12. Advanced Computing and Systems for Security (compendio de articulos).pdf - Advances in Intelligent Systems and Computing 396 RituparnaChaki

12. Advanced Computing and Systems for Security (compendio de articulos).pdf

This preview shows page 1 out of 324 pages.

You've reached the end of your free preview.

Want to read all 324 pages?

Unformatted text preview: Advances in Intelligent Systems and Computing 396 Rituparna Chaki Agostino Cortesi Khalid Saeed Nabendu Chaki Editors Advanced Computing and Systems for Security Volume 2 Advances in Intelligent Systems and Computing Volume 396 Series editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland e-mail: [email protected] About this Series The series “Advances in Intelligent Systems and Computing” contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing. The publications within “Advances in Intelligent Systems and Computing” are primarily textbooks and proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. This permits a rapid and broad dissemination of research results. Advisory Board Chairman Nikhil R. Pal, Indian Statistical Institute, Kolkata, India e-mail: [email protected] Members Rafael Bello, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cuba e-mail: [email protected] Emilio S. Corchado, University of Salamanca, Salamanca, Spain e-mail: [email protected] Hani Hagras, University of Essex, Colchester, UK e-mail: [email protected] László T. Kóczy, Széchenyi István University, Győr, Hungary e-mail: [email protected] Vladik Kreinovich, University of Texas at El Paso, El Paso, USA e-mail: [email protected] Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan e-mail: [email protected] Jie Lu, University of Technology, Sydney, Australia e-mail: [email protected] Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico e-mail: [email protected] Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil e-mail: [email protected] Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland e-mail: [email protected] Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong e-mail: [email protected] More information about this series at Rituparna Chaki Agostino Cortesi Khalid Saeed Nabendu Chaki • • Editors Advanced Computing and Systems for Security Volume 2 123 Editors Rituparna Chaki University of Calcutta Kolkata, West Bengal India Agostino Cortesi Università Ca’ Foscari Venice Italy Khalid Saeed Faculty of Computer Science Bialystok University of Technology Białystok Poland Nabendu Chaki University of Calcutta Kolkata, West Bengal India ISSN 2194-5357 ISSN 2194-5365 (electronic) Advances in Intelligent Systems and Computing ISBN 978-81-322-2651-2 ISBN 978-81-322-2653-6 (eBook) DOI 10.1007/978-81-322-2653-6 Library of Congress Control Number: 2015951344 Springer New Delhi Heidelberg New York Dordrecht London © Springer India 2016 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper Springer (India) Pvt. Ltd. is part of Springer Science+Business Media ( ) Preface The Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) took place during May 23–25, 2015 in Kolkata, India. The University of Calcutta collaborated with Ca’ Foscari University of Venice, Bialystok University of Technology, and AGH University of Science and Technology, Poland, to make ACSS 2015 a grand success. The symposium aimed to motivate Ph.D. students to present and discuss their research works to produce innovative outcomes. ACSS 2015 invited researchers working in the domains of Computer Vision & Signal Processing, Biometrics-based Authentication, Machine Intelligence, Algorithms, Natural Language Processing, Security, Remote Healthcare, Distributed Systems, Embedded Systems, Software Engineering, Cloud Computing & Service Science, Big Data, and Data Mining to interact. By this year, the post-conference book series are indexed by ISI Compendex. The sincere effort of the program committee members coupled with ISI indexing has drawn a large number of high-quality submissions from scholars all over India and abroad. A thorough double-blind review process was carried out by the PC members and by external reviewers. While reviewing the papers, reviewers mainly looked at the novelty of the contributions, at the technical content, at the organization, and at the clarity of presentation. The entire process of paper submission, review, and acceptance process was done electronically. Due to the sincere efforts of the Technical Program Committee and the Organizing Committee members, the symposium resulted in a suite of strong technical paper presentations followed by effective discussions and suggestions for improvement of each researcher. The Technical Program Committee for the symposium selected only 37 papers for publication out of 92 submissions. During each session, the authors of each presented paper were given a list of constructive suggestions in a bid to improve upon their work. Each author had to incorporate the changes in the final version of the paper as suggested by the reviewers and the respective session chairs. The symposium Proceedings are organized as a collection of papers, on a session-wise basis. v vi Preface We take this opportunity to thank all the members of the Technical Program Committee and the external reviewers for their excellent and time-bound review works. We thank all the sponsors who have come forward toward the organization of this symposium. These include Tata Consultancy Services (TCS), Springer India, ACM India, M/s Business Brio, and M/s Enixs. We appreciate the initiative and support from Mr. Aninda Bose and his colleagues in Springer for their strong support toward publishing this post-symposium book in the series “Advances in Intelligent Systems and Computing.” Last but not least, we thank all the authors without whom the symposium would not have reached this standard. On behalf of the editorial team of ACSS 2015, we sincerely hope that this book will be beneficial to all its readers and motivate them toward further research. Rituparna Chaki Agostino Cortesi Khalid Saeed Nabendu Chaki Contents Part I Signal Processing Design and Development of Marathi Speech Interface System . . . . . . . . Santosh Gaikwad, Bharti Gawali and Suresh Mehrotra 3 Fusion-Based Noisy Image Segmentation Method . . . . . . . . . . . . . . . . . Mateusz Buczkowski and Khalid Saeed 21 An Approach for Automatic Indic Script Identification from Handwritten Document Images . . . . . . . . . . . . . . . . . . . . . . . . . . Sk. Md. Obaidullah, Chayan Halder, Nibaran Das and Kaushik Roy Writer Verification on Bangla Handwritten Characters . . . . . . . . . . . . Chayan Halder, Sk. Md. Obaidullah, Jaya Paul and Kaushik Roy 37 53 Face Recognition in Video Using Deformable Parts Model with Scale Invariant Feature Transform (DPSIFT) . . . . . . . . . . . . . . . . V. Mohanraj, V. Vaidehi, Ranajith Kumar and R. Nakkeeran 69 Registration of Range Images Using a Novel Technique of Centroid Alignment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Parama Bagchi, Debotosh Bhattacharjee and Mita Nasipuri 81 Part II Software Engineering An Investigation into Effective Test Coverage. . . . . . . . . . . . . . . . . . . . Debashis Mukherjee and Rajib Mall 93 Resource Management in Native Languages Using Dynamic Binary Instrumentation (PIN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Nachiketa Chatterjee, Saurabh Singh Thakur and Partha Pratim Das vii viii Contents A Study on Software Risk Management Strategies and Mapping with SDLC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Bibhash Roy, Ranjan Dasgupta and Nabendu Chaki A New Service Discovery Approach for Community-Based Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Adrija Bhattacharya, Smita Ghosh, Debarun Das and Sankhayan Choudhury Data-Flow Analysis-Based Approach of Database Watermarking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 Sapana Rani, Preeti Kachhap and Raju Halder A New Framework for Configuration Management and Compliance Checking for Component-Based Software Development . . . . . . . . . . . . 173 Manali Chakraborty and Nabendu Chaki CAD-Based Analysis of Power Distribution Network for SOC Design. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Ayan Majumder, Moumita Chakraborty, Krishnendu Guha and Amlan Chakrabarti Part III Algorithms A New Hybrid Mutual Exclusion Algorithm in the Absence of Majority Consensus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Sukhendu Kanrar, Samiran Chattopadhyay and Nabendu Chaki A Comprehensive Sudoku Instance Generator . . . . . . . . . . . . . . . . . . . 215 Arnab Kumar Maji, Sunanda Jana and Rajat Kumar Pal Implementing Software Transactional Memory Using STM Haskell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Ammlan Ghosh and Rituparna Chaki Comparative Analysis of Genetic Algorithm and Classical Algorithms in Fractional Programming . . . . . . . . . . . . . . . . . . . . . . . . 249 Debasish Roy, Surjya Sikha Das and Swarup Ghosh An Algorithm to Solve 3D Guard Zone Computation Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 Ranjan Mehera, Piyali Datta, Arpan Chakraborty and Rajat Kumar Pal Multistep Ahead Groundwater Level Time-Series Forecasting Using Gaussian Process Regression and ANFIS . . . . . . . . . . . . . . . . . . 289 N. Sujay Raghavendra and Paresh Chandra Deka Contents ix Anomaly Detection and Three Anomalous Coins Problem. . . . . . . . . . . 303 Arpan Chakraborty, Joydeb Ghosh, Piyali Datta, Ankita Nandy and Rajat Kumar Pal Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321 About the Editors Rituparna Chaki has been an Associate Professor in the A.K. Choudhury School of Information Technology, University of Calcutta, India since June 2013. She joined academia as faculty member in the West Bengal University of Technology in 2005. Before that she has served under Government of India in maintaining industrial production database. Rituparna has received her Ph.D. from Jadavpur University in 2002. She has been associated with organizing many conferences in India and abroad by serving as Program Chair, OC Chair or as member of Technical Program Committee. She has published more than 60 research papers in reputed journals and peer-reviewed conference proceedings. Her research interest is primarily in ad hoc networking and its security. She is a professional member of IEEE and ACM. Agostino Cortesi received his Ph.D. degree in Applied Mathematics and Informatics from University of Padova, Italy, in 1992. After completing his post-doc at Brown University, in the US, he joined the Ca’ Foscari University of Venice. In 2002, he was promoted to full professor of Computer Science. In recent past, he served as Dean of the Computer Science program, as Department Chair, and as Vice-Rector of Ca’ Foscari University for quality assessment and institutional affairs. His main research interests concern programming languages theory, software engineering, and static analysis techniques, with particular emphasis on security applications. He has published over 100 papers in high-level international journals and proceedings of international conferences. His h-index is 15 according to Scopus, and 23 according to Google Scholar. Agostino served several times as a member (or chair) of program committees of international conferences (e.g., SAS, VMCAI, CSF, CISIM, ACM SAC) and he is in the editorial boards of the journals such as “Computer Languages, Systems and Structures” and “Journal of Universal Computer Science.” Khalid Saeed received the B.Sc. degree in Electrical and Electronics Engineering from Baghdad University in 1976, the M.Sc. and Ph.D. degrees from Wrocław University of Technology, in Poland in 1978 and 1981, respectively. He received his D.Sc. Degree (Habilitation) in Computer Science from Polish Academy of xi xii About the Editors Sciences in Warsaw in 2007. He is a Professor of Computer Science with AGH University of Science and Technology in Poland. He has published more than 200 publications—edited 23 books, journals and conference proceedings, eight text and reference books. He has supervised more than 110 M.Sc. and 12 Ph.D. theses. His areas of interest are biometrics, image analysis and processing, and computer information systems. He gave 39 invited lectures and keynotes in different universities in Europe, China, India, South Korea, and Japan. The talks were on biometric image processing and analysis. He received about 18 academic awards. Khalid Saeed is a member of more than 15 editorial boards of international journals and conferences. He is an IEEE Senior Member and has been selected as IEEE Distinguished Speaker for 2011–2016. Khalid Saeed is the Editor in Chief of International Journal of Biometrics with Inderscience Publishers. Nabendu Chaki is a Senior Member of IEEE and Professor in the Department of Computer Science and Engineering, University of Calcutta, India. Besides editing several volumes in Springer in LNCS and other series, Nabendu has authored three textbooks with reputed publishers like Taylor & Francis (CRC Press), Pearson Education, etc. Dr. Chaki has published more than 120 refereed research papers in Journals and International conferences. His areas of research interests include image processing, distributed systems, and network security. Dr. Chaki has also served as a Research Assistant Professor in the Ph.D. program in Software Engineering at the Naval Postgraduate School, Monterey, CA, USA. He is a visiting faculty member in many universities including the University of Ca’ Foscari, Venice, Italy. Dr. Chaki has contributed in SWEBOK v3 of the IEEE Computer Society as a Knowledge Area Editor for Mathematical Foundations. Besides being in the editorial board of Springer and many international journals, he has also served in the committees of more than 50 international conferences. He has been the founding Chapter Chair for ACM Professional Chapter in Kolkata, India since January 2014. Part I Signal Processing Design and Development of Marathi Speech Interface System Santosh Gaikwad, Bharti Gawali and Suresh Mehrotra Abstract Speech is the most prominent and natural form of communication between humans. It has potential of being an important mode of interaction with computer. Man–machine interface has always been proven to be a challenging area in natural language processing and in speech recognition research. There are growing interests in developing machines that can accept speech as input. Normal person generally communicate with the computer through a mouse or keyboard. It requires training and hard work as well as knowledge about computer, which is a limitation at certain levels. Marathi is used as official language at government of Maharashtra. There is a need for developing systems that enable human–machine interaction in Indian regional languages. The objective of this research is to design and development of the Marathi speech Activated Talking Calculator (MSAC) as an interface system. The MSAC is speaker-dependent speech recognition system that is used to perform basic mathematical operation. It can recognize isolated spoken digit from 0 to 50 and basic operation like addition, subtraction, multiplication, start, stop, equal, and exit. Database is an essential requirement to design the speech recognition system. To reach up to the objectives set, a database having 22,320 sizes of vocabularies is developed. The MSAC system trained and tested using the Mel Frequency Cepstral Coefficients (MFCC), Linear Discriminative Analysis (LDA), Principal Component Analysis (PCA), Linear Predictive Codding (LPC), and Rasta-PLP individually. Training and testing of MSAC system are done with individually Mel Frequency Linear Discriminative Analysis (MFLDA), Mel Frequency Principal Component Analysis (MFPCA), Mel Frequency Discrete S. Gaikwad (&)  B. Gawali  S. Mehrotra System Communication Machine Learning Research Laboratory (SCM-RL), Department of Computer Science and Information Technology, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra, India e-mail: [email protected] B. Gawali e-mail: [email protected] S. Mehrotra e-mail: [email protected] © Springer India 2016 R. Chaki et al. (eds.), Advanced Computing and Systems for Security, Advances in Intelligent Systems and Computing 396, DOI 10.1007/978-81-322-2653-6_1 3 4 S. Gaikwad et al. Wavelet Transformation (MFDWT), and Mel Frequency Linear Discrete Wavelet Transformation (MFLDWT) fusion feature extraction techniques. This experiment is proposed and tested the Wavelet Decomposed Cepstral Coefficient (WDCC) with 18, 36, and 54 coefficients approach. The performance of MSAC system is calculated on the basis of accuracy and real-time factor (RTF). From the experimental results, it is observed that the MFCC with 39 coefficients achieved higher accuracy than 13 and 26 variations. The MFLDWT is proven higher accuracy than MFLDA, MFPCA, MFDWT, and Mel Frequency Principal Discrete Wavelet Transformation (MFPDWT). From this research, we recommended that WDCC is robust and dynamic techniques than MFCC, LDA, PCA, and LPC. MSAC interface application is directly beneficial for society people for their day to day activity.      Keywords Human-computer interaction MSAC MFCC PCA WDCC LPC 1 Introduction Speech is the most natural and efficient form of exchanging information between human. Automatic speech recognition (ASR) is defined as the process of converting a speech signal to a sequence of words by means of an algorithm implemented by a computer program. Speech recognition systems help users who cannot be able to use the traditional Input and Output (I/O) devices [1, 2]. The man–machine interface using speech recognition has helpful ways to for enable the visually impaired and computer laymen to use the updated technologies [3]. There are growing interests in developing machines that can accept speech as input. Given the substantial research efforts in the speech recognition worldwide and the rate at which computer becomes faster and smaller, we can expect more applications of speech recognition. The concept of machines being able to interact with people in natural form is very interesting. It is desirable to have mac...
View Full Document

  • Summer '17
  • sfdsdfsf
  • The Land, Speech recognition, Feature Extraction, MFCC, WDCC, Santosh Gaikwad, Khalid Saeed Nabendu Chaki

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture