The book focuses on both theory and applications in the broad areas of communication technology, computer science and information security. This two volume book contains the Proceedings of 4th International Conference on Advanced Computing, Networking and Informatics. This book brings together academic scientists, professors, research scholars and students to share and disseminate information on knowledge and scientific research works related to computing, networking, and informatics to discuss the practical challenges encountered and the solutions adopted. The book also promotes translation of basic research into applied investigation and convert applied investigation into practice.
|
Part I Cloud Computing, Distributed Systems, Social Networks, and Applications |
|
|
|
Review of Elasticsearch Performance Variating the Indexing Methods |
|
|
3 | (6) |
|
|
|
|
Understanding Perception of Cache-Based Side-Channel Attack on Cloud Environment |
|
|
9 | (14) |
|
|
|
|
A Semantic Approach to Classifying Twitter Users |
|
|
23 | (8) |
|
|
|
|
|
Timeline-Based Cloud Event Reconstruction Framework for Virtual Machine Artifacts |
|
|
31 | (12) |
|
|
|
eCloud: An Efficient Transmission Policy for Mobile Cloud Computing in Emergency Areas |
|
|
43 | (8) |
|
|
|
|
|
A Multidimensional Approach to Blog Mining |
|
|
51 | (8) |
|
|
|
Medicinal Side-Effect Analysis Using Twitter Feed |
|
|
59 | (12) |
|
|
|
|
A Study of Opinion Mining in Indian Languages |
|
|
71 | (10) |
|
|
|
Part II Applications of Informatics |
|
|
|
A Pragmatics-Oriented High Utility Mining for Itemsets of Size Two for Boosting Business Yields |
|
|
81 | (10) |
|
|
|
ILC-PIV Design for Improved Trajectory Tracking of Magnetic Levitation System |
|
|
91 | (8) |
|
|
Joshua Sunder David Reddipogu |
|
|
|
|
Performance Analysis and Optimization of Spark Streaming Applications Through Effective Control Parameters Tuning |
|
|
99 | (12) |
|
|
|
A Browser-Based Distributed Framework for Content Sharing and Student Collaboration |
|
|
111 | (8) |
|
|
|
|
Seed Point Selection Algorithm in Clustering of Image Data |
|
|
119 | (8) |
|
|
|
|
Comparative Analysis of AHP and Its Integrated Techniques Applied for Stock Index Ranking |
|
|
127 | (8) |
|
|
|
|
A Proposed What-Why-How (WWH) Learning Model for Students and Strengthening Learning Skills Through Computational Thinking |
|
|
135 | (8) |
|
|
|
Band Power Tuning of Primary Motor Cortex EEG for Continuous Bimanual Movements |
|
|
143 | (10) |
|
|
|
Part III Authentication Methods, Cryptography and Security Analysis |
|
|
|
Probabilistically Generated Ternary Quasigroup Based Stream Cipher |
|
|
153 | (8) |
|
|
|
|
|
Dynamic Access Control in a Hierarchy with Constant Key Derivation Cost |
|
|
161 | (10) |
|
|
|
An Efficient LWE-Based Additively Homomorphic Encryption with Shorter Public Keys |
|
|
171 | (8) |
|
|
|
Contents xv An Enhanced Remote User Authentication Scheme for Multi-server Environment Using Smartcard |
|
|
179 | (10) |
|
|
|
A Proposed Bucket Based Feature Selection Technique (BBFST) for Phishing e-Mail Classification |
|
|
189 | (6) |
|
|
|
|
A Novel Security Mechanism in Symmetric Cryptography Using MRGA |
|
|
195 | (10) |
|
|
|
Techniques for Enhancing the Security of Fuzzy Vault: A Review |
|
|
205 | (10) |
|
|
|
|
An Efficient Vector Quantization Based Watermarking Method for Image Integrity Authentication |
|
|
215 | (12) |
|
|
|
XSS Attack Prevention Using DOM-Based Filter |
|
|
227 | (10) |
|
|
|
|
Part IV Big Data and Recommendation Systems |
|
|
|
Friendship Recommendation System Using Topological Structure of Social Networks |
|
|
237 | (10) |
|
|
|
Personalized Recommendation Approach for Academic Literature Using High-Utility Itemset Mining Technique |
|
|
247 | (8) |
|
|
|
An Estimation of User Preferences for Search Engine Results and its Usage Patterns |
|
|
255 | (10) |
|
|
|
A Comparative Analysis of Various Spam Classifications |
|
|
265 | (8) |
|
|
|
Review Spam Detection Using Opinion Mining |
|
|
273 | (8) |
|
|
|
|
Review Spam Detection Using Semi-supervised Technique |
|
|
281 | (8) |
|
|
|
|
Part V Emerging Techniques in Computing |
|
|
|
Dimensionality Reduction Using Decision-Based Framework for Classification: Sky and Ground |
|
|
289 | (10) |
|
|
|
|
|
|
A Decision Tree-Based Middle Ware Platform for Deploying Fog Computing Services |
|
|
299 | (12) |
|
|
|
Development of 3D FULL HD Endoscope Capable of Scaling View of the Selected Region |
|
|
311 | (8) |
|
|
|
|
An L1-Norm Based Optimization Approach for Power Line Interference Removal in ECG Signals |
|
|
319 | (12) |
|
|
|
|
Exploration of Many-Objective Feature Selection for Recognition of Motor Imagery Tasks |
|
|
331 | (8) |
|
|
Sanghamitra Bandyopadhyay |
|
|
Euler-Time Diagrams: A Set Visualisation Technique Analysed Over Time |
|
|
339 | (6) |
|
Mithileysh Sathiyanarayanan |
|
|
|
A Framework for Goal Compliance of Business Process Model |
|
|
345 | (12) |
|
|
|
Comparative Analysis of Adaptive Beamforming Techniques |
|
|
357 | (10) |
|
|
|
Part VI Internet, Web Technology, Web Security, and IoT |
|
|
|
Securing an External Drive Using Internet with IOT Concept |
|
|
367 | (6) |
|
|
|
|
An Intelligent Algorithm for Automatic Candidate Selection for Web Service Composition |
|
|
373 | (10) |
|
|
|
|
|
A Quality-Centric Scheme for Web Service Ranking Using Fuzzified QoS Parameters |
|
|
383 | (10) |
|
|
|
Enhancing Web Service Discovery Using Meta-heuristic CSO and PCA Based Clustering |
|
|
393 | (12) |
|
|
|
Advancement in Personalized Web Search Engine with Customized Privacy Protection |
|
|
405 | (12) |
|
|
|
|
|
|
Part VII Research on Optical Networks, Wireless Sensor Networks, VANETs, and MANETs |
|
|
|
Traffic Classification Analysis Using OMNeT++ |
|
|
417 | (6) |
|
|
Mithileysh Sathiyanarayanan |
|
|
|
Irregular-Shaped Event Boundary Estimation in Wireless Sensor Networks |
|
|
423 | (14) |
|
|
|
|
|
A New Two-Dimensional Mesh Topology with Optical Interlinks |
|
|
437 | (6) |
|
|
Enhanced TCP NCE: A Modified Non-Congestion Events Detection, Differentiation and Reaction to Improve the End-to-End Performance Over MANET |
|
|
443 | (12) |
|
|
|
|
Intelligent Building Control Solution Using Wireless Sensor---Actuator Networking Framework |
|
|
455 | (10) |
|
|
|
|
Security Framework for Opportunistic Networks |
|
|
465 | (8) |
|
|
|
|
Replica-Based Efficient Data Accessibility Technique for Vehicular Ad Hoc Networks |
|
|
473 | (8) |
|
|
|
|
|
Reinforcement Based Optimal Routing Algorithm for Multiple Sink Based Wireless Sensor Networks |
|
|
481 | (10) |
|
|
|
|
|
Study and Impact of Relay Selection Schemes on Performance of an IEEE 802.16j Mobile Multihop Relay (MMR) WiMAX Network |
|
|
491 | (10) |
|
Chaudhuri Manoj Kumar Swain |
|
|
|
Predicting Link Failure in Vehicular Communication System Using Link Existence Diagram (LED) |
|
|
501 | (8) |
|
|
|
|
Part VIII Communication Systems, Antenna Research, and Cognitive Radio |
|
|
|
An M-Shaped Microstrip Antenna Array for WLAN, WiMAX and Radar Applications |
|
|
509 | (8) |
|
|
|
|
Gain Enhancement of Microstrip Patch Antenna Using H-Shaped Defected Ground Structure |
|
|
517 | (10) |
|
|
|
|
|
|
|
Robust Acoustic Echo Suppression in Modulation Domain |
|
|
527 | (12) |
|
|
|
|
FPGA-Based Equalizer Design Using a Novel Adaptive Reward-Punishment VSSLMS Algorithm for Rayleigh Fading Channel |
|
|
539 | (12) |
|
|
|
Phase Reversal and Suppressed Carrier Characteristics of Neo-Cortical Electroencephalography Signals |
|
|
551 | (8) |
|
|
|
Short-Range Frequency-Modulated Continuous Wave (FMCW) Radar Using Universal Software-Defined Radio Peripheral (USRP) |
|
|
559 | |
|
|
|
|
Erratum to: A Browser-Based Distributed Framework for Content Sharing and Student Collaboration |
|
|
1 | (566) |
|
|
|
Author Index |
|
567 | |
Dr. Pankaj Kumar Sa received the Ph.D. degree in Computer Science in 2010. He is currently serving as an assistant professor with the Department of Computer Science and Engineering, National Institute of Technology Rourkela, India. His research interests include computer vision, biometrics, visual surveillance, and robotic perception. He has co-authored a number of research articles in various journals, conferences, and book chapters. He has co-investigated some research and development projects that are funded by SERB, DRDOPXE, DeitY, and ISRO. He has received several prestigious awards and honors for his excellence in academics and research. Apart from research and teaching, he conceptualizes and engineers the process of institutional automation.
Dr. Manmath Narayan Sahoo is an Assistant Professor in Computer Science and Engineering Department at National Institute of Technology Rourkela, Rourkela, India. His research interest areas are Fault Tolerant Systems,Operating Systems, Distributed Computing, and Networking. He is the member of IEEE, Computer Society of India and The Institutions of Engineers, India. He has published several papers in national and international journals.
Dr. M. Murugappan is Senior Lecturer in School of Mecahtronics Engineering at Universiti Malaysia Perlis (UniMAP), Perlis, Malaysia. He received his PhD degree in Mechatronic Engineering from Universiti Malaysia Perlis (UniMAP), Malaysia in 2010, Master of Engineering degree in Applied Electronics from Government College of Technology, Anna University, Tamilnadu, India in 2006 and Bachelor of Electrical & Electronics Engineering from Adiparasakthi Engineering College, Melmaruvathur, Tamilnadu in 2002. His research interest areas are Signal Processing (EEG, ECG, HRV, ECG), Affective Computing (Emotion, Stress, Emotional Stress), Pattern Recognition, Brain Computer Interface (BCI), Human Machine Interaction (HMI), Digital Image Processing, Statistical Analysis, Neuromarketing and Neurobehavioral Analysis. He has published over 45 research papers in refereed journals and over 50 papers in national and international conferences.
Dr. Yulei Wu is a Lecturer in Computer Science at the University of Exeter. He received his PhD degree in Computing and Mathematics and B.Sc. degree in Computer Science from the University of Bradford, UK, in 2010 and 2006, respectively. His recent research focuses on Future Network Architecture and Protocols, Wireless Networks and Mobile Computing, Cloud Computing, and Performance Modelling and Analysis. He has published over 30 research papers on these areas in prestigious international journals, including IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Communications, IEEE Transactions on Wireless Communications, IEEE Transactions on Vehicular Technology and ACM Transactions on Embedded Computing Systems, and reputable international conferences. He was the recipient ofthe Best Paper Awards from IEEE CSE 2009 and ICAC 2008 conferences. He has served as the Guest Editor for many international journals including Elsevier Computer Networks and ACM/Springer Mobile Networks and Applications (MONET). He has been the Chair or Vice-Chair of 20 international conferences/workshops and has served as the PC member of more than 60 professional conferences/workshops. He was awarded the Outstanding Leadership Awards from IEEE ISPA 2013 and TrustCom 2012, and the Outstanding Service Awards from IEEE HPCC 2012, CIT 2010, ScalCom 2010. His research interest areas are Future Internet Architecture: software defined networking, network functions virtualisation, clean-slate post-IP network technologies (e.g., information centric networking), cloud computing technologies, mobility; Wireless Networks and Mobile Computing; Cloud Computing; Performance Modelling and Analysis.
Dr. Banshidhar Majhi is a Professor in Computer Science & Engineering Department at National Institute of Technology Rourkela, Rourkela, India. Dr. Majhi has 24 years of teaching and 3 years of industry experience. He has supervised 8 PhD students, 40 M.Tech, 70 B.Tech students and several others are pursuing their courses under his guidance. He has over 50 publications in journals and 70 publications in conference proceedings of national and international repute. He was awarded with Gold Medal for Best Engineering Paper from IETE, 2001 and from Orissa Engineering Congress, 2000. He visited Department of Computer Engineering, King Khalid University, Abha, Kingdom of Saudi Arabia as a Professor from October 2010 to February 2011 and Department of Computer Engineering and Information Technology, Al-Hussein Bin Talal University, Maan, Jordan as Assistant Professor from October 2004 to June 2005. His research interests are Image Processing, Data Compression, Security Protocols, Parallel Computing, Soft Computing, and Biometrics.