100% found this document useful (1 vote)
12 views57 pages

Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2018 Volume 1 Ajith Abraham instant download

The document presents proceedings from the IEMIS 2018 conference, focusing on emerging technologies in data mining and information security. It includes various publications and links to download multiple volumes edited by Ajith Abraham and others. The series covers a wide range of topics in intelligent systems and computing, emphasizing recent developments and applications in the field.

Uploaded by

imcgvznju7902
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
12 views57 pages

Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2018 Volume 1 Ajith Abraham instant download

The document presents proceedings from the IEMIS 2018 conference, focusing on emerging technologies in data mining and information security. It includes various publications and links to download multiple volumes edited by Ajith Abraham and others. The series covers a wide range of topics in intelligent systems and computing, emphasizing recent developments and applications in the field.

Uploaded by

imcgvznju7902
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

Emerging Technologies in Data Mining and

Information Security Proceedings of IEMIS 2018


Volume 1 Ajith Abraham download

https://textbookfull.com/product/emerging-technologies-in-data-
mining-and-information-security-proceedings-of-
iemis-2018-volume-1-ajith-abraham/

Download full version ebook from https://textbookfull.com


We believe these products will be a great fit for you. Click
the link to download now, or visit textbookfull.com
to discover even more!

Emerging Technologies in Data Mining and Information


Security Proceedings of IEMIS 2018 Volume 2 Ajith
Abraham

https://textbookfull.com/product/emerging-technologies-in-data-
mining-and-information-security-proceedings-of-
iemis-2018-volume-2-ajith-abraham/

Proceedings of the Third International Scientific


Conference “Intelligent Information Technologies for
Industry” (IITI’18): Volume 1 Ajith Abraham

https://textbookfull.com/product/proceedings-of-the-third-
international-scientific-conference-intelligent-information-
technologies-for-industry-iiti18-volume-1-ajith-abraham/

Proceedings of the Third International Scientific


Conference “Intelligent Information Technologies for
Industry” (IITI’18): Volume 2 Ajith Abraham

https://textbookfull.com/product/proceedings-of-the-third-
international-scientific-conference-intelligent-information-
technologies-for-industry-iiti18-volume-2-ajith-abraham/

Emerging Research in Computing, Information,


Communication and Applications: ERCICA 2018, Volume 1
N. R. Shetty

https://textbookfull.com/product/emerging-research-in-computing-
information-communication-and-applications-
ercica-2018-volume-1-n-r-shetty/
Intelligent Systems Design and Applications: 18th
International Conference on Intelligent Systems Design
and Applications (ISDA 2018) held in Vellore, India,
December 6-8, 2018, Volume 1 Ajith Abraham
https://textbookfull.com/product/intelligent-systems-design-and-
applications-18th-international-conference-on-intelligent-
systems-design-and-applications-isda-2018-held-in-vellore-india-
december-6-8-2018-volume-1-ajith-abraham/

Proceedings of the Future Technologies Conference FTC


2018 Volume 1 Kohei Arai

https://textbookfull.com/product/proceedings-of-the-future-
technologies-conference-ftc-2018-volume-1-kohei-arai/

Hybrid Intelligent Systems Ajith Abraham

https://textbookfull.com/product/hybrid-intelligent-systems-
ajith-abraham/

Innovations in Bio Inspired Computing and Applications


Ajith Abraham

https://textbookfull.com/product/innovations-in-bio-inspired-
computing-and-applications-ajith-abraham/

Intelligent Systems Design and Applications Ajith


Abraham

https://textbookfull.com/product/intelligent-systems-design-and-
applications-ajith-abraham/
Advances in Intelligent Systems and Computing 755

Ajith Abraham · Paramartha Dutta


Jyotsna Kumar Mandal
Abhishek Bhattacharya · Soumi Dutta
Editors

Emerging
Technologies
in Data Mining
and Information
Security
Proceedings of IEMIS 2018, Volume 1
Advances in Intelligent Systems and Computing

Volume 755

Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
e-mail: [email protected]
The series “Advances in Intelligent Systems and Computing” contains publications on theory,
applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all
disciplines such as engineering, natural sciences, computer and information science, ICT, economics,
business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the
areas of modern intelligent systems and computing such as: computational intelligence, soft computing
including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms,
social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and
society, cognitive science and systems, Perception and Vision, DNA and immune based systems,
self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics including
human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent
data analysis, knowledge management, intelligent agents, intelligent decision making and support,
intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings
of important conferences, symposia and congresses. They cover significant recent developments in the
field, both of a foundational and applicable character. An important characteristic feature of the series is
the short publication time and world-wide distribution. This permits a rapid and broad dissemination of
research results.

Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: [email protected]
Members
Rafael Bello Perez, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cuba
e-mail: [email protected]
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: [email protected]
Hani Hagras, University of Essex, Colchester, UK
e-mail: [email protected]
László T. Kóczy, Széchenyi István University, Győr, Hungary
e-mail: [email protected]
Vladik Kreinovich, University of Texas at El Paso, El Paso, USA
e-mail: [email protected]
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan
e-mail: [email protected]
Jie Lu, University of Technology, Sydney, Australia
e-mail: [email protected]
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico
e-mail: [email protected]
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil
e-mail: [email protected]
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland
e-mail: [email protected]
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong
e-mail: [email protected]

More information about this series at http://www.springer.com/series/11156


Ajith Abraham Paramartha Dutta

Jyotsna Kumar Mandal Abhishek Bhattacharya


Soumi Dutta
Editors

Emerging Technologies
in Data Mining
and Information Security
Proceedings of IEMIS 2018, Volume 1

123
Editors
Ajith Abraham Abhishek Bhattacharya
Machine Intelligence Research Labs Institute of Engineering and Management
Auburn, WA, USA Kolkata, West Bengal, India

Paramartha Dutta Soumi Dutta


Department of Computer and Systems Institute of Engineering and Management
Sciences Kolkata, West Bengal, India
Visva-Bharati University
Santiniketan, West Bengal, India

Jyotsna Kumar Mandal


Department of Computer Science
and Engineering
University of Kalyani
Kalyani, India

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-981-13-1950-1 ISBN 978-981-13-1951-8 (eBook)
https://doi.org/10.1007/978-981-13-1951-8

Library of Congress Control Number: 2018950802

© Springer Nature Singapore Pte Ltd. 2019


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made. The publisher remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Organizing Committee

Patron
Prof. (Dr.) Satyajit Chakrabarti, Institute of Engineering and Management, India

Conference General Chair


Dr. Bimal Kumar Roy, Indian Statistical Institute, Kolkata, India

Convener
Dr. Subrata Saha, Institute of Engineering and Management, India
Abhishek Bhattacharya, Institute of Engineering and Management, India

Co-convener
Sukalyan Goswami, University of Engineering and Management, India
Krishnendu Rarhi, Institute of Engineering and Management, India
Soumi Dutta, Institute of Engineering and Management, India
Sujata Ghatak, Institute of Engineering and Management, India
Dr. Abir Chatterjee, University of Engineering and Management, India

Key Note Speakers


Dr. Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), USA
Dr. Fredric M. Ham, IEEE Life Fellow, SPIE Fellow, and INNS Fellow, USA
Dr. Sheng-Lung Peng, National Dong Hwa University, Hualien, Taiwan
Dr. Shaikh Fattah, Editor, IEEE Access and CSSP (Springer), Bangladesh
Dr. Detlef Streitferdt, Technische Universität Ilmenau, Germany
Dr. Swagatam Das, Indian Statistical Institute, Kolkata, India
Dr. Niloy Ganguly, IIT Kharagpur, India

v
vi Organizing Committee

Dr. K. K. Shukla, IIT (BHU.), Varanasi, India


Dr. Nilanjan Dey, Techno India College of Technology, Kolkata, India

Technical Program Committee Chair


Dr. J. K. Mondal, University of Kalyani, India
Dr. Paramartha Dutta, Visva-Bharati University, India
Abhishek Bhattacharya, Institute of Engineering and Management, India

Technical Program Committee Co-chair


Dr. Satyajit Chakrabarti, Institute of Engineering and Management, India
Dr. Subrata Saha, Institute of Engineering and Management, India
Dr. Kamakhya Prasad Ghatak, University of Engineering and Management, India
Dr. Asit Kumar Das, IIEST, Shibpur, India

Editorial Board
Dr. Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), USA
Dr. J. K. Mondal, University of Kalyani, India
Dr. Paramartha Dutta, Visva-Bharati University, India
Abhishek Bhattacharya, Institute of Engineering and Management, India
Soumi Dutta, Institute of Engineering and Management, India

Advisory Committee
Dr. Mahmoud Shafik, University of Derby
Dr. Mohd Nazri Ismail, National Defence University of Malaysia
Dr. Bhaba R. Sarker, Louisiana State University
Dr. Tushar Kanti Bera, University of Arizona, USA
Dr. Shirley Devapriya Dewasurendra, University of Peradeniya, Sri Lanka
Dr. Goutam Chakraborty, Professor and Head of the Intelligent Informatics Lab,
Iwate Prefectural University, Japan
Dr. Basabi Chakraborty, Iwate Prefectural University, Japan
Dr. Kalyanmoy Deb, Michigan State University, East Lansing, USA
Dr. Vincenzo Piuri, University of Milan, Italy
Dr. Biswajit Sarkar, Hanyang University, Korea
Dr. Raj Kumar Buyya, The University of Melbourne
Dr. Anurag Dasgupta, Valdosta State University, Georgia
Dr. Prasenjit Mitra, The Pennsylvania State University
Dr. Esteban Alfaro-Cortés, University of Castilla-La Mancha, Spain
Dr. Ilkyeong Moon, Seoul National University, South Korea
Dr. Izabela Nielsen, Aalborg University, Denmark
Organizing Committee vii

Dr. Prasanta K. Jana, IEEE Senior Member, Indian Institute of Technology (ISM),
Dhanbad
Dr. Gautam Paul, Indian Statistical Institute, Kolkata
Dr. Malay Bhattacharyya, IIEST, Shibpur
Dr. Sipra Das Bit, IIEST, Shibpur
Dr. Jaya Sil, IIEST, Shibpur
Dr. Asit Kumar Das, IIEST, Shibpur
Dr. Saptarshi Ghosh, IIEST, Shibpur, IIT KGP
Dr. Prof. Hafizur Rahman, IIEST, Shibpur
Dr. C. K. Chanda, IIEST, Shibpur
Dr. Asif Ekbal, Associate Dean, IIT Patna
Dr. Sitangshu Bhattacharya, IIIT Allahabad
Dr. Ujjwal Bhattacharya, CVPR Unit, Indian Statistical Institute
Dr. Prashant R. Nair, Amrita Vishwa Vidyapeetham (University), Coimbatore
Dr. Tanushyam Chattopadhyay, TCS Innovation Lab, Kolkata
Dr. A. K. Nayak, Fellow and Hony. Secretarý, CSI
Dr. B. K. Tripathy, VIT University
Dr. K. Srujan Raju, CMR Technical Campus
Dr. Dakshina Ranjan Kisku, National Institute of Technology, Durgapur
Dr. A. K. Pujari, University of Hyderabad
Dr. Partha Pratim Sahu, Tezpur University
Dr. Anuradha Banerjee, Kalyani Government Engineering College
Dr. Amiya Kumar Rath, Veer Surendra Sai University of Technology
Dr. Kandarpa Kumar Sharma, Gauhati University
Dr. Amlan Chakrabarti, University of Calcutta
Dr. Sankhayan Choudhury, University of Calcutta
Dr. Anjana Kakoti Mahanta, Gauhati University
Dr. Subhankar Bandyopadhyay, Jadavpur University
Dr. Debabrata Ghosh, Calcutta University
Dr. Rajat Kr. Pal, University of Calcutta
Dr. Ujjwal Maulik, Jadavpur University
Dr. Himadri Dutta, Kalyani Government Engineering College, Kalyani
Dr. Brojo Kishore Mishra, C. V. Raman College of Engineering (Autonomous),
Bhubaneswar
Dr. S. Vijayakumar Bharathi, Symbiosis Centre for Information Technology (SCIT)
Dr. Govinda K., VIT University, Vellore
Dr. Ajanta Das, University of Engineering and Management, India

Technical Committee
Dr. Vincenzo Piuri, University of Milan, Italy
Dr. Mahmoud Shafik, University of Derby
Dr. Bhaba Sarker, Louisiana State University
Dr. Mohd Nazri Ismail, National Defence University of Malaysia
viii Organizing Committee

Dr. Tushar Kanti Bera, Yonsei University, Seoul


Dr. Birjodh Tiwana, LinkedIn, San Francisco, California
Dr. Saptarshi Ghosh, IIEST, Shibpur, IIT KGP
Dr. Srimanta Bhattacharya, Indian Statistical Institute, Kolkata
Dr. Loingtam Surajkumar Singh, NIT Manipur
Dr. Sitangshu Bhattacharya, IIIT Allahabad
Dr. Sudhakar Tripathi, NIT Patna
Dr. Chandan K. Chanda, IIEST Shibpur
Dr. Dakshina Ranjan Kisku, NIT Durgapur
Dr. Asif Ekbal, IIT Patna
Dr. Prasant Bharadwaj, NIT Agartala
Dr. Somnath Mukhopadhyay, Hijli College Kharagpur, India, and Regional Student
Coordinator, Region II, Computer Society of India
Dr. G. Suseendran, Vels University, Chennai, India
Dr. Sumanta Sarkar, Department of Computer Science of University of Calgary
Dr. Manik Sharma, Assistant Professor, DAV University, Jalandhar
Dr. Rita Choudhury, Gauhati University
Dr. Kuntala Patra, Gauhati University
Dr. Helen K. Saikia, Gauhati University
Dr. Debasish Bhattacharjee, Gauhati University
Dr. Somenath Sarkar, University of Calcutta
Dr. Sankhayan Choudhury, University of Calcutta
Dr. Debasish De, Maulana Abul Kalam Azad University of Technology
Dr. Buddha Deb Pradhan, National Institute of Technology Durgapur
Dr. Shankar Chakraborty, Jadavpur University
Dr. Durgesh Kumar Mishra, Sri Aurobindo Institute of Technology, Indore,
Madhya Pradesh
Dr. Angsuman Sarkar, Secretary, IEEE EDS Kolkata Chapter and Kalyani
Government Engineering College
Dr. A. M. Sudhakara, University of Mysore
Dr. Indrajit Saha, National Institute of Technical Teachers’ Training and Research,
Kolkata
Dr. Bikash Santra, Indian Statistical Institute (ISI)
Dr. Ram Sarkar, Jadavpur University
Dr. Priya Ranjan Sinha Mahapatra, Kalyani University
Dr. Avishek Adhikari, University of Calcutta
Dr. Jyotsna Kumar Mandal, Kalyani University
Dr. Manas Kumar Sanyal, Kalyani University
Dr. Atanu Kundu, Chairman, IEEE EDS, Heritage Institute of Technology, Kolkata
Dr. Chintan Kumar Mandal, Jadavpur University
Dr. Kartick Chandra Mondal, Jadavpur University
Mr. Debraj Chatterjee, Manager, Capgemini
Mr. Gourav Dutta, Cognizant Technology Solutions
Dr. Soumya Sen, University of Calcutta
Dr. Soumen Kumar Pati, St. Thomas College of Engineering and Technology
Organizing Committee ix

Mrs. Sunanda Das, Neotia Institute of Technology Management and Science, India
Mrs. Shampa Sengupta, MCKV Institute of Engineering, India
Dr. Brojo Kishore Mishra, C. V. Raman College of Engineering (Autonomous),
Bhubaneswar
Dr. S. Vijayakumar Bharathi, Symbiosis Centre For Information Technology, Pune
Dr. Govinda K., Vellore Institute of technology
Dr. Prashant R. Nair, Amrita University
Dr. Hemanta Dey, IEEE Senior Member
Dr. Ajanta Das, University of Engineering and Management, India
Dr. Samir Malakar, MCKV Institute of Engineering, Howrah
Dr. Tanushyam Chattopadhyay TCS Innovation Lab, Kolkata
Dr. A. K. Nayak Indian Institute of Business Management, Patna
Dr. B. K. Tripathy, Vellore Institute of Technology, Vellore
Dr. K. Srujan Raju, CMR Technical Campus, Hyderabad
Dr. Partha Pratim Sahu, Tezpur University
Dr. Anuradha Banerjee, Kalyani Government Engineering College
Dr. Amiya Kumar Rath, Veer Surendra Sai University of Technology, Odisha
Dr. S. D. Dewasurendra,
Dr. Arnab K. Laha, IIM Ahmedabad
Dr. Kandarpa Kumar Sarma, Gauhati University
Dr. Ambar Dutta, BIT Mesra & Treasurer—CSI Kolkata
Dr. Arindam Pal, TCS Innovation Labs, Kolkata
Dr. Himadri Dutta, Kalyani Government Engineering College, Kalyani
Dr. Tanupriya Choudhury, Amity University, Noida, India
Dr. Praveen Kumar, Amity University, Noida, India

Organizing Chairs
Krishnendu Rarhi, Institute of Engineering and Management, India
Sujata Ghatak, Institute of Engineering and Management, India
Dr. Apurba Sarkar, IIEST, Shibpur, India

Organizing Co-chairs
Sukalyan Goswami, University of Engineering and Management, India
Rupam Bhattacharya, Institute of Engineering and Management, India

Organizing Committee Convener


Dr. Sajal Dasgupta, Vice-Chancellor University of Engineering and Management
x Organizing Committee

Organizing Committee
Subrata Basak, Institute of Engineering and Management, India
Anshuman Ray, Institute of Engineering and Management, India
Rupam Bhattacharya, Institute of Engineering and Management, India
Abhijit Sarkar, Institute of Engineering and Management, India
Ankan Bhowmik, Institute of Engineering and Management, India
Manjima Saha, Institute of Engineering and Management, India
Biswajit Maity, Institute of Engineering and Management, India
Soumik Das, Institute of Engineering and Management, India
Sreelekha Biswas, Institute of Engineering and Management, India
Nayantara Mitra, Institute of Engineering and Management, India
Amitava Chatterjee, Institute of Engineering and Management, India
Ankita Mondal, Institute of Engineering and Management, India

Registration Chairs
Abhijit Sarkar, Institute of Engineering and Management, India
Ankan Bhowmik, Institute of Engineering and Management, India
Ankita Mondal, Institute of Engineering and Management, India
Ratna Mondol, Institute of Engineering and Management, India

Publication Chairs
Dr. Debashis De, Maulana Abul Kalam Azad University of Technology, India
Dr. Kuntala Patra, Gauhati University, India

Publicity and Sponsorship Chair


Dr. J. K. Mondal, University of Kalyani, India
Dr. Paramartha Dutta, Visva-Bharati University, India
Abhishek Bhattacharya, Institute of Engineering and Management, India
Biswajit Maity, Institute of Engineering and Management, India
Soumik Das, Institute of Engineering and Management, India

Treasurer and Conference Secretary


Dr. Subrata Saha, Institute of Engineering and Management, India
Rupam Bhattacharya, Institute of Engineering and Management, India
Krishnendu Rarhi, Institute of Engineering and Management, India
Organizing Committee xi

Hospitality and Transport Chair


Soumik Das, Institute of Engineering and Management, India
Nayantara Mitra, Institute of Engineering and Management, India
Manjima Saha, Institute of Engineering and Management, India
Sreelekha Biswas, Institute of Engineering and Management, India
Amitava Chatterjee, Institute of Engineering and Management, India

Web Chair
Samrat Goswami
Samrat Dey
Foreword

Welcome to the Springer International Conference on Emerging Technologies in


Data Mining and Information Security (IEMIS 2018) held on February 23–25,
2018, in Kolkata, India. As a premier conference in the field, IEMIS 2018 provides
a highly competitive forum for reporting the latest developments in the research and
application of information security and data mining. We are pleased to present the
proceedings of the conference as its published record. The theme of this year is
Crossroad of Data Mining and Information Security, a topic that is quickly gaining
traction in both academic and industrial discussions because of the relevance of
privacy-preserving data mining (PPDM) model.
IEMIS is a young conference for research in the areas of information and net-
work security, data sciences, big data, and data mining. Although 2018 is the debut
year for IEMIS, it has already witnessed a significant growth. As an evidence of
that, IEMIS received a record of 532 submissions. The authors of the submitted
papers are from 35 countries around the world. Authors of the accepted papers are
from 11 countries.
We hope that this program will further stimulate research in information security
and data mining and provide practitioners with better techniques, algorithms, and
tools for the deployment. We feel honored and privileged to serve the best recent
developments in the field of WSDM to you through this exciting program.

Kolkata, India Bimal Kumar Roy


General Chair, IEMIS 2018

xiii
Preface

This volume presents the proceedings of the International Conference on Emerging


Technologies in Data Mining and Information Security (IEMIS 2018), which took
place in the University of Engineering and Management in Kolkata, India, on
February 23–25, 2018. The volume appears in the series “Advances in Intelligent
Systems and Computing” (AISC), which is one of the fastest growing book series,
published by Springer Nature, one of the largest and most prestigious scientific
publishers,. AISC is meant to include various high-quality and timely publications,
primarily conference proceedings of relevant conference, congresses, and symposia
but also monographs, on the theory, applications, and implementations of broadly
perceived modern intelligent systems and intelligent computing, in their modern
understanding, i.e., tools and techniques of artificial intelligence (AI), computa-
tional intelligence (CI)—which include data mining, information security, neural
networks, fuzzy systems, evolutionary computing, as well as hybrid approaches that
synergistically combine these areas—but also topics such as multiagent systems,
social intelligence, ambient intelligence, Web intelligence, computational neuro-
science, artificial life, virtual worlds and societies, cognitive science and systems,
perception and vision, DNA- and immune-based systems, self-organizing and
adaptive systems, e-learning and teaching, human-centered and human-centric
computing, autonomous robotics, knowledge-based paradigms, learning paradigms,
machine ethics, intelligent data analysis, and various issues related to “big data,”
security, and trust management. These areas are at the forefront of science and
technology and have been found useful and powerful in a wide variety of disci-
plines such as engineering, natural sciences, computer, computation and informa-
tion sciences, ICT, economics, business, e-commerce, environment, health care, life
science, and social sciences. The AISC book series is submitted for indexing in ISI
Conference Proceedings Citation Index (now run by Clarivate), EI Compendex,
DBLP, SCOPUS, Google Scholar, and SpringerLink and many other indexing
services around the world. IEMIS 2018 is a debut annual conference series orga-
nized at the School of Information Technology, under the aegis of the Institute of
Engineering and Management. This idea came from the heritage of the other two
cycles of events: IEMCON and UEMCON, which were organized by the Institute

xv
xvi Preface

of Engineering and Management under the leadership of Prof. Dr. Satyajit


Chakraborty.
In this volume of “Advances in Intelligent Systems and Computing,” we would
like to present the results of studies on selected problems of data mining and
information security. Security implementation is the contemporary answer to new
challenges in the threat evaluation of complex systems. Security approach in theory
and engineering of complex systems (not only computer systems and networks) is
based on the multidisciplinary attitude to information theory, technology, and
maintenance of the systems working in real (and very often unfriendly) environ-
ments. Such a transformation has shaped natural evolution in the topical range of
subsequent IEMIS conferences, which can be seen over the recent years. Human
factors likewise infest the best digital dangers. Workforce administration and digital
mindfulness are fundamental for accomplishing all-encompassing cybersecurity.
This book will be of extraordinary incentive to a huge assortment of experts,
scientists, and understudies concentrating on the human part of the Internet and for
the compelling assessment of safety efforts, interfaces, client-focused outline, and
plan for unique populaces, especially the elderly. We trust this book is instructive
yet much more than it is provocative. We trust it moves, driving per user to examine
different inquiries, applications, and potential arrangements in making sheltered and
secure plans for all.
The Programme Committee of the IEMIS 2018 Conference, its organizers, and
the editors of these proceedings would like to gratefully acknowledge participation
of all the reviewers who helped to refine contents of this volume and evaluated
conference submissions. Our thanks go to, in the alphabetic order, Prof. Bimal
Kumar Roy, Dr. Ajith Abraham, Dr. Sheng Lung peng, Dr. Detlef Streitferdt,
Dr. Shaikh Fattah, Dr. Celia Shahnaz, Dr. Swagatam Das, Dr. Niloy Ganguly,
Dr. K. K. Shukla, Dr. Nilanjan Dey, Dr. Florin PopentiuVladicescu, Dr. Dewan
Md. Farid, Dr. Saptarshi Ghosh, Dr. Rita Choudhury, Dr. Asit Kumar Das,
Prof. Tanupriya Choudhury, Prof. Arijit Ghosal, Prof. Rahul Saxena,
Prof. Monika Jain, Dr. Aakanksha Sharaff, Prof. Dr. Sajal Dasgupta,
Prof. Rajiv Ganguly, Prof. Sukalyan Goswami.
Thanking all the authors who have chosen IEMIS 2018 as the publication
platform for their research, we would like to express our hope that their papers will
help in further developments in design and analysis of engineering aspects of
complex systems, being a valuable source material for scientists, researchers,
practitioners, and students who work in these areas.

Auburn, USA Ajith Abraham


Santiniketan, India Paramartha Dutta
Kalyani, India Jyotsna Kumar Mandal
Kolkata, India Abhishek Bhattacharya
Kolkata, India Soumi Dutta
Contents

Part I Artificial Intelligence


Application of Common ANN for Similar Datatypes in On-line
Monitoring and Security Estimation of Power System . . . . . . . . . . . . . . 3
Shubhranshu Kumar Tiwary, Jagadish Pal and Chandan Kumar Chanda
Crop Prediction Models—A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Supreeth S. Avadhani, Aashrith B. Arun, Varun Govinda
and Juyin Shafaq Imtiaz Inamdar
Rainfall Prediction: A Comparative Study of Neural Network
Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Kaushik D. Sardeshpande and Vijaya R. Thool
Prediction of Bacteriophage Protein Locations Using Deep
Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Muhammad Ali, Farzana Afrin Taniza, Arefeen Rahman Niloy,
Sanjay Saha and Swakkhar Shatabda
Classification of Phishing Websites Using Moth-Flame Optimized
Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Santosh Kumar Majhi and Pragati Mahapatra
Design and Analysis of Intrusion Detection System via Neural
Network, SVM, and Neuro-Fuzzy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Abhishek Tiwari and Sanjeev Kumar Ojha
Grammar-Based White-Box Testing via Automated Constraint
Path Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Bijoy Rahman Arif
Music Playing and Wallpaper Changing System Based
on Emotion from Facial Expression . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Protik Hosen, Nuruzzaman Himel, Md. Asaduzzaman Adil,
Ms. Nazmun Nessa Moon and Ms. Fernaz Narin Nur

xvii
xviii Contents

Gender Recognition Inclusive with Transgender from Speech


Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Ghazaala Yasmin, Omkar Mullick, Arijit Ghosal and Asit K. Das
A Survey on Artificial Intelligence Techniques in Cognitive
Radio Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
R. Ganesh Babu and V. Amudha
Bangla Handwritten Digit Recognition Using Convolutional
Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
AKM Shahariar Azad Rabby, Sheikh Abujar, Sadeka Haque
and Syed Akhter Hossain
Distinction Between Phases of Human Sleep Cycle Using Neural
Networks Based on Bio-signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Trishita, Simran Kaur Bhatia, Gaurav Kumar and Aleena Swetapadma
Genetic Algorithm Based Load Evaluation Approach for Salvation
of Complexities in Allocation of Budget Assets . . . . . . . . . . . . . . . . . . . . 131
Neelima Chilagani and S. S. V. N. Sarma
A Theoretic Approach to Music Genre Recognition from Musical
Features Using Single-Layer Feedforward Neural Network . . . . . . . . . . 145
Sourav Das and Anup Kumar Kolya
Analysis on Efficient Handwritten Document Recognition
Technique Using Feature Extraction and Back Propagation
Neural Network Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Pramit Brata Chanda
Microarray Gene Expression Analysis Using Fuzzy Logic
(MGA-FL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Daksh Khanna, Tanupriya Choudhury, A. Sai Sabitha
and Nguyen Gia Nhu
Stratification of String Instruments Using Chroma-Based
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Arijit Ghosal, Suchibrota Dutta and Debanjan Banerjee
Liver Disorder Prediction Due to Excessive Alcohol Consumption
Using SLAVE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Sahil Saxena, Vikas Deep and Purushottam Sharma
Analysis on Multi-objective Optimization Problem Techniques . . . . . . . 203
Aditi Jaiswal
Contents xix

Part II Cloud Computing


Proposed Methodology to Strengthen the Performance
of Adaptive Cloud Using Efficient Resource Provisioning . . . . . . . . . . . 217
Lata J. Gadhavi and Madhuri D. Bhavsar
A Cloud-Based Vertical Data Distribution Approach
for a Secure Data Access on Mobile Devices . . . . . . . . . . . . . . . . . . . . . 227
Jens Kohler and Thomas Specht
A Priority-Based Process Scheduling Algorithm
in Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Misbahul Haque, Rakibul Islam, Md. Rubayeth Kabir, Fernaz Narin Nur
and Nazmun Nessa Moon
Efficient Model of Cloud Trustworthiness for Selecting Services
Using Fuzzy Logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Rashi Srivastava and A. K. Daniel
CS-PSO based Intrusion Detection System in Cloud Environment . . . . . 261
Partha Ghosh, Arnab Karmakar, Joy Sharma and Santanu Phadikar
Matrix-Based Data Security in Cloud Computing Using Advanced
Cramer–Shoup Cryptosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Y. Mohamed Sirajudeen and R. Anitha
Makespan Efficient Task Scheduling in Cloud Computing . . . . . . . . . . . 283
Y. Home Prasanna Raju and Nagaraju Devarakonda
Improved Lattice-Based Encryption with LP Solver for Secured
Outsourced Data in Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Vemuri Sudarsan Rao and N. Satyanarayana
A Dynamic Resource Allocation Strategy to Minimize
the Operational Cost in Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Chinnaiah Valliyammai and Rengarajan Mythreyi
Review Paper on Cloudlet Allocation Policy . . . . . . . . . . . . . . . . . . . . . . 319
Rachna Anuragi and Manish Pandey

Part III Computational Mathematics


Modelling and Analysis of Bio-convective Nano-fluid Flow
Past a Continuous Moving Vertical Cylinder . . . . . . . . . . . . . . . . . . . . . 331
Debasish Dey
Unsteady MHD Flow of Viscoelastic Fluid Through a Porous
Medium in a Vertical Porous Channel . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Sonam Dorjee and Utpal Jyoti Das
xx Contents

Heat Equation-Based ECG Signal Denoising in The Presence


of White, Colored, and Muscle Artifact Noises . . . . . . . . . . . . . . . . . . . . 355
Prateep Upadhyay, S. K. Upadhyay and K. K. Shukla
Second-Order Fluid Through Porous Medium in a Rotating
Channel with Hall Current . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Hridi Ranjan Deb
Adept-Disseminated Arithmetic-Based Discrete Cosine Transform . . . . . 379
K. B. Sowmya and Jose Alex Mathew
A Survey Road Map on Different Algorithms Proposed
on Protein Structure Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Kunal Kabi, Bhabani Shankar Prasad Mishra and Satya Ranjan Dash
Graph Theoretic Scenario in Period Doubling and Limit Cycle
Circumstances in Two-Dimensional Maps . . . . . . . . . . . . . . . . . . . . . . . 393
Tarini Kumar Dutta, Debasmriti Bhattacherjee and Debasish Bhattacharjee

Part IV Computational Modeling


Enjoy and Learn with Educational Game: Likhte Likhte Shikhi
Apps for Child Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Md. Walid Bin Khalid Aunkon, Md. Hasanuzzaman Dipu,
Nazmun Nessa Moon, Mohd. Saifuzzaman and Fernaz Narin Nur
Technique for Data-Driven Mining in Physiological Sensor Data
by Using Eclat Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
Shraddha Kalbhor and S. V. Kedar
A New Homogeneous Droplet Transportation Algorithm
and Its Simulator to Boost Route Performance in Digital
Microfluidic Biochips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Rupam Bhattacharya, Pranab Roy and Hafizur Rahaman
A New Combined Routing Technique in Digital Microfluidic
Biochip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Rupam Bhattacharya, Pranab Roy and Hafizur Rahaman
Optimized Multi-agent Personalized Search Engine . . . . . . . . . . . . . . . . 451
Disha Verma, Barjesh Kochar and Y. S. Shishodia
Reversible Code Converters Based on Application Specific
Four Variable Reversible Gates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Sanjoy Banerjee, Abhijit Kumar Pal, Mahamuda Sultana,
Diganta Sengupta and Abhijit Das
Regression-Based AGRO Forecasting Model . . . . . . . . . . . . . . . . . . . . . 479
B. V. Balaji Prabhu and M. Dakshayini
Contents xxi

CRICRATE: A Cricket Match Conduction and Player Evaluation


Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Md. Ashraf Uddin, Mahmudul Hasan, Sajal Halder, Sajeeb Ahamed
and Uzzal Kumar Acharjee
Predicting Factors of Students Dissatisfaction for Retention . . . . . . . . . 501
Mohammad Aman Ullah, Mohammad Manjur Alam, Md. Mahiuddin
and Mohammed Mahmudur Rahman
Establishing the Correlation Relationship Between Size of Code
and New Functionalities Using Regression Line Equation . . . . . . . . . . . 511
Kanupriya Kashyap, Abdul Wahid and Vikrant Shokeen
Cassandra—A Distributed Database System: An Overview . . . . . . . . . . 519
Abdul Wahid and Kanupriya Kashyap

Part V Computational Science


Subcellular Localization of Gram-Negative Proteins Using Label
Powerset Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
Hasnaeen Ferdous, Raihan Uddin and Swakkhar Shatabda
Impact of Thermophoretic MHD Visco-Elastic Fluid Flow
Past a Wedge with Heat Source and Chemical Reaction . . . . . . . . . . . . 541
Bibhash Deka and Rita Choudhury
Slip Effects on Heat and Mass Transfer in MHD Visco-Elastic
Fluid Flow Through a Porous Channel . . . . . . . . . . . . . . . . . . . . . . . . . 553
Bamdeb Dey and Rita Choudhury
A Channel Selection Method for Epileptic EEG Signals . . . . . . . . . . . . 565
Satarupa Chakrabarti, Aleena Swetapadma and Prasant Kumar Pattnaik
Visco-Elastic Effects on Nano-fluid Flow in a Rotating System
in Presence of Hall Current Effect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
Debasish Dey and Ashim Jyoti Baruah
RNA Structure Prediction Using Chemical Reaction Optimization . . . . 587
Md. Rayhanul Kabir, Fatema Tuz Zahra and Md. Rafiqul Islam
Mapping of Flow Visualization and Heat Transfer Analysis Over
Roughened Plate Inside Rectangular Duct . . . . . . . . . . . . . . . . . . . . . . . 599
Anup Kumar and Apurba Layek
Impact of Oblique Magnetic Flux upon Second-Grade Fluid Flow
with Dissipation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611
Bandita Das and Rita Choudhury
xxii Contents

Analyzing the Complexity of Loop Shifting for Optimization


of Matrix-Multiplication Process for System Having One
Level Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
Yogesh Singh Rathore, Dharminder Kumar and Kavita Saxena
Modeling Compensation of Data Science Professionals
in BRIC Nations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
M. J. Smibi and Vivek Menon
Horizontal Scaling Enhancement for Optimized Big Data
Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
Chandrima Roy, Kashyap Barua, Sandeep Agarwal, Manjusha Pandey
and Siddharth Swarup Rautaray

Part VI Cryptology
Implementation and Analysis of Cryptographic Ciphers in FPGA . . . . . 653
V. G. Kiran Kumar and C. Shantharama Rai
Attack Experiments on Elliptic Curves of Prime
and Binary Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
Ni Ni Hla and Tun Myat Aung
Gait-Based Authentication System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Vivek Kumar, Chirag Gupta and Vatsal Agarwal
Pen-Drive Based Password Management System
for Online Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 693
Samruddhi Patil, Kumud Wasnik and Sudhir Bagade
A Comparative Analysis of Symmetric Lightweight
Block Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
Asmita Poojari and H. R. Nagesh
A Novel Approach to Generate Symmetric Key in Cryptography
Using Genetic Algorithm (GA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
Chukhu Chunka, Rajat Subhra Goswami and Subhasish Banerjee
A Low-Cost, High-Performance Implementation of RSA Algorithm
Using GPGPU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
P. S. Sasaank Srivatsa and P. V. R. R. Bhogendra Rao
Attacks and Threats on RSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Sreemoyee Biswas and Namita Tiwari
Private Communication Based on Hierarchical Identity-Based
Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
D. Kalyani and R. Sridevi
Contents xxiii

Part VII Expert System


An Approach to the Parameter Based Doctor Ranking . . . . . . . . . . . . . 759
Mohammed Mahmudur Rahman, Md. Aman Ullah, Zinnia Sultana
and Md. Rashedul Islam
Land Use/Land Cover Modeling of Sagar Island,
India Using Remote Sensing and GIS Techniques . . . . . . . . . . . . . . . . . 771
Ismail Mondal, Sandeep Thakur, Phanibhusan Ghosh, Tarun Kumar De
and Jatisankar Bandyopadhyay
A Hybrid Approach to Improve Recommendation System
in E-Tourism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 787
Mohammed Mahmudur Rahman, Zulkifly Bin Mohd Zaki,
Najwa Hayaati Binti Mohd Alwi and Md. Monirul Islam
Developing a Vision-Based Driving Assistance System . . . . . . . . . . . . . . 799
Ashfak Md. Shibli, Mohammed Moshiul Hoque and Lamia Alam
A Proposed Web-Based Architecture for Diabetes Awareness,
Prevention, and Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813
Md. Ariful Islam, Syed Akhter Hossain
and Khondaker Abdullah Al Mamun
Rule Languages for the Semantic Web . . . . . . . . . . . . . . . . . . . . . . . . . 825
Sonia Mehla and Sarika Jain
Towards a Semantic Knowledge Treasure for Military
Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
Sanju Mishra and Sarika Jain
A Fuzzy AHP Approach to IT-Based Stream Selection
for Admission in Technical Institutions in India . . . . . . . . . . . . . . . . . . 847
Oindreela Saha, Arpita Chakraborty and Jyoti Sekhar Banerjee
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859
About the Editors

Dr. Ajith Abraham received Ph.D. from Monash University, Melbourne,


Australia, and M.Sc. from Nanyang Technological University, Singapore. His
research and development experience includes over 25 years in the industry and
academia spanning different continents like Australia, America, Asia, and Europe.
He works in a multidisciplinary environment involving computational intelligence,
network security, sensor networks, e-commerce, Web intelligence, Web services,
computational grids, data mining, and applications to various real-world problems.
He has authored/co-authored over 350 refereed journal/conference papers and
chapters, and some of the papers have also won the best paper awards at international
conferences and also received several citations. Some of the articles are available in
the ScienceDirect Top 25 Hottest Articles—http://top25.sciencedirect.com/index.
php?cat_id=6&subject_area_id=7.
He has given more than 20 plenary lectures and conference tutorials in these
areas. He serves the editorial board of several reputed International journals and has
also guest-edited 26 special issues on various topics. He is actively involved in the
Hybrid Intelligent Systems (HIS); Intelligent Systems Design and Applications
(ISDA); and Information Assurance and Security (IAS) series of international
conferences. He was General Co-chair of the Tenth International Conference on
Computer Modeling and Simulation (UKSIM’08), Cambridge, UK; Second Asia
International Conference on Modeling and Simulation (AMS 2008), Malaysia;
Eighth International Conference on Intelligent Systems Design and Applications
(ISDA’08), Taiwan; Fourth International Symposium on Information Assurance
and Security (IAS’07), Italy; Eighth International Conference on Hybrid Intelligent
Systems (HIS’08), Spain; and Fifth IEEE International Conference on Soft
Computing as Transdisciplinary Science and Technology (CSTST’08),
Cergy-Pontoise, France, and Program Chair/Co-chair of the Third International
Conference on Digital Information Management (ICDIM’08), UK, and Second
European Conference on Data Mining (ECDM 2008), the Netherlands.
He is Senior Member of IEEE, IEEE Computer Society, IEE (UK), ACM, etc.
More information at: http://www.softcomputing.net.

xxv
xxvi About the Editors

Dr. Paramartha Dutta was born in 1966 and did his bachelors and masters in
statistics from the Indian Statistical Institute, Calcutta, in the years 1988 and 1990,
respectively. He completed his M.Tech. in computer science from the same institute
in the year 1993 and Ph.D. in engineering from the Bengal Engineering and Science
University, Shibpur, in 2005. He has served in the capacity of research personnel in
various projects funded by the Government of India, which include Defence
Research Development Organization, Council of Scientific and Industrial Research,
Indian Statistical Institute. He is now Professor in the Department of Computer and
System Sciences of the Visva-Bharati University, West Bengal, India. Prior to this,
he served Kalyani Government Engineering College and College of Engineering in
West Bengal as full-time faculty member. He remained associated as visiting/guest
faculty of several universities/institutes such as West Bengal University of
Technology, Kalyani University, Tripura University.
He has co-authored eight books and has also seven edited books to his credit. He
has published more than two hundred technical papers in various peer-reviewed
journals and conference proceedings, both international and national, as well as
several chapters in edited volumes of reputed international publishing houses like
Elsevier, Springer-Verlag, CRC Press, John Wiley. He has guided six scholars who
already had been awarded their Ph.D. apart from one who has submitted her thesis.
Presently, he is supervising six scholars for their Ph.D. program.
He is the co-inventor of ten Indian patents and one international patent which are
all published apart from five international patents which are filed but not yet to be
published.
He, as an investigator, could implement successfully projects funded by All
India Council for Technical Education, Department of Science and Technology,
of the Government of India. He has served/serves in the capacity of external
member of Boards of Studies of relevant departments of various universities
encompassing West Bengal University of Technology, Kalyani University, Tripura
University, Assam University. He had the opportunity to serve as the expert of
several interview boards conducted by West Bengal Public Service Commission;
Assam University, Silchar; National Institute of Technology, Arunachal Pradesh;
Sambalpur University; etc.
He is Life Fellow of the Optical Society of India (FOSI), Institution of
Electronics and Telecommunication Engineers (FIETE), and Institute of
Engineering (FIE); Life Member of Computer Society of India (LMCSI), Indian
Science Congress Association (LMISCA), Indian Society for Technical Education
(LMISTE), and Indian Unit of Pattern Recognition and Artificial Intelligence
(LMIUPRAI); the Indian affiliate of the International Association for Pattern
Recognition (IAPR); Senior Member of Associated Computing Machinery
(SMACM) and Institution of Electronics and Electrical Engineers (SMIEEE), USA.

Dr. Jyotsna Kumar Mandal completed his M.Tech. in computer science from the
University of Calcutta in 1987, was awarded Ph.D. (engineering) in computer
science and engineering by Jadavpur University in 2000, was Former Dean, Faculty
About the Editors xxvii

of Engineering, Technology and Management, for two consecutive terms since


2008, and is presently working as Professor of Computer Science and Engineering,
Kalyani University, Kalyani, Nadia, Government of West Bengal. He is
Ex-Director, IQAC, Kalyani University, and Chairman, CIRM, Kalyani University.
He was appointed as Professor in Kalyani Government Engineering College
through Public Service Commission under Government of West Bengal. He started
his career as Lecturer at NERIST, under MHRD Government of India, Arunachal
Pradesh, in September 1988. He has teaching and research experience of 30 years.
His areas of research are coding theory, data and network security, remote sensing
and GIS-based applications, data compression, error correction, visual cryptogra-
phy, and steganography. He has produced 21 Ph.Ds., two scholars have submitted,
and eight are pursuing. He has supervised 3 M.Phil. graduates and more than 50
M.Tech. dissertations and more than 100 M.C.A. dissertations. He is Chief Editor
of CSI Journal of Computing and Guest Editor of MST Journal (SCI indexed) of
Springer. He has published more than 400 research articles out of which 154
articles in various international journals. He has published five books from LAP
Germany and one from IGI Global. He was awarded A. M. Bose Memorial Silver
Medal and Kali Prasanna Dasgupta Memorial Silver Medal in M.Sc. from Jadavpur
University. India International Friendship Society (IIFS), New Delhi, conferred
“Bharat Jyoti Award” for meritorious service, outstanding performance, and
remarkable role in the field of computer science and engineering on August 29,
2012. He received “Chief Patron” Award from CSI India in 2014. International
Society for Science, Technology and Management conferred “Vidyasagar Award”
in the Fifth International Conference on Computing, Communication and Sensor
Network on December 25, 2016. ISDA conferred Rastriya Pratibha Award in 2017.

Abhishek Bhattacharya is Assistant Professor in the Department of Computer


Application at the Institute of Engineering and Management, India. He did his
M.Sc. from the Biju Patnaik University of Technology and completed his M.Tech.
in computer science from BIT, Mesra. He remained associated as visiting/guest
faculty of several universities/institutes in India. He has three books to his credit. He
has published 20 technical papers in various peer-reviewed journals and conference
proceedings, both international and national, as well as chapters in edited volumes
of reputed International publishing houses. He has teaching and research experience
of 13 years. His areas of research are data mining, network security, mobile
computing, and distributed computing. He is the reviewer of couple of journals of
IGI Global, Inderscience Publications, and Journal of Information Science Theory
and Practice, South Korea.
He is Member of International Association of Computer Science and
Information Technology (IACSIT), Universal Association of Computer and
Electronics Engineers (UACEE), International Association of Engineers (IAENG),
Internet Society as a Global Member (ISOC), the Society of Digital Information and
Wireless Communications (SDIWC), and International Computer Science and
Engineering Society (ICSES); Technical Committee Member of CICBA 2017,
52nd Annual Convention of Computer Society of India (CSI 2017), International
xxviii About the Editors

Conference on Futuristic Trends in Network and Communication Technologies


(FTNCT-2018), ICIoTCT 2018, ICCIDS 2018, and Innovative Computing and
Communication (ICICC-2018); and Advisory Board Member of ISETIST 2017.

Soumi Dutta is Assistant Professor at the Institute of Engineering and


Management, India. She is also pursuing her Ph.D. in the Department of Computer
Science and Technology, Indian Institute of Engineering Science and Technology,
Shibpur. She received her B.Tech. in information technology and her M.Tech. in
computer science securing first position (gold medalist), both from Techno India
Group, India. His research interests include social network analysis, data mining,
and information retrieval. She is the member of several technical functional bodies
such as the Michigan Association for Computer Users in Learning (MACUL), the
Society of Digital Information and Wireless Communications (SDIWC), Internet
Society as a Global Member (ISOC), and International Computer Science and
Engineering Society (ICSES). She has published several papers in reputed journals
and conferences.
Discovering Diverse Content Through
Random Scribd Documents
15. Brocklehurst Coll.
16. Alnw.
17. P.

18. “Usert-kau, nebt taui,” the ka-name of Hatshepsut. T.


19. “Uaz renpetu,” the nebti-name of Hatshepsut. L.
20-30. “Maa-ka-ra,” the prenomen of Hatshepsut.
20. Gr.
21. Alnw.
22. Liv.
23. Gdn.
24. B.M.
25. B.M. 29230.
26. “The heiress of Ra.” B.M.
27. “Favoured with delicacies.” Berl. 1903.
28. “Rising in the Horizon.” Har.
29. “Sweet of scent to the nostrils of the Gods of Thebes.” In
the possession of Mrs. Wright of Netley.
30. C.M.

31. “Maa-ka-ra, Hatshepsut, the favoured of Amen.” B.M.


32. “Hatshepsut, the favoured of Amen.” B.M. 30572.
33-35 “The Divine Wife, Hatshepsut.”
33. Alnw.
34. B.M. 28438.
35. Berl. 1904.
PLATE XXVIII.

SCARABS OF THE EIGHTEENTH DYNASTY—


continued.

(Thothmes III and His Family.)

1. “Neferu-ra” (Daughter of Hatshepsut). P.


2. “Neferu-ra, the Divine Wife.” Scarab, set in a gold funda. Gr.
3. “The Royal Daughter and Royal Sister, Neferu-ra.” L.
4. “The Divine Wife, Neferu-ra.” L.
5-34. “Men-kheper-ra” (Thothmes III).
5. Gr.
6. L.
7. B.M. 28745.
8. Alnw. 999.
9. B.M. 16789.
10. B.M. 16838.
11. P.
12. Hood.
13. T.
14. Evans.
15. Alnw. 981.
16. Evans.
17. L.
18. Berl. 14427.
19. Gdn.
20. B.M.
21. P.
22. B.M. 16790.
23. In the possession of Mrs. Roller.
24. C.M.
25. C.M.
26. Hood.
27. T.
28. Amh.
29. T.
30. L.
31. P.
32. Berl. 14929.
33. M-G.
34. B.M. 28492.

35. “The Great Royal Wife, Merŷt-ra Hatshepsut.” A lapis-lazuli


scarab set in a gold funda. L.
36. “Hatshepsut Merŷt-amen-ra.” B.M. 29455.
37. “The Great Royal Wife, Sat-aah.” P.
PLATE XXIX.

OFFICIALS OF THE EIGHTEENTH DYNASTY; AND


RINGS, ETC., FROM THE TOMB OF MAKET,[128] AT
GUROB (temp. THOTHMES III).

1. “The Superintendent of the Royal Temple, Aahmes.” Murch.


2. “The Keeper of the Storehouse of Offerings, Sen-pu.” Murch. This
scarab probably belongs to the end of the Twelfth Dynasty. (Cf.
Pl. XIII, 19.)
3. “The Scribe of the Recruits, Ab-ka-user.” M-G.
4. “The Superintendent of the Workmen of Amen, Men-kheper-ra-
senb.” Murch.
5. “The High Priest of Amen, Hapu-senb.” B.M. 29435. Hapu-senb
lived under Thothmes II and Queen Hatshepsut. (For remarks
on his life, see my note on him in P.S.B.A. XXII, pp. 31-36.)
6. “The Steward of the Queen, Pe-en-Thebu.” Murch.
7. “The uab-priest, Amen-em-heb.” Hood. Mounted in a gold funda.
8. “The Eyes and Ears of the Lord of the Two Lands, the Mayor, Sen-
nefer.” This Mayor (of Thebes) lived under Amenhetep II (see
my notes on him in the P.S.B.A. XXII, pp. 52-61).
9. “The sedem ash of the Superintendent of the Seal, Min-nekht.”
Davis.
10. “The Divine Father, beloved of the God (i.e., the King), the Vezîr,
Ptahmes.” C.M.
11. “The Chantress of Amen, Maŷ.” Alnw.
12. “The Lady, Art.” B.M. 30639.
13. “The Royal Brother....” B.M. 27790.
14. “The Lady, Apu-ser.” Alnw.
15-46. Rings, etc., from the tomb of Maket at Gurob (temp.
Thothmes III).
15, 17, 18, 20-28. Scarabs with ornamental devices.
16. “Ra,” a very common type of scarab, and specimens of it may
generally be dated to the first half of the Eighteenth Dynasty.
19-32. “Amen-ra.” This is another very common type; it is nearly
always of the date of Thothmes III.
29. “The Good God, Lord of the Two Lands, Men-kheper-ra
(Thothmes III).”
30, 31, 33. “The Lady, Maket.”
34. “Aa-kheper-ka-ra (Thothmes I),” chosen of Amen.
35-41. “Men-kheper-ra (Thothmes III).”
42. Plaque, with figures of the Gods Tahuti and Ptah.
43. A cylinder-seal, bearing the titles and names of Thothmes II.
44-45. Flat seals, with ornamental devices.
46. Frog in porcelain, with a beetle engraved upon the base.
PLATE XXX.

SCARABS OF THE EIGHTEENTH DYNASTY—


continued.

(Amenhetep II to Amenhetep III.)

1-15. “Aa-kheperu-ra (Amenhetep II).”


1. “Born at Memphis.” P.
2. “Beloved of Tahuti.” Luxor.
3. “Firm of heart.” B.M. 4077. This rectangular plaque is a
splendid specimen of the engraver’s art; it is of yellow
jasper, and on the reverse is cut a representation of
one of the horses of the king.
4. B.M.
5. B.M. 16915.
6. “Lord of Glory in the house of Amen.” W. (W., S.B. IV, 67.)
7. L.
8. L.
9. Alnw.
10. B.M. 4069.
11. P. I., VIII, 39.
12. “Prince of Thebes, Lord of Valiance, and beloved of
Amen.” P. I. VIII.
13. Alnw. (plaque).
14. (W. S.B. IV, 400.)
15. B.M. 3944.

16. A gold plaque, forming the bezel of a swivel ring, in the


Liverpool Museum. The inscription reads:—“The Good God, son
of Amen, Lord of Valiance, the Son of Ra, Amenhetep (II), the
Divine Ruler of Heliopolis, fighting hundreds of thousands.”
17. “Aa-kheperu-ra, Son of Amen, whom he (Amen) created
himself.” P. K. XXIII, 7.
18-25. “Men-kheperu-ra (Thothmes IV).”
18. Brock. A gold plaque, forming the bezel of a swivel-ring.
19 and 20. Gr.
21. “Lord of the sweet wind.” L.
22. “Beloved of Ptah.” B.M.
23. Gr.
24. Ready.
25. L.

26-32. “Neb-maa-ra (Amenhetep III).”


26 and 27. Newb.
28. “Neb-maa-ra (Amenhetep III)” and “the Royal Wife Thyi.”
B.M.
29. “Beloved of Amen.” Luxor.
30. “Beloved of Ptah.” Amh.
31. “Lord of the festival, Amenhetep (III), Ruler of Thebes.” T.
32. Gr.
PLATE XXXI.

SCARABS OF THE EIGHTEENTH DYNASTY—


(continued).

Amenhetep III (continued) TO Aŷ.

1-12, 14-18. Neb-maa-ra (Amenhetep III) and his Queen Thŷi.


1. Newb.
2. B.M. 28314.
3. “Neb-maa-ra and the Royal Wife, Thŷi.” B.M. 29454.
4. “The Great Royal Wife, Thŷi.” B.M. 32351.
5. “Pleasing with Victories.” B.M. 32433.
6. B.M. 28571.
7. B.M. 32304.
8. “The Royal Wife Thŷi.”
9. “Amenhetep (III), Ruler of Thebes.” Newb.
10. “Abounding in things.” B.M. 32405.
11. Newb.
12. B.M. 32348.
13. See below under Amenhetep IV.
14. Amh.
15. “Amenhetep (III), Ruler of Thebes.” B.M. 30446. A gold
ring.
16. “Neb-maa-ra and the Royal Wife, Thŷi.” P.
17. “The Royal Wife, Thŷi.” B.M. 30589.
18. “The Great Divine Wife, Thŷi, beloved
of Isis.”

13, 19-25, 27, 28. Nefer-kheperu-ra, ua-en-ra (Amenhetep IV),


afterwards called Akhenaten.
13. “Ruler of Thebes.” B.M. 4097.
19. “Lord of the Sweet Wind.”
20. “Beloved of Hor-akhuti.”
21. “Beloved of Amen and Mut.” Gdn.
22. “Amenhetep (IV), the Divine Ruler of Thebes.” Newb.
23. “Chosen of Amen.” B.M. 29236.
24. A plaque in the Amherst Collection giving the two names
of Amenhetep IV, and on the reverse, “beloved of
Sebek-ra, Lord of Sunu.” Amh.
25. A silver ring in the M-G. Collection.
27. “Pacifying the Aten.” B.M. 30596.
28. “Beloved of the Aten.” B.M. 28417.

26, 29. Kheper-kheperu-ra, ar maat (Aŷ). See also No. 34.


26. “Beloved of Amen.” B.M. 4096.
29. “Beloved of Amen.” Newb.

30. “Nefer-neferu-aten Nefert-iti,” Queen of Akhenaten. Gold ring in


the Louvre.
31. A bronze ring of Ankh-kheperu-ra, in the M-G. Collection.
32. “Neb-kheperu-ra (Tût-ankh-amen), beloved of Ptah, Lord of
Heaven.” P.
33. “Ankh-nes-pa-aten,” Queen of Tut-ankh-amen. P.
34. A gold ring of Kheper-kheperu-ra, ar maat (Aŷ). Leyd.
PLATE XXXII.

HISTORICAL SCARABS OF AMENHETEP III.


1. Kirgipa and Her Harîm.

Two specimens of this scarab are known, and it is perhaps the


most interesting one of the series. One example is preserved in the
Berl. Mus. (11002), the other was in the possession of Madame
Hoffmann. An elaborate study of the text of the latter example has
been published by Brugsch in the Ä.Z., XVIII, 81, and Maspero has
given a drawing of the inscription (by Legrain, from a paper
impression) in his Recueil des Travaux, XV, 200. The text given in the
Plate is from the Berlin specimen, restored from Maspero’s published
copy.
(a) Transliteration. (b) Translation.
1. Renpt X kher hen en 1. “The tenth year under the
Majesty of

2-5. Ankh Heru. (Here follow 2-5. “the Living Horus.” (Here
the usual titles of Amen- follow the full titles of
hetep III and Thŷi.) Amenhetep III and Thŷi.)

6. ren en tef-ef Ŷuaa; ren-en 6. “The name of her father is


Ŷuaa; the name of

7. met-es Thuaa. Baŷt: anen 7. “her mother, Thuaa. Wonders:


8. ŷt hen-ef sat ur ne Neherina 8. “His Majesty brought the


daughter of the Prince of
Mesopotamia,
9. Sa-tha-ri-na Kir-gi-pa 9. “Sa-tha-ra-na (the Princess)
Kir-gi-pa

10. tepu ne khenera-es 10. “(and) the head-women of


her harîm

11. set, 317. 11. “Women, 317.”


2. The Lion Hunts of Amenhetep III.
Scarabs bearing an inscription recording the lion hunts of
Amenhetep III are common, and about forty specimens are known.
Of these, five are in the British Museum (4095, 12520, 16987,
24169, 29438); four are in the Louvre (Inv., 787, 788); four in the
Berlin Museum (3481, 3482, 8443, 13274); three in the Leyden
Museum (O. 83-85); and one each in the Cairo (M., Cat. Ab., 1388),
Florence (840), and Bologna (2455) Museums. In the Cat. des Med.,
Paris (1021), and in the Amherst, Edwards, Fraser (Sc. 261), Grant,
Hertz (Cat., p. 112), Kennard, Myers, Meux (1785), Palin, Petrie,
Posno, H-Price (Cat. 284), and several smaller collections, are also
one each. The example figured is in the possession of Mr. Nash. The
hieroglyphic text of this scarab has been published, among others,
by Mariette (Alb. de Boulaq, Pl. 36, 532), Maspero (Histoire, II, p.
315), Brugsch (Ä.Z., XVIII, 81), and Budge (Mummy, p. 241), and a
translation of it has been given by Pierret (Cat. Salle Hist., Louvre,
1877, p. 138), by Birch (Records of the Past, XII, p. 40), and many
others.

(a) Transliteration. (b) Translation.


1-5. (Full titles and names 1-5. 1-5. (Full titles and names 1-5.
(Full titles and names of (Full titles and names of
Amenhetep III and of Amenhetep III and of
Amenhetep III and Thŷi.) Amenhetep III and Thŷi.)

5. ari-khet mau 5. “Number of the lions

6. anen hen-ef em satet-ef zes- 6. “brought by his Majesty in his


ef shaa own shooting, beginning
7. em renpt I nefrŷt er renpt X . “from the year one ending at
mau7 the year ten: lions

8. hesa, 102 8. “fierce, 102.”


3. The Parents ofQueen Thŷi and the Limits of the
Egyptian Empire.
Many specimens are known of this historical scarab. In the Louvre
there are two examples (Inv. 787); in the British Museum are three
(4096, 16988, 29437, the latter specimen of fine blue-glazed
steatite); in the Cairo Museum, one (3817, figured in Mariette’s
Album de Boulaq, XXXVI, 541; Maspero, Struggles of the Nations, p.
315); in the Bologna Museum, one (2454); in the Edwards, Petrie,
Fraser (Fr., Sc. X, 262), Nash, Hilton-Price (Cat. 283), Dattari and
Myers’ Collections, one each; as well as several others in private
hands. The example figured here is from the Amherst Collection.
Birch (Records of the Past, XII, 39); Budge (Mummy, 242), and
Fraser (Fr. Sc., X, 56), have published translations of the text.

(a) Transliteration. (b) Translation.


1. Ankh Heru. (Here follow the 1. “The Living Horus.” (Here
full titles of Amenhetep III follow the titles of Amenhetep
and his Queen Thŷi) III and his Queen Thŷi.)

5. “ren en tef-es 5. “The name of her father is

6. Ŷuaa, ren en met-es Thuaa 6. “Ŷuaa, the name of her mother


is Thuaa;

7. hemt pu ent seten nekht 7. “she is the wife of the


victorious king;

8. tash ef res er Karŷ 8. “his southern boundary is Karŷ,


[129]
9. mehti er Neha- 9. “(and) his northern boundary is
Meso-

10. rina. 10. “potamia.”


PLATE XXXIII.

HISTORICAL SCARABS OF AMENHETEP III—


(continued).
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like