Table Of ContentAmlan Chakrabarti
Neha Sharma
Valentina Emilia Balas Editors
Advances in
Computing
Applications
Advances in Computing Applications
⋅
Amlan Chakrabarti Neha Sharma
Valentina Emilia Balas
Editors
Advances in Computing
Applications
123
Editors
AmlanChakrabarti Valentina EmiliaBalas
A.K.Choudhury Schoolof Information Faculty of Engineering, Department of
Technology Automatics andAppliedSoftware
University of Calcutta AurelVlaicu University of Arad
Kolkata, West Bengal Arad,Arad
India Romania
Neha Sharma
ZealInstitute of Business Administration,
Computer Application andResearch
ZealEducation Society
Pune,Maharashtra
India
ISBN978-981-10-2629-4 ISBN978-981-10-2630-0 (eBook)
DOI 10.1007/978-981-10-2630-0
LibraryofCongressControlNumber:2016950755
©SpringerScience+BusinessMediaSingapore2016
Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar
methodologynowknownorhereafterdeveloped.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom
therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authorsortheeditorsgiveawarranty,expressorimplied,withrespecttothematerialcontainedhereinor
foranyerrorsoromissionsthatmayhavebeenmade.
Printedonacid-freepaper
ThisSpringerimprintispublishedbySpringerNature
TheregisteredcompanyisSpringerNatureSingaporePteLtd.
Theregisteredcompanyaddressis:152BeachRoad,#22-06/08GatewayEast,Singapore189721,Singapore
Preface
Globalizationhasinfluencedalmosteveryfacetofhumanlifeduetotheemergence
ofnew andaffordabledigitalandcomputing technologiesaswell ascurrenttrends
in management. At the same time, informatics with its strong focus on providing
fast and ready access of information is the backbone of many of the present-day
intelligentapplicationsservingourmankind.Allthesecreateaperfectlandscapefor
widespreadresearchinterestininformationandcommunicationtechnologiesalong
with managementpolicies andthusimpactingpeople’slivesfromentertainment to
health care and from databases to e-governance.
This edited volume of Advances in Computing and Management presents the
latest high-quality technical contributions and research results in the areas of
computing, informatics, management, and information management. It deals with
state-of-the-arttopicsandprovideschallengesandsolutionsforandexploresfuture
research directions. Original, unpublished research work highlighting specific
research domains from all viewpoints is contributed from scientists throughout the
globe.Themaingoalofthisvolumeisnotonlytosummarizenewresearchfindings
but also to place these in the context of past work. This volume is designed for
professional audience, composed of researchers, practitioners, scientists, and
engineers in academia and industry.
The following is the brief summary extracted from the respective chapters and
their abstracts:
Chapter 1, by Vamsi Krishna Myalapalli, proposes an approach to overcome
these befalling sundry wait events in the internal database engine through Query
and PL/SQL rewrite methodologies, and additional overhauling approaches to
increase data hit ratio. The experimental progression and approaches evinced that
CPU impact, wait events, and other performance bottlenecks are minimized. This
papercouldserveastuningtooltoboostqueryaswellasdatabaseperformanceby
waiteventtuningandalsocanobligeasautilityforDatabaseAdministrators,SQL
programmers, and database operators.
Chapter 2, by Snehalata Shirude and Satish Kolhe, proposes Agent based
LibraryRecommenderSystemwiththeobjectivetoprovideeffectiveandintelligent
v
vi Preface
use of library resources such as finding right books, relevant research journal
papers, and articles.
Chapter 3, by Kalyan Baital and Amlan Chakrabarti, presents a scheduling
algorithm where random tasks generated at different time interval with different
periodicity and execution time can be accommodated into a system, which is
already running a set of tasks, meeting the deadline criteria of the tasks.
Chapter4,byManojK.SabnisandManojKumarShukla,explainsModel-based
Approach for Shadow Detection of Static Images using two methods, i.e.
color-based and texture-based.
Chapter5,byNitinVijaykumarSwamietal.,hascoveredtheconceptsofLi-Fi,
how the Li-Fi technology can be enhanced in the mobile communication, how it
works, the Li-Fi cellular network, some ubiquitous computing applications, com-
mon misconceptions about Li-Fi, Li-Fi in solar cell, and Internet of things (IoT).
Chapter 6, by Shraddha Oza and K.R. Joshi, analyzes the performance of
denoisingfilters likeNLM(non-localmean(NLM)spatialdomainfilter),bilateral,
and linear Gaussian filters using PSNR, MSE, and SSIM for MR (Magnetic
Resonance) Images.
Chapter7,byGünterFahrnberger,presentsadetailedviewonSecureString3.0.
The homomorphic cryptosystem SecureString 3.0 remedies to recapture the cloud
users’faithinsecurecloudcomputingonencryptedcharacterstringsbycombining
the paradigms “blind computing” and “secret sharing.” Implementation details of
this cryptosystem given in pseudocode allow researchers to realize their own pro-
totypes and practitioners to integrate SecureString 3.0 in their own security
solutions.
Chapter 8, by Sujay D. Mainkar and S.P. Mahajan paper, focuses on the
development offeature extraction and accurate classification of variety of acoustic
sounds in unstructured environments, where adverse effects such as noise and
distortion are likely to dominate. This chapter attempts to classify 10 different
unstructured real-world acoustic environments using empirical mode decomposi-
tion (EMD) which considers inherent non-stationarity of acoustic signals by
decomposing the signal into intrinsic mode functions (IMFs).
Chapter9,byMrunalPathakandN.Srinivasu,presentstheoverviewofdifferent
multimodal biometric (multibiometric) systems and their fusion techniques with
respective to their performance.
Chapter 10, by Mohan S. Khedkar and Vijay Shelake, proposes a technique
based on the concept of dynamic secret key (DSK), which is used to generate
symmetric cryptography keys for designing an authentication and encryption
scheme in smart grid wireless communication. In this scheme, recently added
device (e.g., smart meter) is authenticated by a randomly chosen authenticated
device. This scheme enables mutual authentication between a control center situ-
atedinlocalmanagementofficeandtherandomlychosendeviceasanauthenticator
to generate proper dynamic secret-based dynamic encryption key (DEK) for con-
sequent secure data communications.
Chapter 11, by Vyanktesh Dorlikar and Anjali Chandavale, proposes a smart
security framework with the integration of enhanced existing technologies.
Preface vii
Thisauthenticationframework providessecurity for thehigh-risk location,suchas
government office buildings, airport, military bases, and space stations.
Chapter 12, by Ashwini Shewale et al., attempts to scale down the medical
imageprocessingtime,withoutgettingarousingeffectonthequalityofimageusing
efficient computational methods for medical image processing.
Chapter 13, by Supriya Kunjir and Rajesh Autee, attempts to develop a
cost-effectivesecuritysystembasedonradarsensornetworktopreventterrorismto
a great extent. The system specifically aims at the task of detecting obstacles by
means of ultrasonic radar sensor network and provides photograph of the detected
obstaclesusingcameraandalsoprovidestotalcountofdetectedobstaclesbymeans
of counter. The ultrasonic sensor network coupled with counter anddisplayunit is
then totally coupled to the FM transceiver to get the voice announcement.
Chapter 14, by Moumita Acharya et al., proposes a low-resource and
energy-awarehardwaredesignforDWTthroughdynamicbitwidthadaptation,thus
performing the computation in an inexact way. They have performed field pro-
grammable gate array (FPGA)-based prototype hardware implementation of the
proposed design.
Chapter15,byValentinaEmiliaBalasetal.,aimstominimizethepossibilityof
avalanche via systematically analyzing the cause behind avalanche. A novel and
efficient attack model is proposed to evaluate the degree of vulnerability in a
dependency-based system caused by its members. This model uses an algorithmic
approach to identify, quantify, and prioritizing, i.e., ranking the extent of vulner-
ability due to the active members in a dependency-based system.
Chapter 16, by Neha Sharma and Hari Om, presents a case study to predict the
survival rate of oral malignancy patients, with the help of two predictive models,
linear regression (LR), which is a contemporary statistical model, and multilayer
perceptron (MLP), which is an artificial neural network model.
Themaingoalofthisvolumeistosummarizenewresultsbutalsoplacethesein
the context of past work.
We are grateful to Springer, especially to Ms. Swati Meherishi (Senior Editor,
Applied Sciences & Engineering) and her team for the excellent collaboration,
patience, and help during the evolvement of this volume.
We hope that the volume will provide useful information to professors,
researchers, and graduated students in the area of intelligent transportation.
Kolkata, India Amlan Chakrabarti
Pune, India Neha Sharma
Arad, Romania Valentina Emilia Balas
Acknowledgement
We, the editors of the book, Dr. Amlan Chakraborty, Dr. Neha Sharma, and
Dr. Valentina Emilia Balas, take this opportunity to express our heartfelt gratitude
toward all those who have contributed toward this book and supported us in one
way or the other. This book incorporates the work of many people, all over the
globe. We are indebted to all those people who helped us in the making of this
high-qualitybookwhichdealswithstate-of-the-arttopicsintheareasofcomputing,
informatics, management, and information management.
Attheoutset,wewouldliketoextendourdeepestgratitudeandappreciationto
our affiliations: Dr. Amlan Chakrabarti to University of Calcutta, India, Dr. Neha
Sharma to Zeal Institute of Business Administration, Computer Application, and
Research of S.P. Pune University, India, and Dr. Valentina Emilia Balas to
Department of Automatics and Applied Software, Faculty of Engineering of
University “Aurel Vlaicu” of Arad, Romania, for providing all the necessary
support throughout the process of book publishing. We are grateful to all the
officers and staff members of our affiliated institutions who have always been very
supportive and have always been companions as well as contributed graciously in
the making of this book.
Our sincere appreciation goes to our entire family for their undying prayers,
love, encouragement, and moral support and for being with us throughout this
period, constantly encouraging us to work hard. “Thank You” for being our
backbone during this journey of compilation and editing of this book.
Amlan Chakrabarti
Neha Sharma
Valentina Emilia Balas
ix
Contents
1 Wait Event Tuning in Database Engine . .... .... .... ..... .... 1
Vamsi Krishna Myalapalli
2 Machine Learning Using K-Nearest Neighbor for Library
Resources Classification in Agent-Based Library
Recommender System... ..... .... .... .... .... .... ..... .... 17
Snehalata B. Shirude and Satish R. Kolhe
3 An Efficient Dynamic Scheduling of Tasks for Multicore
Real-Time Systems . .... ..... .... .... .... .... .... ..... .... 31
Kalyan Baital and Amlan Chakrabarti
4 Model-Based Approach for Shadow Detection of Static Images ... 49
Manoj K. Sabnis and Manoj Kumar Shukla
5 Light Fidelity (Li-Fi): In Mobile Communication
and Ubiquitous Computing Applications. .... .... .... ..... .... 75
Nitin Vijaykumar Swami, Narayan Balaji Sirsat
and Prabhakar Ramesh Holambe
6 Performance Analysis of Denoising Filters for MR Images ... .... 87
Shraddha D. Oza and K.R. Joshi
7 A Detailed View on SecureString 3.0.... .... .... .... ..... .... 97
Günter Fahrnberger
8 Performance Comparison for EMD Based Classification
of Unstructured Acoustic Environments Using GMM
and k-NN Classifiers.... ..... .... .... .... .... .... ..... .... 123
Sujay D. Mainkar and S.P. Mahajan
9 Performance of Multimodal Biometric System Based
on Level and Method of Fusion.... .... .... .... .... ..... .... 137
Mrunal Pathak and N. Srinivasu
xi
xii Contents
10 DSK-Based Authentication Technique for Secure Smart
Grid Wireless Communication. .... .... .... .... .... ..... .... 153
Mohan S. Khedkar and Vijay Shelake
11 A Smart Security Framework for High-Risk Locations
Using Wireless Authentication by Smartphone.... .... ..... .... 173
Anjali Chandavale and Vyanktesh Dorlikar
12 High Performance Computation Analysis for Medical
Images Using High Computational Method... .... .... ..... .... 193
Ashwini Shewale, Nayan Waghmare, Anuja Sonawane,
Utkarsha Teke and Santosh D. Kumar
13 Terrorist Scanner Radar and Multiple Object Detection
System ... .... .... .... ..... .... .... .... .... .... ..... .... 209
Supriya Kunjir and Rajesh Autee
14 Inexact Implementation of Wavelet Transform
and Its Performance Evaluation Through Bit Width
Reduction. .... .... .... ..... .... .... .... .... .... ..... .... 227
Moumita Acharya, Chandrajit Pal, Satyabrata Maity
and Amlan Chakrabarti
15 A Vulnerability Analysis Mechanism Utilizing Avalanche
Attack Model for Dependency-Based Systems. .... .... ..... .... 243
Sirshendu Hore, Sankhadeep Chatterjee, Nilanjan Dey,
Amira S. Ashour and Valentina Emilia Balas
16 Performance of Statistical and Neural Network Method
for Prediction of Survival of Oral Cancer Patients. .... ..... .... 263
Neha Sharma and Hari Om
Author Index.. .... .... .... ..... .... .... .... .... .... ..... .... 285