Download as pdf or txt
Download as pdf or txt
You are on page 1of 54

Proceedings of the Second

International Conference on Computer


and Communication Technologies IC3T
2015 Volume 3 1st Edition Suresh
Chandra Satapathy
Visit to download the full and correct content document:
https://textbookfull.com/product/proceedings-of-the-second-international-conference-o
n-computer-and-communication-technologies-ic3t-2015-volume-3-1st-edition-suresh-
chandra-satapathy/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Proceedings of the Second International Conference on


Computer and Communication Technologies IC3T 2015
Volume 2 1st Edition Suresh Chandra Satapathy

https://textbookfull.com/product/proceedings-of-the-second-
international-conference-on-computer-and-communication-
technologies-ic3t-2015-volume-2-1st-edition-suresh-chandra-
satapathy/

Proceedings of the International Congress on


Information and Communication Technology ICICT 2015
Volume 1 1st Edition Suresh Chandra Satapathy

https://textbookfull.com/product/proceedings-of-the-
international-congress-on-information-and-communication-
technology-icict-2015-volume-1-1st-edition-suresh-chandra-
satapathy/

Proceedings of International Conference on ICT for


Sustainable Development ICT4SD 2015 Volume 1 1st
Edition Suresh Chandra Satapathy

https://textbookfull.com/product/proceedings-of-international-
conference-on-ict-for-sustainable-development-
ict4sd-2015-volume-1-1st-edition-suresh-chandra-satapathy/

Proceedings of International Conference on ICT for


Sustainable Development ICT4SD 2015 Volume 2 1st
Edition Suresh Chandra Satapathy

https://textbookfull.com/product/proceedings-of-international-
conference-on-ict-for-sustainable-development-
ict4sd-2015-volume-2-1st-edition-suresh-chandra-satapathy/
Proceedings of the International Conference on Data
Engineering and Communication Technology ICDECT 2016
Volume 1 1st Edition Suresh Chandra Satapathy

https://textbookfull.com/product/proceedings-of-the-
international-conference-on-data-engineering-and-communication-
technology-icdect-2016-volume-1-1st-edition-suresh-chandra-
satapathy/

Proceedings of First International Conference on


Information and Communication Technology for
Intelligent Systems Volume 2 1st Edition Suresh Chandra
Satapathy
https://textbookfull.com/product/proceedings-of-first-
international-conference-on-information-and-communication-
technology-for-intelligent-systems-volume-2-1st-edition-suresh-
chandra-satapathy/

Information and Decision Sciences, Proceedings of the


6th International Conference on FICTA Suresh Chandra
Satapathy

https://textbookfull.com/product/information-and-decision-
sciences-proceedings-of-the-6th-international-conference-on-
ficta-suresh-chandra-satapathy/

Smart Computing and Informatics Proceedings of the


First International Conference on SCI 2016 Volume 2 1st
Edition Suresh Chandra Satapathy

https://textbookfull.com/product/smart-computing-and-informatics-
proceedings-of-the-first-international-conference-on-
sci-2016-volume-2-1st-edition-suresh-chandra-satapathy/

Smart Intelligent Computing and Applications


Proceedings of the Third International Conference on
Smart Computing and Informatics Volume 1 Suresh Chandra
Satapathy
https://textbookfull.com/product/smart-intelligent-computing-and-
applications-proceedings-of-the-third-international-conference-
on-smart-computing-and-informatics-volume-1-suresh-chandra-
Advances in Intelligent Systems and Computing 381

Suresh Chandra Satapathy


K. Srujan Raju
Jyotsna Kumar Mandal
Vikrant Bhateja Editors

Proceedings of the
Second International
Conference on
Computer and
Communication
Technologies
IC3T 2015, Volume 3
Advances in Intelligent Systems and Computing

Volume 381

Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
e-mail: kacprzyk@ibspan.waw.pl
About this Series
The series “Advances in Intelligent Systems and Computing” contains publications on theory,
applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually
all disciplines such as engineering, natural sciences, computer and information science, ICT,
economics, business, e-commerce, environment, healthcare, life science are covered. The list
of topics spans all the areas of modern intelligent systems and computing.
The publications within “Advances in Intelligent Systems and Computing” are primarily
textbooks and proceedings of important conferences, symposia and congresses. They cover
significant recent developments in the field, both of a foundational and applicable character.
An important characteristic feature of the series is the short publication time and world-wide
distribution. This permits a rapid and broad dissemination of research results.

Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: nikhil@isical.ac.in
Members
Rafael Bello, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cuba
e-mail: rbellop@uclv.edu.cu
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: escorchado@usal.es
Hani Hagras, University of Essex, Colchester, UK
e-mail: hani@essex.ac.uk
László T. Kóczy, Széchenyi István University, Győr, Hungary
e-mail: koczy@sze.hu
Vladik Kreinovich, University of Texas at El Paso, El Paso, USA
e-mail: vladik@utep.edu
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan
e-mail: ctlin@mail.nctu.edu.tw
Jie Lu, University of Technology, Sydney, Australia
e-mail: Jie.Lu@uts.edu.au
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico
e-mail: epmelin@hafsamx.org
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil
e-mail: nadia@eng.uerj.br
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland
e-mail: Ngoc-Thanh.Nguyen@pwr.edu.pl
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong
e-mail: jwang@mae.cuhk.edu.hk

More information about this series at http://www.springer.com/series/11156


Suresh Chandra Satapathy K. Srujan Raju

Jyotsna Kumar Mandal Vikrant Bhateja


Editors

Proceedings of the Second


International Conference
on Computer
and Communication
Technologies
IC3T 2015, Volume 3

123
Editors
Suresh Chandra Satapathy Jyotsna Kumar Mandal
Department of Computer Science Department of Computer Science
and Engineering and Engineering
Anil Neerukonda Institute of Technology Kalyani University
and Sciences Nadia, West Bengal
Visakhapatnam India
India
Vikrant Bhateja
K. Srujan Raju Department of Electronics
Department of Computer Science and Communication Engineering
and Engineering Shri Ramswaroop Memorial Group
CMR Technical Campus of Professional Colleges
Hyderabad Lucknow, Uttar Pradesh
India India

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-81-322-2525-6 ISBN 978-81-322-2526-3 (eBook)
DOI 10.1007/978-81-322-2526-3

Library of Congress Control Number: 2015944452

Springer New Delhi Heidelberg New York Dordrecht London


© Springer India 2016
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made.

Printed on acid-free paper

Springer (India) Pvt. Ltd. is part of Springer Science+Business Media (www.springer.com)


Preface

This volume contains 71 papers presented at the 2nd International Conference on


Computer and Communication Technologies held during July 24–26, 2015 at
Hyderabad hosted by CMR Technical Campus in association with Division-V
(Education and Research) CSI. It proved to be a great platform for researchers from
across the world to report, deliberate, and review the latest progresses in the
cutting-edge research pertaining to intelligent computing and its applications to
various engineering fields. The response to IC3T 2015 has been overwhelming. It
received a good number of submissions from the different areas relating to intel-
ligent computing and its applications in main tracks and three special sessions and
after a rigorous peer-review process with the help of our program committee
members and external reviewers, we finally accepted quality papers with an
acceptance ratio of 0.35. We received submissions from seven overseas countries.
Dr. Vipin Tyagi, Jaypee University of Engineering and Technology, Guna, MP
conducted a Special Session on “Cyber Security and Digital Forensics,” Dr.
K. Ashoka Reddy Principal, Kakatiya Institute of Technology and Science,
Warangal, and Prof. Tara Sai Kumar, CMR Technical Campus, Hyderabad con-
ducted a Special Session on “Applications for Fuzzy Systems in Engineering” and
Dr. Suma. V, Dean, Research and Industry Incubation Centre (Recognized by
Ministry of Science and Technology, Government of India), Dayananda Sagar
Institutions, Bangalore conducted a Special Session on “Software Engineering and
Applications.”
We take this opportunity to thank all keynote speakers and special session chairs
for their excellent support to make IC3T 2015 a grand success.
The quality of a referred volume depends mainly on the expertise and dedication
of the reviewers. We are indebted to the program committee members and external
reviewers who not only produced excellent reviews but also did them in short time
frames. We would also like to thank CSI Hyderabad, CMR Group of Institutions,
DRDO and JNTUH for having come forward to support us to organize this mega
convention.
We express our heartfelt thanks to Mr. Ch. Gopal Reddy, Chairman of CMR
Technical Campus, Smt. C. Vasanthalatha, Secretary of CMR Technical Campus,

v
vi Preface

and Dr. A. Raji Reddy Director of CMR Technical Campus, faculty and admini-
strative staff for their continuous support during the course of the convention.
We would also like to thank the authors and participants of this convention, who
have considered the convention above all hardships. Finally, we would like to thank
all the volunteers who spent tireless efforts in meeting the deadlines and arranging
every detail to make sure that the convention runs smoothly. All the efforts are
worth and would please us all, if the readers of this proceedings and participants of
this convention found the papers and event inspiring and enjoyable. We place our
sincere thanks to the press, print, and electronic media for their excellent coverage
of this convention.

July 2015 Suresh Chandra Satapathy


K. Srujan Raju
Jyotsna Kumar Mandal
Vikrant Bhateja
Team IC3T 2015

Chief Patrons

Sri. C. Gopal Reddy, Chairman


Smt. C. Vasanthalatha Reddy, Secretary
Dr. A. Raji Reddy, Director

Advisory Committee

Dr. A. Govardhan, SIT, JNTUH


Dr. V. Kamakshi Prasad, HOD-CSE, JNTUCEH
Prof. S.K. Udgata, HCU
Dr. Vasumathi, JNTUH
Dr. B. Padmaja Rani, JNTUH
Dr. O.B.V. Ramanaiah, JNTUH
Dr. B.N. Bhandari, JNTUH
Dr. Amit Acharya, JNTUH
Dr. D. Rajya Lakshmi, JNTUV
Dr. C. Srinivasa Kumar, VITSH(VU)
Dr. V. Kamaskshi Prasad, JNTUH
Dr. M.B.R. Murthy, CMRCET
Dr. M.V. Krishna Rao, CMRIT
Dr. M. Janga Reddy, CMRIT
Dr. L. Pratap Reddy, JNTUH
Dr. T. Anil Kumar, SRIITH
Dr. K. Srinivas Rao, CMRCET
Dr. Sahu Chatrapati, JNTUM
Dr. Vaka Murali Mohan, BRC

vii
viii Team IC3T 2015

Program Chairs

Dr. A. Govardhan
Dr. K. Srujan Raju
Prof. G. Srikanth
Dr. Suresh Chandra Satapathy

Conveners

Prof. Dimlo. U. Fernandes


Prof. T. Sai Kumar
Mrs. K. Neeraja

Organizing Committee

Dr. K. Srujan Raju


Prof. T. Sai Kumar
Prof. G. Srikanth
Prof. Dimlo. U. Fernandes
Mr. N. Bhaskar
Mr. Md. Rafeeq
Mr. V. Naresh Kumar
Mr. B. Ravinder
Mr. A. Bharath Kumar, ECE
Mrs. J. Srividya, CSE
Mrs. B. Ragini Reddy, ECE
Mrs. Ch. Sudha Rani, ECE
Mr. S. Venkatesh, ECE
Mrs. K. Mohana Lakshmi, ECE
Mrs. P. Satyavathi, CSE
Mr. J. Narasimha Rao, CSE
Mr. N. Bhaskar, CSE
Mrs. B. Rama Devi, ECE, KITS

Program Committee

Ms. V. Swapna
Mrs. J. Srividya
Mr. Narasimha Rao
Mr. K. Murali
Team IC3T 2015 ix

Mrs. Suvarna Gothane


Mr. Ch. Sudha Mani

Finance Committee

Prof. G. Srikanth
Mr. D. Venkateshwarlu

Publicity Committee

Dr. K. Srujan Raju


Mr. P. Nagaraju
Mr. M. Ajay Kumar
Mr. Anirban Paul

Exhibition Committee

Prof. T. Sai Kumar


Mrs. A. Anusha
Mrs. D. Anuradha
Mr. Ameen Uddin Md.

Transport Committee

Mr. R. Nagaraju
Mr. A. Bharath Kumar
Mr. U. Yedukondalu
Mr. V. Pradeep Kumar

Hospitality Committee

Prof. K. Neeraja
Mrs. K. Kiranmai
Ms. Ch. Swapna
Mr. Md. Abdul Naqi
x Team IC3T 2015

Sponsorship Committee

Mr. K. Bharath
Mr. E. Uma Shankar
Mr. P. Kranthi Rathan
Mr. Ch. Narendar

Marketing and PR Committee

Mr. Md. Shabeer


Mr. S. Madhu
Mr. S. Satyanarayan Reddy
Mr. S. Venkatesh
Mr. A. Vamshidhar Reddy
Mr. G. Kranthi Kiran

Registrations Committee

Mrs. P. Satyavathi
Mrs. K. Shrisha
Mrs. K. Mohana Lakshmi
Mrs. K. Jeji

Cultural Committee

Mrs. Shriya kumari


Ms. B. Karuna Sree
Mrs. B. Ragini
Mr. M. Mahesh Babu

Web Portal Committee

Dr. K. Srujan Raju, CMRTC


Mr. Chandra Mohan
Mr. T. Santhosh Kumar, CSI-Hyderabad Chapter
Team IC3T 2015 xi

International Advisory Committee/Technical Committee

Mr. Gautham Mahapatra, Sr. Scientist, DRDO, India


Dr. A. Damodaram, Director, Academic and Planning, JNTUH
Dr. A. Govardhan,Director, SIT-JNTUH, India
Dr. Kun-lin Hsieh, NTU, Taiwan
Dr. Ahamad J. Rusumdar, KIT, Germany
Dr. V.R. Chirumamilla, EUT, Netherland
Dr. Halis Altun, MU, Turkey
Dr. Vakka Murali Mohan, BRC, India
Dr. K. Ashoka Reddy, KITSW, India
Dr. Md. Zafar Ali Khan, IITH, India
Dr. S.K. Udagata, UOH, India
Mr. Anirban Pal, Tech Mahindra, India

External Reviewers Board

Ankur Singh Bist, KIET, Ghaziabad, India


Dac-Nhuong Le, VNU University, Hanoi, Vietnam
Sumit Ashok Khandelwal, MIT Academy of Engineering, Pune, India
Srinivas Sethi, Indira Gandhi Institute of Technology, India
Kavita Choudhary, ITM University, Gurgaon, India
Ashwini B. Abhale, D. Y. Patil College of Engineering, Akurdi, India
Sadhana J. Kamatkar, University of Mumbai, Mumbai, India
Musheer Ahmad, Jamia Millia Islamia, New Delhi, India
Mridu Sahu, NIT, Raipur, Chhattisgarh, India
Ranjan Tripathi, SRMGPC, Lucknow (U.P.), India
Steven Lawrence Fernandes, Sahyadri College of Engineering & Management,
Mangalore, India
G. Rosline Nesa Kumari, Saveetha School of Engineering, Saveetha University,
Chennai, India
Arshad Mohd. Khan, Innovative Technologies, Hyderabad, India
Nikhil Bhargava, CSI ADM, Ericsson, India
Chirag Arora, KIET, Ghaziabad, India
H.V. Jayashree, PESIT, Bangalore, India
Ravi Tomar, University of Petroleum and Energy Studies, Dehradun, India
Sourav Samanta, University Institute of Technology, BU, India
Srinivas Aluvala, SR Engineering College, Warangal, India
Ritesh Maurya, ABVIITM, Gwalior, India
Abdul Wahid Ansari, University of Delhi, New Delhi, India
Gaikwad Bharatratna Pralhadrao, LPP Institute, Vivekanand College campus,
Aurangabad
A.N. Nagamani, PESIT, Bangalore, India
xii Team IC3T 2015

Balasaheb Deokate, Vidya Pratishthan’s College of Engineering, Baramati, India


Satya Narayan Tazi, Government Engineering College, Ajmer, India
Sherin Zafar, Jamia Millia Islamia, New Delhi, India
Dileep Kumar Yadav, MRCE, Faridabad, India
Gustavo Fernandez, Austrian Institute of Technology, Vienna, Austria
Banani Saha, University of Calcutta, Kolkatta, India
Jagdish Chandra Patni, University of Petroleum and Energy Studies, Dehradun,
India
Sayan Chakraborty, NIT, Durgapur, India
Kamble Vaibhav Venkatrao, Dr. Babasaheb Ambedkar Marathwada University
Aurangabad, Maharashtra, India
Tushar V. Ratanpara, C. U. Shah University, Gujarat
Hem Kumar Gopal, Government College for Women, Mandya, India
Rupayan Das, University of Engineering & Management (UEM), Jaipur, Rajasthan
Maheswari Senthilkumar, Sambhram Institute of Technology, Bangalore, India
Hemprasad Y. Patil, LGNSCE, University of Pune, India
Angshuman Khan, University of Engineering and Management, Jaipur, India
Kamal Kant Sharma, Chandigarh University, Gharuan, Mohali, India
Sk. Md. Obaidullah, Aliah University, Kolkata, West Bengal, India
Nilanjan Dey, Bengal College of Engineering and Technology, Durgapur, India
Andhe Dharani, Mother Teresa Women’s University, India
Sandip Das, University of Engineering and Management, Jaipur
Chayan Halder, West Bengal State University, Barasat, Kolkata, India
Vipin Khattri, SRMU, Lucknow-Deva Road, U.P., India
Alak Majumder, NIT, Arunachal Pradesh, India
Amartya Mukherjee, Bengal College of Engineering and Technology, Durgapur,
India
Suvojit Acharjee, NIT, Agartala, India
Aarti Singh, MMICTBM, M. M. University, Mullana, India
Ramesh Sunder Nayak, Canara Engineering College, Benjanapadavu, Mangalore,
India
P.K. Gupta, Jaypee University of Engineering and Technology, Raghogarh, India
Shilpa Bahl, KIIT, Gurgaon, India
Sudhir Kumar Sharma, Ansal Institute of Technology, GGS Indraprastha
University, Gurgaon, India
Bikesh Kumar Singh, NIT, Raipur, Chhattisgarh, India
Inderpreet Kaur, Chandigarh University, Gharuan, Mohali
Subuhi Khan, AMU, Aligarh, India
Shabana Urooj, GBU, Greater Noida, India
Mukul Misra, SRMU, Lucknow-Deva Road, U.P., India
Paras Jain, Jaypee University of Engineering and Technology, Raghogarh, India
Suresh Limkar, AISSMS IOIT, Pune, India
Pritee Parwekar, ANITS, Vishakhapatnam, India
Sri N. Madhava Raja, St. Joseph’s College of Engineering, Chennai, Tamil Nadu,
India
Team IC3T 2015 xiii

S. Ratan Kumar, ANITS, Vishakapatnam


S. Sridevi Sathya Priya, Karunya University, Coimbatore, Tamilnadu, India
Nishant Shrivastava, Jaypee University of Engineering and Technology,
Raghogarh, India
Rajinikanth Venkatesan, St. Joseph’s College of Engineering, Chennai, India.
Sireesha Rodda, GITAM University, Visakhapatnam, A.P., India
Tanmoy Halder, University of Kalyani, West Bengal, India
Garima Singh, Jaypee University of Information Technology, Waknaghat, Solan,
H.P., India
A. Rajiredyy, CMR Technical campus, Hyderabad
Somnath Mukhopadhyay, University of Kalyani, West Bengal, India
Abhinav Krishn, SRMGPC, Lucknow (U.P.), India
Himanshi Patel, SRMGPC, Lucknow (U.P.), India
Arindam Sarkar, University of Kalyani, West Bengal, India
Y.V. Srinivasa Murthy, NIT, Surathkal, India
Uttam Mondal, College of Engineering and Management, Kolaghat, India
Akanksha Sahu, SRMGPC, Lucknow (U.P.), India
Tara Sai Kumar, CMR Technical campus, Hyderabad
B.N. Biswal, BEC, Bhubaneswar
And many more…
Contents

Gesture Controlled Wireless Device for Disabled. . . . . . . . . . . . . . . . . 1


Shantanu, Manish Sharma, Bhupendra Singh, Mohit Agarwal
and Amit Kumar

Implementation of Genetic Algorithm for Optimization


of Network Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Kamal Kant Sharma and Inderpreet Kaur

An Investigation of Gabor PCA and Different Similarity Measure


Techniques for Image Classification . . . . . . . . . . . . . . . . . . . . . . . . . . 15
N. Hemavathi, T.R. Anusha, K. Mahantesh
and V.N. Manjunath Aradhya

A Low-Power High-Speed Double Manchester Carry Chain


with Carry-Skip Using D3L . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
J. Asha, Kala Bharathan and Anuja T. Samuel

Study and Analysis of Electrocardiography Signals for


Computation of R Peak Value for Sleep Apnea Patient . . . . . . . . . . . . 35
Mridu Sahu, Saransh Shirke, Garima Pathak, Prashant Agarwal,
Ravina Gupta, Vishal Sodhi, N.K. Nagwani and Shrish Verma

Design and Implementation of Two-Wheeled Self-Balancing


Vehicle Using Accelerometer and Fuzzy Logic . . . . . . . . . . . . . . . . . . 45
Sunu S. Babu and Anju S. Pillai

A Time Efficient Secret Image Sharing Scheme for Group


Authentication System Without Pixel Expansions . . . . . . . . . . . . . . . . 55
Samarpita Biswas, Nicole Belinda Dillen, Dipak Kumar Kole
and Aruna Chakraborty

xv
xvi Contents

Imputation of Missing Gene Expressions for DNA Microarray


Using Particle Swarm Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Chanda Panse, Manali Kshirsagar, Dhananjay Raje
and Dipak Wajgi

Deep Belief Network Based Part-of-Speech Tagger


for Telugu Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
M. Jagadeesh, M. Anand Kumar and K.P. Soman

On Context Awareness for Multisensor Data Fusion in IoT . . . . . . . . . 85


Shilpa Gite and Himanshu Agrawal

CRiPT: Cryptography in Penetration Testing . . . . . . . . . . . . . . . . . . . 95


Sachin Ahuja, Rahul Johari and Chetna Khokhar

Simultaneous Localization and Mapping for Visually


Impaired People for Outdoor Environment. . . . . . . . . . . . . . . . . . . . . 107
Anurag Joshi, Himanshu Agrawal and Poorva Agrawal

Automatic ECG Image Classification Using HOG and RPC


Features by Template Matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
V. Rathikarani, P. Dhanalakshmi and K. Vijayakumar

Enhancement of Fuzzy Rank Aggregation Technique . . . . . . . . . . . . . 127


Mohd Zeeshan Ansari, M.M. Sufyan Beg and Manoj Kumar

Intelligent Telecommunication System Using Semantic-Based


Information Retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
E. Ajith Jubilson, P. Dhanavanthini, P. Victer Paul, V. Pravinpathi,
M. RamCoumare and S. Paranidharan

Minimizing Excessive Handover Using Optimized Cuckoo


Algorithm in Heterogeneous Wireless Networks . . . . . . . . . . . . . . . . . 145
Salavadi Ananda Kumar and K.E. Sreenivasa Murthy

Audio Songs Classification Based on Music Patterns . . . . . . . . . . . . . . 157


Rahul Sharma, Y.V. Srinivasa Murthy and Shashidhar G. Koolagudi

Software Reliability Based on Software Measures Applying


Bayesian Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Anitha Senathi, Gopika Vinod and Dipti Jadhav
Contents xvii

On Context Awareness and Analysis of Various Classification


Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Umang Nanda, Shrey Rajput, Himanshu Agrawal, Antriksh Goel
and Mohit Gurnani

Neural Network-Based Automated Priority Assigner . . . . . . . . . . . . . . 183


Harsh Bhasin, Esha Khanna and Kapil Sharma

Design of IMC Controller for TITO Process with Dynamic


Closed-Loop Time Constant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Parikshit Kumar Paul, Chanchal Dey and Rajani K. Mudi

All Optical SOA-MZI-Based Encryption Decryption System


Using Co Propagating Optical Pulses and CW Wave at 40 Gb/s . . . . . 201
Vipul Agarwal and Vijayshri Chaurasia

Exploiting Common Nodes in Overlapped Clusters for Path


Optimization in Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . 209
Devendra Rao BV, D. Vasumathi and Satyanarayana V. Nandury

Maximizing Availability and Minimizing Markesan for Task


Scheduling in Grid Computing Using NSGA II . . . . . . . . . . . . . . . . . . 219
Dinesh Prasad Sahu, Karan Singh and Shiv Prakash

Moving Object Detection for Visual Surveillance


Using Quasi-euclidian Distance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Dileep Kumar Yadav and Karan Singh

IoTA: Internet of Things Application . . . . . . . . . . . . . . . . . . . . . . . . . 235


Sachin Ahuja, Rahul Johari and Chetna Khokhar

Improving Performance of Wireless Mesh Networks Through


User Association Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
G. Vijaya Kumar and C. Shoba Bindu

Characterization of Human Fingernails Using Iterative


Thresholding Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
N.S. Kumuda, M.S. Dinesh and G. Hemantha Kumar

Confidential Terms Detection Using Language Modeling


Technique in Data Leakage Prevention. . . . . . . . . . . . . . . . . . . . . . . . 271
Peneti Subhashini and B. Padmaja Rani
xviii Contents

ECG-Driven Extraction of Respiration Rate Using Ensemble


Empirical Mode Decomposition and Canonical Correlation
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Vineet Kumar and Gurpreet Singh

An Efficient On-Chip Implementation of Reconfigurable


Continuous Time Sigma Delta ADC for Digital Beamforming
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Anjani Harsha Vardhini Palagiri, Madhavi Latha Makkena
and Krishna Reddy Chantigari

Random Forest for the Real Forests . . . . . . . . . . . . . . . . . . . . . . . . . . 301


Sharan Agrawal, Shivam Rana and Tanvir Ahmad

Hybrid GA and PSO Approach for Transmission Expansion


Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Shilpi Sisodia, Yogendra Kumar and Arun Kumar Wadhwani

Pattern Detection Framework for MRI Images and Labeling


Volume of Interest (VoI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Rupal Snehkunj, Richa Mehta and Aashish N. Jani

A Distributed Spanning Tree-Based Dynamic Self-Organizational


Framework for Web Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
J. Amudhavel, U. Prabu, N. Saravanan, P. Dhavachelvan, R. Baskaran
and V.S.K. Venkatachalapathy

Recursive Ant Colony Optimization Routing in Wireless


Mesh Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
J. Amudhavel, S. Padmapriya, R. Nandhini, G. Kavipriya,
P. Dhavachelvan and V.S.K. Venkatachalapathy

Image Processing Representation Using Binary Image; Grayscale,


Color Image, and Histogram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
Vaka Murali Mohan, R. Kanaka Durga, Swathi Devathi
and K. Srujan Raju

A Vector Space Model Approach for Web Attack Classification


Using Machine Learning Technique . . . . . . . . . . . . . . . . . . . . . . . . . . 363
B.V. Ram Naresh Yadav, B. Satyanarayana and D. Vasumathi

Formal Verification of Secure Authentication in Wireless


Mesh Network (SAWMN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
Ninni Singh and Hemraj Saini
Contents xix

Visual K-Means Approach for Handling Class Imbalance


Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
Ch.N. Santhosh Kumar, K. Nageswara Rao and A. Govardhan

A Framework for Discovering Important Patterns Through


Parallel Mining of Protein–Protein Interaction Network . . . . . . . . . . . 397
Sarbani Dasgupta and Banani Saha

Implementing DNA Encryption Technique in Web Services


to Embed Confidentiality in Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Gunjan Gugnani, S.P. Ghrera, P.K. Gupta, Reza Malekian
and B.T.J. Maharaj

An Efficient Motion Detection Method Based on Estimation


of Initial Motion Field Using Local Variance . . . . . . . . . . . . . . . . . . . 417
Satrughan Kumar and Jigyendra Sen Yadav

A Survey on Texture Image Retrieval. . . . . . . . . . . . . . . . . . . . . . . . . 427


Ghanshyam Raghuwanshi and Vipin Tyagi

Converged OAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437


Prashant Saste and Jason Martis

Rule Reduction of a Neuro-Fuzzy PI Controller with Real-Time


Implementation on a Speed Control Process . . . . . . . . . . . . . . . . . . . . 445
Arijit Ghosh, Satyaki Sen and Chanchal Dey

Construction of Binary and Nonbinary LDPC-like Codes


from Kernel Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
C. Pavan Kumar, R. Selvakumar and Raghunadh K. Bhattar

Simulation-Level Implementation of Face Recognition


in Uncontrolled Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Steven Lawrence Fernandes and G. Josemin Bala

Analyzing State-of-the-Art Techniques for Fusion of Multimodal


Biometrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
Steven Lawrence Fernandes and G. Josemin Bala

Genetic Algorithmic Approach to Mitigate Starvation in Wireless


Mesh Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Potti Balamuralikrishna, M.V. Subramanyam and K. Satya Prasad
xx Contents

Handwritten Indic Script Identification from Document


Images—A Statistical Comparison of Different Attribute
Selection Techniques in Multi-classifier Environment . . . . . . . . . . . . . 491
Sk Md Obaidullah, Chayan Halder, Nibaran Das and Kaushik Roy

An FPGA-Based Embedded System for Real-Time


Data Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Pradyut Kumar Sanki

Clustering of Noisy Regions (CNR)—A GIS Anchored


Technique for Clustering on Raster Map . . . . . . . . . . . . . . . . . . . . . . 511
Anirban Chakraborty, J.K. Mandal, Pallavi Roy
and Pratyusha Bhattacharya

Performance of Brightness Enhancement Technique


for Narrow-Band and White-Band Images . . . . . . . . . . . . . . . . . . . . . 521
Sathi Raju Challa and D.V. Rama Koti Reddy

Z Transformation-Based High Payload Authentication Technique


with Higher Region of Convergence Value (ZATHRoc) . . . . . . . . . . . . 529
J.K. Mandal and Suman Mahapatra

Breast Tissue Density Classification Using Wavelet-Based


Texture Descriptors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
Jitendra Virmani and Kriti

On New Families Related to Bernoulli and Euler Polynomials . . . . . . . 547


Subuhi Khan and Mahvish Ali

Vehicular Ad Hoc Networks: Trimming Pile-Ups in Data


Dissemination Using HTPVANET Algorithm . . . . . . . . . . . . . . . . . . . 557
R.V.S. Lalitha and G. Jaya Suma

Information Extraction from Research Papers Based


on Statistical Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
Selvani Deepthi Kavila and D. Fathima Rani

Artificial Neural Network Classifier for Intrusion Detection


System in Computer Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581
N. Lokeswari and B. Chakradhar Rao

Edge Detection on an Image Using Ant Colony Optimization . . . . . . . 593


P. Hinduja, K. Suresh and B. Ravi Kiran
Contents xxi

Cryptography Technique for a Novel Text Using Mathematical


Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
P. Prudvi Raj and Ch. Seshadri Rao

A New Hybrid Approach for Document Clustering


Using Tabu Search and Particle Swarm Optimization (TSPSO) . . . . . . 609
T. Haribabu and S. Jayaprada

An Effective and Efficient Clustering Based on K-Means


Using MapReduce and TLBO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
Praveen Kumar Pedireddla and Sunita A. Yadwad

Detection of Sinkhole Attack in Wireless Sensor Network . . . . . . . . . . 629


Imandi Raju and Pritee Parwekar

Enhancement of Stream Ciphers Security Using DNA . . . . . . . . . . . . . 637


B. Ramesh, S.A. Bhavani and P. Muralidhar

Object Recognition with Discriminately Trained Part-Based Model


on HOG (Histogram of Oriented Gradients) . . . . . . . . . . . . . . . . . . . . 645
Thanikonda Alekhya and S. Ranjan Mishra

Accuracy Assessment of Images Classification Using RBF


with Multi-swarm Optimization Methodology . . . . . . . . . . . . . . . . . . . 655
G. Shyama Chandra Prasad, A. Govardhan and T.V. Rao

Microstrip Patch Antenna Array with Metamaterial Ground


Plane for Wi-MAX Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
Chirag Arora, Shyam S. Pattnaik and R.N. Baral

Tracking and Speed Estimation of Moving Vehicle for Traffic


Surveillance System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
Kamaraju Kamakula, J. Sharmila Rani, G. Santhosi
and G. Gowri Pushpa

Authentication of Audio Signals in Frequency Domain (AASF) . . . . . . 681


Uttam Kr. Mondal and J.K. Mandal

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691


About the Editors

Dr. Suresh Chandra Satapathy is currently working as Professor and Head,


Department of Computer Science and Engineering, Anil Neerukonda Institute of
Technology and Sciences (ANITS), Vishakhapatnam, Andhra Pradesh, India. He
obtained his Ph.D. in Computer Science Engineering from JNTUH, Hyderabad and
Master’s degree in Computer Science and Engineering from National Institute of
Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and
research experience. His research interest includes machine learning, data mining,
swarm intelligence studies, and their applications to engineering. He has more than
98 publications to his credit in various reputed international journals and conference
proceedings. He has edited many volumes from Springer AISC and LNCS in the
past and he is also the editorial board member in a few international journals. He is
a senior member of IEEE and Life Member of Computer society of India.
Currently, he is the National Chairman of Division-V (Education and Research) of
Computer Society of India.
Dr. K. Srujan Raju is the Professor and Head, Department of CSE, CMR
Technical Campus. Professor Srujan earned his Ph.D. in the field of Network
Security and his current research includes computer networks, information security,
data mining, image processing, intrusion detection, and cognitive radio networks.
He has published several papers in referred international conferences and
peer-reviewed journals and also he was on the editorial board of the CSI 2014
Springer AISC series 337 and 338 volumes. In addition to this, he has served as
reviewer for many indexed journals. Professor Raju was also awarded with
Significant Contributor, Active Member Awards by Computer Society of India
(CSI) and currently he is the Hon. Secretary of CSI Hyderabad Chapter.
Dr. Jyotsna Kumar Mandal obtained M.Sc. in Physics from Jadavpur University
in 1986, M.Tech. in Computer Science from University of Calcutta. He was
awarded Ph.D. in Computer Science and Engineering by Jadavpur University in
2000. Presently, he is working as Professor of Computer Science and Engineering
and former Dean, Faculty of Engineering, Technology and Management, Kalyani
University, Kalyani, Nadia, West Bengal for two consecutive terms. He started his

xxiii
xxiv About the Editors

career as lecturer at NERIST, Arunachal Pradesh in September, 1988. He has


teaching and research experience of 28 years. His areas of research include coding
theory, data and network security, remote sensing and GIS-based applications, data
compression, error correction, visual cryptography, steganography, security in
MANET, wireless networks, and unify computing. He has produced 11 Ph.D.
degrees, three submitted (2015) and 8 are ongoing. He has supervised three M.Phil.
and 30 M.Tech. theses. He is life member of Computer Society of India since 1992,
CRSI since 2009, ACM since 2012, IEEE since 2013, and Fellow member of IETE
since 2012, Executive member of CSI Kolkata Chapter. He has delivered invited
lectures and acted as program chair of many international conferences and also
edited nine volumes of proceedings from Springer AISC series, CSI 2012 from
McGraw-Hill, CIMTA 2013 from Procedia Technology, Elsevier. He is reviewer of
various international journals and conferences. He has over 355 articles and five
books published to his credit.
Prof. Vikrant Bhateja is Associate Professor, Department of Electronics and
Communication Engineering, Shri Ramswaroop Memorial Group of Professional
Colleges (SRMGPC), Lucknow and also the Head (Academics and Quality
Control) in the same college. His areas of research include digital image and video
processing, computer vision, medical imaging, machine learning, pattern analysis
and recognition, neural networks, soft computing and bio-inspired computing
techniques. He has more than 90 quality publications in various international
journals and conference proceedings. Professor Vikrant has been on TPC and
chaired various sessions from the above domain in international conferences of
IEEE and Springer. He has been the track chair and served in the
core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014
and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015
under IEEE. He is associate editor in International Journal of Convergence
Computing (IJConvC) and also serves on the editorial board of International
Journal of Image Mining (IJIM) under Inderscience Publishers. At present, he is
guest editor for two special issues floated in the International Journal of Rough Sets
and Data Analysis (IJRSDA) and the International Journal of System Dynamics
Applications (IJSDA) under IGI Global publication.
Gesture Controlled Wireless Device
for Disabled

Shantanu, Manish Sharma, Bhupendra Singh, Mohit Agarwal


and Amit Kumar

Abstract Wheelchairs were made for physically challenged persons in order to


move them from one place to another, but these required a lot of mechanical effort
because of which another person was needed for this work. Then came the wired
system which reduced the effort up to an extent but was not very successful. The
proposed module overcomes the previous limitations of the mechanical and wired
systems. According to this technology, one is able to control a remote device easily
from a distant site. This paper is about wireless communication between two
wireless modules, a robot and a hand movement controlled device fitted with tilt
sensor on it. Free radio frequency of 2.4 GHz with 16 channels, Zigbee technology
is used, keeping all wireless IEEE 802.15.4 global open standards true.

Keywords Robot  Microcontroller  Zigbee  Accelerometer  Tilt sensor

1 Introduction

A robot [1] called as a mechanical device, artificial agent or a model having a


programmable device which controls its movements and gives ease to humans. So it
is usually a system which by its appearance and movements conveys a sense, which
has a tendency to work on its own. Thus, by its virtue of sense it gives more
reliability in the medical field for patients and senior citizens who are unable to
move on their own and need a wheelchair for this purpose. So for the movement of
these wheelchairs only remote controlled devices are made. Such devices always
require extra cost and complexity of microcontroller programming in order to
develop logics for the operation of the device. So in this paper, for reduction of
complexity and extra cost, a wireless and gesture controlled device for the ease of
physically challenged patients and senior citizens using ATmega8 microcontroller,

Shantanu (&)  M. Sharma  B. Singh  M. Agarwal  A. Kumar


Amity School of Engineering and Technology, Amity University, Noida 201303, U.P, India
e-mail: shantanu.21989@gmail.com

© Springer India 2016 1


S.C. Satapathy et al. (eds.), Proceedings of the Second International
Conference on Computer and Communication Technologies, Advances
in Intelligent Systems and Computing 381, DOI 10.1007/978-81-322-2526-3_1
2 Shantanu et al.

Zigbee CC2500 modem [4] and accelerometer sensor is proposed. The receiving
section mounted on the robot receives control signals from the transmitting section
according to the tilt of the sensor platform in order to control the directions of robot,
which fully follows the IEEE 802.15.4 standard protocol.

2 Approach Used

In this approach we used two modules, to make controlled movement of our device
wirelessly. It consists of a transmitter and a receiver in which the transmitter is
mounted on the user hand and the receiver is mounted on the robot body having two
motors and a caster wheel, which gives it good balance and a controlled movement.
This module has a transmitting section with an accelerometer tilt sensor [2] to
measure the tilt angle made by the hand movement or by any body part and transmit
it wirelessly with the help of Zigbee along with the use of microcontroller AVR
ATmega8 [1, 3]. The receiving section mounted on the robot body, or wheelchair,
receives controlling signals from the transmitting section.

2.1 Transmitter Block Diagram

In this section (Fig. 1) the transmitter module has a regulated supply of +5 V


connected to the microcontroller, display (LCD1), switches and Zigbee transmitter
and also the accelerometer mounted on the transmitter module. The above module
is mounted on the hand of the user and as the movement of the user is done which
would be sensed by the accelerometer and the data will be sent forms the transmitter
module to the receiver module with the help of the Zigbee modem [1, 4].

Regulated power supply


(+5V)

Switches Microcontroller
Display (LCD)
Accelerometer
Zigbee Transmitter

Fig. 1 Block diagram of transmitter


Gesture Controlled Wireless Device for Disabled 3

Regulated power supply

Zigbee M1
Microcontroller L293D
LCD 2 M2

Fig. 2 Block diagram of receiver

2.2 Receiver Block Diagram

In this section (Fig. 2) the receiver module has a regulated supply of +5 V, mi-
crocontroller, Zigbee modem, LCD 2 display, two motors and L293D motor IC.
The receiver section is mounted on the robot body which will act according to the
instructions given by the transmitter for moving of robot in stable, forward, reverse,
left and right directions.

3 Working

The working of the wireless controlled device is divided into three parts.

3.1 Robot Body

It is a two-wheel body attached to two DC motors to a tin chassis. Free rotating


wheel with two-dimensional degree of freedom, i.e. it can move in any direction
depending on the direction of force on a plane.

3.2 Transmitter

The system mounted on the user hand acts as transmitter; in this part the Zigbee
modem (CC2500) works as a trans-receiver, which senses the tilt values of the
accelerometer sensor and then sends the instructions to the receiver section. The tilt
values are taken by the movement of the hand of the user in stable, forward, reverse,
left and right directions respectively. When the hand is tilted in the stable forward,
reverse, left and right direction then it gives a value of X and Y coordinates due to
4 Shantanu et al.

Fig. 3 Developed system


(transmitter (mounted on
hand) and receiver (robot))

accelerometer sensor and stores it to the microcontroller as characters. The process


can be seen on the LCD screen attached on the transmitter module.

3.3 Receiver

In the receiver part is a Zigbee modem (CC2500), which also acts as a


trans-receiver on the robot body. Here the modem gets the values stored in the
microcontroller of the transmitter section and compares these characters with the
initially stored values of the X and Y coordinates in the microcontroller of the
receiver section. Thus, this makes the motors of the robot with the help of motor
ICs, to move in the stable, forward, reverse, left and right directions in a quick
response of the time (Fig. 3).

4 Experimental Results

We have found that our proposed system is fast, accurate and secure. Figure 4
shows the comparison of the existing system with the proposed wireless system.
Hence the experimental result shows that the proposed system is fully functional
and can be used easily by patients and physically challenged people.

S. No Previous System New System


1 Wired working systems Wireless system
2 More efforts Very less efforts
3 Very slow process Very fast process

Fig. 4 Comparative study


Gesture Controlled Wireless Device for Disabled 5

5 Conclusion

Wireless system for controlling of a remote object or system which will move in
forward, reverse, right and left directions by the movement of the patient’s hand
(user) is successfully made. The system is developed for people suffering from
spinal cord problems (L2, L3, L4, etc.) and different kinds of physical disabilities.
Wireless communication feature of Zigbee protocol (IEEE 802.15.4), movement
sensing ability of the accelerometer sensor and programming of the ATmega8
microcontroller make the developed system intelligent. So by developing this kind
of wireless module the use of limited wired systems has been overcome. The range
of the system depends from module to module, it may vary from 30 m to 23 km.

6 Future Works

As the future scope is dependent on the accelerometer sensor, only two coordinates
are utilized here, i.e. X and Y coordinates. So by using the third coordinate, i.e.
Z coordinate, a more accurate system can be designed with improved accuracy and
precision and some other Zigbee module can be used for fast processing and longer
distance reception.

References

1. Horton, M., Suh, J.: A Vision for wireless sensor networks. IEEE Trans. Indus. Electr.
0-7803-8846-1/05 (2005)
2. Jiao, W., Wang, X., Zhao, L.: Monitoring system of car-guardrail accident based on wireless
sensor networks, ITST—(2008) ISBN:978-1-4244-2858-8
3. Sahin, H., Guvnec, L.: Household robotics: autonomous devices for vacuuming and lawn
mowing. IEEE Control Syst. Mag. 27(2), 20–96 (2007)
4. Singh, R., Singh, S.: Wireless traffic control using 2.4 GHZ ZigBee Module. J. Inform. Technol.
Listed Ulrich’s Int. Periodicals Directory, USA, 9(2). Dec 2011, ISSN No.:0974-5513
Implementation of Genetic Algorithm
for Optimization of Network Route

Kamal Kant Sharma and Inderpreet Kaur

Abstract Problem in the real world requires modeling the problem mathematically
and drawing conclusions based on the solutions of the mathematical problem. One
of the alternatives is evolutionary computation, which encompasses three main
components––evolution strategies, genetic algorithms, and evolution programs.
Genetic algorithm takes a possible solution to a particular problem on a simple
chromosome with variable genes and uses the data structure to apply the combi-
nation of operators to these structures in order to protect vital assets and search for
optimum solutions. Shortest path routing algorithms are a well-established problem
and addressed by many researchers in different ways. In the present work, one such
algorithm was used for routing which is based on genetic algorithm.

Keywords Mathematical modeling  Genetic algorithm  Evolution strategies 



Chromosomes Optimized path

1 Introduction

Routing is defined as a finding between two entities with minimum disturbance.


There are mainly two types of available routings, active routing and passive routing.
In the first type of routing, the paths are precomputed based on predetermined
factors and saved [1]. Information between any two selected entities follows the
determined path. In dynamic routings, the paths are rearranged based on factors like
congestion and optimization, in order to get the outcome when required by storing
the data. Depending on the requirement and with utmost satisfaction, routing can be
performed in a centralized or decentralized manner. In centralized, master–slave

K.K. Sharma (&)  I. Kaur


Department of Electrical and Electronics Engineering, Chandigarh University, Gharuan, India
e-mail: sharmakamal2002@gmail.com
I. Kaur
e-mail: inder_preet74@yahoo.com

© Springer India 2016 7


S.C. Satapathy et al. (eds.), Proceedings of the Second International
Conference on Computer and Communication Technologies, Advances
in Intelligent Systems and Computing 381, DOI 10.1007/978-81-322-2526-3_2
Another random document with
no related content on Scribd:
railroad across the desert begins. The ship is a sternwheeler, much
like those on some of our rivers. It is about twenty feet wide, one
hundred and fifty feet long, and draws only six inches. We make
about six miles per hour, and our pilot, a dark-faced, short-bearded
Nubian in turban and gown, corkscrews his course from one side of
the river to the other as we wind our way up the stream.
We fly the Egyptian and Sudanese flags, but the steamer belongs
to the government of the Sudan which means it is British. The
captain, however, is a German, and the rest of the crew are Nubians,
most of whom are as black as your shoes. The captain speaks
German, French, English, and Arabic. He attends to everything
connected with the steamer, even to the meals and the proper table
service. Our waiters are black-faced Nubians in long white gowns
and sashes of bright red. They wear white turbans, and their feet are
either bare or shod in red slippers.
I find the steamer comfortable and the company agreeable. The
boat has two decks. On the lower one are thirty cabins and the
dining room, where our meals are served table d’hôte. Over the
upper deck an awning is stretched, so that we can sit and watch the
scenery as we go up the river.
Our party consists of several commercial travellers, bound for the
Sudan and Central Africa; two missionaries who are going up the
Sobat River; a capitalist, largely interested in land development
enterprises about Khartum, and several people who are on their way
to the Blue Nile to hunt big game. Although we are far away in the
wilds of Nubia, with nothing but desert on each side, most of us
appear in evening clothes at dinner. Our meals are served in courses
with half-a-dozen changes of plates, knives, and forks.
Here is our bill of fare for one day. At seven this morning, while I
was yet in bed, my black boy appeared and handed me a cup of hot
tea, with two sweet crackers on each side of the saucer. At eight
o’clock the bell rang for breakfast in the dining room. The meal
consisted of fried fish fresh from the Nile, bacon and eggs, bread
and butter and jam, with tea or coffee. At one o’clock came
luncheon, a bountiful meal of rice, giblets, chicken, mutton chops,
and fruit, with bread and butter and cheese. Coffee, of course. At
eight o’clock we had dinner, and the menu was as follows: An
excellent soup, then a boiled fish just out of the Nile, followed by a
salmi of pigeons, roast lamb and mint sauce, with potatoes and
string beans. Then there was a course of tomato salad, and after
that a pudding and fruit.
I do not find travel in Africa at all cheap. If one travels along the
Nile he must expect to spend about fifteen dollars a day, the cost
increasing as he goes up the river. My trip from Shellal to Khartum
and back by rail and steamer, a distance not very much greater than
from New York to Chicago, will be one hundred and fifteen dollars, or
about six cents per mile, and I shall pay at Khartum a hotel rate of at
least five dollars per day.
If one attempts to travel economically he must expect many
discomforts. On this boat first-class passengers only are carried. We
have some second- and third-class passengers, but they stay on a
low barge which we tow alongside. This barge has a flat deck of
rough boards covered by a roof. The people carry their own bedding
and lay it down on the boards. They must supply their own food, and
as the servants of the first-class passengers, and natives, who are
far from clean, travel in that way, the company is not desirable.
Besides, it is very cold at night, and those who sleep on the decks
have the desert breezes blowing over them all night long. It is cooler
here than in Egypt, although we are nearer the Equator. I have a
woollen blanket on my bed, with a heavy travelling rug on top of that,
but still I am none too warm. In the early morning I wear an overcoat
on deck, although at noon it is so hot out of the breeze that I would
fain take off my flesh and sit in my bones.
Sailing up the Nubian Nile we are almost free from the flies such
as are found by millions in Egypt, but Nubia has a little fly of its own
which is almost unbearable. This is known as the nimetta, a small
midge, which appears in myriads during the winter season. Its bite
causes a slight fever, and the natives sometimes wear bunches of
smouldering grass twisted about their heads to keep it away.
The flies of Egypt are probably the descendants of those which the
Lord sent to afflict Pharaoh when he would not let the Children of
Israel go. They look not unlike the common fly of our country, but
they are bolder and hungrier. Their feet stick to one as though they
were glued and they will not move until forcibly brushed off, but the
Egyptian peasants have become so used to them that they let them
stick at will. Their favourite feeding place seems to be on one’s eyes.
This is especially true of the children, and it is a common sight to see
a child with its eyes so fringed with flies that it seems to have double
eyelashes. The flies cover the meat in the markets, they roost on the
buffaloes, camels, and donkeys, and attack the tourist to such an
extent that the selling of fly brushes has become an Egyptian
industry. The brushes are tassel-like affairs with long strings similar
to the hairs of a horse’s tail.
Everyone knows that flies carry disease and many of the troubles
of the Egyptians are due to them. Ophthalmia is especially prevalent.
There are blind people everywhere, while one-eyed men and women
are common. Diseases of the eye are so universal that one of the
charities of Lower Egypt is a company of travelling eye doctors, who
are supported by a rich Englishman. The doctors go from village to
village, carrying their tents with them. As they enter a town, word
goes out that the poor will be treated without charge, and crowds
come to their tents to have their eyes examined and cured. They
remain in one town for a month or so, serving the poor without
money and without price. The institution does great good.
The port of Shellal, where I took the steamer for Wady Halfa, lies
opposite the island of Philæ, and during my stay there I made
several trips to the island to take photographs of the ruined temples,
which have already been more or less affected by the backing up of
the water of the Aswan Dam. When the Aswan Dam was first
proposed a great outcry came from the savants and archæologists of
the world on account of the injury that it would do to Philæ, but the
material results have been so valuable to Egypt that the dam went
ahead, regardless of the preservation of these ancient ruins.
Something like one hundred thousand dollars was spent in fortifying
the structure during the building of the dam, and it is probable that
twice this amount would have sufficed to take up the temples and
carry them to the mainland, or even transport them to Cairo, where
all the world might see them.
The island of Philæ, which is on the edge of lower Nubia in the
centre of the Nile just above the first cataract, is reached by ferry
boat from Shellal or from Aswan and the dam. It is about fifteen
hundred feet long and five hundred feet wide, and almost covered
with temples built by the Ptolemies and others two or three centuries
before Christ.
The chief deity of Philæ was the goddess Isis, though Osiris,
Hathor, and the gods of the cataracts were also worshipped there.
Under the Roman emperors the temples were enlarged, but when
Egypt was converted to Christianity, the hermits and other fanatics
made their way into Nubia and took possession of it. They turned
some of the temples into Christian churches and their mutilations of
the splendid carvings made in honour of the gods of Old Egypt can
be plainly seen at low water.
The ruins are well worth a visit. Some of the structures have a
forest of columns about them. The Kiosk, which is known as
Pharaoh’s Bed, is one of the most beautiful of the Egyptian temples.
The stones are all of great size. They probably came from the Aswan
quarries, or it may be from the granite rocks that abound in the
desert. That region is almost all granite. I rode over it for thirty miles
on donkey back, making my way through the desert around and
about granite boulders worn smooth by the sandstorms of thousands
of years. The rocks are of all shapes and are piled, one upon
another, as if by the hands of a race of Titans. Here one stands high
over those surrounding it, as though on a pedestal; there others are
massed like fortifications; in another spot they rise in towers.
I visited the Aswan quarries, the great stone yards from which the
obelisks were taken, and from which came the mighty statues of
Rameses and the massive blocks of the greatest of the Theban
temples. The quarries to-day are much the same as they were when
the Egyptians left them two or three thousand years ago. One can
see the marks of their wedges on the rocks and the markings of the
old stone-cutters are plain. In one place there is an obelisk half
finished, lying on its side, just as the masons of the Pharaohs left it
ages ago. When the granite was taken out for the Aswan Dam, the
Italian workmen used many of the blocks that the ancient Egyptian
mechanics had begun to cut; indeed, that great granite structure was
made in partnership by two sets of mechanics born thousands of
years apart.
CHAPTER XVIII
FROM THE MEDITERRANEAN TO THE SUDAN

I am in the Sudan on the northern section of the Cape-to-Cairo


railroad. I am in the upper end of Nubia at the railroad station of
Halfaya, just opposite Khartum, and as far south of Alexandria as the
distance from New York to Denver.
In imagination come with me on the trip from the Mediterranean to
Khartum. We shall need four days to go from the sea to the junction
of the White and Blue Niles, where I now am, but the journey will for
the most part be comfortable and there are interesting sights for at
least part of the way. We start at Alexandria, the chief sea-port of the
whole valley, and in three hours our train carries us across through
the delta to Cairo, for there is frequent and rapid train service
between these two chief cities of Egypt.
As we go first class, we must pay three cents a mile. The second-
class fare is only half as much as the first, and the third is still
cheaper. Every train has first-, second-, and third-class cars. Those
of the first, which are divided into compartments, are patronized by
tourists and officials. The second-class car is much like the coach of
our American train, having an aisle through the centre. These cars
are used by merchants, commercial travellers, and well-to-do
natives. The third-class cars are cheaply made and their seats are
wooden benches. They are always filled with the common Egyptians,
and foreigners seldom travel in them. Our tickets are little blue cards
with the price printed upon them in English and Arabic. We have to
show them to the guard as we enter the train, and they are not
examined again until they are taken up at the gates of the station as
we go out.
We have some trouble with our baggage, for as usual with
Americans, we are loaded with trunks. Only fifty-five pounds can be
checked without extra charge, and my trunks often cost me more
than my fare. We notice that the English and Egyptian passengers
put most of their belongings into bundles and bags, which they can
bring into the cars with them. Many a single passenger is carrying
four or five valises, each holding as much as a small steamer trunk,
and the compartments are half filled with such luggage. Every first-
class car has a guard, or porter, who helps us off and on, and there
are always fellaheen at the depot ready to carry our effects for five
cents apiece.
Most of the Egyptian trains have a small car next to the engine, an
express car back of that, and also cars for animals. Our train carries
one in which are two blanketed horses, with Egyptian grooms to take
care of them. They probably belong to some rich nabob of Cairo, and
are going south by express.
The postal cars are carefully watched. The bags of mail are
carried to them on red trucks made for the purpose. The trucks are
pushed by the Arabs and mail is handled by them; but a dark-faced
soldier with rifle and sword marches along to see the bags taken in
and out. When a truck is loaded, the soldier goes with it to the post-
office wagons. There is always a guard on such Nile steamers as
carry mail, and the letters are never left without some armed official
to watch over them.
The Bisharin are desert folk, whose chief possessions are their wells and flocks.
They pity city dwellers and scorn those who till the soil. This aged warrior has his
short spear and rawhide shield.
Villages of mud huts spot the banks of the Upper Nile for hundreds of miles. The
dates grown along here are sweeter and larger than those from farther down the
river.

The Bisharin inhabit the desert beyond the narrow green strip along the Nile.
Their matting tents are easily moved from place to place in their search for
pasturage.
The railroads of Egypt and the Sudan are under the government,
and I find both systems pay. Those of Egypt earn about six per cent.
on their capital stock and their working expenses are only about
seventy-three per cent. of the gross receipts. The business is rapidly
increasing. They carry some twenty-six million passengers a year
and some five million tons of freight. Egypt now has something like
fifteen hundred miles of railroads which belong to the government,
and in addition more than seven hundred miles of agricultural roads
managed by private parties. The earnings of the latter are
increasing, for they carry more freight and passengers from year to
year.
The main lines are managed by Egyptian and European officials.
The superintendents of departments, who receive three thousand
dollars and upward a year each, are mainly Europeans, while the
inspectors and sub-inspectors, who get from eighty dollars to two
hundred and forty dollars a month, are in the main foreigners. Under
these men are the native guards, track workers, and mechanics of
various kinds, who receive smaller wages. They are almost all
Egyptians, there being some twenty-four hundred of them to about
one hundred and fifty Europeans.
The Sudan roads go through a thinly populated country, but the
receipts are already considerably more than their working expenses
and are rapidly increasing.
The Alexandria-Cairo division of the Cape-to-Cairo road taps one
of the richest countries on earth. I mean the delta of Egypt, which is
more thickly populated than most other parts of the globe. The
distance from Alexandria to Cairo is one hundred and thirty-three
miles, and all the way is through rich farm lands. There is no desert
in sight until you reach Cairo. Cotton is piled up at every depot, there
are vast loads of it on the canals which the track crosses, and at the
stations cars of cotton bales fill the side tracks.
The next division above Cairo goes to Asyut, which is two or three
hundred miles farther south. Then comes the road from Asyut to
Luxor, ending with the narrow-gauge line from Luxor to Aswan.
These divisions are through the narrow part of the Nile valley, with
the desert in sight all the time. The river winds this way and that, but
the railroad is comparatively straight, and is often far off from the
river amid the sand and rocks. Such parts of the line are
uncomfortable going. At times the sands are blinding, the dust fills
the cars, and our eyes smart. These discomforts are somewhat less
in the first-class cars. All of them have shutters and double windows
to keep out the dust, and the inner window panes are of smoked
glass to lessen the glare. With the shutters up it is almost dark and
when both windows are down the interior has the appearance of
twilight. When clear glass alone is used the rays are blinding and the
sun comes through with such strength that it is not safe to have it
strike the back of one’s neck. In addition to the double windows and
shutters there are wooden hoods over the car windows, so that the
direct rays of the sun may not shine in. The cars have also double
roofs, and the doors have windows of smoked glass. There is so
much dust that it comes in when everything is shut tight, and the
porter has to sweep up every hour.
I found the conditions even worse in the Nubian Desert, which I
crossed on the railroad from Wady Haifa, where I left the steamer
Ibis, to Berber. That region is about the dreariest and most desolate
on earth. It is all sand and rocks, with here and there a low barren
mountain. The Nubians themselves call it “the stone belly,” and the
name is well chosen.
The road through Nubia is a part of the Sudan military railway that
extends from Wady Halfa to Khartum. It is one of the iron gateways
to the Sudan, the other being the railway which the British have built
from Atbara to Port Sudan and Suakim on the Red Sea. The military
line is almost as long as from New York to Detroit and the Port
Sudan line from the Red Sea to Atbara, where it connects with the
military line, is less than half that length.
The Port Sudan road vies with the military railways in being one of
the dirtiest railroads ever constructed. Its whole route is across the
Nubian Desert. There is no vegetation at all between Atbara and the
Red Sea until within about nine miles of the coast, and then only a
scanty growth of thorn bush and scrub that feeds small flocks of
camels and sheep.
This Red Sea road was opened about 1905. Since then it has
been carrying a large part of the trade of the Sudan. Mohammedan
pilgrims from Central Africa and the Lower Nile valley use it on their
way to and from Mecca, and occasionally tourists come to Khartum
via the Suez Canal, the Red Sea, and this railroad.
The military line from Wady Halfa is the one built by General
Kitchener during the war with the Mahdi. Constructed in less than
eighteen months by the British engineers and soldiers, it is one of
the most remarkable examples of railroad building on record. A large
part of it was laid in the hottest time of the year and at the rate of one
and a quarter miles per day, and once, more than three miles were
laid in one day. Yet the work was so well done that heavy trains
could travel safely over it even when making twenty-five miles an
hour. It was built through a waterless desert which had never been
mapped until the railroad surveyors went over it. During its
construction the survey camp was kept about six miles in advance of
the rail head. The road was built through a hostile country where
there was constant danger of attack by the Dervishes.
To-day the cars move as smoothly over those tracks as they do
over those of Egypt, and give that country regular connection with
the Sudan. There is now a train de luxe connecting Khartum with
Wady Halfa equipped with sleeping and dining cars.
The sleepers are divided into compartments about seven feet
square with two berths to each. There is an aisle along the side of
the car from which the compartments are entered, and each of the
latter is large enough to enable one to have a wicker chair in it in
addition to the berths. Every little room has an electric fan and is
lighted by electricity.
The dining-car service is good and comparatively cheap. The
meals consist of a cup of tea and some crackers brought in by a
Nubian porter at daybreak; a breakfast in the dining car at eight
o’clock; a table d’hôte luncheon at one, and a dinner in the evening.
In riding over the Sudan military road we stopped for a time at
Atbara, where the Black Nile from Abyssinia flows into the main
stream. Here is the famous bridge built by Americans upon orders
given by General Kitchener. The contract was first offered to the
English, but they were not able to build the bridge in the time
required, so the Americans took the job and finished it. Atbara is now
an important division point where the road across the desert to the
Red Sea branches off. As we stopped at the station our engine
struck me as looking familiar. I walked to the front of the train and
examined it. Sure enough, it was a Baldwin, with the name
“Philadelphia” standing out in the full blaze of the Nubian sun. Later
on, when I crossed the Black Nile over the steel bridge put up by our
builders, I felt that I was not out of touch with home, after all. I was
being hauled by an American engine over an American bridge,
though I was in the heart of the Nubian Desert more than a thousand
miles up the Nile. The thought makes one proud of our American
enterprise and mechanical genius.
At Atbara I learned a great deal about the road, which starts here
on its three hundred and thirty mile journey through the Nubian
Desert to the Red Sea. This little town might be called one of the
railway centres of the Sudan. Lying at the junction of the two chief
railways, it has the principal railroad offices and shops and is the
home of the director, with whom I had a long talk about his line to the
Red Sea. He had a part in building the road and is now its manager.
We first visited the shops, which cover two or three acres of sandy
waste. They are great sheds with walls of galvanized iron and roofs
of iron and plate glass. I saw many locomotives, cars and steel ties,
and telegraph poles outside. Going in, I found all sorts of railway
repair and construction work under way. The machinists were a
mixture of whites, blacks, and yellows, representing a half-dozen
different nations and tribes. There were British overseers, Greek and
Italian mechanics, some Nubian blacksmiths, and many Nubian boys
taking a sort of manual-training course in order that they may serve
as locomotive engineers, under machinists and trackmen. The
machinery is of modern make and the shops are well equipped.
As we walked among the lathes and planing machines the director
pointed out to me some of the peculiarities of the wear and tear of
the desert upon railway materials.
“Here,” said he, as he pointed to the wheel of an American
locomotive, in which was cut a groove so deep and wide that I could
lay my three fingers in it, “is an example of how the sands ruin our
car wheels. The flint-like grains from the desert blow over the rails,
and as the cars move they grind out the steel as though they were
emery powder. Consequently, the life of a wheel is short, and we
have to cut down its tire every few months. Moreover, the sand gets
into the bearings, and there is a continual wearing which
necessitates almost constant repair.”
“How about your sandstorms? Are they serious obstacles to
traffic?”
“At times, yes. They come with such violence that they cover the
tracks; they cloud the sun so that when you are in one you cannot
see your hand before your face. They often spring up afar off, so that
you can watch them coming. At such times the sand gets into
everything and cuts its way through all parts of the machinery.
“Another thing we have to contend with,” continued the railway
manager, “is the extraordinary dryness of the air, which shrinks our
rolling stock so that it has to be tightened up again and again. One of
our passenger cars will shrink as much as eighteen inches in one
wall alone, and we have to put in extra boards to fill up the gaps. The
same is true of all sorts of woodwork.
“Another trouble is the white ant. That little termite eats anything
wooden. It chews up the insides of our cars and even attacks the
furniture. Where there is the least moisture the ants will go for the
railroad ties, and they will chew out the insides of the wooden
telegraph poles. They always work under cover, leaving a thin shell
of wood outside. The result is that a tie or pole may look sound then
all at once it will crumble to pieces. We have to inspect the road very
carefully at regular intervals and watch out for weak points. We now
use hollow steel tubes as ties. They do not make so smooth a road
as the wooden ties, but the ants cannot eat them. We also have
steel telegraph poles.”
“I noticed my train was pulled by an American locomotive. How do
they compare with those from Great Britain?” I inquired.
“Not well,” replied the railroad director. “We have some of your
engines which we bought seven years ago. We are still using them,
but most of them have been repaired and made over. You people
make locomotives, expecting to run them to their full capacity for four
or five years and then throw them on the scrap heap. This is not
advisable out here in the desert, where freight costs so much and
the trouble of getting our rolling stock is so great. We want
machinery that will stand all sorts of trials, including the climate. We
want it rustproof and rotproof and heavily made all around. We have
here not only the dry air and the sand to contend with, but also in the
neighbourhood of the Red Sea the salt air and the alkali water.”
“I suppose the lack of water is one of your chief difficulties, is it
not?” I asked.
“Yes. This railroad is over three hundred miles long and the track
is laid through the sand. For about one third of the distance inland
from the Red Sea the country is mountainous, but the rest of it is flat.
There are no streams, so we have to rely on artesian wells for our
water supply. We have bored a number, but we find that the water in
many places is salt. We struck one well which had three per cent. of
salt in it, and another in which the water was one per cent. salt. Of
course such water is useless for our locomotives.
“We are having trouble also in getting a good water supply at Port
Sudan. We sunk one well to a depth of eight hundred feet and struck
a good flow of fresh water. We had hardly completed, it, however,
before the salt water began to seep in, and we are now drilling again.
There are some stretches along the route where there is no water
whatever. In such places we have to carry our supply with us. For
this we have tanks of galvanized iron, each of which will hold about
fifteen hundred gallons.”
From Atbara I took a later train to continue my journey on toward
Khartum. About one hundred miles south of Atbara we stopped at
Shendi, where the Queen of Sheba is said to have lived. This is a
station on the east bank of the Nile five hours or more from Khartum.
It is a considerable town with railroad shops. I saw great piles of
steel ties such as Captain Midwinter mentioned.
The mud towers outside some Egyptian huts are used by whole families as cool
sleeping places out of reach of scorpions. Sometimes mothers leave their babies
in them while they are working in the fields.
The child so contentedly sucking sugar cane is, like four out of every hundred
children in Egypt, blind in one eye. This is due chiefly to the superstition and
ignorance of their parents.

Shendi consists of an old and a new town. The latter has been laid
out by the British and has a park in the centre watered by the Nile. In
ancient times there was a great city here, for it was the capital of the
country and the supposed residence of the Queen of Sheba, who
went from here down the Nile and crossed to Palestine. There she
had her famous flirtation with King Solomon. The Abyssinians say
that she went back by the Red Sea and stopped in their country; and
that while there she bore a son whose father was Solomon and who
became the head of the line of kings which rule Abyssinia to-day.
The Mohammedans, on the other hand, say that the Queen of
Sheba did not live here at all. They claim that her residence was in
Yemen, Arabia, and that Solomon went there to visit her. The
queen’s name was Balkis. As witty as she was beautiful, she gave
the wise Solomon many a riddle which he was puzzled to answer.
CHAPTER XIX
ACROSS AFRICA BY AIR AND RAIL

The airplane has completed the conquest of the Dark Continent. A


two-months’ journey from Cairo to the Cape of Good Hope has been
reduced to a possible fifty-two hours of flying, each hour
representing one hundred miles through the skies.
Cecil Rhodes died hoping that one day his countrymen would
finish the greatest of his African projects, an all-British route
traversing the continent. His dreams were based upon steam, and
compassed a route of rail and water transport taking advantage of
the Nile and the Great Lakes. Those dreams are becoming realities,
and to-day only a few gaps remain unfilled on the long way from the
north to the south. In the meantime, aircraft has sprung almost full
fledged into the skies, and the gasoline engine and the airplane have
beaten the steam locomotive and its steel track through the wilds.
The first flight from Cairo to the Cape was made by two officers of
the South African Air Force, Colonel P. Van Ryneveld and Lieutenant
C. J. Q. Brand. Of four competitors who started from Cairo, they
were the only ones to land at Cape Town. They had several
accidents and wrecked two machines on the way. Leaving Cairo on
February 10, 1920, they took twenty-eight days to reach Cape Town,
although their actual flying time was counted in hours. Their nearest
competitor covered only half the distance, while the two others did
not succeed in getting across the desert wastes of the Sudan.
In the airplane of our imagination, let us take the trip they made.
We may be sure of excitement, for even under favourable conditions
we are starting out on one of the most dangerous air journeys known
to the world. But let us first look at a map and pick out our route. It is
a jagged line, extending from north to south, the length of the
continent. It is marked with dots and triangles, each showing a place
where we may land. As we look at the map it seems quite simple
and easy, but actual experience proves its great difficulties.
We shall leave Cairo at dawn and follow the Nile to Khartum. This
is a flight of one thousand miles, but landing places have been
prepared along the entire route at intervals of two hundred miles. We
shall stop at one of these long before noon and spend several hours
to avoid the heat of the day, when gusts of hot air, rising from the
sun-baked desert, make it dangerous to fly at low altitudes. At the
start of our flight we shall rise a mile or more to avoid these
treacherous currents, which frequently take the form of “air spouts,”
often visible on account of the dust and sand they have sucked up
with them. Such currents have force enough to toss our plane about
like a leaf in the wind. With these great gusts of hot air spouting
upward are cold currents rushing downward. These are even more
dangerous, as they are always invisible. Consequently, we shall fly
high, to avoid a “bumpy” passage, as our pilot calls it, and in landing
must be careful lest we get caught in an air pocket.
From Khartum we start on the second, longest, and most
dangerous leg of the journey. This covers a distance of twenty-six
hundred miles, extending to Livingstone near Victoria Falls in
northern Rhodesia. We shall follow, in a general way, the Blue Nile to
Ehri, and then go almost due south to Uganda and Lake Victoria, the
second largest lake of the world. We shall skirt the eastern edge of
the Sudd, in which there is hardly a single safe landing place. Except
in the main channels, masses of papyrus completely hide the water,
and if we should come down in that treacherous region we could
hardly hope to get out alive. We should be unable to walk, swim, or
float in the dense tangle.
This second leg of our journey takes us into the heart of Africa.
The country is wooded and mountainous. It is very hot, for we are
nearing the Equator, which cuts across the upper edge of Lake
Victoria. In fact, our pilot will not fly after nine in the morning nor
earlier than four o’clock in the afternoon. The air is more “bumpy,”
and often terrific thunderstorms seem to fill the sky with sheets of
water. In dodging these storms, we must be careful not to fly so far
off our course as to be forced to land in the wilds. The country here

You might also like