You are on page 1of 54

Advances in Computer Communication

and Computational Sciences:


Proceedings of IC4S 2018 Sanjiv K.
Bhatia
Visit to download the full and correct content document:
https://textbookfull.com/product/advances-in-computer-communication-and-computati
onal-sciences-proceedings-of-ic4s-2018-sanjiv-k-bhatia/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Advances in Computer Communication and Computational


Sciences Proceedings of IC4S 2019 Sanjiv K. Bhatia

https://textbookfull.com/product/advances-in-computer-
communication-and-computational-sciences-proceedings-of-
ic4s-2019-sanjiv-k-bhatia/

Advances in Computer Communication and Computational


Sciences: Proceedings of IC4S 2017, Volume 1 Sanjiv K.
Bhatia

https://textbookfull.com/product/advances-in-computer-
communication-and-computational-sciences-proceedings-of-
ic4s-2017-volume-1-sanjiv-k-bhatia/

Advances in Communication, Devices and Networking:


Proceedings of ICCDN 2018 Rabindranath Bera

https://textbookfull.com/product/advances-in-communication-
devices-and-networking-proceedings-of-iccdn-2018-rabindranath-
bera/

Computational Advancement in Communication Circuits and


Systems Proceedings of ICCACCS 2018 Koushik Maharatna

https://textbookfull.com/product/computational-advancement-in-
communication-circuits-and-systems-proceedings-of-
iccaccs-2018-koushik-maharatna/
Advances in Communication and Computational Technology
Select Proceedings of ICACCT 2019 Gurdeep Singh Hura

https://textbookfull.com/product/advances-in-communication-and-
computational-technology-select-proceedings-of-
icacct-2019-gurdeep-singh-hura/

Advances in Computational Intelligence and


Communication Technology Proceedings of CICT 2019 Xiao-
Zhi Gao

https://textbookfull.com/product/advances-in-computational-
intelligence-and-communication-technology-proceedings-of-
cict-2019-xiao-zhi-gao/

Advances in Computational Intelligence Proceedings of


Second International Conference on Computational
Intelligence 2018 Sudip Kumar Sahana

https://textbookfull.com/product/advances-in-computational-
intelligence-proceedings-of-second-international-conference-on-
computational-intelligence-2018-sudip-kumar-sahana/

Advances in VLSI Communication and Signal Processing


Select Proceedings of VCAS 2018 Debashis Dutta

https://textbookfull.com/product/advances-in-vlsi-communication-
and-signal-processing-select-proceedings-of-vcas-2018-debashis-
dutta/

Advances in Information and Communication Networks:


Proceedings of the 2018 Future of Information and
Communication Conference (FICC), Vol. 1 Kohei Arai

https://textbookfull.com/product/advances-in-information-and-
communication-networks-proceedings-of-the-2018-future-of-
information-and-communication-conference-ficc-vol-1-kohei-arai/
Advances in Intelligent Systems and Computing 924

Sanjiv K. Bhatia
Shailesh Tiwari
Krishn K. Mishra
Munesh C. Trivedi Editors

Advances in
Computer
Communication
and Computational
Sciences
Proceedings of IC4S 2018
Advances in Intelligent Systems and Computing

Volume 924

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, Electronic Engineering, University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen, Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156


Sanjiv K. Bhatia Shailesh Tiwari
• •

Krishn K. Mishra Munesh C. Trivedi


Editors

Advances in Computer
Communication
and Computational Sciences
Proceedings of IC4S 2018

123
Editors
Sanjiv K. Bhatia Shailesh Tiwari
Department of Mathematics CSED
and Computer Science ABES Engineering College
University of Missouri–St. Louis Ghaziabad, Uttar Pradesh, India
St. Louis, MO, USA

Krishn K. Mishra Munesh C. Trivedi


Department of Computer Science Department of Information Technology
and Engineering Rajkiya Engineering College
Motilal Nehru National Institute Azamgarh, Uttar Pradesh, India
of Technology
Allahabad, Uttar Pradesh, India

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-981-13-6860-8 ISBN 978-981-13-6861-5 (eBook)
https://doi.org/10.1007/978-981-13-6861-5

Library of Congress Control Number: 2019932704

© Springer Nature Singapore Pte Ltd. 2019


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface

IC4S is a major multidisciplinary conference organized with the objective of


bringing together researchers, developers, and practitioners from academia and
industry working in all areas of computer and computational sciences. It is orga-
nized specifically to help the computer industry to derive the advances of
next-generation computer and communication technology. Researchers invited to
speak will present the latest developments and technical solutions.
Technological developments all over the world are dependent upon globalization
of various research activities. Exchange of information and innovative ideas is
necessary to accelerate the development of technology. Keeping this ideology in
preference, the International Conference on Computer, Communication and
Computational Sciences (IC4S 2018) was organized at Mandarin Hotel Bangkok,
Bangkok, Thailand, during October 20–21, 2018.
This is the third time the International Conference on Computer, Communication
and Computational Sciences has been organized with a foreseen objective of
enhancing the research activities at a large scale. Technical Program Committee and
Advisory Board of IC4S include eminent academicians, researchers, and practi-
tioners from abroad as well as from all over the nation.
In this book, selected manuscripts have been subdivided into various tracks
named—Intelligent Hardware and Software Design, Advanced Communications,
Intelligent Computing Techniques, Web and Informatics, and Intelligent Image
Processing. A sincere effort has been made to make it an immense source of
knowledge for all, and this book includes 64 manuscripts. The selected manuscripts
went through a rigorous review process and are revised by authors after incorpo-
rating the suggestions of the reviewers.
IC4S 2018 received around 350 submissions from around 550 authors of
15 different countries such as USA, Iceland, China, Saudi Arabia, South Africa,
Taiwan, Malaysia, Indonesia, and Europe. Each submission went through the
plagiarism check. On the basis of plagiarism report, each submission was rigorously
reviewed by at least two reviewers with an average of 2.7 per reviewer. Even some
submissions have more than two reviews. On the basis of these reviews,

v
vi Preface

64 high-quality papers were selected for publication in this proceedings volume,


with an acceptance rate of 18.28%.
We are thankful to the keynote speakers—Prof. Raija Halonen, University of
Oulu, Finland; Dr. K. K. Mishra, University of Missouri, St. Louis, USA;
Mr. Aninda Bose, Senior Editor, Springer Nature, to enlighten the participants with
their knowledge and insights. We are also thankful to delegates and the authors for
their participation and their interest in IC4S 2018 as a platform to share their ideas
and innovation. We are also thankful to Prof. Dr. Janusz Kacprzyk, Series Editor,
AISC, Springer, for providing guidance and support. Also, we extend our heartfelt
gratitude to the reviewers and Technical Program Committee members for showing
their concern and efforts in the review process. We are indeed thankful to everyone
directly or indirectly associated with the Organizing Committee of the conference,
leading it toward the success.
Although utmost care has been taken in compilation and editing, a few errors
may still occur. We request the participants to bear with such errors and lapses
(if any). We wish you all the best.

Bangkok, Thailand Organizing Committee


IC4S 2018
About This Book

With the advent of technology, intelligent and soft computing techniques came into
existence with a wide scope of implementation in engineering sciences. Nowadays,
technology is changing with a speedy pace and innovative proposals that solve the
engineering problems intelligently are gaining popularity and advantages over the
conventional solutions to these problems. It is very important for the research
community to track the latest advancements in the field of computer sciences.
Keeping this ideology in preference, this book includes the insights that reflect the
‘Advances in Computer and Computational Sciences’ from upcoming researchers
and leading academicians across the globe. It contains the high-quality
peer-reviewed papers of ‘International Conference on Computer, Communication
and Computational Sciences’ (IC4S 2018), held during October 20–21, 2018, at
Mandarin Hotel Bangkok, Bangkok, Thailand. These papers are arranged in the
form of chapters. The content of this book is divided into five broader tracks that
cover a variety of topics. These tracks are: Intelligent Hardware and Software
Design, Advanced Communications, Intelligent Computing Technologies, Web and
Informatics, and Intelligent Image Processing. This book helps the prospective
readers from computer and communication industry and academia to derive the
immediate surroundings’ developments in the field of communication and computer
sciences and shape them into real-life applications.

vii
Contents

Part I Intelligent Hardware and Software Design


Software Architecture Decision-Making Practices
and Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Md. Monzur Morshed, Mahady Hasan and M. Rokonuzzaman
Abstraction in Modeling and Programming with Associations:
Instantiation, Composition and Inheritance . . . . . . . . . . . . . . . . . . . . . . 11
Bent Bruun Kristensen
Ensuring Compliance with Sprint Requirements in SCRUM . . . . . . . . . 33
Manuel Pastrana, Hugo Ordóñez, Ana Rojas and Armando Ordoñez
Remote Collaborative Live Coding in SuperCollider-Based
Environments via Open Sound Control Proxy . . . . . . . . . . . . . . . . . . . . 47
Poonna Yospanya
A Collaborative Model for Customer Retention on User Service
Experience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Pushpa Singh and Vishwas Agrawal
Smart Services for Smart Cities: New Delhi Versus Jaipur . . . . . . . . . . 65
Devesh Kumar Srivastava
Global Terrorism Predictive—Analysis . . . . . . . . . . . . . . . . . . . . . . . . . 77
Sandeep Chaurasia, Vinayak Warikoo and Shanu Khan

Part II Advanced Communications


Effect of Constraint Variation on the Efficiency of Protocols
Under Realistic Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Prem Chand Vashist, Ashish Tripathi and Pushpa Choudhary

ix
x Contents

Performance Evaluation of OLSR-MD Routing Protocol


for MANETS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Rachna Jain and Indu Kashyap
Privacy Attack Modeling and Risk Assessment Method
for Name Data Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Vishwa Pratap Singh and R. L. Ujjwal
Analysis of Classification Methods Based on Radio Frequency
Fingerprint for Zigbee Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Jijun Wang, Ling Zhuang, Weihua Cheng, Chao Xu, Xiaohu Wu
and Zheying Zhang
To Identify Visible or Non-visible-Based Vehicular Ad Hoc Networks
Using Proposed BBICR Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Kallam Suresh, Patan Rizwan, Balusamy Balamurugan,
M. Rajasekharababu and S. Sreeji
Energy Efficient Improved SEP for Routing in Wireless Sensor
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Deepak Kumar Sharma, Siddhant Bagga and Rishabh Rastogi

Part III Intelligent Computing Technologies


SVM Hyperparameter Optimization Using a Genetic Algorithm
for Rub-Impact Fault Diagnosis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Alexander Prosvirin, Bach Phi Duong and Jong-Myon Kim
Adaptive Credit Card Fraud Detection Techniques Based on Feature
Selection Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Ajeet Singh and Anurag Jain
Emousic: Emotion and Activity-Based Music Player Using Machine
Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Pranav Sarda, Sushmita Halasawade, Anuja Padmawar
and Jagannath Aghav
Extra-Tree Classifier with Metaheuristics Approach for Email
Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Aakanksha Sharaff and Harshil Gupta
A Parametric Method for Knowledge Measure of Intuitionistic
Fuzzy Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Zhen-hua Zhang, Shen-guo Yuan, Chao Ma, Jin-hui Xu and Jing Zhang
Hybrid PPSO Algorithm for Scheduling Complex
Applications in IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Komal Middha and Amandeep Verma
Contents xi

Skyline Probabilities with Range Query on Uncertain Dimensions . . . . . 225


Nurul Husna Mohd Saad, Hamidah Ibrahim, Fatimah Sidi
and Razali Yaakob
KDD-Based Decision Making: A Conceptual Framework Model
for Maternal Health and Child Immunization Databases . . . . . . . . . . . . 243
Sourabh Shastri and Vibhakar Mansotra
An Efficient Detection of Malware by Naive Bayes Classifier
Using GPGPU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Sanjay K. Sahay and Mayank Chaudhari
Content-Based Audio Classification and Retrieval Using
Segmentation, Feature Extraction and Neural Network Approach . . . . . 263
Nilesh M. Patil and Milind U. Nemade
Information Extraction from Natural Language Using Universal
Networking Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Aloke Kumar Saha, M. F. Mridha, Jahir Ibna Rafiq and Jugal K. Das
On the Knowledge-Based Dynamic Fuzzy Sets . . . . . . . . . . . . . . . . . . . . 293
Rolly Intan, Siana Halim and Lily Puspa Dewi
Analysis and Discussion of Radar Construction Problems
with Greedy Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Wenrong Jiang
Multilevel ML Assistance to High Efficiency Video Coding . . . . . . . . . . 313
Chhaya Shishir Pawar and SudhirKumar D. Sawarkar
Recognizing Hand-Woven Fabric Pattern Designs
Based on Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Wichai Puarungroj and Narong Boonsirisumpun
Learning Curve as a Knowledge-Based Dynamic Fuzzy Set:
A Markov Process Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Siana Halim, Rolly Intan and Lily Puspa Dewi
Human Body Shape Clustering for Apparel Industry
Using PCA-Based Probabilistic Neural Network . . . . . . . . . . . . . . . . . . 343
YingMei Xing, ZhuJun Wang, JianPing Wang, Yan Kan, Na Zhang
and XuMan Shi
Predicting the Outcome of H-1B Visa Eligibility . . . . . . . . . . . . . . . . . . 355
Prateek and Shweta Karun
Dynamic Neural Network Model of Speech Perception . . . . . . . . . . . . . 365
Marius Crisan
xii Contents

Leakage Detection of Water-Induced Pipelines Using Hybrid Features


and Support Vector Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Thang Bui Quy and Jong-Myon Kim
Large-Scale Meta-Analysis of Genes Encoding Pattern
in Wilson’s Disease . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
Diganta Misra, Anurag Tiwari and Amrita Chaturvedi
A Dynamic Weight Grasshopper Optimization Algorithm
with Random Jumping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Ran Zhao, Hong Ni, Hangwei Feng and Xiaoyong Zhu
Simulation Model and Scenario to Increase Corn Farmers’
Profitability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Erma Suryani, Rully Agus Hendrawan, Lukman Junaedi
and Lily Puspa Dewi
Comparison of Bayesian Networks for Diabetes Prediction . . . . . . . . . . 425
Kanogkan Leerojanaprapa and Kittiwat Sirikasemsuk

Part IV Web and Informatics


A Survey on the Detection of Android Malicious Apps . . . . . . . . . . . . . 437
Sanjay K. Sahay and Ashu Sharma
A Survey on Visualization Techniques Used for Big
Data Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Sumit Hirve and C. H. Pradeep Reddy
User Behaviour-Based Mobile Authentication System . . . . . . . . . . . . . . 461
Adnan Bin Amanat Ali, Vasaki Ponnusamay and Anbuselvan Sangodiah
Cyber Social Media Analytics and Issues: A Pragmatic Approach
for Twitter Sentiment Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
Sanur Sharma and Anurag Jain
Internet of Things for Epidemic Detection: A Critical Review . . . . . . . . 485
S. A. D. S. Kaushalya, K. A. D. T. Kulawansa and M. F. M. Firdhous
Semantic Recognition of Web Structure to Retrieve Relevant
Documents from Google by Formulating Index Term . . . . . . . . . . . . . . 497
Jinat Ara and Hanif Bhuiyan
An Effective and Cost-Based Framework for a Qualitative Hybrid
Data Deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Charles R. Haruna, MengShu Hou, Moses J. Eghan,
Michael Y. Kpiebaareh and Lawrence Tandoh
Contents xiii

Ontology-Based Natural Language Processing for Thai Herbs


and Thai Traditional Medicine Recommendation System
Supporting Health Care and Treatments (THMRS) . . . . . . . . . . . . . . . . 521
Akkasit Sittisaman and Naruepon Panawong
Tourism Web Filtering and Analysis Using Naïve Bay with Boundary
Values and Text Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
Naruepon Panawong and Akkasit Sittisaman
One Novel Word Segmentation Method Based on N-Shortest Path
in Vietnamese . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
Xiaohua Ke, Haijiao Luo, JiHua Chen, Ruibin Huang and Jinwen Lai
The Analysis of Student Performance Using Data Mining . . . . . . . . . . . 559
Leo Willyanto Santoso and Yulia
Efficient CP-ABE Scheme for IoT CCN Based on ROBDD . . . . . . . . . . 575
Eric Affum, Xiasong Zhang, Xiaofen Wang and John Bosco Ansuura
Authority-Based Ranking in Propaganda Summary Generation
Considering Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
Kun Lang, Wei Han, Tong Li and Zhi Cai
A Concept to Improve Care for People with Dementia . . . . . . . . . . . . . 603
Mary Sio Lai Karppinen, Jori Karppinen and Raija Halonen
Analysis of Centrality Concepts Applied to Real-World
Big Graph Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
Soyeon Oh, Kyeongjoo Kim and Minsoo Lee
How Does Grooming Fit into Social Engineering? . . . . . . . . . . . . . . . . . 629
Patricio Zambrano, Jenny Torres and Pamela Flores

Part V Intelligent Image Processing


Towards Improving Performance of Sigma Filter . . . . . . . . . . . . . . . . . 643
Mayank Tiwari, Subir Singh Lamba and Bhupendra Gupta
Video-Based Facial Expression Recognition Using a Deep
Learning Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653
Mahesh Jangid, Pranjul Paharia and Sumit Srivastava
Zernike Moment-Based Facial Expression Recognition
Using Two-Staged Hidden Markov Model . . . . . . . . . . . . . . . . . . . . . . . 661
Mayur Rahul, Rati Shukla, Dinesh Kumar Yadav and Vikash Yadav
Automated Facial Micro-expression Recognition Using Local Binary
Patterns on Three Orthogonal Planes with Boosted Classifiers:
A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671
Kennedy Chengeta
xiv Contents

Identification of Emotional States and Their Potential . . . . . . . . . . . . . . 687


Jan Francisti and Zoltan Balogh
Effects of a Spectral Window on Frequency Domain
HRV Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697
Jeom Keun Kim and Jae Mok Ahn
Effects of Heart Rate on Results of HRV Analysis . . . . . . . . . . . . . . . . . 711
Jae Mok Ahn and Jeom Keun Kim
Review of Camera Calibration Algorithms . . . . . . . . . . . . . . . . . . . . . . . 723
Li Long and Shan Dongri
Breast Cancer Prediction: Importance of Feature Selection . . . . . . . . . . 733
Prateek
Enactment of LDPC Code Over DVB-S2 Link System
for BER Analysis Using MATLAB . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743
Shariq Siraj Uddin Ghouri, Sajid Saleem and Syed Sajjad Haider Zaidi
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 751
About the Editors

Sanjiv K. Bhatia received his Ph.D. in Computer Science from the University of
Nebraska, Lincoln, USA in 1991. He presently works as a Professor and Graduate
Director (Computer Science) at the University of Missouri, St.Louis, USA. His
primary areas of research include image databases, digital image processing, and
computer vision. In addition to publishing over 40 articles in these areas, he has
consulted extensively with industry for commercial and military applications of
computer vision. He is an expert on system programming and has worked on
real-time and embedded applications. He has taught a broad range of courses in
computer science and was the recipient of the Chancellor’s Award for Excellence in
Teaching in 2015. He is a senior member of ACM.

Shailesh Tiwari currently works as a Professor at the Department of Computer


Science and Engineering, ABES Engineering College, Ghaziabad, India. He is an
alumnus of Motilal Nehru National Institute of Technology Allahabad, India. His
primary areas of research are software testing, implementation of optimization
algorithms and machine learning techniques in software engineering. He has
authored more than 50 publications in international journals and the proceedings of
leading international conferences. He also serves as an editor for various Scopus,
SCI and E-SCI-indexed journals and has organized several international confer-
ences under the banner of the IEEE and Springer. He is a senior member of the
IEEE and a member of the IEEE Computer Society.

Krishn K. Mishra is currently working as an Assistant Professor at the


Department of Computer Science and Engineering, Motilal Nehru National Institute
of Technology Allahabad, India. He has also been a Visiting Faculty at the
Department of Mathematics and Computer Science, University of Missouri,
St. Louis, USA. His primary areas of research include evolutionary algorithms,
optimization techniques and design, and analysis of algorithms. He has also
authored more than 50 publications in international journals and the proceedings of

xv
xvi About the Editors

leading international conferences. He currently serves as a program committee


member of several conferences and an editor for various Scopus and SCI-indexed
journals.

Munesh C. Trivedi is currently an Associate Professor at the Department of


Information Technology, Rajkiya Engineering College, Azamgarh, India and also
Associate Dean-UG Programs, Dr. APJ Abdul Kalam Technical University,
Lucknow. He has published 20 textbooks and 95 research papers in various
international journals and in the proceedings of leading international conferences.
He has received young scientist and numerous other awards from different national
and international forums. He currently serves on the review panel of the IEEE
Computer Society, International Journal of Network Security, and Computer &
Education (Elsevier). He is a member of the executive committee of the IEEE UP
Section, IEEE India Council and also the IEEE Asia Pacific Region 10.
Part I
Intelligent Hardware and Software Design
Software Architecture Decision-Making
Practices and Recommendations

Md. Monzur Morshed, Mahady Hasan and M. Rokonuzzaman

Abstract The role of Software Architect plays a vital role in entire software devel-
opment process and becomes highly responsible when the software goes into deploy-
ment as business operations and automations are based on the software system. Since
business operations are fully dependent on the software system, software architec-
tural decision-making process becomes one of the major activities of a successful
software projects. In this paper, we have depicted a series of empirical ways based
on real life experiences so that software architects able to make accurate decision
before going into software development. Regardless of architecture decision-making
process, this paper may help software engineers, project managers, business owners
and stakeholders in developing enterprise solutions.

Keywords Software · Architecture · Decision · Framework

1 Introduction

We are living in a fast growing business environment where most of the business
operations are being handled by big software systems based on massive IT infras-
tructures. According to the famous Software Engineer and Academician Professor
Barry Boehm, “Marry your architecture in haste and you can repent in leisure”.
In the initial stage of software system development, a software architect should
consider the following issues (not limited to):

Md. M. Morshed
TigerHATS, Independent University-Bangladesh, Dhaka, Bangladesh
e-mail: m.monzur@gmail.com; monzur@tigerhats.org
M. Hasan (B)
Independent University-Bangladesh, Dhaka, Bangladesh
e-mail: mahady@iub.edu.bd
M. Rokonuzzaman
North South University, Dhaka, Bangladesh
e-mail: m.rokonuzzaman@northsouth.edu

© Springer Nature Singapore Pte Ltd. 2019 3


S. K. Bhatia et al. (eds.), Advances in Computer Communication
and Computational Sciences, Advances in Intelligent Systems and Computing 924,
https://doi.org/10.1007/978-981-13-6861-5_1
4 Md. M. Morshed et al.

(a) What type of software it will be?


(b) What type of business operation will be performed?
(c) Who are the end-users? Identify them.
(d) How many users will be using this software system?
(e) What should be the expected life span of the software?
(f) Will it be a cross platform application?
(g) What are the functional and non-functional requirements?
(h) Does the company have available resources such as human resources, funds?
It is also important to understand the organization’s culture and business processes
while architecting the software system. One might say that business analyst or soft-
ware requirements engineer is responsible for such issues. But as a software architect
is important not to ignore such issues because better understanding about the orga-
nization’s work process and business operations will help him/her in architecting a
cost effect software as several issues are involved here such as cost effectiveness,
technical issues, business thinking, clients’ satisfaction and user friendly system,
effective use of resources, on time delivery and budgets, etc.
Typically software architecture decision-making process begins from software
development to maintenance phase. Both the phases are equally important for a suc-
cessful software project. As the most expensive phase of software development is
maintenance [1], the software architecture decision making process also becomes
very critical in this stage. According to Walker Royce, “for every $1 you spend
on development, you will spend $2 on maintenance [2]”. During software mainte-
nance phase new change requests need to be continuously delivered and deployed
on demand basis, any system anomaly will directly impact the end-users and stake-
holders.

2 Related Works

Vliet et al. [3] outlined some research directions that may help to understand and
improve the software architecture design process. They have discussed about two
decision-making concepts like rational and bounded rational.
Dasanayake et al. [4] studied the current software architecture decision making
practices in the industry using a case study conducted among professional software
architects in three different companies in Europe. They have identified different
software architecture decision-making practices followed by the software teams as
well as their reasons for following them, the challenges associated with them, and
the possible improvements from the software architects’ point of view. They found
out that improving software architecture knowledge management can address most
of the identified challenges and would result in better software architecture decision-
making.
Software Architecture Decision-Making Practices … 5

Kazman et al. [5] discussed about economics-driven architecture which could


produce the maximum amount of value, productivity, evolve ability, and reputation
which should be the guide in making any architecture-related decisions.
Asundi et al. [6] developed a method known as CBAM (Cost Benefit Analysis
Method) for performing economic modeling of software systems, centered on an
analysis of their architecture. In the framework, they incorporate economic criteria
like benefit and cost that are derived from the technical criteria like quality attribute
responses.

3 SWOT Analysis in Architecture Decision Making

SWOT analysis is a strategic planning technique used to identify the strengths, weak-
nesses, opportunities, and threats related to business planning. In this paper, we have
shown the use of SWOT analysis in Software Architecture-decision making process.

Strengths Weaknesses
• Widely accepted • Unstable platform
• Open source • Unstable technology
• Cross-platform • Too many bugs/defects
• Scalable • Too much dependency
• Community support • Lack of documentation
• Documentation
Opportunities Threats
• Competitive price • Structural change leads to affect the core
• Available skilled human resource technology
• Popular technology • Third-party software dependency
• Copyright issues
• Unrealistic price
• Security weakness

The lists we have shown may not accommodate all the critical issues associated
in a software project. However, in future we will come up with a complementary
checklist to serve the purpose of common software engineering issues.

4 Evaluation Criteria of Selecting Software Architectures

To select the right software architecture we are proposing the following evaluation
criteria:
6 Md. M. Morshed et al.

Table 1 Software development methodologies and project based complexity level


Project size Target group Complexity level
Scrum Small S 1
Agile Medium S, M 2
Waterfall Medium, large M, L 3
Extreme programing Medium S, M 2
Microsoft solutions framework Medium S, M 1, 2
Test-driven development Medium S, M 1, 2
Spiral Large L 3

Table 2 Software architectural platforms and project based resource allocation


Technology Cost Time (%) Resources Skill (%) Recomm.
availability effective (%)
(%) (%)
Monolithic 80 90 90 70 80 S
Client- 60 80 80 85 80 S
server
Distributed 80 80 90 85 90 M, L
SOA 80 70 90 90 90 M, L
Micro- 90 70 95 90 90 M, L
services

Small enterprise S
Medium enterprise M
Large enterprise L

Complexity level Normal 1


Average 2
High 3

See Tables 1 and 2.

5 Economics-driven Software Architecture

By adopting proper software engineering methodology, software architecture and


software product line, it becomes easier to reduce the software product cost which
may increase in the number of software production. Reduction in software produc-
tion cost enhances the product’s market penetration and makes the product more
Software Architecture Decision-Making Practices … 7

Fig. 1 Production cost versus software production

competitive among other players. It is important to remember that along with soft-
ware features and functionality, software price also plays a vital role in today’s global
market. In the Fig. 1, we have depicted the relation between Production Cost versus
Software Production.

6 Fishbone Model in Software Architecture


Decision-Making

FishBone model also known as Cause and Effect Diagram created by Kaoru Ishikawa,
a visualization tool is widely used for identifying the root cause of the problem [7].
This model can be used in software architecture decision making process to identify
the root cause of the issues that usually occur during software system development
and maintenance phase (Fig. 2).

7 Conclusion

It is one of the major tasks to identify the product’s life span considering the existing
technology, business, and market demand before developing a software system. As
these days technology is evolving rapidly, it is a very challenging task to develop
8 Md. M. Morshed et al.

Fig. 2 Fishbone model in software architecture decision making-process

software system that converges with the Organization’s vision. This is why it has
become a vital task to identify proper software platform. Lack of proper planning,
the project’s future could be at risk and cause financial loss which can be tackled by
selecting proper software development methodology, platform, strategy, and tech-
nology frameworks to enhance ROI. Adopting any of these may not be suitable for
any project unless the need assessments are conducted properly.
In future, we are aiming to extend this work and develop a comprehensive check
list that may help technology professionals, academicians and industry in identify-
ing critical issues during project initiation, planning, and software development to
maintenance stages. Furthermore, it would be our goal to incorporate the concept of
software product lines and reusing the software component to ensure cost effective
products development in a timely manner.

References

1. Martin, R.C.: Granularity. C++ Rep. 8(10) (1996)


2. Walker, R.: Next-Generation Software Economics. The Rational Edge (2000)
3. Vliet, H., Tang, A.: Decision making in software architecture. J. Syst. Softw. (2016). https://doi.
org/10.1016/j.jss.2016.01.017
4. Dasanayake, S., Markkula, J., Aaramaa, S., Oivo, M.: Software architecture decision-making
practices and challenges: an industrial case study. In: 2015 24th Australasian Software Engi-
neering Conference, Adelaide, SA, 2015, pp. 88–97 (2015)
5. Kazman, R., Bahsoon, R., Mistrik, I., Zhang, Y.: Economics-Driven Software Architecture:
Introduction. https://doi.org/10.1016/b978-0-12-410464-8.00001-5
Software Architecture Decision-Making Practices … 9

6. Asundi, J., Kazman, R., Klein, M.: Using Economic Considerations to Choose Among Archi-
tecture Design Alternatives (2001)
7. FishBone Diagram. https://whatis.techtarget.com/definition/fishbone-diagram
Abstraction in Modeling
and Programming with Associations:
Instantiation, Composition
and Inheritance

Bent Bruun Kristensen

Abstract The association concept abstracts over collaboration between concurrent


autonomous entities. Associations describe collaborations, i.e., requests and coordi-
nation of contributions from the entities. And the association concept also supports
abstraction in the form of instantiation, composition and inheritance. Simple and
expressive abstraction with associations is demonstrated by illustrative examples,
schematic language presentations, brief characterizations of qualities and imple-
mentation experiments.

Keywords Language design · Abstraction with associations · Instantiation,


composition and inheritance · Concurrent autonomous entities · Qualities

1 Introduction

The description of collaboration between autonomous entities is typically distributed


among the participating entities in terms of their individual contributions, and the
coordination is based on synchronization mechanisms. On the contrary, the associa-
tion concept gives a unified description of collaboration—i.e., both requests and coor-
dination of contributions from entities. The association abstracts over both structural
and interaction aspects of the collaboration: It includes roles and a directive, where
entities play the roles in interactions and the directive describes interaction sequence
between the entities. In [1], the association concept is motivated and defined—and
evaluated and related to similar modeling and programming concepts.
The aim of the present paper is to show the potential of abstraction in modeling and
programming with instantiation, composition and inheritance of associations. The
association offers instantiation, i.e., how to create an instance from an association
category; composition, i.e., how to compose an association category from instances

B. B. Kristensen (B)
University of Southern Denmark, Odense, Denmark
e-mail: bbk@mmmi.sdu.dk

© Springer Nature Singapore Pte Ltd. 2019 11


S. K. Bhatia et al. (eds.), Advances in Computer Communication
and Computational Sciences, Advances in Intelligent Systems and Computing 924,
https://doi.org/10.1007/978-981-13-6861-5_2
12 B. B. Kristensen

P Rp Rq Q
X Eq
Ep …
Rp

Ax
… … … Rq
… …

Entity Association Entity …

Fig. 1 Illustration of association and entity

of existing association categories; and inheritance, i.e., how to describe an association


category by inheriting from an existing association category.
Section 2 is a brief introduction to the association concept, a presentation of a
basic example, as well as related work and prerequisites for this kind of abstraction.
Section 3 illustrates abstraction in terms of instantiation, composition and inheri-
tance by giving illustrative but complex examples and schematic presentations and
by characterizing the qualities of the abstractions. In Sect. 4, an experimental imple-
mentation of abstraction with associations is discussed.

2 Background

2.1 Associations and Autonomous Entities

Associations are inspired from a model for understanding, modeling and program-
ming ambient systems [2]. The association concept offers an alternative way of
describing interactions among concurrent autonomous entities. Association X and
entities P and Q are illustrated in Fig. 1: Instances of entities (Ep and Eq ) are
autonomous (and therefore distinct from ordinary objects/classes [3]) and partici-
pate in instance Ax of association X. Because an entity is autonomous, only the entity
itself controls the execution of its methods. An entity has an action part (illustrated
by …) in the form of a sequence of actions (similar to a class in SIMULA [4]).
An entity also has a list of the actual contributions (i.e., methods to be executed)
requested from associations in which an instance of the entity participates. An asso-
ciation requests an instance of an entity to contribute by executing a given method,
but the instance itself chooses among the requests. Associations integrate activity
(the directive) and role aspects. The directive (illustrated by … …) is an interaction
sequence including requests to participating entities. The interactions of the direc-
tive are executed sequentially, whereas an entity executes its action part and list of
requests interleaved. The description of a role (Rp and Rq ) of an association includes
a name of an entity category (like P or Q) that specifies which instances may play the
role. The association concept combines activities [5] and roles [6] in one abstraction.
A textual version of associations and entities is illustrated in the Association
Language in Fig. 2, i.e., association x with instance Ax and entities P and Q with
Abstraction in Modeling and Programming with Associations … 13

entity P { association X { X Ax = new X(…)


void mp(…) {…} role Rp for P …
… role Rq for Q P Ep = new P(…)
action part {…} … …
} directive { Q Eq = new Q(…)
entity Q { … …
void mq(…) {…} Rp::mp(…) Ep play Ax.Rp
… … …
action part {…} Rq::mq(…) Eq play Ax.Rq
} …
}
}

Fig. 2 Textual version of illustration of association and entity

instances Ep and Eq . With respect to an autonomous instance Ep playing role Eq of Ax ,


we use the notation Rp ::mp () for the request of an invocation of the method mp() of Ep .
But because entities are autonomous, the invocation is a request to Ep , i.e., Ep decides
if and when it may execute mp () (interleaved with Ep ’s action part). With respect
to the directive, different mechanisms for synchronization and communication among
entities are possible: In [1], synchronization of autonomous entities is illustrated in
rendezvous-based way [7]; in [8], interactions between agents are illustrated by
asynchronous message-passing [9].
Concurrent object execution [10] implies that the objects execute in parallel and
independently, but that these objects at various times synchronize and typically com-
municate to exchange data. Typically, the language mechanisms used to describe
the synchronization are placed at the concurrent objects, i.e., in the action part
of entities P and Q in Fig. 2. On the contrary, by associations, the synchronization
mechanisms are placed outside the entities and shared by these entities, i.e., in the
association x in Fig. 2. The association is superior with respect to modeling and
programming collaboration because it supports our natural understanding of collab-
orations between autonomous entities and because the concept captures collabora-
tion as a descriptive unit, c.f. association x in Fig. 2. The association abstraction x is
formed by our conceptualization of collaborations and is essential for understanding,
modeling and communication (“Without abstraction we only know that everything
is different” [11]): The association is a language concept and not implementation-
specific technology. As a shared plan for collaboration, the association makes it
possible for entities precisely and understandably to explain their ongoing execu-
tions, i.e., in Fig. 2, when entity Ep executes method mp (), this execution refers to
a specific request, for example, Rp ::mp () in association x.
14 B. B. Kristensen

Ao.Home

b1 Ao
Here
a2
b3

b2 Po
Pi Ai
a3
a1

Ai.Home

Fig. 3 Example with interacting AGVs

2.2 Example with Interacting AGVs1

The examples in the paper are inspired from a project about transportation systems
[12]. The project investigates the process of moving boxes from a conveyor belt onto
pallets and transporting these pallets. This scenario is inspired from the high bay
area of the LEGO® factory with AGVs, no human intervention and only central-
ized control. A toy prototype inspired from this system (to bridge the gap between
simulation and real physical applications) measures 1.5 by 2 m, with three mobile
robots (LEGOBots), two input stations, two output stations, a conveyor belt and a
station with empty pallets. The approach supports a fully distributed control for each
LEGOBot. A LEGOBot is based on a LEGO® MindstormsTM RCX brick extended
with a PDA and wireless LAN. Problems with combining and maintaining the basic
technology (including LEGO® MindstormsTM, RCX, PDA, WLAN) have motivated
the introduction of a virtual platform.
The basic example is illustrated in Fig. 3. The example includes two AGVs and
two ports, and the objective is to describe how to organize the transport of packages
by the AGVs between the ports. AGVs Ai and Ao bring packages from port pi to
port po (i for input and o for output). AGV Ai brings a package from port pi to
position Here, the AGVs shift the package from AGV Ai to AGV Ao , and AGV Ao
brings the package from position Here to port Po . The AGVs move along suitable
paths: AGV Ai moves along a1 followed by a2 followed by a3; AGV Ao moves
along b1 followed by b2 followed by b3. The AGVs must synchronize in order to
shift the package from Ai to Ao . Furthermore, AGV Ai must synchronize with port
Pi to pick up the package, and AGV Ao must synchronize with port Po to put down
the package.
The example presented in Fig. 3 is described in the Association Language in
Fig. 4: AGV and Port are entity categories for AGVs and ports, respectively. Entity
Port includes package x and Position P, whereas entity AGV includes

1 AGV is the acronym for Automatic Guided Vehicle.


Abstraction in Modeling and Programming with Associations … 15

entity Port { association Transport { Transport T = new Transport()


… role Ai for AGV
Package x role Ao for AGV AGV A1 = new AGV(…)
Position p role Pi for Port AGV A2 = new AGV(…)
} role Po for Port
Port P1 = new Port(…)
entity AGV { directive { Port P2 = new Port(…)
… Position Here = f(…)
Package x (| Ai::goto(Pi.p) A1 play T.Ai, A2 play T.Ao
Position Home Pi::x → Ai::x
void goto(…) {…} Ai::goto(Here) P1 play T.Pi, P2 play T.Po
} , Ao::goto(Here)
|)
class Position { Ai::x → Ao::x
… (| Ai::goto(Ai.Home)
} , Ao::goto(Po.p)
Ao::x → Po::x
Ao::goto(Ao.Home)
|)
}
}

Fig. 4 Textual form of example with interacting AGVs

Package x, Position Home and method goto(. . .). Instances of AGV and
Port exist at execution time, namely P1 , P2 and A1 , A2 , respectively. The associa-
tion category Transport is a description of the interactions of AGVs and ports. In
the instance T of Transport, AGVs A1 , A2 and Ports P1 , P2 play roles Ai , Ao and
Pi , Po , respectively. The interactions are described by the association Transport
on behalf of—and executed by—the participating AGVs and ports. The synchroniza-
tion of AGVs and ports is described specifically by Pi ::x → Ai ::x, Ai ::x → Ao ::x
and Ao ::x → Po ::x.2 The clause (| …, … |) means concurrent execution of the
(two or more) parts included in the clause.3 The example illustrates synchronization
in time and place by “being at the right places before synchronization in time.” In
the directive of Transport, the meeting point is calculated as Position Here.
Next the directive includes the sequence (| . . . |) Ai ::x → Ao ::x(| . . . |) to be
executed sequentially. In the first (| … |) clause, the input AGV Ai moves to input
Port Pi from which Ai picks up x and moves to Here and concurrently the output
AGV Ao moves to Here. When both Ai and Ao are at Here, the package x is trans-
ferred from Ai to Ao by Ai ::x → Ao ::x. In the last (| … |) clause, the input AGV
Ai moves to its Home and concurrently the output AGV Ao moves to output Port
Po where Ao puts down x and moves to its Home.
The problem outlined in Fig. 3 is illustrative, and Fig. 4 offers an excellent solution.
Variations of this problem are used in Sects. 3.2 and 3.3 for illustrating composition

2 S::x → R::y describes synchronization between S and R where S is requested to transfer the
value of x and R to receive this value in y. Entities S and R are synchronized exactly when the
contents of x are transferred to y.
3 (|…, …, …|) describes concurrent execution of the parts included. The execution is completed

when all parts have completed their execution.


Another random document with
no related content on Scribd:
A Trouser Hanger

The Trousers can be Easily Hung on the Cross Bars to Keep the Crease in
Them
A wood frame, similar to a picture frame, is made up and hinged to
the inner side of the closet door with its outer edge hung on two
chains. The inside of the frame is fitted with cross bars. After
hanging the trousers on the cross bars the frame is swung up
against the door where it is held with a hook. Several pairs of
trousers can be hung on the frame, and when flat against the door it
takes up very little space. The trousers are kept flat so that they will
hold their crease.
An Emergency Alcohol Stove
If a person starts on a picnic with a ketchup bottle full of wood
alcohol placed in the lunch basket and suddenly discovers that the
alcohol stove was left at home, it is not necessary to walk back to get
it; just unscrew the cover of the ketchup bottle and bunch a piece of
cloth large enough to fill the top, soak it thoroughly in the alcohol and
light it. The metal top is just the right size to make a hot flame.

¶A box 8¹⁄₄ in. square and 4 in. deep will hold one gallon.
Fireside Dissolving Views
By SUSAN E. W. JOCELYN

Toshowing
those interested in amateur theatricals the following method of
dissolving views in the fire-light of pipe dreams and mind
pictures will be appreciated.
A frame made of light material, A, Fig. 1, covered with red cloth
and chalked to represent brick, is placed in the center of the stage.
The central opening, representing the fireplace, must be rather large,
about 12 ft. wide and 7 ft. high, because it is at the back of this
opening that the pictures are produced. From the chimney back, 2¹⁄₂
ft. behind this opening, the sides, B, of the fireplace slope outward to
the imitation brickwork. The walls of the fireplace are covered with
sheet asbestos, for safety, and painted black; then ashes are rubbed
on the chimney back and scattered over the hearthstone, to make
the appearance more realistic.
The chimney back is removable, in fact it is one of a series of a
half dozen screens, the others being behind it, the proper
manipulation of which, together with changing lights, gives to the
audience the effect of dissolving views of the dreams that are being
acted out directly behind the screens.
The Tableau is Played Out behind the Screens and is Dimly Seen through the
Fireplace Opening When the Lights are Properly Controlled and the Screens
Drawn Slowly

The screens are carried in a light frame, the top of which is shown
in Fig. 2, with position of runs. The runs are made of narrow strips of
wood, fastened to the under side of two end pieces, for the screen
frames to slide in. Corresponding strips are placed in a suitable
position on the floor, to keep the screens steady in sliding. The
frames holding the run pieces are longer than the chimney back is
wide, and the upper one is placed as high as the brickwork, the
shelf, or mantel, over the fireplace being an extension of the upper
part, or frame. The screens are in pairs, as shown in Fig. 3, each
one extending to the center of the fireplace. They consist of light
frames covered with black mosquito netting. The upper and lower
sides of the frames are sandpapered smooth so that they will move
easily in the runs. The vertical sides of a pair of screen frames that
meet in the center of the fireplace are made of one strand of wire,
instead of wood, so that their motion will not be noticeable. To
complete the apparatus, andirons and a gas log are needed in the
fireplace, and whatever arrangements are necessary for the action of
the views to be shown behind the screens.
If gas is available, an asbestos log is used in the fireplace, and it
has a connecting pipe to the footlights, where four or five jets are
located on the floor just back of the screens. A narrow board, painted
black, is placed in front of the lights, which should be wide enough to
conceal the lights from the spectators and reflect the light on the
tableau. If the light is thrown above the imitation brickwork, then it
should be made higher.
In most halls, and some houses, electric lights are used instead of
gas, and in this case ordinary logs are piled in the fireplace on the
andirons, and one or more red globes are introduced to produce the
effect of glowing embers. The gas is more effective, however,
because it is not easy to get a gradual rise and fall in the glow of
electric lights. Four or five footlights are sufficient.

Fig. 2
Fig. 1
Fig. 3

Frames Made of Light Material and Covered with Black Mosquito Netting
Serve as Screens Which are Operated in Runs Located behind the
Fireplace That is Made Up in a Like Manner and Penciled to Represent
Brick
The working of the dissolving views can be best explained by an
illustration from “Reveries of a Bachelor.” The gas log is turned low
to make the stage dimly lighted, and the tableau to be shown is all
arranged behind the chimney back and the screens. There should be
barely sufficient light to reveal the bachelor on the hearthstone
smoking in the gloaming. Then the chimney back almost
imperceptibly parts, that is, the screens of the first pair are gradually
pulled apart, the footlights and gas log are gradually turned on, and
the tableau behind the fireplace, being more brightly illuminated, is
dimly seen through the series of screens. Slowly the successive
pairs of screens are drawn aside, and the tableau becomes quite
distinct. Then the process is reversed, the screens are gradually
replaced, the lights are lowered and the dream fades away;
brightens and fades again; brightens and fades, till gone entirely.
The screens are always slowly moving while the tableau is exposed,
and this makes the illusory effect. It is evident that the success of
this plan depends principally on the coördination with which the
screens are operated. “Cinderella,” and many other tales based on
the vagaries of the mind and having their source in glowing embers,
can thus be presented.
Imitation-Celluloid Scales and Name Plates
Often the amateur turns out a very workmanlike piece of
apparatus, which only lacks the addition of a scale or name plate to
give it a truly professional appearance. I recently hit upon an
excellent method of making these articles in a manner that will stand
considerable wear and at the same time present a very good
appearance. Simply take a piece of good Bristol board and letter it
as desired with waterproof drawing ink, then apply a coat of clear
varnish, such as is used on bird’s-eye maple furniture. After not less
than 24 hours rub lightly with fine steel wool, wipe clean, and
revarnish. Usually two coats are sufficient, and the last should be
rubbed with a soft oily rag dipped in some abrasive material such as
tooth powder, or one of the many powders used for metal polishing.
Finally polish with a little oil, and the result will be a perfect imitation
of celluloid.—Contributed by John D. Adams, Phoenix, Ariz.
Direct View Finder for a Box Camera
Disappointment in the taking of pictures with a small camera is
often caused by the inability of the photographer to obtain an
accurate view of what he is photographing. If, instead of the small
view finder on the camera, the device illustrated is used, a view of
the resultant photograph may be obtained, right side up, and of
nearly the same size as the finished print.
Sight through the Eyepiece for a Direct View of the Object Photographed,
Thus Insuring More Nearly the Accuracy of the Result
The distance from the lens of the camera to the front surface of
the plate or film must be determined. In the camera shown this was
4¹⁄₂ in. The distance from the small metal eyepiece, when it is in
place on the box, to the inner side of the opposite end of the box
must be made ¹⁄₂ in. shorter than this measurement. This will cause
the box to be shorter than the camera.
The box is constructed so that the sides extend above the top and
engage the camera. The view-finder eyepiece is made from a flat
piece of sheet metal, laid out as shown, and bent into the desired
shape. It is fixed over the center of the end of the box. The sight hole
must be ¹⁄₃₂ in. in diameter. By sighting through the small opening in
the eyepiece an unobstructed view of the prospective photograph is
obtained.—Contributed by A. S. Thomas, Amherstburg, Ont.
Checking a Rip in Tire Tubes
It is often difficult to prevent a small rip in an inner tube of a tire
from becoming longer, even though a patch has been applied. An
effective remedy is to punch a small round hole at each end of the
rip before applying the patch. This stops the tendency to rip farther
when pressure is applied.—Contributed by George H. Holden,
Chesterfield, England.
Protecting Wall Back of Range or Sink
A simple and attractive protection for the wall back of the range or
sink in a kitchen was provided by fixing a piece of plate glass to the
wall by means of round-headed brass screws. The glass may be
washed easily and can be removed when new wall covering is
applied.—Contributed by Jennie E. McCoy, Philadelphia, Pa.
Polishing with a Hand Drill

A Hand Drill Clamped in a Vise and Used to Polish Round-Head Screws

There are certain desired effects in polishing metal that can only
be obtained with a true rotary motion. There is no amount of
handwork that will produce a proper finish on the round head of a
brass screw. Therefore, when small pieces of metal are to be shaped
up with the file and polished, simply set them in a three-jaw chuck of
a hand drill, and then clamp the drill in a vise, as shown in the
illustration. Operate the drill with the left hand and hold the file, or
emery paper, with the right, and a finish will be obtained that can in
nowise be distinguished from lathe work. It is surprising how different
round-head brass screws appear when treated in this manner.
Releasing a Parachute from a Kite
Pull In About a Yard of the Kite String and Release It, Tripping the Parachute
Parachutes may be released from suspended kites readily by
providing tripping loops on the kite tail, as shown in the illustration.
Form a loop on one end of a piece of cord, and tie the other end to
the kite tail. Make a loop in one end of another piece of cord and tie
the other end to the top of the parachute. Tie a piece of cord around
a nail close to its head and fix this also to the kite tail. Pass one loop
through the other and insert the nail, as shown in the sketch. To trip
the parachute, pull in about a yard of string and release it quickly.
The parachute will trip without fail. The end of the string may be
fastened to a stake driven into the ground or it may be held in the
hand.
A Trick Blotter
An ordinary blotter may be transformed easily so that it will remove
ink completely when applied instead of leaving sufficient to recognize
the script, by steeping it in a solution of oxalic acid. Permit it to dry
after several applications of the acid. It will be the source of much
amusement, and is useful as well.
Magic Candles Explained
By CLIFFORD WAYNE

Clever and baffling though it may be, the magic-candle trick may be
performed easily and with professional skill by a person who has
made a few simple preparations. The illustration shows the candles
arranged on a table made of a music stand.
Candles, cigars, or pencils may be used, but for the purpose of
this description the former will be used. The candles are of different
colors but of the same size and weight. The manipulation is as
follows:
Exhibit a tube of brass, cardboard, or other suitable material, just
large enough to contain a candle. Then retire from the room, leaving
the tube on the table while one of the spectators selects one of the
candles and places it into the tube, covering the end of the latter
securely with a small cap. The other candles are hidden before the
performer is permitted to return. The trick is to announce the color of
the candle contained in the box by merely passing the hand over it
several times. The box and candle are passed out for inspection and
will bear it if properly prepared.
The secret of the trick is this: The first candle, for example, the
white one, is unprepared. The second, a blue one, has concealed in
it, ¹⁄₂ in. from the top, a small piece of magnetized steel. The third
candle, a red one, has a similar bar concealed at the middle; the
fourth, a magnetized bar ¹⁄₂ in. from the bottom, and the fifth candle
has the bar at a point halfway between the middle and the bottom.
The candles are made of wood and the magnets may readily be
imbedded in them. They are made of two pieces glued together like
a pencil.

You might also like