Download as pdf or txt
Download as pdf or txt
You are on page 1of 54

Innovations in Computational

Intelligence and Computer Vision


Proceedings of ICICV 2020 Manoj
Kumar Sharma
Visit to download the full and correct content document:
https://textbookfull.com/product/innovations-in-computational-intelligence-and-comput
er-vision-proceedings-of-icicv-2020-manoj-kumar-sharma/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Advances in Computational Intelligence Proceedings of


Second International Conference on Computational
Intelligence 2018 Sudip Kumar Sahana

https://textbookfull.com/product/advances-in-computational-
intelligence-proceedings-of-second-international-conference-on-
computational-intelligence-2018-sudip-kumar-sahana/

Artificial Intelligence and Bioinspired Computational


Methods Proceedings of the 9th Computer Science On line
Conference 2020 Vol 2 Radek Silhavy

https://textbookfull.com/product/artificial-intelligence-and-
bioinspired-computational-methods-proceedings-of-the-9th-
computer-science-on-line-conference-2020-vol-2-radek-silhavy/

Applied Computer Vision and Image Processing


Proceedings of ICCET 2020 Volume 1 Brijesh Iyer

https://textbookfull.com/product/applied-computer-vision-and-
image-processing-proceedings-of-iccet-2020-volume-1-brijesh-iyer/

Advances in Computer Vision: Proceedings of the 2019


Computer Vision Conference (CVC), Volume 1 Kohei Arai

https://textbookfull.com/product/advances-in-computer-vision-
proceedings-of-the-2019-computer-vision-conference-cvc-
volume-1-kohei-arai/
Foundations of Mental Health Promotion 2nd Edition
Manoj Sharma

https://textbookfull.com/product/foundations-of-mental-health-
promotion-2nd-edition-manoj-sharma/

Computer Vision and Graphics International Conference


ICCVG 2020 Warsaw Poland September 14 16 2020
Proceedings Leszek J. Chmielewski

https://textbookfull.com/product/computer-vision-and-graphics-
international-conference-iccvg-2020-warsaw-poland-
september-14-16-2020-proceedings-leszek-j-chmielewski/

Innovations in Electrical and Electronic Engineering:


Proceedings of ICEEE 2020 Margarita N. Favorskaya

https://textbookfull.com/product/innovations-in-electrical-and-
electronic-engineering-proceedings-of-iceee-2020-margarita-n-
favorskaya/

Computer Vision ECCV 2020 16th European Conference


Glasgow UK August 23 28 2020 Proceedings Part XVI
Andrea Vedaldi

https://textbookfull.com/product/computer-vision-eccv-2020-16th-
european-conference-glasgow-uk-august-23-28-2020-proceedings-
part-xvi-andrea-vedaldi/

Computer Vision ECCV 2020 16th European Conference


Glasgow UK August 23 28 2020 Proceedings Part XVII
Andrea Vedaldi

https://textbookfull.com/product/computer-vision-eccv-2020-16th-
european-conference-glasgow-uk-august-23-28-2020-proceedings-
part-xvii-andrea-vedaldi/
Advances in Intelligent Systems and Computing 1189

Manoj Kumar Sharma ·


Vijaypal Singh Dhaka ·
Thinagaran Perumal · Nilanjan Dey ·
João Manuel R. S. Tavares Editors

Innovations in
Computational
Intelligence and
Computer Vision
Proceedings of ICICV 2020
Advances in Intelligent Systems and Computing

Volume 1189

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156


Manoj Kumar Sharma Vijaypal Singh Dhaka
• •

Thinagaran Perumal Nilanjan Dey


• •

João Manuel R. S. Tavares


Editors

Innovations in Computational
Intelligence and Computer
Vision
Proceedings of ICICV 2020

123
Editors
Manoj Kumar Sharma Vijaypal Singh Dhaka
Department of Computer Department of Computer
and Communication Engineering and Communication Engineering
Manipal University Jaipur Manipal University Jaipur
Jaipur, Rajasthan, India Jaipur, Rajasthan, India

Thinagaran Perumal Nilanjan Dey


Department of Computer Science Department of Information Technology
Faculty of Computer Science Techno India College of Technology
and Information Technology Kolkata, West Bengal, India
Universiti Putra Malaysia
Serdang, Selangor, Malaysia

João Manuel R. S. Tavares


Faculdade de Engenharia da
Universidade do Porto
Porto, Portugal

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-981-15-6066-8 ISBN 978-981-15-6067-5 (eBook)
https://doi.org/10.1007/978-981-15-6067-5
© Springer Nature Singapore Pte Ltd. 2021
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface

This volume contains papers presented at the International Conference on


Innovations in Computational Intelligence and Computer Vision (ICICV 2020)
organized by the Department of Computer and Communication Engineering,
Computer Science and Information Technology, Manipal University Jaipur during
January 17-19, 2020. It provided an open platform for the young minds/ researchers
across the globe to present cutting-edge research findings, exchanging ideas, and
reviewing submitted and presented single and multi-disciplinary research. The
research articles presented in the conference covers systems and paradigms that
cover computational intelligence and computer vision in a broad sense.
ICICV 2020 had an overwhelming response with high volume of submissions
from different domains related to advanced computing, artificial intelligence and
computer vision, image processing and video analysis, innovative practices, and
interdisciplinary research areas. The scope of the conference was deep learning, soft
computing, machine learning, image and video processing which may be applied to
the solution of world problems in industry, the environment and the community. It
also focusses on the knowledge-transfer methodologies and innovation strategies
employed to make this happen effectively. The combination of intelligent systems
tools and a broad range of applications introduces a need for a synergy of disci-
plines from science, technology, business and the humanities. A rigorous
peer-review process was adopted to filter the quality research submissions and with
the help of external reviewers and programme committee few qualitative submis-
sions were accepted for publication in this volume of Advances in Intelligent
Systems and Computing series of Springer.
Several special sessions were offered by eminent professors in many
cutting-edge technologies. Several eminent researchers and academicians delivered
talks addressing the participants in their respective field of proficiency. Our thanks
are due to Shri Sandip Datta, IOT Platform & Solutions Country Leader, IBM India
Private Limited; Dr Robin T. Bye and Dr Ottar from Norwegian University of
Science and Technology, Alesund, Norway; Dr Dharam Singh from University of
Namibia; Dr Swagatam Das from Indian Statistical Institute, Kolkata; Dr Manu
Pratap Singh from Dr. Bhimrao Ambedkar University, Agra, India; Dr Nilanjan

v
vi Preface

Dey from Techno India College of Technology, Kolkata, India; Dr K.V. Arya,
ABV-IIITM Gwalior, India; and Mr. Aninda Bose, Springer India, for their valu-
able talks for the benefits of the participants. We would like to express our
appreciation to the members of the program committee for their support and
cooperation in this publication. We are also thankful to the team from Springer for
providing a meticulous service for the timely production of this volume.
Our heartfelt thanks to our Honourable President, Manipal University Jaipur,
Dr. G. K. Prabhu; Honourable Pro-president, Manipal University Jaipur, Dr. N. N.
Sharma; Honourable Registrar, Manipal University Jaipur, Dr. Ravishankar
Kamath; Honourable Dean FoE, Dr. Jagannath Korody. Without their support, we
could never have executed such a mega event. Special thanks to all special session
chairs, track managers, and reviewers for their excellent support. Last but not least,
our special thanks go to all the participants who had brightened the event with their
valuable research submissions and presentations.

Jaipur, India Manoj Kumar Sharma


Contents

Advanced Computing
Stochastic Investigation of Two-Unit Redundant System
with Provision of Different Repair Schemes . . . . . . . . . . . . . . . . . . . . . . 3
Monika Saini, Ashish Kumar, and Kuntal Devi
A Workflow Allocation Strategy Under Precedence Constraints
for IaaS Cloud Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Mirza Azeem Beg, Mahfooz Alam, and Mohammad Shahid
Artificial Neural Network Analysis for Predicting Spatial Patterns
of Urbanization in India . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Arpana Chaudhary, Chetna Soni, Chilka Sharma, and P. K. Joshi
Satellite Radar Interferometry for DEM Generation Using
Sentinel-1A Imagery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Chetna Soni, Arpana Chaudhary, Uma Sharma, and Chilka Sharma
Cyber Espionage—An Ethical Analysis . . . . . . . . . . . . . . . . . . . . . . . . . 34
Somosri Hore and Kumarshankar Raychaudhuri
Optimized Z-Buffer Using Divide and Conquer . . . . . . . . . . . . . . . . . . . 41
Nitin Bakshi, Shivendra Shivani, Shailendra Tiwari, and Manju Khurana
Data Mining in Cloud Computing: Survey . . . . . . . . . . . . . . . . . . . . . . . 48
Medara Rambabu, Swati Gupta, and Ravi Shankar Singh
Optimal Nodes Communication Coverage Approach for Wireless
Sensor Network Path Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Usha Soni Verma and Namit Gupta
Reliability Enhancement of Wireless Sensor Network Using Error
Rate Estimation (ERE) Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Usha Soni Verma and Namit Gupta

vii
viii Contents

Channel Capacity in Psychovisual Deep-Nets: Gaussianization Versus


Kozachenko-Leonenko . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Jesus Malo
pARACNE: A Parallel Inference Platform for Gene Regulatory
Network Using ARACNe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Softya Sebastian, Sk. Atahar Ali, Alok Das, and Swarup Roy
Information Fusion-Based Intruder Detection Techniques
in Surveillance Wireless Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . 93
Anamika Sharma and Siddhartha Chauhan
Evaluation of AOMDV Routing Protocol for Optimum Transmitted
Power in a Designed Ad-hoc Wireless Sensor Network . . . . . . . . . . . . . 100
Suresh Kumar, Deepak Sharma, Payal, and Mansi
A New Automatic Query Expansion Approach Using Term Selection
and Document Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Yogesh Gupta and Ashish Saini
Investigating Large-Scale Graphs for Community Detection . . . . . . . . . 122
Chetna Dabas, Gaurav Kumar Nigam, and Himanshu Nagar
Big Data Platform Selection at a Hospital: A Rembrandt
System Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Sudhanshu Singh, Rakesh Verma, and Saroj Koul
Analysis of PQ Disturbances in Renewable Grid Integration System
Using Non-parametric Spectral Estimation Approach . . . . . . . . . . . . . . 141
Rajender Kumar Beniwal and Manish Kumar Saini
Noise Density Range Sensitive Mean-Median Filter for Impulse
Noise Removal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Prateek Jeet Singh Sohi, Nikhil Sharma, Bharat Garg, and K. V. Arya

Artificial Intelligence and Computer Vision


Foodborne Disease Outbreak Prediction Using Deep Learning . . . . . . . 165
Pranav Goyal, Dara Nanda Gopala Krishna, Divyansh Jain,
and Megha Rathi
Convolutional Elman Jordan Neural Network for Reconstruction
and Classification Using Attention Window . . . . . . . . . . . . . . . . . . . . . . 173
Sweta Kumari, S. Aravindakshan, Umangi Jain, and V. Srinivasa
Chakravarthy
A Multimodal Biometric System Based on Finger Knuckle Print,
Fingerprint, and Palmprint Traits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Chander Kant and Sheetal Chaudhary
Contents ix

Image Segmentation of MR Images with Multi-directional Region


Growing Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Anjali Kapoor and Rekha Aggarwal
Countering Inconsistent Labelling by Google’s Vision API for Rotated
Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Aman Apte, Aritra Bandyopadhyay, K. Akhilesh Shenoy,
Jason Peter Andrews, Aditya Rathod, Manish Agnihotri,
and Aditya Jajodia
Computed Tomography Image Reconstruction Using Fuzzy Complex
Diffusion Regularization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Manju Devi, Sukhdip Singh, and Shailendra Tiwari
Predicting the Big-Five Personality Traits from Handwriting . . . . . . . . 225
Nidhi Malik and Ashwin Balaji
A Novel Framework for Autonomous Driving . . . . . . . . . . . . . . . . . . . . 238
Ishita Joshi, Satyabrata Roy, Krishna Kumar, Ravinder Kumar,
and Deepak Sinwar
Concurrent Multipath Transfer Using Delay Aware Scheduling . . . . . . 247
Lal Pratap Verma, Neelaksh Sheel, and Chandra Shekhar Yadev
Implementation of Recommender System Using Neural Networks
and Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Akshita Gupta and Anand Sharma
NER Tagging of Free Text Queries to Search Data for Developing
Autonomous Driving System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
P. V. Veena, Jitendra Kumar, and Devadatta Prasad

Image Processing and Video Analysis


Predictive Modeling of Brain Tumor: A Deep Learning Approach . . . . 275
Priyansh Saxena, Akshat Maheshwari, and Saumil Maheshwari
Estimation of View Size Using Sampling Techniques . . . . . . . . . . . . . . . 286
Madhu Bhan and K. Rajanikanth
Packet Priority-Based Routing Approach for Vehicular Delay
Tolerant Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Vishakha Chourasia, Sudhakar Pandey, and Sanjay Kumar
Video Tagging and Recommender System Using Deep Learning . . . . . . 302
Varsha Garg, Vidhi Ajay Markhedkar, Shalvi Sanjay Lale,
and T. N. Raghunandan
Aadhaar-Based Authentication and Authorization Scheme for Remote
Healthcare Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Deepshikha and Siddhartha Chauhan
x Contents

DAN : Breast Cancer Classification from High-Resolution Histology


Images Using Deep Attention Network . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Ritabrata Sanyal, Manan Jethanandani, and Ram Sarkar
Automated Surveillance Model for Video-Based Anomalous Activity
Detection Using Deep Learning Architecture . . . . . . . . . . . . . . . . . . . . . 327
Karishma Pawar and Vahida Attar
Analysis of Gait and Face Biometric Traits from CCTV Streams
for Forensics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Vishwas Rajashekar and Shylaja S. S.
Multiple Digital Image Watermarking Using SWT, FWHT
and R, G, B Channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Anand Ghuli, Dayanand G. Savakar, and Shivanand Pujar
Face Liveness Detection to Overcome Spoofing Attacks in Face
Recognition System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Unnati Koppikar, C Sujatha, Prakashgoud Patil, and P. S. Hiremath
Analysis of MRI Image Compression Using Compressive Sensing . . . . . 361
Vivek Upadhyaya and Mohammad Salim
A Transfer Learning Approach for Drowsiness Detection
from EEG Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
S. S. Poorna, Amitha Deep, Karthik Hariharan, Rishi Raj Jain,
and Shweta Krishnan
Classification and Measuring Accuracy of Lenses Using Inception
Model V3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Shyo Prakash Jakhar, Amita Nandal, and Rahul Dixit
Detection of Life Threatening ECG Arrhythmias Using Morphological
Patterns and Wavelet Transform Method . . . . . . . . . . . . . . . . . . . . . . . 384
Shivani Saxena and Ritu Vijay
A New Approach for Fire Pixel Detection in Building Environment
Using Vision Sensor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
P. Sridhar, Senthil Kumar Thangavel, and Latha Parameswaran

Innovative Practices
Computer Assisted Classification Framework for Detection of Acute
Myeloid Leukemia in Peripheral Blood Smear Images . . . . . . . . . . . . . . 403
S. Alagu and K. Bhoopathy Bagan
An Efficient Multimodal Biometric System Integrated with Liveness
Detection Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Chander Kant and Komal
Contents xi

A Random Walk-Based Cancelable Biometric Template


Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Fagul Pandey, Priyabrata Dash, and Divyanshi Sinha
Influence of Internal and External Sources on Information Diffusion
at Twitter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Mohammad Ahsan and T. P. Sharma
Pedestrian Detection: Unification of Global and Local Features . . . . . . . 437
Sweta Panigrahi, U. S. N. Raju, R. Pranay Raj, Sindhu Namulamettu,
and Vishnupriya Thanda
Logistic Map-Based Image Steganography Using Edge Detection . . . . . 447
Aiman Jan, Shabir A. Parah, and Bilal A. Malik
Smart Vehicle Tracker for Parking System . . . . . . . . . . . . . . . . . . . . . . 455
Ishita Swami and Anil Suthar
An Efficient Technique to Access Cryptographic File System over
Network File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Umashankar Rawat, Satyabrata Roy, Saket Acharya, and Krishna Kumar
Hybrid Feature Selection Method for Predicting the Kidney Disease
Membranous Nephropathy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
K. Padmavathi, A. V. Senthılkumar, and Amit Dutta
Feasibility of Adoption of Blockchain Technology in Banking
and Financial Sector of India . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Anuja Agarwal, Mahendra Parihar, and Tanvi Shah

Interdisciplinary Areas
Machine Learning Techniques for Predicting Crop Production
in India . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Sarthak Agarwal and Naina Narang
Navier–Stokes-Based Image Inpainting for Restoration of Missing
Data Due to Clouds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Deepti Maduskar and Nitant Dube
Perception of Plant Diseases in Color Images Through Adaboost . . . . . 506
Cheruku Sandesh Kumar, Vinod Kumar Sharma, Ashwani Kumar Yadav,
and Aishwarya Singh
SWD: Low-Compute Real-Time Object Detection Architecture . . . . . . . 512
Raghav Sharma and Rohit Pandey
Guided Analytics Software for Smart Aggregation, Cognition,
and Interactive Visualisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521
Aleksandar Karadimce, Natasa Paunkoska (Dimoska), Dijana Capeska
Bogatinoska, Ninoslav Marina, and Amita Nandal
xii Contents

A Comparison of GA Crossover and Mutation Methods


for the Traveling Salesman Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
Robin T. Bye, Magnus Gribbestad, Ramesh Chandra, and Ottar L. Osen
Comparison-Based Study to Predict Breast Cancer: A Survey . . . . . . . . 543
Ankit Grover, Nitesh Pradhan, and Prashant Hemrajani
Software Quality Prediction Using Machine Learning Techniques . . . . . 551
Somya Goyal and Pradeep Kumar Bhatia
Prognosis of Breast Cancer by Implementing Machine Learning
Algorithms Using Modified Bootstrap Aggregating . . . . . . . . . . . . . . . . 561
Peeyush Kumar, Ayushe Gangal, and Sunita Kumari
Localizing License Plates in Real Time with RetinaNet
Object Detector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570
Ritabrata Sanyal, Manan Jethanandani, Gummi Deepak Reddy,
and Abhijit Kurtakoti
Decision Support System for Detection and Classification of Skin
Cancer Using CNN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578
Rishu Garg, Saumil Maheshwari, and Anupam Shukla
An Attribute-Based Break-Glass Access Control Framework
for Medical Emergencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
Vidyadhar Aski, Vijaypal Singh Dhaka, and Anubha Parashar
Faster and Secured Web Services Communication Using Modified
IDEA and Custom-Level Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
Jitender Tanwar, Sanjay Kumar Sharma, and Mandeep Mittal
Reputation-Based Stable Grouping Strategy for Holistic Content
Distribution in IoV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
Richa Sharma, T. P. Sharma, and Ajay Kumar Sharma
About the Editors

Dr. Manoj Kumar Sharma Associate Professor,


Department of Computer and Communication
Engineering, Manipal University Jaipur, Jaipur, India.
Expertise: Computational Intelligence, Artificial
Intelligence, Machine Learning, Cryptography.
Dr. Manoj Kumar Sharma is an enthusiastic and
motivating technocrat with 14 years of academic
experience. With his sharp wits, creativity, leading
style and passion for students’ development. He is
strong at technical fixes and impresses by his ability to
design solutions. Fostering innovation and providing
nurturing eco-system for budding entrepreneurs is his
key thrust area. He lays strong emphasis on automation
projects for society and industry. He has published
more than 46 research papers in different National/
International Journals and conferences. He has granted
3 copyrights and published 2 patents. His research
interests include, Machine Learning, Artificial
Intelligence, Image processing, pattern recognition
and cryptography. He has organized 3 International
conferences in 2017, 2018 and 2020. He has served as
Organising Secretary and is TPC member in number of
Conferences including IEEE and Springer. He is
reviewer in different Journals of repute from Springer,
Elsevier, IEEE and many more. Dr. Sharma has been
called in different National/International conferences in
India and abroad to give Guest Lectures. He has been
guided number of M.Tech./Ph.D. thesis. He is working

xiii
xiv About the Editors

on some R&D and industrial projects and he has


organized number of National/International
conferences/workshops etc.

Dr. Vijaypal Singh Dhaka Professor, Computer


Science, Head, Department of Computer and Commu-
nication Engineering; Director, Innovations, Manipal
University Jaipur, Jaipur, India.
Expertise: Computational Intelligence; Artificial
Intelligence, Machine Learning, Web Technologies.
Dr. Dhaka is an enthusiastic and motivating tech-
nocrat with 15 years of industry and academic experi-
ence. With his sharp wits, creativity, leading style and
passion for students' development, he has created an
atmosphere of project development in University. He is
strong at technical fixes and impresses by his ability to
design solutions. Fostering innovation and providing
nurturing eco-system for budding entrepreneurs is his
key thrust area. In his able leadership students have won
many prizes at National level e.g. Aero India Drone
Competition, Pravega at IISc Bengaluru and Innovative
Research prize at IIT Bombay are some to mention. He
lays strong emphasis on automation projects for
University use, developed by students and has been
successful in deploying 6 such projects in University.
He has served on various key positions including
Director-Innovations, Dean-Academics, Chief Editor
for International Journal and Head of Department. He
has more than 80 publications in Journals of great repute
in his name and guided 10 research scholars to earn
PhD. His research interests include, Machine Learning,
Artificial Intelligence, Image processing and pattern
recognition. He has organized 6 International confer-
ences supported by IEEE, ACM, Springer and Elsevier
including SIN-2017. He has served as Organising
Secretary and is TPC member for several IEEE
Conferences. He has been invited to deliver keynote
addresses and plenary talk in various universities and
institutions. Dr Dhaka has successfully executed Solar
Photo-Voltaic Efficiency Prediction and Enhancement
Project funded by SERB (DST, Govt of India). 9 student
research projects funded by DST Govt of Rajasthan,
India, have been guided by him. He received “World
About the Editors xv

Eminence Awards 2017” for Leading Research


Contribution in ICT for the Year 2016, at WS-4 in
London on 15th Feb 2017.

Dr. Thinagaran Perumal Chair, IEEE Consumer


Electronics Society Malaysia; Senior Lecturer, Depart-
ment of Computer Science, Faculty of Computer Science
and Information Technology, Universiti Putra Malaysia;
Head, Cyber-Physical System Unit, Faculty of Computer
Science and Information Technology, Universiti Putra
Malaysia.
Expertise: Internet of Things; Cyber-Physical Sys-
tems, Smart Homes and Interoperability and Ambient
Intelligence.
Thinagaran Perumal is the recipient of 2014 Early
Career Award from IEEE Consumer Electronics Society
for his pioneering contribution in the field of consumer
electronics. He completed his PhD at Universiti Putra
Malaysia, in the area of smart technology and robotics.
He is currently a Senior Lecturer at the Department of
Computer Science, Faculty of Computer Science and
Information Technology, Universiti Putra Malaysia. He
is also currently appointed as Head of Cyber-Physical
Systems in the university and also been elected as Chair
of IEEE Consumer Electronics Society Malaysia
Chapter. His research interests are towards interoper-
ability aspects of smart homes and Internet of Things
(IoT), wearable computing, and cyber-physical systems.
Thina is also heading the National Committee on
Standardization for IoT (IEC/ISO TC / G/16) as
Chairman since 2018. Some of the eminent works
include proactive architecture for IoT systems; develop-
ment of the cognitive IoT frameworks for smart homes
and wearable devices for rehabilitation purposes. He is an
active member of IEEE Consumer Electronics Society
and its Future Directions Committee on Internet of
Things. He has been invited to give several keynote
lectures and plenary talk on Internet of Things in various
institutions and organizations internationally. He has
published several papers in IEEE Conferences and
Journals and is serving as TPC member for several
reputed IEEE conferences. He is an active reviewer for
IEEE Internet of Things Journal, IEEE Communication
Magazine, IEEE Sensors Journal, and IEEE Transaction
for Automation Science and Engineering, to name a few.
xvi About the Editors

He was elected as General Chair for IEEE International


Symposium on Consumer Electronics 2017 (ISCE’17)
held in Kuala Lumpur.
Dr. Nilanjan Dey is an Assistant Professor in
Department of Information Technology at Techno
India College of Technology, Kolkata, India. He is a
visiting fellow of the University of Reading, UK. He is
a Visiting Professor at Wenzhou Medical University,
China and Duy Tan University, Vietnam, He was an
honorary Visiting Scientist at Global Biomedical
Technologies Inc., CA, USA (2012-2015). He was
awarded his PhD. from Jadavpur Univeristy in 2015.
He has authored/edited more than 45 books with
Elsevier, Wiley, CRC Press and Springer, and pub-
lished more than 300 papers. He is the Editor-in-Chief
of International Journal of Ambient Computing and
Intelligence, IGI Global, Associated Editor of IEEE
Access and International Journal of Information
Technology, Springer. He is the Series Co-Editor of
Springer Tracts in Nature-Inspired Computing,
Springer Nature, Series Co-Editor of Advances in
Ubiquitous Sensing Applications for Healthcare,
Elsevier, Series Editor of Computational Intelligence
in Engineering Problem Solving and Intelligent Signal
processing and data analysis, CRC.
His main research interests include Medical Imaging,
Machine learning, Computer Aided Diagnosis, Data
Mining etc. He is the Indian Ambassador of
International Federation for Information Processing
(IFIP) – Young ICT Group. Recently, he has been
awarded as one among the top 10 most published
academics in the field of Computer Science in India
(2015-17).
About the Editors xvii

João Manuel R. S. Tavares graduated in Mechanical


Engineering at the Universidade do Porto, Portugal in
1992. He also earned his M.Sc. degree and Ph.D.
degree in Electrical and Computer Engineering from
the Universidade do Porto in 1995 and 2001, and
attained his Habilitation in Mechanical Engineering in
2015. He is a senior researcher at the Instituto de
Ciência e Inovação em Engenharia Mecânica e
Engenharia Industrial (INEGI) and Associate
Professor at the Department of Mechanical
Engineering (DEMec) of the Faculdade de Engenharia
da Universidade do Porto (FEUP).
João Tavares is co-editor of more than 55 books,
co-author of more than 50 chapters, 650 articles in
international and national journals and conferences, and
3 international and 3 national patents. He has been a
committee member of several international and national
journals and conferences, is co-founder and co-editor
of the book series “Lecture Notes in Computational
Vision and Biomechanics” published by Springer,
founder and Editor-in-Chief of the journal “Computer
Methods in Biomechanics and Biomedical Engineering:
Imaging & Visualization” published by Taylor &
Francis, Editor-in-Chief of the journal “Computer
Methods in Biomechanics and Biomedical
Engineering” published by Taylor & Francis, and
co-founder and co-chair of the international conference
series: CompIMAGE, ECCOMAS VipIMAGE,
ICCEBS, and BioDental. Additionally, he has been
(co-)supervisor of several M.Sc. and Ph.D. thesis and
supervisor of several post-doc projects and has partic-
ipated in many scientific projects both as researcher and
as scientific coordinator.
His main research areas include computational
vision, medical imaging, computational mechanics,
scientific visualization, human–computer interaction,
and new product development.
Advanced Computing
Stochastic Investigation of Two-Unit Redundant
System with Provision of Different Repair
Schemes

Monika Saini(B) , Ashish Kumar, and Kuntal Devi

Department of Mathematics and Statistics, Manipal University Jaipur, Jaipur, Rajasthan 303007,
India
drmnksaini4@gmail.com, akbrk@rediffmail.com,
kuntal.sangwan@gmail.com

Abstract. The foremost concentration of the contemporary work is to investigate


a two dissimilar unit system stochastically by adopting the notion of priority in
repair activities. Here, two various types of priorities are given and three stochastic
models are developed. The first model is basic one in which no priority is given,
in second model original unit’s repair got preference over duplicate unit’s repair
activities while in third model original unit’s repair got preference over preventive
maintenance of duplicate unit. A full-time repairman always remains with system
and PM timings are already specified in advance. The behaviour of all time-
dependent random variables is Weibull distributed. The random variables have
common shape and distinct scale parameters. Expressions for numerous processes
of system efficiency have been acquired and shown graphically to climax the
significance of the work.

Keywords: Semi-Markov process · Weibull distribution · Priority in repair


activities · Preventive maintenance and repair

1 Introduction
A lot of studied have been conceded for analysing the consistency and performance of
complex industrial systems. Complexity of any system decreases the productivity of
the system. To enhance the availability and reliability, some researcher suggested that
redundancy is an effective technique. Air crafts, textile manufacturing plants and carbon
reclamation units in fertilizer manufacturing industry get high reliability using various
redundancy approached specially applying cold standby. Chandrasekhar et al. [1] sup-
ported this theory by a study on two-unit cold standby system in which repair rates are
Erlangian distributed. Many researchers like Malik and Deswal [8], Chhillar et al. [2]
and Kumar and Saini [4] using the theories of precautionary maintenance and priority in
repair discipline, constant failure, and repair rates for identical unit redundant systems.
Zhang and Wang [11] developed geometric model using the concept of priority in opera-
tion and repair for a repairable system having cold standby redundancy. Moghassass et al.
© Springer Nature Singapore Pte Ltd. 2021
M. K. Sharma et al. (eds.), Innovations in Computational Intelligence and Computer Vision,
Advances in Intelligent Systems and Computing 1189,
https://doi.org/10.1007/978-981-15-6067-5_1
4 M. Saini et al.

[10] analysed reliability measures of redundant system using concept of shut-off rules.
Kumar and Malik [9] proposed some reliability theories for computer systems using
ideas of priority. All the studies referred above discussed various reliability problems of
cold standby structures having alike units in dissimilar set of conventions. But, several
times due to financial constraints, situations do not permit to retain alike unit in reserve.
Furthermost the effort conceded so far based on the hypothesis of persistent failure and
repair proportions, but it is not seeming realistic for many engineering systems. Some
researchers like Gupta et al. [3], Kishan and Jain [5], and Barak et al. [7] advocated some
consistency models for cold standby of non-similar unit repairable systems with arbi-
trary failure and repair laws. Kumar et al. [6] supported the enactment investigation of
redundant systems with priority in various repair disciplines and Weibull law for failure
and repair.
By keeping in mind, the above facts and figures, the present study is designed to
investigate non-identical redundant systems stochastically using the concept of priority
in various situations of system failures. For this purpose, here two various types of
priorities are given, and three stochastic models are developed. The first model is basic
one in which no priority is given, in second model original unit’s repair got preference
over duplicate unit’s repair activities while in third model original unit’s repair got
preference over PM of duplicate unit. A full-time repairman always remains with system
and PM timings are already specified in advance. Altogether failure and repair period
distributions follow Weibull distribution. The random variables have common shape and
distinct scale parameters. Expressions for numerous procedures of system efficacy have
been acquired and shown graphically to climax the significance of the study.

State Description
The possible states (Following the notations of Kumar et al. [6]) of the system are as
follows:
Common to all Models

S0 = (O, Dcs), S2 = (Fur, Do), S1 = (Pm, Do), S4 = (O, DPm),


S3 = (O, DFur), S6 = (FUR, DFwr), S8 = (DPM, WPm),
S9 = (PM, DWPm), S10 = (PM, DFwr),
S12 = (DFUR, WPm)

Different states of models


Model I

S5 = (DPM, Fwr), S7 = (FUR, DWPm), S11 = (DFUR, Fwr)

Model II

S5 = (Fur, DWPm), S11 = (DFwr, Fur)

Model III

S7 = (Fwr, DPm)
Stochastic Investigation of Two-Unit Redundant System 5

Transition Probabilities
According to Kumar et al. [6], by probabilistic opinions, we have
α β γ α
P01 = , P02 = , P10 = , P19 = ,
α+β α+β α+h+γ α+γ +h
h k h
P1.10 = , P20 = , P26 ,
α+γ +h α+k +h α+h+k
α l β
P27 = , P30 = , P3.11 = ,
α+h+k l+α+β α+β +l
α γ β
P3.12 = , P40 = , P45 = ,
α+β +l α+β +γ α+β +γ
α
P48 = , P52 = 1, P63 = 1, P74 = 1, P81 = 1,
α+β +γ
h
P94 = 1, P10.3 = 1, P11.2 = 1, P12.1 = 1, p13.10 = ,
α+γ +h
α α h
p14.9 = , p24.7 = , p23.6 = ,
α+γ +h α+h+k α+h+k
α β
p31.12 = , p32.11 = ,
α+β +l α+β +l
α β
p41.8 = , p42.5 = ,
α+β +γ α+β +γ
P32.11 andP42.5 are not available in model II, P54 = 1, P11.3 = 1.

Mean Sojourn Times


Suppose T represent the period
 ∞ to system failure. Mean sojourn times at various state S i
is given by μi = E(t) = 0 P(T > t)dt
Hence,
 
(1 + η1 ) 1 1

μ4 = 1
, μ1 = (1/η + 1) 1
+ 1
(α + h) ,
(α + β + γ ) η (α + h + γ ) η (α + γ + h) η
 
 1 1
μ2 = (1/η + 1) 1
+ 1
(α + h) ,
(α + h + k) η (α + k + h) η
   
 1 + η1  1 + η1
μ1 = 1
, μ11 = 1
(α + γ + h) η (f ) η
 
1 1 (α + β)
μ3 =  1 + + ,
η (α + β + l) η
1
(α + β + l)(l) η
1

   
 1 + η1  1 + η1
μ2 = 1
, μ0 = 1
(α + k + h) η (α + β) η
6 M. Saini et al.

 
1 1 (α + β)
μ4 =  1 + + ,
η (α + β + γ )
1
η
1
(α + β + γ )(γ ) η
 
 1 + η1 (1 + η1 )
μ3 = 1
, μ5 = 1
(α + β + l) η (f ) η
 
 1 1 (α)
μ3 =  1 + +
η (α + β + l) η
1 1
(α + β + l)(l) η
 
1 1 (α)
μ4 =  1 + +
η (α + β + γ ) η
1 1
(α + β + γ )(γ ) η
By applying similar approach availability and mean sojourn times of third model
has been obtained.

Investigation of Availability
By stochastic influences, the recurrence relations for system availability X i (t) are derived
as follows:
(n)
Xi (t) = Ci (t) + qi,j (t) © Xj (t) (1)
j

wherever i and j represent regenerative states. Taking Laplace transformation of overhead


relations (1) and solving for X0∗ (s). The system’s availability is specified by

X0 (∞) = lim sX0∗ (s) (2)


s→0

Investigation of Repairman’s Busy Period


By stochastic influences, the recurrence relations for analysis of busy period of repairman
in terms of Dir (t) and DiPm (t) are derived as follows:
(n)
Dir (t) = Yi (t) + qi,j (t) © Djr (t)
j
pm (n) pm
Di (t) = Yi (t) + qi,j (t) © Dj (t) (3)
j

where i and j represent regenerative states. Taking Laplace transformation of overhead


relations (3) and explaining for D0∗r (s) and D0∗Pm (s). The results for busy period are
gained by D0r = lim sD0∗r (s), D0Pm = lim sD0∗Pm (s).
s→0 s→0

Investigation of Estimated Number of Repairs, PM and Visits by Repairman


By stochastic influences, the recurrence relations for estimated number of repairs, PM
and visits by repairman EiR (t), EiPm (t) and N i (t) are derived as follows:

(n)
EiR (t) = Qi,j (t) ® δj + EjR (t) ;
j
Stochastic Investigation of Two-Unit Redundant System 7

(n)
EiPm (t) = Qi,j (t) ® δj + EjPm (t) ;
j
(n)  
Ni (t) = Qi,j (t) ® δj + Nj (t) (4)
j

Here δj = 1, if j is the regenerative stage wherever the server prepares his work
again, otherwise δj = 0. Where i and j represent regenerative states. Taking LST of
above relations (4) and solving for 
E0R (s). The expected numbers of repairs per unit time
are given by

E0R (∞) = lim s


E0R (s), E0Pm (∞) = lim s
E0Pm (s) and N0 (∞) = lim sÑ0 (s). (5)
s→0 s→0 s→0

Profit Analysis
The profit generated by system in steady state can be obtained by using the following
expression:

P = K0 X0 − K1 D0Pm − K2 D0r − K3 E0Pm − K4 E0R − K5 N0 (6)

K 0 Represents the income per entity up-time


K i Represent the cost per unit time.

Graphical Results
See Figs. 1, 2, 3 and 4.

Variation in Availability with respect to β for shape parameter η=0.5


0
0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1
-0.001

-0.002
α=2.4
Availability

-0.003
h=0.01
-0.004

-0.005
α=2, h=0.009, l=1.4, k=1.5, γ=5
-0.006 k=1.7
γ=7 l=2
-0.007

Failure Rate

Fig. 1. Availability change (M:I–M:II) versus failure rate (β) for η = 0.5
8 M. Saini et al.

0 Variation in Profit with respect to (β) for shape parameter η=0.5


-10 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1

-20
-30
Profit

-40
-50
-60 h=0.01 γ=7
-70
h=0.009,k=1.5,l=1.4,α=2,γ=5 k=1.7
-80
Failure Rate α=2.4
l=2

Fig. 2. Profit change (M:I–M:II) versus failure rate (β) for η = 0.5

Variation in Availability with respect to (β) for shape


parameter η=0.5
0
0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1
-0.002
α=2.4
-0.004 h=0.01
-0.006
Availability

-0.008
-0.01 γ=7
-0.012
-0.014
-0.016
h=0.009,k=1.5,l=1.4,α=2,γ=5

-0.018 k=1.7
Failure Rate
l=2

Fig. 3. Availability change (M:I–M:III) versus failure rate (β) for η = 0.5

Variation in Profit with respect to (β) for shape parameter η=0.5


0
0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1
-10

-20 γ=7
-30 l=2
Profit

-40 h=0.01

-50 k=1.7
-60

-70 α=2.4
l=1.4,k=1.5,h=0.009,α=2,γ=5
-80
Failure Rate

Fig. 4. Profit change (M:I–M:III) versus failure rate (β) for η = 0.5
Stochastic Investigation of Two-Unit Redundant System 9

2 Conclusion
The availability and profit analysis of all the models have been carried out for a specific
situation by assigning shape parameter value η = 0.5 to all the random variables. The
values of all other parameters are kept as constant quantity shown in Figs. 1, 2, 3 and
4 for model I, II, and III. It is observed that the availability and profit rise with respect
to increase of precautionary maintenance rate and repair rate while these declines by
increasing maximum operation time and failure rate in all the three models. From Figs. 1,
2, 3, and 4, it is observed that

• Giving preference to repair of novel unit over preventive maintenance and repair of
replica unit is always beneficial and profitable
• Giving preference to repair of novel unit over precautionary maintenance of replica
unit is profitable.

Hence, use of priority in repair activities is concluded and recommended from the
present study.

References
1. P. Chandrasekhar, R. Natarajan, V.S.S. Yadavalli, A study on a two unit standby system with
Erlangian repair time. Asia-Pac. J. Oper. Res. 21(03), 271–277 (2004)
2. S.K. Chhillar, A.K. Barak, S.C. Malik, Reliability measures of a cold standby system with
priority to repair over corrective maintenance subject to random shocks. Int. J. Stat. Econ.
13(1), 79–89 (2014)
3. R. Gupta, P. Kumar, A. Gupta, Cost-bbenefit analysis of a two dissimilar unit cold standby
system with Weibull failure and repair laws. Int. J. Syst. Assur. Eng. Manag. 4(4), 327–334
(2013)
4. A. Kumar, M. Saini, Cost-benefit analysis of a single-unit system with preventive maintenance
and Weibull distribution for failure and repair activities. J. Appl. Math. Stat. Inform. 10(2),
5–19 (2014)
5. R. Kishan, D. Jain, Classical and Bayesian analysis of reliability characteristics of a two-unit
parallel system with Weibull failure and repair laws. Int. J. Syst. Assur. Eng. Manag. 5(3),
252–261 (2014)
6. A. Kumar, M. Saini, K. Devi, Performance analysis of a redundant system with weibull failure
and repair laws. Revista Investigacion Operacional 37(3), 247–257 (2016)
7. M.S. Barak, D. Yadav, S. Kumari, Stochastic analysis of a two-unit system with standby and
server failure subject to inspection. Life Cycle Reliab. Saf. Eng. (2017). https://doi.org/10.
1007/s41872-017-0033-5
8. S.C. Malik, S. Deswal, Stochastic analysis of a repairable system of non-identical units with
priority for operation and repair subject to weather conditions. Int. J. Comput. Appl. 49(14),
33–41 (2012)
9. A. Kumar, S.C. Malik, Reliability modeling of a computer system with priority to s/w replace-
ment over h/w replacement subject to MOT and MRT. Int. J. Pure Appl. Math. 80, 693–709
(2012)
10. R. Moghassass, M.J. Zuo, J. Qu, Reliability and availability analysis of a repairable-out-of-
system with repairmen subject to shut-off rules. IEEE Trans. Reliab. 60, 658–666 (2011)
11. Y.L. Zhang, G.J. Wang, A geometric process repair model for a repairable cold standby system
with priority in use and repair. Reliab. Eng. Syst. Safety 94, 1782–1787 (2009)
A Workflow Allocation Strategy Under
Precedence Constraints for IaaS Cloud
Environment

Mirza Azeem Beg1 , Mahfooz Alam2(B) , and Mohammad Shahid3


1 Department of Computer Science & Engineering, Institute of Technology & Management,
Aligarh, India
mirzaazeembeg@live.com
2 Department of Computer Science, Al-Barkaat College of Graduate Studies, Aligarh, India
mahfoozalam.amu@gmail.com
3 Department of Commerce, Aligarh Muslim University, Aligarh, India

mdshahid.cs@gmail.com

Abstract. A big challenge for the adoption of cloud computing in the scientific
community remains the efficient allocation and execution of compute-intensive
scientific workflows to reduce the complexity of workflow application, turnaround
time, and the size of migrated data. The allocation of scientific workflows on
public clouds can be described through a variety of perspectives and parameters.
The workflow allocation problem in cloud environment has been proved to be
NP-complete. This paper presents a new approach for workflow allocation by
managing the precedence constraints on heterogeneous virtual machine in IaaS
cloud with possible minimization of execution time. Here, illustration has been
presented to demonstrate the strategy for a small number of tasks workflow. A
brief comparative performance study has been conducted on the basis of the results
obtained for proposed strategy and HEFT on considered parameters. The study
reveals the better performance of proposed strategy than HEFT on total execution
time (TET) for considered set of tasks.

Keywords: Cloud computing · IaaS cloud · Workflow allocation · DAG


scheduling · Execution time

1 Introduction

Cloud computing is commission-based service-oriented approach that is used to access


the various resources like hiring services. The aim of cloud computing is designed
to be very fast, always available and secure, and the infrastructure of this system has
to be flexible, scalable, and intelligently delivered services [1]. Therefore, workflow
management system (WMS) becomes crucial for cloud computing and it allows the cloud
service to improve the efficient resource allocation, scalability, and fault tolerance. In
cloud computing, virtualization is one of the main components to compete a hardware

© Springer Nature Singapore Pte Ltd. 2021


M. K. Sharma et al. (eds.), Innovations in Computational Intelligence and Computer Vision,
Advances in Intelligent Systems and Computing 1189,
https://doi.org/10.1007/978-981-15-6067-5_2
A Workflow Allocation Strategy Under Precedence Constraints 11

platform that is doubter to both user workload and operating system to run different
applications. In this technology, various security threats include as mixed-trust-level
virtual machines (VMs), inter VM attacks, and communication blind spots.
A workflow is a chain management/sequence of steps to achieve finite objective in
any computing environment and to maintain of steps in certain order to ensure effi-
ciency, improve fast execution, and other benefits. Workflow applications are allocated
for processing specially on IaaS cloud. There are many issues on implementation of
workflows viz. machine failures, communication loss, and network congestion [2]. As
heterogeneous VM becomes too massive, computational requirements for running dif-
ficult applications comprise batch of tasks common in order to cater to the parame-
ters in consideration. The process of assigning the tasks onto multiple VMs is known
as scheduling/workflow allocation. Workflow applications represented using Directed
Acyclic Graph (DAG) have always accepted lots of awareness [3, 4]. A schedule for a
DAG is an assignment which specifies the mapping of tasks and VMs and the expected
start time of each task on the mapped machine in the given set of machines with a key
objective to minimize TET. Workflow allocation problems can be major categorized
into two directions such as single workflows and multiple workflows. Some single- and
multiple-workflow applications were proposed to deal with HDSs such as ETF [5], DLS
[6], LMT [7], HEFT [8] LBSIR [9], and many more. Most of the scheduling algorithms
for workflow task allocation require entry and exit task in single vertex. So, if more than
one entry/exit task, they are connected to a pseudo-entry/exit (i.e., called T entry /T exit )
with zero time and communication which does not affect the allocation and the schedule.
In this paper, a new approach for workflow allocation by managing the precedence
constraints on heterogeneous virtual machine in IaaS cloud with possible minimization
of execution time of the workflow is represented by using DAG [10]. The strategy is
consisting of two phases viz. schedule generation and VM selection. In the first phase,
an out degree of vertex-based scheme is used for sorting of all tasks in the workflow
to satisfy the precedence constraints. VM selection phase is same as the HEFT [8].
Further, illustration has been presented to demonstrate the strategy for some small task
size workflows. A brief comparative performance study has been conducted on the basis
of the results obtained for proposed strategy and HEFT on considered parameters.
The paper is organized as follows. Section 2 presents the problem formulation for
the proposed strategy and Sect. 3 presents the proposed strategy for workflow allocation.
Sections 4 and 5 show the illustration and performance study for better understanding
of the work, respectively. Finally, we conclude the work in Sect. 6.

2 Problem Formulation
The formulation of the workflow allocation problem for heterogeneous virtual machines
on cloud computing is considered as making decisions for mapping (f ) of set of tasks
in the workflow (ψ) on set of VMs (V ) with the aim of minimizing the total execution
time (TET) with tasks precedence requirement are satisfied.
f :ψ → V (1)
A workflow is a composition of tasks subject to precedence constraints. First, we
address a deterministic non-preemptive single workflow having batch of task parallel
12 M. A. Beg et al.

allocation problem on a set of virtual machines, where m tasks ψ = {Ti : 1 ≤ i ≤ m}


must be assigned on parallel VMs (sites) V = {Vj : 1 ≤ j ≤ n}. Each edge represents the
precedence constraint between tasks, such that predecessor (pred) must be completed
prior execution of its successor (succ).
Before proceeding the objective function, we define the EST and EFT attributes
form a prepared schedule. EST(T i , V j ) and EFT(T i , V j ) are the T i on V j , respectively.
The entry task (T entry ) of EST(T entry , V j ) will be zero. The EST and EFT are calculated
recursively, beginning from the T entry as Eqs. (2) and (3). EST(T i , V j ) and EFT(T i , V j )
are computed same as HEFT [8] as follows:
 
     
EST Ti , Vj = max avail Vj , max AFT(Tm ) + Cm,i (2)
Tm ∫ pred(Ti )
   
EFT Ti , Vj = Eij + EST Ti , Vj (3)

where avail[V j ] is available time for task on V j , pred T i is the group of instant predecessor
of task T i , and AFT(T m ) is the actual finish time (AFT) of task (T m ). When all the tasks
are scheduled, the TET will be actual finish time of the last task. Moreover, C m,i , E ij
is the communication cost and execution time of T i on V j as computed as in [8]. After
whole tasks in a DAG are scheduled, the TET will be AFT of the exit task T exit . TET is
the total execution time takes to the current task of workflow and defined as:

TET = max{AFT(Texit )} (4)


∀n

3 Proposed Workflow Allocation Strategy

In this paper, a new approach is presented for workflow allocation and managing the
precedence constraints on heterogeneous virtual machine for single workflow with possi-
ble aim of minimization of execution time of the workflow for IaaS cloud. The proposed
strategy is an application of DAG scheduling for bounded number of virtual machines.
Proposed strategy has two phases like schedule generation phase and VMs selection
phase for selecting best machine, which minimizes execution time of the task.

3.1 Schedule-Generation Phase

This phase provides the order in which tasks are executed with preserving precedence
constraints. The schedule phase for preserving precedence constraints of the tasks is used
in top-to-bottom and left-to-right approaches. In this phase, first, we will find tasks with
maximum out degree (odmax ) from top-to-bottom and left-to right in the given workflow.
Starting from T entry , next task will be selected for execution which has odmax then second
next and so on. Tie-breaking is done using which has largest Average Execution Cost
(E ij ) is first executed. If the average execution cost is equal, then tie-breaking is done
randomly. From this strategy, no need of extra effort upward rank (UPr ) calculation to
preserve precedence constraints for maintaining the Schedule Order (Or ).
Another random document with
no related content on Scribd:
back
back
back
back
back
back
back
back
back
back
back
back
back
back
back
back
back
back

You might also like