1. Trang chủ
  2. » Thể loại khác

Networking and informatics volume 1

717 50 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 717
Dung lượng 31,29 MB
File đính kèm 28. Networking and Informatics.rar (27 MB)

Nội dung

27 Editors SMART INNOVATION, SYSTEMS AND TECHNOLOGIES Malay Kumar Kundu Durga Prasad Mohapatra Amit Konar Aruna Chakraborty Advanced Computing, Networking and Informatics – Volume Advanced Computing and Informatics Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014) 13 Smart Innovation, Systems and Technologies Volume 27 Series editors Robert J Howlett, KES International, Shoreham-by-Sea, UK e-mail: rjhowlett@kesinternational.org Lakhmi C Jain, University of Canberra, Canberra, Australia e-mail: Lakhmi.jain@unisa.edu.au For further volumes: http://www.springer.com/series/8767 About this Series The Smart Innovation, Systems and Technologies book series encompasses the topics of knowledge, intelligence, innovation and sustainability The aim of the series is to make available a platform for the publication of books on all aspects of single and multi-disciplinary research on these themes in order to make the latest results available in a readily-accessible form Volumes on interdisciplinary research combining two or more of these areas is particularly sought The series covers systems and paradigms that employ knowledge and intelligence in a broad sense Its scope is systems having embedded knowledge and intelligence, which may be applied to the solution of world problems in industry, the environment and the community It also focusses on the knowledge-transfer methodologies and innovation strategies employed to make this happen effectively The combination of intelligent systems tools and a broad range of applications introduces a need for a synergy of disciplines from science, technology, business and the humanities The series will include conference proceedings, edited collections, monographs, handbooks, reference books, and other relevant types of book in areas of science and technology where smart systems and technologies can offer innovative solutions High quality content is an essential feature for all book proposals accepted for the series It is expected that editors of all accepted volumes will ensure that contributions are subjected to an appropriate level of reviewing process and adhere to KES quality principles Malay Kumar Kundu · Durga Prasad Mohapatra Amit Konar · Aruna Chakraborty Editors Advanced Computing, Networking and Informatics – Volume Advanced Computing and Informatics Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014) ABC Editors Malay Kumar Kundu Machine Intelligence Unit Indian Statistical Institute Kolkata India Durga Prasad Mohapatra Dept of Computer Science and Engineering National Institute of Technology Rourkela Rourkela India ISSN 2190-3018 ISBN 978-3-319-07352-1 DOI 10.1007/978-3-319-07353-8 Amit Konar Dept of Electronics and Tele-Communication Engineering Artificial Intelligence Laboratory Jadavpur University Kolkata India Aruna Chakraborty Dept of Computer Science and Engineering St Thomas’ College of Engineering & Technology Kidderpore India ISSN 2190-3026 (electronic) ISBN 978-3-319-07353-8 (eBook) Springer Cham Heidelberg New York Dordrecht London Library of Congress Control Number: 2014940383 c Springer International Publishing Switzerland 2014 This work is subject to copyright All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer Permissions for use may be obtained through RightsLink at the Copyright Clearance Center Violations are liable to prosecution under the respective Copyright Law The use of general descriptive names, registered names, trademarks, service marks, etc in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made The publisher makes no warranty, express or implied, with respect to the material contained herein Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) Foreword The present volume is an outcome, in the form of proceedings, of the 2nd International Conference on Advanced Computing, Networking and Informatics, St Thomas’ College of Engineering and Technology, Kolkata, India, June 24–26, 2014 As the name of the conference implies, the articles included herein cover a wide span of disciplines ranging, say, from pattern recognition, machine learning, image processing, data mining and knowledge discovery, soft computing, distributed computing, cloud computing, parallel and distributed networks, optical communication, wireless sensor networks, routing protocol and architecture to data privacy preserving, cryptology and data security, and internet computing Each discipline, itself, has its own challenging problems and issues Some of them are relatively more matured and advanced in theories with several proven application domains, while others fall in recent thrust areas Interestingly, there are several articles, as expected, on symbiotic integration of more than one discipline, e.g., in designing intelligent networking and computing systems such as forest fire detection using wireless sensor network, minimizing call routing cost with assigned cell in wireless network, network intrusion detection system, determining load balancing strategy in cloud computing, and side lobe reduction and beam-width control, where the significance of pattern recognition, evolutionary strategy and soft computing has been demonstrated This kind of interdisciplinary research is likely to grow significantly, and has strong promise in solving real life challenging problems The proceedings are logically split in two homogeneous volumes, namely, Advanced Computing and Informatics (vol 1) and Wireless Networks and Security (vol 2) with 81 and 67 articles respectively The volumes fairly represent a state-of-the art of the research mostly being carried out in India in these domains, and are valued-additions to the current era of computing and knowledge mining VI Foreword The conference committee, editors, and the publisher deserve congratulations for organizing the event (ICACNI-2014) which is very timely, and bringing out the archival volumes nicely as its output Kolkata, April 2014 Sankar K Pal Distinguished Scientist and former Director Indian Statistical Institute Message from the Honorary General Chair It gives me great pleasure to introduce the International Conference on Advanced Computing, Networking and Informatics (ICACNI 2014) which will be held at St Thomas’ College of Engineering and Technology, Kolkata during June 24–26, 2014 ICACNI is just going to cross its second year, and during this small interval of time it has attracted a large audience The conference received over 650 submissions of which only 148 papers have been accepted for presentation I am glad to note that ICACNI involved top researchers from 26 different countries as advisory board members, program committee members and reviewers It also received papers from 10 different countries ICACNI offers an interesting forum for researchers of three apparently diverse disciplines: Advanced Computing, Networking and Informatics, and attempts to focus on engineering applications, covering security, cognitive radio, human-computer interfacing among many others that greatly rely on these cross-disciplinary research outcomes The accepted papers are categorized into two volumes, of which volume includes all papers on advanced computing and informatics, while volume includes accepted papers on wireless network and security The volumes will be published by SpringerVerlag The conference includes plenary lecture, key-note address and four invited sessions by eminent scientists from top Indian and foreign research/academic institutes The lectures by these eminent scientists will provide an ideal platform for dissemination of knowledge among researchers, students and practitioners I take this opportunity to thank all the participants, including the keynote, plenary and invited speakers, reviewers, and the members of different committees in making the event a grand success VIII Message from the Honorary General Chair Thanks are also due to the various Universities/Institutes for their active support towards this endeavor, and lastly Springer-Verlag for publishing the proceedings under their prestigious Smart Innovation, Systems and Technologies (SIST) series Wish the participants an enjoyable and productive stay in Kolkata Kolkata, April 2014 Dwijesh Dutta Majumder Honorary General Chair ICACNI -2014 Preface The twenty first century has witnessed a paradigm shift in three major disciplines of knowledge: 1) Advanced/Innovative computing ii) Networking and wireless Communications and iii) informatics While the first two are complete in themselves by their titles, the last one covers several sub-disciplines involving geo-, bio-, medical and cognitive informatics among many others Apparently, the above three disciplines of knowledge are complementary and mutually exclusive but their convergence is observed in many real world applications, encompassing cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing and many others The International Conference on Advanced Computing, Networking and Informatics (ICACNI) is aimed at examining the convergence of the above three modern disciplines through interactions among three groups of people The first group comprises leading international researchers, who have established themselves in one of the above three thrust areas The plenary, the keynote lecture and the invited talks are organized to disseminate the knowledge of these academic experts among young researchers/practitioners of the respective domain The invited talks are also expected to inspire young researchers to initiate/orient their research in respective fields The second group of people comprises Ph.D./research students, working in the cross-disciplinary areas, who might be benefited from the first group and at the same time may help creating interest in the cross-disciplinary research areas among the academic community, including young teachers and practitioners Lastly, the group comprising undergraduate and master students would be able to test the feasibility of their research through feedback of their oral presentations ICACNI is just passing its second birthday Since its inception, it has attracted a wide audience This year, for example, the program committee of ICACNI received as many as 646 papers The acceptance rate is intentionally kept very low to ensure a quality publication by Springer This year, the program committee accepted only 148 papers from these 646 submitted papers An accepted paper has essentially received very good recommendation by at least two experts in the respective field To maintain a high standard of ICACNI, researchers from top international research laboratories/universities have been included in both the advisory committee and the program committee The presence of these great personalities has helped the 702 S.Z.N Hazarika et al Algorithm Eyelid detection Require: im Ensure: cc2 A ← smooth(im) B ← edge(A) cc1 ← labelled edge(B) no of edges ← maximum(cc1) for i = to no of edges hor spr ← horizontal spread of the edge nop ← number of pixel in ith edge spr horizontality(i) ← hor nop end for 10 cc2 ← cc1 11 for i = to max(cc1) 12 if horizontality(i) < 90% of horizontality of other edges then 13 cc2 ← cc1 − ith edge 14 end if 15 end for 16 return cc2 Fig Proposed periocular localization algorithm : (a) Coloured input image; (b) Noisy image of the iris; (c) Grayscale image of the iris; (d) Smoothed image of the iris; (e) Detection of edges of the image; (f) Horizontal edges retained; (g) Upper and lower eyelids detected through checking hf ; (h) 2-means clustering performed on detected eyelid points; (i) Periocular region localized Fast Approximate Eyelid Detection for Periocular Localization 703 Table Detail of database for evaluation of proposed approach Database Developer Version Images Subjects Resolution Color Model Spectrum Soft Computing and Image Analysis (SOCIA) v1 [9] 1,877 241 800 × 600 RGB Group, Department of UBIRIS VS Computer Science, University of Beira v2 [10] 11,102 261 400 × 300 sRGB Interior, Portugal Table Localization results on UBIRISv1 and UBIRISv2 databases Accuracy → Databases ↓ UBIRISv1 UBIRISv2 Upper Eyelid Mislocalization Partial (%) Localization (%) 22.48 68.13 30.07 65.86 Lower Eyelid Mislocalization Partial (%) Localization (%) 35.79 55.22 40.18 50.28 Conclusion Iris is considered to be one of the most reliable biometric traits, making it one of the most widely used in the present biometric scenario However, in cases where unconstrained images are acquired, iris recognition fails to deliver desired accuracy Hence, to achieve recognition in unconstrained images, the periocular region is considered as an alternative Upon implementing the proposed eyelid detection algorithm on publicly available visual spectrum (VS) image database UBIRISv1 and UBIRISv2, it is observed that both the upper and lower eyelids show partial localization for most of the images Even with the partial success in detecting the eyelids, we are able to approximately localize the periocular region References Adam, M., Rossant, F., Amiel, F., Mikovikova, B., Ea, T.: Eyelid Localization for Iris Identification Radioengineering 17(4), 82–85 (2008) Bakshi, S., Sa, P.K., Majhi, B.: Optimised periocular template selection for human recognition BioMed Research International 2013, 1–14 (2013) Bakshi, S., Tuglular, T.: Security through human-factors and biometrics In: 6th International Conference on Security of Information and Networks, pp 463–463 (2013) Cui, J., Wang, Y., Tan, T., Ma, L., Sun, Z.: A Fast and Robust Iris Localization Method Based on Texture Segmentation In: Biometric Authentication and Testing, National Laboratory of Pattern Recognition, Chinese Academy of Sciences (2004) He, Z., Tan, T., Sun, Z., Qiu, X.: Robust eyelid eyelash and shadow localization for iris recognition In: 15th IEEE International Conference on Image Processing, pp 265–268 (2008) Ling, L.L., de Brito, D.F.: Fast and efficient iris image segmentation Journal of Medical and Biological Engineering 30(6), 381–392 (2010) 704 S.Z.N Hazarika et al Mahlouji, M., Noruzi, A.: Human Iris Segmentation for Iris Recognition in Unconstrained Environments IJCSI International Journal of Computer Science Issues 9(1), 3, 149–155 (2012) Masek, L.: Recognition of Human Iris Patterns for Biometric Identification In: Bachelor of Engineering Thesis at The University of Western Australia (2003) Proen¸ca, H., Alexandre, L.A.: UBIRIS: A noisy iris image database In: Roli, F., Vitulano, S (eds.) ICIAP 2005 LNCS, vol 3617, pp 970–977 Springer, Heidelberg (2005) 10 Proena, H., Filipe, S., Santos, R., Oliveira, J., Alexandre, L.: The UBIRISv2: A database of visible wavelength iris images captured on-the-move and at-a-distance IEEE Transactions on Pattern Analysis and Machine Intelligence 32(8), 1529–1535 (2010) 11 Radman, A., Zainal, N., Ismail, M.: Efficient Iris Segmentation based on eyelid detection Journal of Engineering Science and Technology 8(4), 399–405 (2013) 12 Thalji, Z., Alsmadi, M.: Iris Recognition Using Robust Algorithm for Eyelid, Eyelash and Shadow Avoiding World Applied Sciences Journal 25(6), 858–865 (2013) 13 Valentina, C., Hartono, R.N., Tjahja, T.V., Nugroho, A.S.: Iris Localization using Circular Hough Transform and Horizontal Projection Folding In: Proceedings of International Conference on Information Technology and Applied Mathematics (2012) 14 Xu, G., Zhang, Z., Ma, Y.: Improving the Performance of Iris Recognition System Using Eyelids and Eyelashes Detection and Iris Image Enhancement In: 5th IEEE conference on Cognitive Informatics, pp 871–876 (2006) Prediction of an Optimum Parametric Combination for Minimum Thrust Force in Bone Drilling: A Simulated Annealing Approach Rupesh Kumar Pandey and Sudhansu Sekhar Panda* Department of Mechanical Engineering, Indian Institute of Technology Patna, India rupeshiitp@gmail.com, sspanda@iitp.ac.in Abstract Minimally invasive drilling of bone has a great demand in orthopaedic surgical process as it helps in better fixation and quick healing of the damaged bones The aim of the present study is to find out the optimal setting of the bone drilling parameters (spindle speed and feed rate) for minimum thrust force during bone drilling using simulated annealing (SA) The bone drilling experiments were carried out by central composite design scheme and based on the results obtained, a response surface model for thrust force as a function of drilling parameters is developed This model is used as an objective function in the SA approach The results of the confirmation experiments showed that the SA can effectively predict the optimal settings of spindle speed and feed rate for minimum thrust force during bone drilling The suggested methodology can be very useful for orthopaedic surgeons to minimize the drilling induced bone tissue injury Keywords: Bone drilling, Thrust force, Response surface methodology, Simulated annealing Introduction Drilling of bone is commonly employed during orthopaedic surgery to produce hole for the insertion of screws and wires to fix the damaged bone or for the installation of prosthetic device [1] The thrust force induced to the bone during drilling is one of the major concerns as the exposure of the bone to their higher magnitudes can damage the bone cells or can even result in their death (osteonecrosis) leading to the loosening of the fixation and increased healing time [1-4] Moreover, micro cracks and the drill bit breakage can also occur as an additional disadvantage of the higher mechanical forces The micro cracks can lead to the further fracture of the damaged bone which can initiate large number of cracks resulting in the misalignment of the fixation or permanent failure [2] The broken drill bit can obstruct the placement of other fixating devices and can cause adverse histological effects if it undergoes corrosion thus, demands for additional procedures to remove the broken drill bit [5-9] thereby increasing the operative time The rate of heat generation is also high with higher drilling forces [10] which can result in thermal osteonecrosis Therefore, minimization of the * Corresponding author M.K Kundu et al (eds.), Advanced Computing, Networking and Informatics - Volume 1, Smart Innovation, Systems and Technologies 27, DOI: 10.1007/978-3-319-07353-8_81, © Springer International Publishing Switzerland 2014 705 706 R.K Pandey and S.S Panda thrust force generated during bone drilling will result in better fixation of the broken bones and their quick recovery postoperatively Previously, many researchers have investigated the bone drilling process to study the effect of the various drilling parameters on the thrust force produced [1-4] The early researches in this area were reported in late 1950s [3] Spindle speed and feed rate were the main drilling parameters analyzed in most of the studies [3-4, 10-14] There is a consensus among the researchers that the thrust force decreases with an increase in spindle speed [3-4, 10-14] But, the drilling of bone with higher spindle speeds were reported with increased trauma [3, 14] The analysis on the effect of the feed rate showed that the increase in feed rate increases the thrust force induced in bone drilling [1-2, 4, 13] Despite of the above mentioned studies, there is a lack of a clear suggestion on the optimal settings of the feed rate and spindle speed for minimum thrust force generation during bone drilling In this work, a statistical model for bone drilling process to predict the thrust force as a function of feed rate (mm/min) and spindle speed (rpm) is developed using response surface methodology (RSM) Next, the model is used as a fitness function in SA algorithm to determine the optimal setting of feed rate and spindle speed for minimum thrust force during bone drilling The adopted approach is then validated through the confirmation experiment RSM is a collection of mathematical and statistical tools which are easy, quick and effective for modeling the process in which several variables influence the response of interest [15-16] In most of the real problems the relationship between the response and the independent variable is unknown In RSM the relationship between the response and the independent process variables is represented as (1) Y = f ( A, B, C ) + ε (1) Where Y is the desired response, f is the response function and ε represents the error observed in the response A second order model is generally employed if the response function is nonlinear or not known, shown in (2) [15-16] k k i =1 i =1 Y = β +  β i xi +  βii xi2 +  β ij xi x j + ε i (2) j Where β is the coefficient for constant term β i , β ii and β ij are the coefficients for linear, square and interaction terms respectively Simulated annealing algorithm mimics the process of annealing which involves heating of a metal to a temperature beyond its melting point followed by a gradual cooling In molten state, the particles are in random motion and when it is cooled gradually the particles rearrange themselves to attain minimum energy state As the cooling is done gradually, lower and lower energy states are obtained until the lowest energy state is reached [17] In the process of annealing the probability Pr (E ) of being at energy state is given by the Boltzmann distribution as (3): Pr ( E ) = (3) Z (T ) exp(− E / KT ) Prediction of an Optimum Parametric Combination for Minimum Thrust Force 707 Where Z (T ) = normalized factor depending upon the temperature T and K is the Boltzmann constant The probability Pr (E ) approaches one when the temperature T is high for all energy states The probability of the higher energy states decreases as compared to the lower energy states as the temperature decreases Metropolis et al [18] used the above criteria and proposed that if a random perturbation is applied to the present energy state of a solid with temperature T for the generation of the perturbed energy states and the difference of the energy ΔE between the two states is negative then the particles rearrange themselves such that they attain the low energy state The probability of the acceptance of perturbed energy state as the new energy state is given as (4) Pr ( E ) = exp(−ΔE / KT ) (4) This criterion of acceptance for the new state is known as the Metropolis acceptance criteria Kirkpatrick et al [19] used the sequence of Metropolis algorithm evaluated by the sequence of reducing temperatures as simulated annealing minimization of an objective function The objective function corresponds to the energy function used in Metropolis acceptance criteria Recently, SA has been used successfully for the optimization of the various engineering problems [20-21] It uses a number of points ( N ) to test the thermal equilibrium at a particular temperature before acquiring a reduced temperature state The algorithm is stopped when the desirable minimum change in the value of the objective function is obtained or the temperature obtained is sufficiently small The initial starting temperature T and the number of iterations N to be performed at each temperature are the two user defined parameters that governs the effective working of SA algorithm The step by step procedure of SA algorithm is discussed below [17] • Initialize the starting temperature T and the termination temperature Tmin Randomly generate initial starting point X Also define the number of iterations N to be performed at each Temperature Set the iteration counter as i = • Calculate the value of the objective function E = f ( X ) • Update E Best = E and X Best = X • Generate the random neighborhood point X ∗ and calculate the objective function E∗ = f ( X ∗) • Evaluate the change in energy ΔE = E ∗ − E • If the change in energy ΔE < , then update the point X = X ∗ and if E < E best ,then E best = E and X Best = X Update the iteration as i = i + and go to next step Else go to step number and repeat the process • If i > N go to the next step • Reduce the temperature by a factor α and update T = αT • If T ≤ Tmin then terminate the process and print X best and E best else, move to step 708 R.K Pandey and S.S S Panda Experimental Prrocedure 2.1 Experimental Desig gn Based on Response Surface Methodology The bone drilling parameteers considered are feed rate (mm/min) and spindle sppeed (rpm) (shown in Table 1) and a the response taken is thrust force (N) The central coomposite design (CCD) of RS SM was employed to design the plan of experiments for studying the relationship beetween the response and the bone drilling parameters F Full factorial design for factors at two levels i.e high (+1) and low (-1) corresponding tto a face centered design with th hirteen runs (four factorial points, four axial points and ffive central points) was used as shown in Table The bone drilling parameters and thheir levels are considered based on the wide range of experiments reported in the literatture [1-4, 10-14] Table Factor F and levels considered for bone drilling A B 2.2 Control facto or Feed rate (mm m/min) Spindle speed d (rpm) Low level (-1) 30 500 High level (+ +1) 150 2500 Experimental Details The work material used fo or conducting the bone drilling experiments was bovvine femur, as the human bones are not easily available and it closely resembles the hum man bone, allowing the results to be extrapolated in the real surgical situations [19-220] The bovine femur was obttained from a local slaughter house immediately after the slaughter and the experiments were done within few hours to maintain minimum lloss in thermo-physical propertiies of the fresh bone [22-23] No animal was scarified sspecifically for the purpose of this t research Fig Experimental set up Prediction of an Optimum Parametric Combination for Minimum Thrust Force 709 The experiments were carried out on axis MTAB flex mill using 4.5mm HSS (high speed steel) drill bit The drilling depth was 6mm The drilling thrust force signals were measured using Kistler 9257B piezo electric dynamometer The signals were acquired using 5070 multichannel charge amplifier and Dynoware software The thrust force obtained for each experimental run is listed in the last column of Table 2.The experimental set up is shown in the Fig Table Experimental condition and result Exp No 10 11 12 13 Feed rate (mm/min) 90 150 90 150 30 90 30 90 90 90 150 90 30 Spindle speed (rpm) 1500 1500 500 500 2500 2500 1500 1500 1500 1500 2500 1500 500 Thrust Force (N) 16.93 24.55 29.25 45.43 4.72 14.31 6.155 16.79 17.41 17.29 20.33 17.01 11.32 Development of Mathematical Model A mathematical model correlating the thrust force and drilling process parameters is developed based on (2) using design expert software version 8.0.1 [24] A quadratic model is selected based on low standard deviation and high R squared value as mentioned in Table [24] Table Model summary statistics Source Linear 2FI Quadratic Standard deviation 4.08 3.00 1.44 R-Squared 0.8721 0.9378 0.9888 Adjusted R-Squared 0.8466 0.9171 0.9808 Predicted R-Squared 0.6912 0.7966 0.8880 Suggested The model is given by (5) as: Force = 8.796 + 0.3817 × Feed rate − 0.0155 × spindle speed − 7.7083 × E − × Feed rate × spindle speed − 4.2713 × E − × Feed rate + 4.8898 × E − × spindle speed (5) 710 R.K Pandey and S.S Panda Analysis of variance (ANOVA) carried out to find the significance of the developed model and individual model coefficients at 95% confidence interval is shown in Table Table ANOVA table for the proposed model Source Model A-Feed rate B-Spindle speed AB A2 B2 Residual Total DOF 1 1 12 SS 1287.77 773.28 362.55 85.56 6.53 66.04 14.58 1302.35 MS 257.55 773.28 362.55 85.56 6.53 66.04 2.08 P value

Ngày đăng: 30/08/2021, 09:21

w