Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

Smart and Sustainable Intelligent

Systems Sustainable Computing and


Optimization 1st Edition Namita Gupta
(Editor)
Visit to download the full and correct content document:
https://textbookfull.com/product/smart-and-sustainable-intelligent-systems-sustainable
-computing-and-optimization-1st-edition-namita-gupta-editor/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Computational Intelligence and Sustainable Systems


Intelligence and Sustainable Computing H. Anandakumar

https://textbookfull.com/product/computational-intelligence-and-
sustainable-systems-intelligence-and-sustainable-computing-h-
anandakumar/

Intelligent Decision Support Systems for Sustainable


Computing Paradigms and Applications 1st Edition Arun
Kumar Sangaiah

https://textbookfull.com/product/intelligent-decision-support-
systems-for-sustainable-computing-paradigms-and-applications-1st-
edition-arun-kumar-sangaiah/

Advanced Intelligent Systems for Sustainable


Development AI2SD 2018 Volume 5 Advanced Intelligent
Systems for Computing Sciences Mostafa Ezziyyani

https://textbookfull.com/product/advanced-intelligent-systems-
for-sustainable-development-ai2sd-2018-volume-5-advanced-
intelligent-systems-for-computing-sciences-mostafa-ezziyyani/

Advanced Intelligent Systems for Sustainable


Development AI2SD 2019 Volume 2 Advanced Intelligent
Systems for Sustainable Development Applied to
Agriculture and Health Mostafa Ezziyyani
https://textbookfull.com/product/advanced-intelligent-systems-
for-sustainable-development-ai2sd-2019-volume-2-advanced-
intelligent-systems-for-sustainable-development-applied-to-
Intelligent Computing & Optimization Pandian Vasant

https://textbookfull.com/product/intelligent-computing-
optimization-pandian-vasant/

Smart Energy Control Systems for Sustainable Buildings


1st Edition John Littlewood

https://textbookfull.com/product/smart-energy-control-systems-
for-sustainable-buildings-1st-edition-john-littlewood/

Advanced Intelligent Systems for Sustainable


Development AI2SD 2019 Volume 6 Advanced Intelligent
Systems for Networks and Systems Mostafa Ezziyyani

https://textbookfull.com/product/advanced-intelligent-systems-
for-sustainable-development-ai2sd-2019-volume-6-advanced-
intelligent-systems-for-networks-and-systems-mostafa-ezziyyani/

Sustainable Agriculture Reviews 29 Sustainable Soil


Management Preventive and Ameliorative Strategies
Rattan Lal

https://textbookfull.com/product/sustainable-agriculture-
reviews-29-sustainable-soil-management-preventive-and-
ameliorative-strategies-rattan-lal/

Breeding oilseed crops for sustainable production :


opportunities and constraints 1st Edition Gupta

https://textbookfull.com/product/breeding-oilseed-crops-for-
sustainable-production-opportunities-and-constraints-1st-edition-
gupta/
Smart and Sustainable
Intelligent Systems
Smart and Sustainable
Intelligent Systems

Edited by
Namita Gupta
Prasenjit Chatterjee and
Tanupriya Choudhury
This edition first published 2021 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener
Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA
© 2021 Scrivener Publishing LLC
For more information about Scrivener publications please visit www.scrivenerpublishing.com.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or
by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to
obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.

Wiley Global Headquarters


111 River Street, Hoboken, NJ 07030, USA

For details of our global editorial offices, customer services, and more information about Wiley prod-ucts visit us at www.
wiley.com.

Limit of Liability/Disclaimer of Warranty


While the publisher and authors have used their best efforts in preparing this work, they make no rep­resentations or warran-
ties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including
without limitation any implied warranties of merchant-­ability or fitness for a particular purpose. No warranty may be created
or extended by sales representa­tives, written sales materials, or promotional statements for this work. The fact that an orga-
nization, website, or product is referred to in this work as a citation and/or potential source of further informa­tion does not
mean that the publisher and authors endorse the information or services the organiza­tion, website, or product may provide or
recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering pro-
fessional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with
a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial
damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware
that websites listed in this work may have changed or disappeared between when this work was written and when it is read.

Library of Congress Cataloging-in-Publication Data

ISBN 978-1-119-75058-1

Cover image: Pixabay.Com


Cover design by Russell Richardson and Farzil Kidwai

Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines

Printed in the USA

10 9 8 7 6 5 4 3 2 1
Dedication

Prof. Namita Gupta would like to dedicate this book to her husband Mr. Arvind Goyal
and her sons Anish Goyal and Ansh Goyal for their patience and support. She expresses
extreme gratitude to Dr N. K. Garg (Founder and Chief Advisor, MATES), Prof. Neelam
Sharma (Director MAIT) and Prof. S. S. Deswal (Dean Academics, MAIT) for their valuable
guidance and encouragement.

Dr. Prasenjit Chatterjee would like to dedicate this book to his late grandparents, father
Late Dipak Kumar Chatterjee, his mother Mrs. Kalyani Chatterjee, beloved wife Amrita and
his little angel Aheli.

Dr. Tanupriya Choudhury would like to dedicate this book to his late grandparents,
his father Sri Mrigendra Choudhury, his mother Mrs. Minakshi Choudhury, beloved wife
Rituparna and his son Rajrup and his respected guides, his research collaborators, friends,
scholars, most beloved students and colleagues.
Contents

Preface xxv
Acknowledgement xxix
Part 1: Machine Learning and Its Application 1
1 Single Image Super-Resolution Using GANs for High-Upscaling Factors 3
Harshit Singhal, Aman Kumar, Shubham Khandelwal, Anupam Kumar
and Mini Agarwal
1.1 Introduction 3
1.2 Methodology 5
1.2.1 Architecture Details 5
1.2.2 Loss Function 7
1.3 Experiments 7
1.3.1 Environment Details 7
1.3.2 Training Dataset Details 7
1.3.3 Training Parameters 7
1.4 Experiments 8
1.5 Conclusions 10
1.6 Related Work 10
References 13
2 Landmark Recognition Using VGG16 Training 17
Ruchi Jha, Prerna Jain, Sandeep Tayal and Ashish Sharma
2.1 Introduction 17
2.2 Related Work 19
2.2.1 ImageNet Classification 19
2.2.2 Deep Local Features 22
2.2.3 VGG Architecture 25
2.3 Proposed Solution 26
2.3.1 Revisiting Datasets 26
2.3.1.1 Data Pre-Processing 28
2.3.1.2 Model Training 30
2.4 Results and Conclusions 33
2.5 Discussions 37
References 37

vii
viii Contents

3 A Comparison of Different Techniques Used for Classification of


Bird Species From Images 41
Sourabh Kumar, Vatsal Dhoundiyal, Nishant Raj and Neha Sharma
3.1 Introduction 41
3.2 CUB_200_2011 Birds Dataset 42
3.3 Machine Learning Approaches 42
3.3.1 Softmax Regression 44
3.3.2 Support Vector Machine 45
3.3.3 K-Means Clustering 45
3.4 Deep Learning Approaches 46
3.4.1 CNN 46
3.4.2 RNN 46
3.4.3 InceptionV3 47
3.4.4 ImageNet 47
3.5 Conclusion 48
3.6 Conclusion and Future Scope 49
References 49
4 Road Lane Detection Using Advanced Image Processing Techniques 51
Prateek Sawhney and Varun Goel
4.1 Introduction 51
4.2 Related Work 52
4.3 Proposed Approach 52
4.4 Analysis 53
4.4.1 Dataset 53
4.4.2 Camera Calibration and Distortion Correction 56
4.4.3 Threshold Binary Image 59
4.4.4 Perspective Transform 61
4.4.5 Finding the Lane Lines—Sliding Window 64
4.4.6 Radius of Curvature and Central Offset 67
4.5 Annotation 67
4.6 Illustrations 68
4.7 Results and Discussions 70
4.8 Conclusion and Future Work 70
References 70
5 Facial Expression Recognition in Real Time Using Convolutional
Neural Network 73
Vashi Dhankar and Anu Rathee
5.1 Introduction 73
5.1.1 Need of Study 75
5.2 Related Work 75
5.3 Methodology 76
5.3.1 Applying Transfer Learning using VGG-16 77
5.3.2 Modeling and Training 78
5.4 Results 80
Contents ix

5.5 Conclusion and Future Scope 86


References 87
6 Feature Extraction and Image Recognition of Cursive Handwritten
English Words Using Neural Network and IAM Off-Line Database 91
Arushi Sharma and Shikha Gupta
6.1 Introduction 91
6.1.1 Scope of Discussion 92
6.2 Literature Survey 93
6.2.1 Early Scanners and the Digital Age 93
6.2.2 Machine Learning 93
6.3 Methodology 94
6.3.1 Dataset 95
6.3.2 Evaluation Metric 96
6.3.3 Pre-Processing 96
6.3.4 Implementation and Training 97
6.4 Results 98
6.4.1 CNN Output 98
6.4.2 RNN Output 98
6.4.3 Model Analysis 99
6.5 Conclusion and Future Work 100
6.5.1 Image Pre-Processing 100
6.5.2 Extend the Model to Fit Text-Lines 100
6.5.3 Integrate Word Beam Search Decoding 100
References 101
7 License Plate Recognition System Using Machine Learning 103
Ratan Gupta, Arpan Gupta, Amit Kumar, Rachna Jain and Preeti Nagrath
7.1 Introduction 103
7.1.1 Machine Learning 105
7.2 Related Work 105
7.3 Classification Models 106
7.3.1 Logistic Regression 107
7.3.2 Decision Trees 107
7.3.3 Random Forest 107
7.3.4 K Means Clustering 107
7.3.5 Support Vector Machines 107
7.3.5.1 Linear Classification 108
7.3.5.2 Nonlinear Classification 108
7.4 Proposed Work and Methodology 108
7.4.1 Detect License Plate 110
7.4.2 Segmentation 110
7.4.3 Training the Model 111
7.4.4 Prediction and Recognition 111
7.5 Result 112
7.6 Conclusion 112
x Contents

7.7 Future Scope 112


References 112
8 Prediction of Disease Using Machine Learning Algorithms 115
Annu Dhankhar and Shashank Jain
8.1 Introduction 115
8.2 Datasets and Evaluation Methodology 116
8.2.1 Datasets 117
8.3 Algorithms Used 118
8.3.1 Decision Tree Classifier 118
8.3.2 Random Forest Classifier 119
8.3.3 Support Vector Machines 120
8.3.4 K Nearest Neighbors 121
8.4 Results 123
8.5 Conclusion 123
References 123

Part 2: Deep Learning and Its Application 127


9 Brain Tumor Prediction by Binary Classification Using VGG-16 129
Vaibhav Singh, Sarthak Sharma, Shubham Goel, Shivay Lamba and
Neetu Garg
9.1 Introduction 130
9.2 Existing Methodology 130
9.2.1 Dataset Description 130
9.2.2 Data Import and Preprocessing 131
9.3 Augmentation 132
9.3.1 For CNN Model 133
9.3.2 For VGG 16 Model 133
9.4 Models Used 133
9.4.1 CNN Model 133
9.4.2 VGG 16 Model 133
9.4.2.1 Pre-Trained Model Approach 134
9.5 Results 134
9.6 Comparison 136
9.7 Conclusion and Future Scope 136
References 137
10 Study of Gesture-Based Communication Translator by
Deep Learning Technique 139
Rishabh Agarwal, Shubham Bansal, Abhinav Aggarwal, Neetu Garg
and Akanksha Kochhar
10.1 Introduction 139
10.2 Literature Review 141
10.3 The Proposed Recognition System 142
10.3.1 Image Acquisition 143
10.3.2 Pre-Processing 145
Contents xi

10.3.3 Classification and Recognition 146


10.3.4 Post-Processing 147
10.4 Result and Discussion 148
10.5 Conclusion 149
10.6 Future Work 150
References 150
11 Transfer Learning for 3-Dimensional Medical Image Analysis 151
Sanket Singh, Sarthak Jain, Akshit Khanna, Anupam Kumar
and Ashish Sharma
11.1 Introduction 151
11.2 Literature Survey 152
11.2.1 Deep Learning 152
11.2.2 Transfer Learning 153
11.2.3 PyTorch and Keras (Our Libraries) 154
11.3 Related Works 155
11.3.1 Convolution Neural Network 156
11.3.2 Transfer Learning 157
11.4 Dataset 159
11.4.1 Previously Used Dataset 159
11.4.2 Data Acquiring 159
11.4.3 Cleaning the Data 160
11.4.4 Understanding the Data 160
11.5 Description of the Dataset 162
11.6 Architecture 162
11.7 Proposed Model 165
11.7.1 Model 1 167
11.7.2 Model 2 167
11.7.3 Model 3 167
11.8 Results and Discussion 167
11.8.1 Coding the Model 169
11.9 Conclusion 169
11.10 Future Scope 169
Acknowledgement 170
References 170
12 A Study on Recommender Systems 173
Agrima Mehandiratta, Pooja Gupta and Alok Kumar Sharma
12.1 Introduction 173
12.2 Background 174
12.2.1 Popularity-Based 175
12.2.2 Content-Based 175
12.2.3 Collaborative Systems 175
12.3 Methodology 176
12.3.1 Input Parameters 176
12.3.2 Implementation 177
12.3.3 Performance Measures 178
xii Contents

12.4 Results and Discussion 178


12.5 Conclusions and Future Scope 180
References 180
13 Comparing Various Machine Learning Algorithms for User
Recommendations Systems 181
Rahul Garg, Shivay Lamba and Sachin Garg
13.1 Introduction 181
13.2 Related Works 182
13.3 Methods and Materials 182
13.3.1 Content-Based Filtering 182
13.3.2 Collaborative Filtering 182
13.3.3 User–User Collaborative Filtering 182
13.3.4 Item–Item Collaborative Filtering 183
13.3.5 Random Forest Algorithm 183
13.3.6 Neural Networks 183
13.3.7 ADA Boost Classifier 184
13.3.8 XGBoost Classifier 184
13.3.9 Trees 184
13.3.10 Regression 185
13.3.11 Dataset Description 185
13.4 Experiment Results and Discussion 185
13.5 Future Enhancements 189
13.6 Conclusion 189
References 190
14 Indian Literacy Analysis Using Machine Learning Algorithms 191
Shubhi Jain, Sakshi Bindal, Ruchi Goel and Gaurav Aggarwal
14.1 Introduction 191
14.2 Related Work 193
14.3 Solution Approaches 194
14.3.1 Preparation of Dataset 195
14.3.2 Data Reduction 195
14.3.3 Data Visualization 195
14.3.4 Prediction Models 196
14.3.4.1 KNN (K-Nearest Neighbors) 196
14.3.4.2 ElasticNet Regression 196
14.3.4.3 Artificial Neural Networks 197
14.3.4.4 Random Forest 197
14.4 Proposed Approach 197
14.5 Result Analysis 199
14.6 Conclusion and Future Scope 202
14.6.1 Conclusion 202
14.6.2 Future Scope 202
References 203
Contents xiii

15 Motion Transfer in Videos using Deep Convolutional Generative


Adversarial Networks 205
Savitoj Singh, Bittoo Aggarwal, Vipin Bhardwaj and Anupam Kumar
15.1 Introduction 205
15.2 Related Work 206
15.3 Methodology 208
15.3.1 Pre-Processing 209
15.3.2 Pose Detection and Estimation 209
15.4 Pose to Video Translation 209
15.5 Results and Analysis 210
15.6 Conclusion and Future Scope 212
References 213
16 Twin Question Pair Classification 215
Ashish Sharma, Sachin Sourav Jha, Sahil Arora, Shubham Garg
and Sandeep Tayal
16.1 Introduction 215
16.2 Literature Survey 216
16.2.1 Duplicate Quora Questions Detection by Lei Guo,
Chong Li & Haiming Tian 216
16.2.2 Natural Language Understanding with the Quora Question Pairs
Dataset by Lakshay Sharma, Laura Graesser, Nikita Nangia,
Utku Evci 217
16.2.3 Duplicate Detection in Programming Question Answering
Communities by Wei Emma Zhang and Quan Z. Sheng,
Macquarie University 217
16.2.4 Exploring Deep Learning in Semantic Question Matching by
Arpan Poudel and Ashwin Dhakal 218
16.3 Methods Applied for Training 218
16.3.1 Count Vectorizer 218
16.3.2 TF-IDF Vectorizer 219
16.3.3 XG Boosting 220
16.3.4 Random Forest Classifier 222
16.4 Proposed Methodology 224
16.4.1 Data Collection 224
16.4.2 Data Analysis 224
16.4.3 Data Cleaning and Pre-Processing 224
16.4.4 Embedding 225
16.4.5 Feature Extraction 225
16.4.6 Data Splitting 225
16.4.7 Modeling 225
16.5 Observations 225
16.6 Conclusion 226
References 226
xiv Contents

17 Exploration of Pixel-Based and Object-Based Change Detection Techniques


by Analyzing ALOS PALSAR and LANDSAT Data 229
Amit Kumar Shakya, Ayushman Ramola and Anurag Vidyarthi
17.1 Introduction 229
17.2 Classification of Pixel-Based and Object-Based Change Detection Methods 231
17.2.1 Image Ratio 231
17.2.2 Image Differencing 232
17.2.3 Image Regression 233
17.2.4 Vegetation Index Differencing 233
17.2.5 Minimum Distance Classification 235
17.2.6 Maximum Likelihood Classification 235
17.2.7 Spectral Angle Mapper (SAM) 235
17.2.8 Support Vector Machine 236
17.3 Experimental Results 237
17.3.1 Omission Error 237
17.3.2 Commission Error 238
17.3.3 User Accuracy 238
17.3.4 Producer Accuracy 238
17.3.5 Overall Accuracy 238
17.4 Conclusion 242
Acknowledgment 242
References 242
18 Tracing Bad Code Smells Behavior Using Machine Learning
with Software Metrics 245
Aakanshi Gupta, Bharti Suri and Lakshay Lamba
18.1 Introduction 245
18.2 Related Work and Motivation 247
18.3 Methodology 248
18.3.1 Data Collection 248
18.3.2 Static Code Analysis 249
18.3.3 Sampling 250
18.3.4 Machine Learning Approach 251
18.4 Result Analysis and Manual Validation 251
18.5 Threats, Limitation and Conclusion 255
References 255
19 A Survey on Various Negation Handling Techniques in Sentiment Analysis 259
Sarita Bansal Garg and V.V. Subrahmanyam
19.1 Introduction 259
19.2 Methods for Negation Identification 261
19.2.1 Bag of Words 261
19.2.2 Contextual Valence Shifters 261
19.2.3 Semantic Relations 262
19.2.4 Relations and Dependency-Based or Syntactic-Based 264
19.3 Word Embedding 267
Contents xv

19.4 Conclusion 278


References 279
20 Mobile-Based Bilingual Speech Corpus 281
Nivedita Palia, Deepali Kamthania and Ashish Pahwa
20.1 Introduction 281
20.2 Overview of Multilingual Speech Corpus for Indian Languages 283
20.3 Methodology for Speech Corpus Development 283
20.3.1 Recording Setup 287
20.3.1.1 Text Selection 287
20.3.1.2 Speaker Selection 288
20.3.1.3 Device Selection 288
20.3.1.4 Recording Environment 289
20.3.2 Capturing 289
20.3.3 Segregation and Editing 289
20.3.3.1 Annotation 290
20.4 Description of Bilingual Speech Corpus 291
20.5 Conclusion and Future Scope 292
References 292
21 Intrusion Detection using Nature-Inspired Algorithms and
Automated Machine Learning 295
Vasudev Awatramani and Pooja Gupta
21.1 Introduction 295
21.2 Related Work 298
21.3 Methodology 300
21.3.1 Nature Inspired Algorithms for Feature Selection 300
21.3.2 Automated Machine Learning 301
21.3.3 Architecture Search using Bayesian Search 301
21.3.4 Hyperparameter Optimization Through Particle Swarm
Optimization (HPO-PSO) 303
21.4 Results 304
21.5 Conclusion 304
References 304

Part 3: Security and Blockchain 307


22 Distributed Ownership Model for Non-Fungible Tokens 309
Jaspreet Singh and Prashant Singh
22.1 Introduction 309
22.2 Background 310
22.2.1 Blockchain Technology 310
22.2.2 Ownership 311
22.3 Proposed Architecture 311
22.3.1 Overview 311
22.3.2 Implementation 312
22.3.3 Rationale for Smart Contract 313
xvi Contents

22.3.4 Smart Contract Tables 314


22.4 Use-Cases 315
22.4.1 Transaction Volume 316
22.4.2 Comparison Between NFT Tokens 317
22.5 Example Usage 318
22.5.1 Current Scenario 318
22.5.2 Solution by Distributed NFT 318
22.6 Results 320
22.7 Conclusion and Future Work 321
References 321
23 Comparative Analysis of Various Platforms of Blockchain 323
Nitin Mittal, Srishty Pal, Anjali Joshi, Ashish Sharma, Sandeep Tayal
and Yogesh Sharma
23.1 Introduction to Blockchain 323
23.2 Important Terms of Blockchain 325
23.2.1 Decentralization 325
23.2.2 Ledger 325
23.2.3 Consensus Algorithm 325
23.2.4 51% Attack 326
23.2.5 Merkle Tree 326
23.2.6 Cryptography 326
23.2.7 Smart Contract 326
23.3 Bitcoin or Blockchain 327
23.3.1 Primary Key and Public Key 327
23.3.2 Workflow of Bitcoin 327
23.4 Platforms of Blockchain 328
23.4.1 Ethereum 328
23.4.1.1 History 328
23.4.1.2 Ethereum and Bitcoin 328
23.4.1.3 Gas and Ether 329
23.4.1.4 Workflow 329
23.4.2 Hyperledger 329
23.4.2.1 Purpose of Introducing Hyperledger 330
23.4.2.2 Features 330
23.4.2.3 PBFT 330
23.4.2.4 Framework Use Cases 330
23.4.3 R3 Corda 331
23.4.3.1 History 331
23.4.3.2 Purpose 331
23.4.3.3 Corda vs Bitcoin 331
23.4.3.4 Consensus 332
23.4.4 Stellar 332
23.4.4.1 History 332
23.4.4.2 Assets and Anchors 332
23.4.4.3 Features 333
Contents xvii

23.4.4.4 Stellar Consensus 333


23.4.5 Multichain 333
23.4.5.1 History 333
23.4.5.2 Features 334
23.4.5.3 Consensus Algorithm for Multichain 334
23.4.5.4 Smart Filters 334
23.5 Blockchain Platforms and Comparative Analysis 334
23.6 Conclusion 338
References 338
24 Smart Garbage Monitoring System 341
Akshita Goel and Amita Goel
24.1 Introduction 341
24.2 Literature Review 343
24.3 System Design 344
24.4 System Specifications 345
24.4.1 Components 345
24.4.2 Simulation Tool 346
24.4.3 Analytics Tool 346
24.5 Circuit Diagram 346
24.6 Proposed Approach 347
24.7 Implementation 348
24.8 Result 352
24.9 Conclusion 352
24.10 Future Scope 352
References 353
25 Study of Various Intrusion Detection Systems: A Survey 355
Minakshi Chauhan and Mohit Agarwal
25.1 Introduction 355
25.2 Structure of IDS 356
25.3 Intrusion Detection Systems 356
25.3.1 Host-Based IDS (HIDS) 357
25.3.2 Network-Based IDS (NIDS) 357
25.3.3 Types of Network-Based Detection Technique 358
25.3.3.1 Signature-Based (or Pattern-Matching) Intrusion
Detection Systems (SIDS) 358
25.3.3.2 Anomaly-Based Intrusion Detection Systems (AIDS) 358
25.3.3.3 Hybrid Intrusion Detection System 358
25.4 Types of Attacks 359
25.5 Recent Improved Solutions to Intrusion Detection 360
25.5.1 Based on Data Mining and Machine Learning Methods 361
25.5.2 Knowledge-Based 361
25.5.3 Evolutionary Methods and Optimization Techniques 361
25.6 Analysis of Exiting IDS Based on Technique Used 361
xviii Contents

25.7 Analysis of Existing IDS in Different Domains 365


25.7.1 IDS for IoT 366
25.7.2 IDS in Cloud Computing Environment 367
25.7.3 IDS in Web Applications 367
25.7.4 IDS for WSN (Wireless Sensor Network) 368
25.8 Conclusion 368
References 368

Part 4: Communication and Networks 373


26 Green Communication Technology Management for Sustainability
in Organization 375
Shivangi Sahay and Anju Bharti
26.1 Introduction 375
26.2 Sustainability of Green ICT 378
26.3 Going Green and Sustainability 378
26.4 ICT: Green and Sustainability 379
26.5 Benefits: Green IT Practices 380
26.6 Management Perspective: Green IT 381
26.7 Biodegradable Device Components 381
26.8 Conclusion 384
References 385
27 A Means of Futuristic Communication: A Review 387
Vivek, Deepika Kukreja and Deepak Kumar Sharma
27.1 Introduction 387
27.1.1 Internet of Things 387
27.1.1.1 Characteristics of IoT 387
27.1.1.2 Different Forms of IoT 388
27.1.1.3 IoT Applications 388
27.1.1.4 Challenges in IoT 388
27.1.2 IoT and Cloud Computing 389
27.1.2.1 Issues With IoT Cloud Platforms 390
27.1.3 Fog Computing 390
27.1.3.1 Analysis of Data in Fog Computing 391
27.1.4 Edge Computing 391
27.1.5 Comparative Analysis of Cloud, Fog and Edge Computing 391
27.2 Literature Review 392
27.3 IoT Simulators 394
27.4 IoT Test Beds 394
27.5 Conclusion and Future Scope 396
References 397
28 Experimental Evaluation of Security and Privacy in GSM Network
Using RTL-SDR 401
Hardik Manocha, Utkarsh Upadhyay and Deepika Kumar
28.1 Introduction 401
Contents xix

28.2 Literature Review 402


28.3 Privacy in Telecommunication 403
28.4 A Take on User Privacy: GSM Exploitation 404
28.4.1 IMSI Catching 404
28.4.1.1 Active Attacks 405
28.4.1.2 Soft Downgrade to GSM 405
28.4.2 Eavesdropping 405
28.5 Experimental Setup 405
28.5.1 Hardware and Software 405
28.5.2 Implementation Algorithm and Procedure 405
28.6 Results and Analysis 406
28.7 Conclusion 410
References 410
29 A Novel Consumer-Oriented Trust Model in E-Commerce 413
Jyoti Malik and Suresh Kumar
29.1 Introduction 413
29.2 Literature Surveys 414
29.3 Trust Pyramid 415
29.3.1 Trust Scenarios 416
29.3.2 Statistics of E-Commerce 417
29.3.2.1 Case Study: Consumer Trust Violation 418
29.4 Categorization of E-Commerce in Different Spheres 418
29.4.1 Hyperlocal 418
29.4.2 Travel and Hospitality 419
29.4.3 Business to Customer (B2C) 419
29.4.4 Education Technology 419
29.4.5 Payments and Wallets 419
29.4.6 Business to Business (B2B) 419
29.4.7 Mobility 420
29.4.8 Financial Technology 420
29.4.9 Health Technology 420
29.4.10 Social Commerce 420
29.4.11 Gaming 420
29.4.12 Logistics Technology 421
29.4.13 Online Classified and Services 421
29.5 Categorization of E-Commerce in Different Spheres and Investment
in Last Five Years 421
29.6 Proposed Model 422
29.6.1 Different Components of Web Trust Model 422
29.6.2 A Novel Consumer-Oriented Trust Model 422
29.7 Conclusion 424
References 424
xx Contents

30 Data Mining Approaches for Profitable Business Decisions 427


Harshita Belwal, Sandeep Tayal, Yogesh Sharma and Ashish Sharma
30.1 Introduction to Data Mining and Business Intelligence 427
30.2 Outline of Data Mining and BI 428
30.2.1 CRISP-DM 430
30.3 Leading Techniques used for Data Mining in BI 431
30.3.1 Classification Analysis 431
30.3.2 Clustering 431
30.3.3 Regression Analysis 431
30.3.4 Anomaly Detection 432
30.3.5 Induction Rule 432
30.3.6 Summarization 432
30.3.7 Sequential Patterns 432
30.3.8 Decision Tree 433
30.3.9 Neural Networks 433
30.3.10 Association Rule Mining 433
30.4 Some Implementations of Data Mining in Business 434
30.4.1 Banking and Finance 434
30.4.2 Relationship Management 434
30.4.3 Targeted Marketing 434
30.4.4 Fraud Detection 435
30.4.5 Manufacturing and Production 435
30.4.6 Market Basket Analysis 435
30.4.7 Propensity to Buy 435
30.4.8 Customer Profitability 435
30.4.9 Customer Attrition and Channel Optimization 436
30.5 Tabulated Attributes of Popular Data Mining Technique 436
30.5.1 Classification Analysis 436
30.5.2 Clustering 436
30.5.3 Anomaly or Outlier Detection 438
30.5.4 Regression Analysis 438
30.5.5 Induction Rule 438
30.5.6 Summarization 438
30.5.7 Sequential Pattern 439
30.5.8 Decision Tree 439
30.5.9 Neural Networks 439
30.5.10 Association Rule Learning 439
30.6 Conclusion 440
References 440

Part 5: Latest Trends in Sustainable Computing Techniques 443


31 Survey on Data Deduplication Techniques for Securing Data in
Cloud Computing Environment 445
Ashima Arya, Vikas Kuchhal and Karan Gulati
31.1 Cloud Computing 445
Contents xxi

31.1.1 Introduction 445


31.1.2 Cloud Computing Features 446
31.1.3 Services Provided by Cloud Computing 446
31.1.4 Types of Clouds Based on Deployment Model 447
31.1.5 Cloud Computing Security Challenges 447
31.1.5.1 Infrastructure-as-a-Service (IaaS) 447
31.1.5.2 Platform-as-a-Service (PaaS) 449
31.1.5.3 Software-as-a-Service (SaaS) 449
31.1.5.4 Hardware-as-a-Service (HaaS) 450
31.1.5.5 Data-as-a-Service (DaaS) 450
31.2 Data Deduplication 451
31.2.1 Data Deduplication Introduction 451
31.2.2 Key Design Criteria for Deduplication Techniques 451
31.2.2.1 Information Granularity 451
31.2.2.2 Deduplication Area 452
31.2.2.3 System Architecture 452
31.2.2.4 Duplicate Check Boundary 453
31.3 Literature Review 453
31.4 Assessment Rules of Secure Deduplication Plans 454
31.5 Open Security Problems and Difficulties 455
31.5.1 Data Ownership the Board 455
31.5.2 Achieving Semantically Secure Deduplication 456
31.5.3 POW in Decentralized Deduplication Structures 456
31.5.4 New Security Risks on Deduplication 457
31.6 Conclusion 457
References 457
32 Procedural Music Generation 461
Punya Aachman, Piyush Aggarwal and Pushkar Goel
32.1 Introduction 461
32.2 Related Work 462
32.3 Experimental Setup 463
32.4 Methodology 463
32.5 Result 465
32.6 Conclusion 467
References 467
33 Detecting Photoshopped Faces Using Deep Learning 469
Siddharth Aggarwal and Ajay Kumar Tiwari
33.1 Introduction 469
33.2 Related Literature 471
33.3 Dataset Generation 472
33.3.1 Generating Dataset of Fake Images 473
33.4 Methodolody 476
33.4.1 Details of the Training Procedure 477
33.5 Results 478
33.6 Conclusion 479
xxii Contents

33.7 Future Scope 479


References 479
34 A Review of SQL Injection Attack and Various Detection Approaches 481
Neha Bhateja, Dr. Sunil Sikka and Dr. Anshu Malhotra
34.1 Introduction 481
34.2 SQL Injection Attack and Its Types 483
34.3 Literature Survey 484
34.4 Summary 487
34.5 Conclusion 488
References 488
35 Futuristic Communication Technologies 491
Sanika Singh, Aman Anand, Shubham Sharma, Tanupriya Choudhury
and Saurabh Mukherjee
35.1 Introduction 491
35.2 Types of Communication Medium 493
35.2.1 Wired Medium 493
35.3 Types of Wired Connections 493
35.3.1 Implementation of Wired (Physical Mode) Technology 494
35.3.2 Limitations of Wired Technology 494
35.4 Wireless Communication 495
35.4.1 Types of Wireless Technology 495
35.4.2 Applications of Wireless Technology 497
35.4.3 Limitations of Wireless Technology 497
35.5 Optical Fiber Communication 497
35.5.1 Types of Optical Fiber Communication 497
35.5.2 Applications of Optical Fiber Communication 498
35.5.3 Limitations of Optical Fiber Communication 498
35.6 Radar Communication 498
35.6.1 Types of Radar Communication 499
35.6.2 Applications of RADAR Communication 500
35.6.3 Limitations of RADAR Communication 500
35.7 Green Communication Technology, Its Management and Its Sustainability 500
35.8 Space Air Ground Integrated Communication 502
35.9 Ubiquitous Communication 503
35.10 Network Planning, Management, Security 504
35.11 Cognitive Radio Communication 506
35.12 Types of Cognitive Radio Communication 507
35.13 Next Generation Communications and Applications 507
35.14 Smart Energy Management 508
References 509
36 An Approach for Load Balancing Through Genetic Algorithm 511
Mahendra Pratap Yadav, Harishchandra A. Akarte
and Dharmendra Kumar Yadav
36.1 Introduction 511
Contents xxiii

36.2 Motivation 512


36.3 Background and Related Technology 513
36.3.1 Load Balancing 513
36.3.2 Load Balancing Metrics 514
36.3.3 Classification of Load Balancing Algorithms 515
36.4 Related Work 516
36.5 Proposed Solution 518
36.5.1 Genetic Algorithm 518
36.5.2 Flowchart of Proposed Strategy 519
36.6 Experimental Setup and Results Analysis 520
36.6.1 Data Pre-Processing 520
36.6.2 Experimental Setup 520
36.6.3 Result Analysis 521
36.7 Conclusion 523
References 523
Index 525
Preface

This book covers emerging computational and knowledge transfer approaches, optimizing
solutions in varied disciplines of science, technology and healthcare. The idea behind com-
piling this work is to familiarize researchers, academicians, industry persons and students
with various applications of intelligent techniques for producing sustainable, cost-effective
and robust solutions of frequently encountered complex, real-world problems in engineer-
ing and science disciplines.
The chapters include the list of topics that spans all the areas of smart intelligent sys-
tems and computing such as: Data Mining with Soft Computing, Evolutionary Computing,
Quantum Computing, Expert Systems, Next Generation Communication, Blockchain
and Trust Management, Intelligent Biometrics, Multi-Valued Logical Systems, Cloud
Computing and security etc. An extensive list of bibliographic references at the end of each
chapter guides the reader to probe further into application area of interest to him/her.

Organization of the Book


The complete book is organized into 36 Chapters. A brief description of each of the chapters
is presented as follows:
Chapter 1 proposes to improve the residual block architecture to define a modified
residual dense block with the addition of the batch-normalization layer and secondly &
improvised the Perceptual loss function according to our GAN. After these two changes,
the authors introduce a new GAN based architecture for the Single Image Super-Resolution
task for higher up-sampling levels.
Chapter 2 proposes a solution to google landmark recognition challenge 2019 hosted on
Kaggle and an intuition for facilitating a tour guide recommender engine and visualization
using method attempts to predict landmarks using CNN, pre-trained with VGG16 neural
network used with transfer learning from ImageNet.
Chapter 3 suggests that Neural Network Models specifically CNN performed way better
than other models with some fine-tuning for classification of 200 species of birds with an
accuracy of 86.5%.
Chapter 4 proposes the use of Advance Image Processing Techniques and OpenCV func-
tions to detect lanes on a public road along with calculating the radius of curvature of the
lane and vehicle position in respect to the road lane i.e. central offset. In this paper, the front
facing camera on the hood of the car is used for recording the video of the road in front of
the car and feeding that video in the algorithm for better predictions of the road area. Used

xxv
xxvi Preface

techniques like Search from Prior and Sliding window to create a more efficient and accu-
rate algorithm better than previous approaches.
Chapter 5 proposes a methodology to detect human and animated faces in real time
video and images. The facial expression would then be classified six basic emotions- happy,
surprise, fear, anger, sad, disgust and a neutral face.
Chapter 6 proposes a system that does not segment the input of images, but rather the
layers extract relevant features from the scanned images fed as input. Compared with previ-
ous systems for handwritten text recognition, the given architecture is end-to-end trainable
and does not require different components to be trained separately. It naturally handles
sequences in random lengths, involving no horizontal scale normalization or character seg-
mentation. The model is smaller yet effective, thus, more practical for application in real-
world scenarios.
Chapter 7 presents a machine learning modelled system able to analyse the image of an
automobile captured by a camera, detect the registration plate and identify the registration
number of the automobile. The algorithm also accepts live feed videos and pre-recorded
videos, which are broken into frames. This system was made to solve security problems
which exist in residential buildings, societies, parking areas and other institutions and areas
where the pre-existing security systems cannot be installed.
Chapter 8 presents the finding of the best algorithm that can be used to predict the dis-
ease or chances that the disease can occur in the person.
Chapter 9 build a model which is combination of CNN model classification problem (to
predict whether the subject has brain tumor or not) & Computer Vision problem (to auto-
mate the process of brain cropping from MRI scans). VGG-16 model architecture is used
for feature extraction, which along with other features is fed as input to an Artificial Neural
Network classifier through transfer learning. Binary Classifier classifies the input images as
either 0 (No tumor) or 1 (Tumor exists).
Chapter 10 discusses the challenges faced in understanding the gestures of deaf and mute
people in India and identified the need for a proper translator arises.
Chapter 11 designs a heterogeneous 3-Dimensional mesh (or network) to co-train 3
dimensional medical images dataset so as to make a series of pre-trained classifiers.
Chapter 12 explores a simpler approach to recommender systems that are fairly easy to
use for small scale e- retail websites.
Chapter 13 discusses the recommendations to users on the basis of various user pref-
erences while interacting with a social media platform, such as the gender, age, number
of meetups, the skills and ratings of user profiles, image quality. All are taken into consid-
eration to provide the ultimate user recommendation possible to make the software more
relevant and user centric with recommendations strictly based on the way a given user
interacts with the platform.
Chapter 14 discusses and compares the various machine learning algorithms applied to
predict the literacy rate of various states.
Chapter 15 discusses an approach for video to video translation using various poses gen-
erated in the frames of video for translation. The approach makes use of Pose Generation
Convolutional Neural Network to synthesize arbitrary poses from source videos and
train the pix2pix - DCGAN which is a conditional generative adversarial network con-
sisting of multi scale discriminator and generator for target video frames generation. It
uses PatchGAN loss, VGG loss and Feature Matching Loss function for improving and
Preface xxvii

optimizing models. The presented approach provides compelling results of the generated
DCGAN model with the discriminator loss of 0.0003 and generator loss of 5.8206.
Chapter 16 compares different classification and boosting algorithms like Count
Vectorizer with xG Gradient Boosting, TF-IDF Vectorizer with xG Gradient Boosting,
Logistic Regression, and Random Forest.
Chapter 17 discusses development of traditional pixel-based methods and ends with the
evolution of the latest object-based change detection techniques. LANDSAT and PALSAR
images are used to represent the changes developed in the land use/land cover using
­pixel-based and object-based approaches.
Chapter 18 presents a study of four different machine learning algorithms namely J48,
JRip, Random Forest and Naive Bayes, to detect three types of bad smells God Class, Long
Method and Feature Envy. The results demonstrated that the machine learning algorithms
achieved high accuracy with the validation method of 10-fold cross-validation.
Chapter 19 discusses the work done by the different researchers for identification of
the negation’s cues and their scope. Chapter is organized according to the different feature
selection methods employed and how different researchers contributed to this.
Chapter 20 describes the methodology and experimental setup used for the genera-
tion and development of bilingual speech corpus. Continuous and spontaneous (discrete)
speech samples from both languages are collected on different mobile phones in a real-time
environment, unlike studio environments. A brief comparative study of 18 readily available
multilingual speech corpus developed for Indian languages is made against the proposed
corpus. An annotation scheme is discussed to carry out further study how the recognition
rate varies on the basis of language, device, text, and utterance.
Chapter 21 focuses on building an Intelligent Intrusion Detection System utilizing a
blend of Nature Inspired Heuristics and Automated Machine Learning. The study applies
Evolutionary Algorithms for feature selection as well as Hyperparameter Optimization.
Moreover, the research explores Bayesian Search for Neural Architecture Search to estimate
the ideal architecture of an artificial neural network (ANN).
Chapter 22 introduces the concept of distributed ownership of any digital asset (NFT)
amongst many people in the form of percentage shares. Distributed NFT (dNFT), holds
the properties of NFTs as well as it can be traded in the form of percentage shares as in real
world. Each digital asset in this model is validated by the validators who act as a trust entity
in the system. Hence, it is authentic, verifiable and acts as real market place for all types of
digital assets.
Chapter 23 compares 5 most popular blockchain platforms on the basis of 21 different
attributes concluded with a summary of different platforms and some suggestions for most
commonly and widely used blockchain platforms.
Chapter 24 discusses how the installation of smart bins will contribute towards an
enhanced waste management system that will create a circular economy coupled with evolv-
ing production and consumption behavior while minimizing the environmental impact.
Chapter 25 discusses the structure of IDS; different types of intrusion detection tech-
niques and various types of attacks and compare various intrusion detection systems based
on techniques used, various parameters of detection performance and their use in different
domains.
Chapter 26 features increasing demand for green communication technology in telecom
and IT industry for better energy efficiency.
Another random document with
no related content on Scribd:
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project
Gutenberg™ works in compliance with the terms of this
agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms
of this agreement by keeping this work in the same format with
its attached full Project Gutenberg™ License when you share it
without charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it
away or re-use it under the terms of the Project Gutenberg
License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country where
you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of the
copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite
these efforts, Project Gutenberg™ electronic works, and the
medium on which they may be stored, may contain “Defects,”
such as, but not limited to, incomplete, inaccurate or corrupt
data, transcription errors, a copyright or other intellectual
property infringement, a defective or damaged disk or other
medium, a computer virus, or computer codes that damage or
cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES -


Except for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU
AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE,
STRICT LIABILITY, BREACH OF WARRANTY OR BREACH
OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE
TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER
THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR
ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE
OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF
THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If


you discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person or
entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR
ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you do
or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status by
the Internal Revenue Service. The Foundation’s EIN or federal
tax identification number is 64-6221541. Contributions to the
Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.

The Foundation’s business office is located at 809 North 1500


West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws


regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or
determine the status of compliance for any particular state visit
www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states


where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot


make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.

Please check the Project Gutenberg web pages for current


donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
credit card donations. To donate, please visit:
www.gutenberg.org/donate.

Section 5. General Information About Project


Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.

Project Gutenberg™ eBooks are often created from several


printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.
back

You might also like