan, Renjith Mohan, and Vipina Valsan
xvi Contents
Factors Influencing Trihalomethane Formation and Methodsof Reduction—A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1395Geena Prasad, Jewel Yoko Kentilitisca, Maneesha Vinodini Ramesh,and K. Rohit
An Overview of Natural Organic Matter . . . . . . . . . . . . . . . . . . . . . . . 1407Geena Prasad, Jewel Yoko Kentilitisca, Maneesha Vinodini Ramesh,and Nithin Suresh
Implementation and Experimental Validation of LDPC Codesfor DVB-S2 Forward Error Correction . . . . . . . . . . . . . . . . . . . . . . . . 1417Vijaykumar T. Korishetti, V. Jayashree, and V. C. Patil
A Tourism and Travel Recommendation System Basedon User-Location Vector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1429Meghana Dhaware and Pankaj Vanwari
Technology Driven Rural Healthcare Practices for the Villagersof Sarai Nooruddinpur, Uttar Pradesh . . . . . . . . . . . . . . . . . . . . . . . . . 1438C. Sachin, Nikhila P. Nambiar, U. S. SuryaBalaji, R. Ananthu,Abhijith A. Shekhar, Vimisha Valsan, and Debasish Brahma
Semi-automation System for Construction Industry with Emphasison Humanitarian Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1450P. M. James, Shanker Ramesh, Mohan T. Harish, and Rao R. Bhavani
Can Software Based Integrated Platform Be a Solution for HolisticMedical Care in Developing Communities? . . . . . . . . . . . . . . . . . . . . . 1463K. Manikandan, S. S. Sreeraj, S. Koushik, B. Sreelakshmi, J. P. Dhivvya,and Krishna Nandanan
Clean Technologies for Optimization of Solid Waste Managementin Village of Majerdari, West Bengal . . . . . . . . . . . . . . . . . . . . . . . . . . 1477P. Jyothi Swaroop, K. S. Praveen Kumar, Revanth Reddy,Vavila Purushotham, Chungath Srinivasan, Renjith Mohan,and R. Aravinthan
Optimization of DC Motor Speed Control Using LQR Technique . . . . 1492Jyotshna Bharti, Gargi Phadke, and Diptee Patil
Position of Static Cylinder Effect on Base Flows . . . . . . . . . . . . . . . . . 1500Mohammed Asadullah, Sher Afghan Khan, Waqar Asrar, and E. Sulaeman
System Design for Integrating Technologies for Building Water WiseCommunities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1511Deepak Suresh Varma, Sidharth Anilkumar, Vishak Raja, Ashwin R. Raj,B. Soundharajan, Renjith Mohan, and Thirunjanam
Contents xvii
Power Quality Improvement by Using Active Power Filterand STATCOM of Renewable Power Distribution System . . . . . . . . . . 1523Rupesh Wankar and Nagmanaj Taj Pathan
A Review of Dynamic Scalability and Dynamic Schedulingin Cloud-Native Distributed Stream Processing Systems . . . . . . . . . . . 1539Ambalavanar Senthuran and Saman Hettiarachchi
Technology Aided Waste Management Practices in the Villageof Maira, Punjab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1554K. G. Sachin, S. Ganapathy, S. M. Sakthi Vignesh,Anantha Krishnan Nair, C. R. Kavitha, V. Vignesh, and Renjith Mohan
Improving Income Generation Opportunities and Livelihood ofWomen in Pandori by Enhancing Their Skills . . . . . . . . . . . . . . . . . . . 1566O. Navya Teja, T. Srikar, G. Vinay Mahadev, D. Yaswanth,Renjith Mohan, and S. G. Divya Sharma
Payment Card Fraud Detection with Data Mining: A Review . . . . . . . 1579Diksha Maheshwari
On Classification of BMD Images Using Machine Learning (ANN)Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1590Santosh Kumar, Mohd Dilshad Ansari, Vinit Kumar Gunjan,and Vijender Kumar Solanki
Role of Artificial Intelligence (AI) in Understanding the BehaviorPattern: A Study on E-Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1600Saikat Gochhait, O. Mazumdar, S. Chahal, P. Kanwat, S. Gupta,R. Sharma, V. Pandit, R. Brahma, and R. Sachan
Dengue Trend Prediction by Learning Long Term Sequences . . . . . . . 1607Sourabh Dattawad, Sanjay Deshpande, and Subarna Roy
Exploring the Access Control Policies of Web-Based SocialNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1614Kaushal Shah and Devkishan Patel
The Potent Combo of Software Testing and NLP . . . . . . . . . . . . . . . . 1623Nilofar Mulla and Naveenkumar Jayakumar
Sinusoidal Tracking Algorithm Based Voltage Oriented Controlof Harmonic Less Rectifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1633Swapnil Y. Gadgune, Utkarsh V. Patil, and P. M. Joshi
Waste Management for Sustainable Rural Futures in the Villageof Muljipura, Madhya Pradesh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1642Pranathi R. Jonnala, Pinaki Prasad Panigrahy, P. Uday Kanth,A. Sharath Chandra Sagar, Sagar Basavaraju, Nidhi Gangrade,and Krishna Nandanan
xviii Contents
Technology Assisted Rural Futures in the Village of Moti Borvai . . . . 1654K. M. Keerthana, C. Arjun, J. Ramdev Krishnan, N. S. Hari Krishna,Renjith Mohan, and Vipina Valsan
Computing for Mitigation of Health Vulnerabilities for the VillageMorasiya in Bihar, India . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1662Mohit Hooda, Abhijeet Gupta, Meera Ramesh, Rahul U, Jayashree Nair,and Renjith Mohan
Context Aware Community Based Systems for Sustainable WasteManagement in Morasia, Bihar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1673K. Vishnu, A. Adarsh, N. A. Namitha, K. Sayooj Devadas, Jayashree Nair,and Renjith Mohan
The Impact of Water Distribution Inconsistency in the RuralSettlements of Punjab and to Extrapolate a Nature BasedSustainable Technology to Enhance Livelihood . . . . . . . . . . . . . . . . . . 1683Ramshankar Yadhunath, Nithika Suresh, Ch. Bhanu Vardhan,Venkatramana, Lalith Shubhankar, V. Vignesh, C. R. Kavitha,and Renjith Mohan
Technology Powered Resource Utilization for Income GenerationOpportunities in the Rural Villages of Chhattisgarh . . . . . . . . . . . . . . 1699P. Sreeram, P. R. Eshwara Moorthy, Sriram Sreenivasan, M. Aiswarya,Krishna Nandanan, Renjith Mohan, and J. P. Dhivvya
Modified Gabor Filter (MGF) Image Enhancement Approachfor Early Detection of Lung Cancer . . . . . . . . . . . . . . . . . . . . . . . . . . . 1710S. Avinash, K. Manjunath, and S. Senthil Kumar
Augmenting Technology to Address Rural Sanitation . . . . . . . . . . . . . 1723R. Vineeth, S. Vikash, P. Swetha, P. Geetha, Ashok Kumar Mohan,and Krishna Nandanan
Automatic Detection of Arrhythmia Using Optimized FeatureSelection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1731G. Jayagopi and S. Pushpa
Web User Grouping Based on Navigation Patterns Through PairWise Sequence Alignment and Breadth First Search . . . . . . . . . . . . . . 1743R. Geetharamani and P. Revathy
Exploratory Data Analysis Using Supervised Learning Techniqueson Credit Card Default Data Set in Machine Learning . . . . . . . . . . . . 1759K. Ulaga Priya and S. Pushpa
Grouping Users Through Pair Wise Sequence Alignment and GraphTraversal Based on Web Page Navigation Behaviour . . . . . . . . . . . . . 1770R. Geetharamani and P. Revathy
Contents xix
Identification of Disaster Prone Areas-A Machine LearningApproach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1792Bhogireddy Narendra, K. Govinda, T. Kavitha, and B. Dharani
Artificial Intelligence Systems and Expert Systems: An Overviewof Recent Trends and Roles in Information Science and DataAnalytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1804Sasikumar Gurumoorthy, Naresh Babu Muppalaneni, G. Chandra Sekhar,and G. Sandhya Kumari
Unique Whale Optimization Algorithm for Harvestingand Clustering the Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1813Sarvani Anandarao and Nagaraju Devarakonda
Efficient Spatial Database Keyword Query Search . . . . . . . . . . . . . . . . 1824L. Venkateswara Reddy and K. Prema
Building a ChatBot Using Emotional Cognitive ConversationalAgent Architecture (ECCAA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1836Gnaneswari Gnanaguru
A Deep Learning Sentiment Primarily Based Intelligent ProductRecommendation System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1847V. Sivaparvathi, G. Lavanya Devi, and K. Srinivasa Rao
Speaker State Classification Using Machine Learning Techniques . . . . 1857Bhavani Sirisha Madamanchi, Sai Vinay Paladugu, Sai Revanth Ballipalli,Divya Reddy Kanala, and Swarna Kuchibhotla
A Nuclei Segmentation Method Based on Optimal Fuzzy ClusteringUsing Salp Swarm Algorithm for Histopathological Images . . . . . . . . . 1865Venubabu Rachapudi, G. Lavanya Devi, and Ramesh Neelapu
A Novel Approach for Detection of Tumors in MammographicImages Using Fourier Descriptors and KNN . . . . . . . . . . . . . . . . . . . . 1877L. Kanya Kumari and B. N. Jagadesh
Web User Clustering Techniques for Recommendation Systems . . . . . 1885P. Dhanalakshmi, P. Dileep Kumar Reddy, Sasikumar Gurumurthy,and K. Lalitha
Automation of Aerators Based System on Water Quality Parametersin Aquaculture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1896G. Hemanth Kumar and D. R. Kumar Raja
Study on Pernicious Impacts of Diabetes Mellitus on CognitionDysfunctioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1903P. Sateesh, U. Neelima, B. Srinivas, P. R. S. Naidu, and M. Bhuvaneswari
xx Contents
A Security Scheme for Discovering Battery Draining Attacksin Android Smartphone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1908P. C. Senthil Mahesh and K. Muthumanickam
Design and Implementation of Novel 4-Bit Alu . . . . . . . . . . . . . . . . . . 1916K. Riyazuddin, N. BalaDastagiri, S. Bajid Vali, and Shaik Karimullah
Floorplanning for Placement of Modules in VLSI Physical DesignUsing Harmony Search Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1929Shaik Karimullah, D. Vishnu Vardhan, and Syed Javeed Basha
Integrated Big Data with Public Cloud: A Model for E-CommerceRetailer Market . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1937C. Sasidhar and Nuka Mallikharjuna Rao
Iterative Analysis of Optimization Algotithms for Placementand Routing in Asic Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1947Shaik Karimullah and D. Vishnuvardhan
VLSI Floorplanning Using Nature-Inspired Hybrid OptimizationAlgorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1959Syed Javeed Basha and Bepar Abdul Raheem
Investigation of Predictive Chronic Disease Through Data MiningAlgorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1968Amit Kumar and Sanjay Pachuri
A Study on Natural Computing: A Review . . . . . . . . . . . . . . . . . . . . . 1975Rashmi Pathak and Shyam Sunder Gupta
Machine Learning Methods for Extraction and Classificationfor Biometric Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1984Vinit Kumar Gunjan, Puja S. Prasad, Rashmi Pathak, and Amit Kumar
Contents xxi