Full Download Information and Decision Sciences, Proceedings of The 6th International Conference On FICTA Suresh Chandra Satapathy PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 49

Download and Read online, DOWNLOAD EBOOK, [PDF EBOOK EPUB ], Ebooks

download, Read Ebook EPUB/KINDE, Download Book Format PDF

Information and Decision Sciences, Proceedings of


the 6th International Conference on FICTA Suresh
Chandra Satapathy

OR CLICK LINK
https://textbookfull.com/product/information-and-
decision-sciences-proceedings-of-the-6th-
international-conference-on-ficta-suresh-chandra-
satapathy/

Read with Our Free App Audiobook Free Format PFD EBook, Ebooks dowload PDF
with Andible trial, Real book, online, KINDLE , Download[PDF] and Read and Read
Read book Format PDF Ebook, Dowload online, Read book Format PDF Ebook,
[PDF] and Real ONLINE Dowload [PDF] and Real ONLINE
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Proceedings of First International Conference on


Information and Communication Technology for
Intelligent Systems Volume 2 1st Edition Suresh Chandra
Satapathy
https://textbookfull.com/product/proceedings-of-first-
international-conference-on-information-and-communication-
technology-for-intelligent-systems-volume-2-1st-edition-suresh-
chandra-satapathy/

Proceedings of the International Congress on


Information and Communication Technology ICICT 2015
Volume 1 1st Edition Suresh Chandra Satapathy

https://textbookfull.com/product/proceedings-of-the-
international-congress-on-information-and-communication-
technology-icict-2015-volume-1-1st-edition-suresh-chandra-
satapathy/

Proceedings of International Conference on ICT for


Sustainable Development ICT4SD 2015 Volume 1 1st
Edition Suresh Chandra Satapathy

https://textbookfull.com/product/proceedings-of-international-
conference-on-ict-for-sustainable-development-
ict4sd-2015-volume-1-1st-edition-suresh-chandra-satapathy/

Proceedings of International Conference on ICT for


Sustainable Development ICT4SD 2015 Volume 2 1st
Edition Suresh Chandra Satapathy

https://textbookfull.com/product/proceedings-of-international-
conference-on-ict-for-sustainable-development-
ict4sd-2015-volume-2-1st-edition-suresh-chandra-satapathy/
Proceedings of the Second International Conference on
Computer and Communication Technologies IC3T 2015
Volume 2 1st Edition Suresh Chandra Satapathy

https://textbookfull.com/product/proceedings-of-the-second-
international-conference-on-computer-and-communication-
technologies-ic3t-2015-volume-2-1st-edition-suresh-chandra-
satapathy/

Proceedings of the Second International Conference on


Computer and Communication Technologies IC3T 2015
Volume 3 1st Edition Suresh Chandra Satapathy

https://textbookfull.com/product/proceedings-of-the-second-
international-conference-on-computer-and-communication-
technologies-ic3t-2015-volume-3-1st-edition-suresh-chandra-
satapathy/

Proceedings of the International Conference on Data


Engineering and Communication Technology ICDECT 2016
Volume 1 1st Edition Suresh Chandra Satapathy

https://textbookfull.com/product/proceedings-of-the-
international-conference-on-data-engineering-and-communication-
technology-icdect-2016-volume-1-1st-edition-suresh-chandra-
satapathy/

Smart Computing and Informatics Proceedings of the


First International Conference on SCI 2016 Volume 2 1st
Edition Suresh Chandra Satapathy

https://textbookfull.com/product/smart-computing-and-informatics-
proceedings-of-the-first-international-conference-on-
sci-2016-volume-2-1st-edition-suresh-chandra-satapathy/

Smart Intelligent Computing and Applications


Proceedings of the Third International Conference on
Smart Computing and Informatics Volume 1 Suresh Chandra
Satapathy
https://textbookfull.com/product/smart-intelligent-computing-and-
applications-proceedings-of-the-third-international-conference-
on-smart-computing-and-informatics-volume-1-suresh-chandra-
Advances in Intelligent Systems and Computing 701

Suresh Chandra Satapathy


Joao Manuel R. S. Tavares
Vikrant Bhateja
J. R. Mohanty Editors

Information
and Decision
Sciences
Proceedings of the 6th International
Conference on FICTA
Advances in Intelligent Systems and Computing

Volume 701

Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
e-mail: [email protected]
The series “Advances in Intelligent Systems and Computing” contains publications on theory, applications,
and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as
engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce,
environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent
systems and computing such as: computational intelligence, soft computing including neural networks,
fuzzy systems, evolutionary computing and the fusion of these paradigms, social intelligence, ambient
intelligence, computational neuroscience, artificial life, virtual worlds and society, cognitive science and
systems, Perception and Vision, DNA and immune based systems, self-organizing and adaptive systems,
e-Learning and teaching, human-centered and human-centric computing, recommender systems, intelligent
control, robotics and mechatronics including human-machine teaming, knowledge-based paradigms,
learning paradigms, machine ethics, intelligent data analysis, knowledge management, intelligent agents,
intelligent decision making and support, intelligent network security, trust management, interactive
entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings of
important conferences, symposia and congresses. They cover significant recent developments in the field, both
of a foundational and applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad dissemination of research results.
Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: [email protected]
Members
Rafael Bello Perez, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cuba
e-mail: [email protected]
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: [email protected]
Hani Hagras, University of Essex, Colchester, UK
e-mail: [email protected]
László T. Kóczy, Széchenyi István University, Győr, Hungary
e-mail: [email protected]
Vladik Kreinovich, University of Texas at El Paso, El Paso, USA
e-mail: [email protected]
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan
e-mail: [email protected]
Jie Lu, University of Technology, Sydney, Australia
e-mail: [email protected]
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico
e-mail: [email protected]
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil
e-mail: [email protected]
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland
e-mail: [email protected]
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong
e-mail: [email protected]

More information about this series at http://www.springer.com/series/11156


Suresh Chandra Satapathy
Joao Manuel R. S. Tavares
Vikrant Bhateja ⋅ J. R. Mohanty
Editors

Information and Decision


Sciences
Proceedings of the 6th International
Conference on FICTA

123
Editors
Suresh Chandra Satapathy Vikrant Bhateja
Department of Computer Science Department of Electronics
and Engineering and Communication Engineering
PVP Siddhartha Institute of Technology SRMGPC
Vijayawada, Andhra Pradesh Lucknow, Uttar Pradesh
India India

Joao Manuel R. S. Tavares J. R. Mohanty


Departamento de Engenharia Mecânica School of Computer Application
Universidade do Porto KIIT University
Porto Bhubaneswar, Odisha
Portugal India

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-981-10-7562-9 ISBN 978-981-10-7563-6 (eBook)
https://doi.org/10.1007/978-981-10-7563-6
Library of Congress Control Number: 2018930369

© Springer Nature Singapore Pte Ltd. 2018


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made. The publisher remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.

Printed on acid-free paper

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
part of Springer Nature
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface

This book is a collection of high-quality peer-reviewed research papers presented at


the 6th International Conference on Frontiers of Intelligent Computing: Theory and
Applications (FICTA-2017) held at School of Computer Applications, KIIT
University, Bhubaneswar, Odisha, India, during October 14–15, 2017.
The idea of this conference series was conceived by few eminent professors and
researchers from premier institutions of India. The first three editions of this con-
ference: FICTA-2012, FICTA-2013, and FICTA-2014 were organized by Bhuba-
neswar Engineering College (BEC), Bhubaneswar, Odisha, India. Due to its
popularity and wide visibilities in the entire country as well as abroad, the fourth
edition FICTA-2015 has been organized by the prestigious NIT Durgapur, WB,
India. The fifth edition FICTA-2016 was organized by KIIT University, Bhuba-
neswar, Odisha, India. All papers of past FICTA editions are published by
Springer AISC series. Presently, FICTA-2017 is the sixth edition of this conference
series which aims to bring together researchers, scientists, engineers, and practi-
tioners to exchange and share their theories, methodologies, new ideas, experiences,
applications in all areas of intelligent computing theories, and applications to
various engineering disciplines like Computer Science, Electronics, Electrical,
Mechanical, Biomedical Engineering.
FICTA-2017 had received a good number of submissions from the different
areas relating to decision sciences, intelligent computing, and its applications.
These papers have undergone a rigorous peer review process with the help of our
program committee members and external reviewers (from the country as well as
abroad). The review process has been very crucial with minimum 2 reviews each
and in many cases 3–5 reviews along with due checks on similarity and content
overlap as well. FICTA-2017 witnessed more than 300 papers including the main
track as well as special sessions. The conference featured seven special sessions in
various cutting-edge technologies of specialized focus which were organized and
chaired by eminent professors. The total toll of papers received, included submis-
sions received cross country along with 7 overseas countries. Out of this pool, only
131 papers were given acceptance and segregated as two different volumes for

v
vi Preface

publication under the proceedings. This volume consists of 59 papers from diverse
areas of information and decision sciences.
The conference featured many distinguished keynote addresses by eminent
speakers like Dr. Siba K. Udgata (University of Hyderabad, Telangana, India) on
Intelligent and Soft Sensor for Environment Monitoring; Dr. Goutam Sanyal (NIT
Durgapur, WB, India) on Vision-based Biometric Features; Dr. Kamiya Khatter
(Sr. Editorial Assistant, Springer Nature, India) on Author Services and Tools.
These keynote lectures embraced a huge toll of an audience of students, faculties,
budding researchers, as well as delegates.
We thank the General Chairs: Prof. Samaresh Mishra, Prof. Veena Goswami,
KIIT University, Bhubaneswar, India, and Prof. Suresh Chandra Satapathy,
PVPSIT, Vijayawada, India, for providing valuable guidelines and inspiration to
overcome various difficulties in the process of organizing this conference.
We extend our heartfelt thanks to the Honorary Chairs of this conference:
Dr. B. K. Panigrahi, IIT Delhi, and Dr. Swagatam Das, ISI, Kolkata, for being with
us from the beginning to the end of this conference and without their support this
conference could never have been successful.
We would also like to thank School of Computer Applications and Computer
Engineering, KIIT University, Bhubaneswar, who jointly came forward to support
us to organize sixth edition of this conference series. We are amazed to note the
enthusiasm of all faculty, staff, and students of KIIT to organize the conference in
such a professional way. Involvements of faculty coordinators and student volunteer
are praiseworthy in every respect. We are confident that in the future too we would
like to organize many more international-level conferences in this beautiful campus.
We would also like to thank our sponsors for providing all the support and financial
assistance.
We take this opportunity to thank authors of all submitted papers for their hard
work, adherence to the deadlines, and patience with the review process. The quality
of a refereed volume depends mainly on the expertise and dedication of the
reviewers. We are indebted to the program committee members and external
reviewers who not only produced excellent reviews but also did these in short time
frames. We would also like to thank the participants of this conference, who have
participated in the conference above all hardships. Finally, we would like to thank all
the volunteers who spent tireless efforts in meeting the deadlines and arranging every
detail to make sure that the conference can run smoothly. All the efforts are worth and
would please us all, if the readers of this proceedings and participants of this con-
ference found the papers and conference inspiring and enjoyable. Our sincere thanks
to all press print and electronic media for their excellent coverage of this conference.
We take this opportunity to thank all Keynote Speakers, Track and Special
Session Chairs for their excellent support to make FICTA-2017 a grand success.

Vijayawada, India Dr. Suresh Chandra Satapathy


Porto, Portugal Dr. Joao Manuel R. S. Tavares
Lucknow, India Dr. Vikrant Bhateja
Bhubaneswar, India Dr. J. R. Mohanty
Organization

Chief Patron
Achyuta Samanta, KISS and KIIT University

Patron
H. Mohanty, KIIT University

Advisory Committee
Sasmita Samanta, KIIT University
Ganga Bishnu Mund, KIIT University
Samaresh Mishra, KIIT University

Honorary Chairs
Swagatam Das, ISI, Kolkata
B. K. Panigrahi, IIT Delhi

General Chairs
Veena Goswami, KIIT University
Suresh Chandra Satapathy, PVPSIT, Vijayawada

Convener
Sachi Nandan Mohanty, KIIT University
Satya Ranjan Dash, KIIT University

Organizing Chairs
Sidharth Swarup Routaray, KIIT University
Manas Mukul, KIIT University

vii
viii Organization

Publication Chair
Vikrant Bhateja, SRMGPC, Lucknow

Steering Committee
Suresh Chandra Satapathy, PVPSIT, Vijayawada
Vikrant Bhateja, SRMGPC, Lucknow
Siba K. Udgata, UoH, Hyderabad
Manas Kumar Sanyal, University of Kalyani
Nilanjan Dey, TICT, Kolkata
B. N. Biswal, BEC, Bhubaneswar

Editorial Board
Suresh Chandra Satapathy, PVPSIT, Vijayawada, India
Vikrant Bhateja, SRMGPC, Lucknow (UP), India
Dr. J. R. Mohanty, KIIT University
Prasant Kumar Pattnaik, KIIT University, Bhubaneswar, India
Joao Manuel R. S. Tavares, Universidade do Porto (FEUP), Porto, Portugal
Carlos Artemio Coello Coello, CINVESTAV-IPN, Mexico City, Mexico

Transport and Hospitality Chairs


Ramakant Parida, KIIT University
K. Singh, KIIT University
B. B. Dash, KIIT University

Session Management Chairs


Chinmay Mishra, KIIT University
Sudhanshu Sekhar Patra, KIIT University

Registration Chairs
Ajaya Jena, KIIT University
Utpal Dey, KIIT University
P. S. Pattanayak, KIIT University
Prachi Viyajeeta, KIIT University

Publicity Chairs
J. K. Mandal, University of Kalyani, Kolkata
Himanshu Das, KIIT University
R. K. Barik, KIIT University
Organization ix

Workshop Chairs
Manoj Mishra, KIIT University
Manas Kumar Rath, KIIT University

Track Chairs
Machine Learning Applications: Steven L. Fernandez, The University of Alabama,
Birmingham, USA
Image Processing and Pattern Recognition: V. N. Manjunath Aradhya, SJCE,
Mysore, India
Signals, Communication, and Microelectronics: A. K. Pandey, MIET, Meerut (UP),
India
Data Engineering: M. Ramakrishna Murty, ANITS, Visakhapatnam, India

Special Session Chairs


SS01: Computational Intelligence to Ecological Computing through Data Sciences:
Tanupriya Choudhury and Praveen Kumar, Amity University, UP, India
SS02: Advances in Camera Based Document Recognition: V. N. Manjunath
Aradhya and B. S. Harish, SJCE, Mysore, India
SS03: Applications of Computational Intelligence in Education and Academics:
Viral Nagori, GLS University, Ahmedabad, India
SS04: Modern Intelligent Computing, Human Values and Professional Ethics for
Engineering and Management: Hardeep Singh and B. P. Singh, FCET, Ferozepur,
Punjab
SS05: Mathematical Modelling and Optimization: Deepika Garg, G. D. Goenka
University, India, and Ozen Ozer, Kırklareli Üniversitesi, Turkey
SS06: Computer Vision and Image Processing: Synh Viet-Uyen Ha, Vietnam
National University, Vietnam
SS07: Data Mining Applications in Network Security: Vinutha H. P., BIET,
Karnataka, India, and Sagar B. M., RVCE, Bangalore, Karnataka, India

Technical Program Committee/International Reviewer Board


A. Govardhan, India
Aarti Singh, India
Almoataz Youssef Abdelaziz, Egypt
Amira A. Ashour, Egypt
Amulya Ratna Swain, India
Ankur Singh Bist, India
Athanasios V. Vasilakos, Athens
Banani Saha, India
Bhabani Shankar Prasad Mishra, India
B. Tirumala Rao, India
Carlos A. Coello, Mexico
x Organization

Charan S. G., India


Chirag Arora, India
Chilukuri K. Mohan, USA
Chung Le, Vietnam
Dac-Nhuong Le, Vietnam
Delin Luo, China
Hai Bin Duan, China
Hai V. Pham, Vietnam
Heitor Silvério Lopes, Brazil
Igor Belykh, Russia
J. V. R. Murthy, India
K. Parsopoulos, Greece
Kamble Vaibhav Venkatrao, India
Kailash C. Patidar, South Africa
Koushik Majumder, India
Lalitha Bhaskari, India
Jeng-Shyang Pan, Taiwan
Juan Luis Fernández Martínez, California
Le Hoang Son, Vietnam
Leandro Dos Santos Coelho, Brazil
L. Perkin, USA
Lingfeng Wang, China
M. A. Abido, Saudi Arabia
Maurice Clerc, France
Meftah Boudjelal, Algeria
Monideepa Roy, India
Mukul Misra, India
Naeem Hanoon, Malaysia
Nikhil Bhargava, India
Oscar Castillo, Mexico
P. S. Avadhani, India
Rafael Stubs Parpinelli, Brazil
Ravi Subban, India
Roderich Gross, England
Saeid Nahavandi, Australia
Sankhadeep Chatterjee, India
Sanjay Sengupta, India
Santosh Kumar Swain, India
Saman Halgamuge, India
Sayan Chakraborty, India
Shabana Urooj, India
S. G. Ponnambalam, Malaysia
Srinivas Kota, Nebraska
Srinivas Sethi, India
Sumanth Yenduri, USA
Organization xi

Suberna Kumar, India


T. R. Dash, Cambodia
Vipin Tyagi, India
Vimal Mishra, India
Walid Barhoumi, Tunisia
X. Z. Gao, Finland
Ying Tan, China
Zong Woo Geem, USA
Monika Jain, India
Rahul Saxena, India
Vaishali Mohite, India
And many more …
Contents

A New Approach for Authorship Attribution . . . . . . . . . . . . . . . . . . . . . 1


P. Buddha Reddy, T. Raghunadha Reddy, M. Gopi Chand
and A. Venkannababu
Using Aadhaar for Continuous Test-Taker Presence Verification in
Online Exams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
N. Sethu Subramanian, Sankaran Narayanan, M. D. Soumya,
Nitheeswar Jayakumar and Kamal Bijlani
Determining the Popularity of Political Parties Using Twitter
Sentiment Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Sujeet Sharma and Nisha P. Shetty
Analysis of Passenger Flow Prediction of Transit Buses Along a Route
Based on Time Series . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Reshma Gummadi and Sreenivasa Reddy Edara
Smart Fire Safety: Serious Game for Fire Safety Awareness . . . . . . . . . 39
George Jacob, R. Jayakrishnan and Kamal Bijlani
An OpenMP-Based Algorithmic Optimization for Congestion Control
of Network Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Monika Jain, Rahul Saxena, Vipul Agarwal and Alok Srivastava
Comparative Analysis of Frequent Pattern Mining for Large Data
Using FP-Tree and CP-Tree Methods . . . . . . . . . . . . . . . . . . . . . . . . . . 59
V. Annapoorna, M. Rama Krishna Murty, J. S. V. S. Hari Priyanka
and Suresh Chittineni
Wireless Seatbelt Latch Status Indicator . . . . . . . . . . . . . . . . . . . . . . . . 69
S. P. Adithya and O. V. Gnana Swathika
A Study of Various Varieties of Distributed Data Mining
Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Sukriti Paul, Nisha P. Shetty and Balachandra

xiii
xiv Contents

Graph Representation of Multiple Misconceptions . . . . . . . . . . . . . . . . . 89


Sylvia Encheva
Classification Through Discriminant Analysis Over Educational
Dataset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Parag Bhalchandra, Aniket Muley, Mahesh Joshi, Santosh Khamitkar,
Hanumant Fadewar and Pawan Wasnik
Dynamic and Secure Authentication Using IKC for Distributed Cloud
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
M. Ranjeeth Kumar, N. Srinivasu and Lokanatha C. Reddy
Planned Random Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Anurag Pant, Kunwar Agrawal and B. K. Tripathy
Hurst Exponent as a New Ingredient to Parametric Feature Set for
Mental Task Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Akshansh Gupta, Dhirendra Kumar and Anirban Chakraborti
A Crawler–Parser-Based Approach to Newspaper Scraping and
Reverse Searching of Desired Articles . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Ankit Aich, Amit Dutta and Aruna Chakraborty
Impact of Cloud Accountability on Clinical Architecture and
Acceptance of Healthcare System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Biswajit Nayak, Sanjaya Kumar Padhi and Prasant Kumar Pattnaik
A Stability Analysis of Inverted Pendulum System Using
Fractional-Order MIT Rule of MARC Controller . . . . . . . . . . . . . . . . . 159
Deep Mukherjee, Palash Kundu and Apurba Ghosh
KMDT: A Hybrid Cluster Approach for Anomaly Detection
Using Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Santosh Thakur and Ramesh Dharavath
Extraction and Sequencing of Keywords from Twitter . . . . . . . . . . . . . 177
Harkirat Singh, Mukesh Kumar and Preeti Aggarwal
A Modular Approach for Social Media Text Normalization . . . . . . . . . 187
Palak Rehan, Mukesh Kumar and Sarbjeet Singh
Author Verification Using Rich Set of Linguistic Features . . . . . . . . . . . 197
A. Bhanu Prasad, S. Rajeswari, A. Venkannababu
and T. Raghunadha Reddy
Deterministic and Randomized Heuristic Algorithms for
Uncapacitated Facility Location Problem . . . . . . . . . . . . . . . . . . . . . . . . 205
Soumen Atta, Priya Ranjan Sinha Mahapatra and Anirban Mukhopadhyay
Contents xv

Group Search Optimization Technique for Multi-area Economic


Dispatch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Chitralekha Jena, Swati Smaranika Mishra and Bhagabat Panda
Adaptive Control of Aircraft Wing Oscillations with Stiffness and
Damping Nonlinearities in Pitching Mode . . . . . . . . . . . . . . . . . . . . . . . 227
L. Prabhu and J. Srinivas
Application of Total Least Squares Version of ESPRIT Algorithm for
Seismic Signal Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
G. Pradeep Kamal and S. Koteswara Rao
Metadata-Based Semantic Query in Multilingual Databases . . . . . . . . . 249
Ch. V. S. Satyamurty, J. V. R. Murthy and M. Raghava
A Step Towards Internet Anonymity Minimization: Cybercrime
Investigation Process Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Shweta Sankhwar, Dhirendra Pandey and R. A. Khan
Comparison of Different Fuzzy Clustering Algorithms: A Replicated
Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Tusharika Singh and Anjana Gosain
Passive Object Tracking Using MGEKF Algorithm . . . . . . . . . . . . . . . . 277
M. Kavitha Lakshmi, S. Koteswara Rao, K. Subrahmanyam and
V. Gopi Tilak
Instantaneous Time Smoothing in GPS Receivers Using
Kalman Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
R. Revathi, K. S. Ramesh, S. Koteswara Rao and K. Uday Kiran
Application of Least Squares Algorithm for Precise GPS Receiver
Positioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
R. Revathi, K. S. Ramesh, S. Koteswara Rao and K. Uday Kiran
Application of Parametric Methods for Earthquake Precursors Using
GPS TEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
R. Revathi, K. S. Ramesh, S. Koteswara Rao and K. Uday Kiran
A Fuzzy-Based Modified Gain Adaptive Scheme for Model Reference
Adaptive Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
A. K. Pal, Indrajit Naskar and Sampa Paul
Early System Test Effort Estimation Automation for Object-Oriented
Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Pulak Sahoo, J. R. Mohanty and Debabrata Sahoo
Identification of Coseismic Signatures by Comparing Welch and Burg
Methods Using GPS TEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
K. Uday Kiran, S. Koteswara Rao, K. S. Ramesh and R. Revathi
xvi Contents

Energy-Efficient GPS Usage in Location-Based Applications . . . . . . . . . 345


Joy Dutta, Pradip Pramanick and Sarbani Roy
Group Recommender Systems-Evolutionary Approach Based on
Consensus with Ties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Ritu Meena
Cryptanalysis of Image Cryptosystem Using Synchronized 4D Lorenz
Stenflo Hyperchaotic Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Musheer Ahmad, Aisha Aijaz, Subia Ansari,
Mohammad Moazzam Siddiqui and Sarfaraz Masood
Automatic Text-Line Level Handwritten Indic Script Recognition:
A Two-Stage Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Pawan Kumar Singh, Anirban Mukhopadhyay, Ram Sarkar
and Mita Nasipuri
Weight-Based Secure Approach for Identifying Selfishness Behavior
of Node in MANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
Shoaib Khan, Ritu Prasad, Praneet Saurabh and Bhupendra Verma
Assisting Vehicles Using Cyber-Physical Systems . . . . . . . . . . . . . . . . . . 399
Navid Anjum Munshi, Chandreyee Chowdhury and Sarmistha Neogy
An Efficient Framework Based on Segmented Block Analysis for
Human Activity Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Vikas Tripathi, Durgaprasad Gangodkar, Monika Pandey
and Vishal Sanserwal
Ranked Gene Ontology Based Protein Function Prediction by
Analysis of Protein–Protein Interactions . . . . . . . . . . . . . . . . . . . . . . . . 419
Kaustav Sengupta, Sovan Saha, Piyali Chatterjee, Mahantapas Kundu,
Mita Nasipuri and Subhadip Basu
Investigation of Optimal Cyclic Prefix Length for 4G
Fading Channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Ch. Vijay, G. Sasibhushana Rao and Vinodh Kumar Minchula
High-Density Noise Removal Algorithm for Brain Image Analysis . . . . . 437
Vimala Kumari G, Sasibhushana Rao G and Prabhakara Rao B
A Pragmatic Study and Analysis of Load Balancing Techniques in
Parallel Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Varsha Thakur and Sanjay Kumar
A Novel Segmentation Algorithm for Feature Extraction of Brain
MRI Tumor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Ch. Rajasekhara Rao, M. N. V. S. S. Kumar and G. Sasi Bhushana Rao
Contents xvii

Adaptive Parameter Estimation-Based Drug Delivery System for


Blood Pressure Regulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Bharat Singh and Shabana Urooj
Mathematical Modeling of Sensitivity and Specificity for Basal Cell
Carcinoma (BCC) Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
Sudhakar Singh and Shabana Urooj
Integer Representation and B-Tree for Classification of Text
Documents: An Integrated Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
S. N. Bharath Bhushan, Ajit Danti and Steven Lawrence Fernandes
Switching Angle and Power Loss Calculation for THD Minimization
in CHB-Multilevel Inverter Using DEA . . . . . . . . . . . . . . . . . . . . . . . . . 491
Gayatri Mohapatra and Manas Ranjan Nayak
Load Balancing of Unbalanced Matrix with Summation Method . . . . . . 503
Ranjan Kumar Mondal, Payel Ray, Enakshmi Nandi, Biswajit Biswas,
Manas Kumar Sanyal and Debabrata Sarddar
Detection of Outliers Using Interquartile Range Technique from
Intrusion Dataset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
H. P. Vinutha, B. Poornima and B. M. Sagar
A Novel Arbitrary-Oriented Multilingual Text Detection in
Images/Video . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
H. T. Basavaraju, V. N. Manjunath Aradhya and D. S. Guru
Working with Cassandra Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
Saurabh Anand, Pallavi Singh and B. M. Sagar
Learning to Solve Sudoku Problems with Computer Vision Aided
Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
Tuan T. Nguyen, Sang T. T. Nguyen and Luu C. Nguyen
Combined Effect of Cohort Selection and Decision Level Fusion in a
Face Biometric System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
Jogendra Garain, Ravi Kant Kumar, Dipak Kumar, Dakshina Ranjan Kisku
and Goutam Sanyal
Global Stability of Harvested Prey–Predator Model with Infection in
Predator Species . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
Nishant Juneja and Kulbhushan Agnihotri
Flying Ad hoc Networks: A Comprehensive Survey . . . . . . . . . . . . . . . . 569
Amartya Mukherjee, Vaibhav Keshary, Karan Pandya, Nilanjan Dey
and Suresh Chandra Satapathy
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581
About the Editors

Suresh Chandra Satapathy, Ph.D. is currently working as Professor and Head


of the Department of CSE, PVPSIT, Vijayawada, India. He was the National
Chairman Div-V (Educational and Research) of the Computer Society of India from
2015 to 2017. A Senior Member of IEEE, he has been instrumental in organizing
more than 18 international conferences in India and has edited more than 30 books
as a corresponding editor. He is highly active in research in the areas of Swarm
Intelligence, Machine Learning, and Data Mining. He has developed a new opti-
mization algorithm known as social group optimization (SGO) and authored more
than 100 publications in reputed journals and conference proceedings. Currently, he
serves on the editorial board of the journals IGI Global, Inderscience, and Growing
Science.

Joao Manuel R. S. Tavares earned his Ph.D. in Electrical and Computer Engi-
neering in 2001 and his postdoctoral degree in Mechanical Engineering in 2015. He
is a Senior Researcher and Project Coordinator at the Instituto de Ciência e Ino-
vação em Engenharia Mecânica e Engenharia Industrial (INEGI), Portugal, and an
Associate Professor at the Faculdade de Engenharia da Universidade do Porto
(FEUP), Portugal. He is the co-editor of more than 35 books, co-author of more
than 550 articles in international and national journals and conferences, and holder
of 3 international and 2 national patents. He is the co-founder and co-editor of the
book series “Lecture Notes in Computational Vision and Biomechanics,” founder
and editor-in-chief of the journal “Computer Methods in Biomechanics and
Biomedical Engineering: Imaging and Visualization,” and co-founder and co-chair
of the international conference series: CompIMAGE, ECCOMAS VipIMAGE,
ICCEBS, and BioDental.

Vikrant Bhateja is an Associate Professor in the Department of ECE, SRMGPC,


Lucknow, and also the Head of Academics and Quality Control at the same college.
His areas of research include Digital Image and Video Processing, Computer
Vision, Medical Imaging, Machine Learning, Pattern Analysis, and Recognition.
He has authored more than 120 publications in various international journals and

xix
xx About the Editors

conference proceedings. He is an Associate Editor for the International Journal of


Synthetic Emotions (IJSE) and International Journal of Ambient Computing and
Intelligence (IJACI).

J. R. Mohanty is a Professor and Associate Dean School of Computer Applica-


tions at KIIT University, Bhubaneswar, India. He holds a Ph.D. (Computer Sci-
ence) and has 20 years of experience teaching postgraduate students. His key
strengths in research and academia include Database Management Systems,
Operating Systems, Evolutionary Algorithms, Queueing Networks, and Cloud
Computing. He has published a number of research papers in peer-reviewed
international journals and conferences.
A New Approach for Authorship
Attribution

P. Buddha Reddy, T. Raghunadha Reddy, M. Gopi Chand


and A. Venkannababu

Abstract Authorship attribution is a text classification technique, which is used to


find the author of an unknown document by analyzing the documents of multiple
authors. The accuracy of author identification mainly depends on the writing styles
of the authors. Feature selection for differentiating the writing styles of the authors
is one of the most important steps in the authorship attribution. Different researchers
proposed a set of features like character, word, syntactic, semantic, structural, and
readability features to predict the author of a unknown document. Few researchers
used term weight measures in authorship attribution. Term weight measures have
proven to be an effective way to improve the accuracy of text classification. The
existing approaches in authorship attribution used the bag-of-words approach to
represent the document vectors. In this work, a new approach is proposed, wherein
the document weight is used to represent the document vector instead of using
features or terms in the document. The experimentation is carried out on reviews
corpus with various classifiers, and the results achieved for author attribution are
prominent than most of the existing approaches.

Keywords Authorship attribution ⋅ Author prediction ⋅ Term weight measure


BOW approach

P. B. Reddy (✉) ⋅ T. R. Reddy ⋅ M. G. Chand


Department of IT, Vardhaman College of Engineering, Hyderabad, India
e-mail: [email protected]
T. R. Reddy
e-mail: [email protected]
M. G. Chand
e-mail: [email protected]
A. Venkannababu
Department of CSE, Sri Vasavi Engineering College, Tadepalligudem, Andhra Pradesh, India
e-mail: [email protected]

© Springer Nature Singapore Pte Ltd. 2018 1


S. C. Satapathy et al. (eds.), Information and Decision Sciences,
Advances in Intelligent Systems and Computing 701,
https://doi.org/10.1007/978-981-10-7563-6_1
2 P. B. Reddy et al.

1 Introduction

The web is growing constantly with a huge amount of text mainly through blogs,
twitter, reviews, and social media. Most of this text is written by various authors in
different contexts. The availability of text challenges the researchers and informa-
tion analysts to develop automated tools for information analysis. Authorship
analysis is one such area attracted by several researchers to extract information from
the anonymous text. Authorship analysis is a procedure of finding the authorship of
a text by inspecting its characteristics. Authorship analysis is classified into two
categories such as authorship identification and author profiling [1].
Authorship identification finds the authorship of a document. It is categorized
into two classes namely, authorship attribution and authorship verification.
Authorship attribution predicts the author of a given anonymous document by
analyzing the documents of multiple authors [2]. Authorship verification finds
whether the given document is written by a particular author or not by analyzing the
documents of a single author [3]. Author profiling is a type of text classification
task, which predicts profiling characteristics such as gender, age, occupation, native
language, location, education, and personality traits of the authors by analyzing
their writing styles [4].
Authorship attribution is used in several applications such as forensic analysis,
security, and literary research. In forensic analysis, the suicide notes and property
wills are analyzed whether the note or will is written by a correct person or not by
analyzing the writing styles of suspected authors. The terrorist organizations send
threatening mails; authorship attribution techniques are used to identify which
terrorist organization send the mail or to confirm the mail whether it came from
correct source or not. In literary research, some researchers try to claim the inno-
vations of others without proper acknowledgement. The authorship attribution is
used to identify author of a document by analyzing the writing styles of the various
authors.
The authorship attribution approaches are divided into two categories such as
profile-based approaches and instance-based approaches [1]. In this work, an
instance-based approach is discussed. In the profile-based approach, the available
training texts per author were concatenated to get a single text file. This single big
file is used to extract the different properties of the author’s style. In the
instance-based approaches, the known authorship text sample is considered as an
instance and every text sample as a unit.
This paper is planned as follows. Section 2 explains the related work done by the
researchers in authorship attribution area. The existing model used by several
researchers to represent a document is described in Sect. 3. In Sect. 4, the proposed
model is explained with a term weight measure and document weight measure. The
A New Approach for Authorship Attribution 3

experimental results are analyzed in Sect. 5. Section 6 concludes this work and
suggests the future work in authorship attribution.

2 Existing Work

Authorship attribution task is subdivided into two different subtasks: First,


extraction of most discriminative features to differentiate the writing styles of the
authors; and second, identifying the suitable classification algorithm to detect the
most probable author of a test document [5].
The character trigrams, POS bigrams and trigrams, suffixes, word length, syn-
tactic complexity and structure, and percentage of direct speech from the documents
is extracted in Stefan Ruseti et al. [6] to represent the document vector. They
experimented with Sequential Minimal Optimization (SMO) algorithm and
obtained an accuracy of overall 77% in authorship identification. It was observed
that the accuracy is increased when the application-specific features are added.
Ludovic Tanguy et al. experimented [7] with rich linguistic features such as
frequency of character trigrams, contraction forms, phrasal verbs, lexical generosity
and ambiguity, frequency of POS trigrams, syntactic dependencies, syntactic
complexity, lexical cohesion, morphological complexity, lexical absolute fre-
quency, punctuation and case, quotations, first/third person narrative and proper
names, and maximum entropy machine learning tool. It was observed that the rich
set of linguistic features perform well for author identification when compared to
trigrams of characters and word frequencies.
Ludovic Tanguy et al. experimented [8] with linguistic features such as
sub-word-level features, word-level features, sentence-level features, and
message-level features to represent the document vectors. They used maximum
entropy technique and machine learning algorithms such as rule-based learners and
decision trees to evaluate the accuracy of author prediction. It was observed that
maximum entropy technique achieved good accuracy than machine learning
algorithms.
N. Akiva used [9] single vector representation that captures the presence or
absence of common words in a text. They used SVM-Light classification algorithm
to generate the classification model. They observed that the accuracy of author
prediction is increased when binary BOW representation is used to represent the
document vector and also observed that the accuracy is increased when the number
of authors is increased in the training data.
In this work, the dataset was collected from www.amazon.com, and it contains
10 different authors’ reviews on different products. The corpus is balanced in terms
of number of documents in each author group, and each author group contains 400
reviews of each. The accuracy measure is used to evaluate the performance of the
4 P. B. Reddy et al.

author prediction. Accuracy is the ratio of number of documents correctly predicted


their author and the number of documents considered.

3 Existing Approach

Most of the authorship attribution approaches used the Bag-Of-Words (BOW) -


approach to represent the document vector.

3.1 Bag-of-Words (BOW) Approach

Figure 1 shows the model of the BOW approach. In this approach, first collect the
corpus. Then, preprocessing techniques are applied to the collected dataset. Extract

Training Corpus

Preprocessing Techniques

Extracting Features

Bag of Words
(F1 ,F2 ,…………………….,F n )

Computation of Feature Weights


(WF1, WF2 ,………………………,WFn)

Document Vectors Representation


< WF1, WF2 ,………………………,WFn, Document Class Label>

Classification Model

Fig. 1 The model of the BOW approach


A New Approach for Authorship Attribution 5

the most frequent terms or features that are important to discriminate the writing
styles of the authors from the modified dataset. Consider these terms or features as
BOW. Every document in the dataset is represented by this BOW. Each value in the
document vector is the weights of the BOW. Finally, the document vectors are used
to generate classification model.

4 Proposed Author-Specific Document Weighted


(ADW) Approach

Figure 2 depicts the model of proposed author-specific document weighted


approach.
In the proposed approach first, collect the reviews corpus. Apply preprocessing
techniques to the corpus of documents such as stop words removal and stemming.
Extract frequent terms that occur at least 5 times in the updated corpus. Compute

TRAINING CORPUS
<D1,D2,………………..Dm>

PREPROCESSING
TECHNIQUES

EXTRACTING MOST FREQUENT TERMS FROM THE


CORPUS
<T1,T2,T3,,……………………………….Tn>

UNKNOWN
DOCUMENT ( Du )

PREPROCESSING
TECHNIQUES

GENERATE DOCUMENT VECTORS


TEST DOCUMENT VECTORS

AUTHOR OF A
CLASSIFICATION MODEL UNKNOWN
PREDICTS DOCUMENT

Fig. 2 Model of proposed ADW approach


6 P. B. Reddy et al.

term weights in each author group of documents using term weight measures.
Document weights are determined for each author group by aggregating the weights
of the terms in a document using document weight measure. Generate document
vectors with document weights to build a classification model. Finally, the classi-
fication model is used to predict the author of an unknown document.
In this model, {A1,A2, …Aq} is a set of author groups, {D1, D2, …Dm} is a list of
documents in the corpus, and {T1, T2, …Tn} is a list of vocabulary terms. TWAxy is
the weight of the term Ty weight in the author group Ax, and DWApq is the
document Dq weight in the author group Ap. The profiles of an anonymous doc-
ument are predicted using classification model. In this approach, identification of
suitable weight measures for calculating term weight and document weight is
important. Sections. 4.1 and 4.2 discuss about the weight measures used in this
approach.

4.1 Term Weight Measure

In text classification, the text document is represented by the vector space model
and predefined classes are assigned to documents through machine learning algo-
rithms. In vector space model, the documents are represented as numerical feature
vector, which consists of the weights of the terms that are extracted from the
document. The basic problem in text classification is identification of appropriate
term weight measure to calculate the weight of the terms that directly affects the
classification accuracy.
In this work, the Discriminative Feature Selection Term Weight (DFSTW)
measure [10] was identified from text categorization domain to select the best
features to categorize the text. This measure is tested on our corpus to predict the
characteristics of the authors. DFS measure assigns more weight to the terms that
are having high average term frequency in class cj and the terms with high
occurrence rate in most of the documents of cj. DFS measure assigns less weight to
the terms that occurred in most of the documents in both cj and cj . The DFSTW
measure is represented in Eq. (1).

tf ðti , cj Þ ̸ df ðti , cj Þ aij aij aij cij


Wðti , cj Þ = × × × − 
tf ðti , cj Þ ̸ df ðti , cj Þ aij + bij aij + cij aij + bij cij + dij
ð1Þ

where A = {A1, A2, ….Aq} is the set of author groups, {D1, D2,…., Dm}is a
collection of documents in the corpus, and V = {t1,t2, ….,tn} is a collection of
vocabulary terms for analysis. aij is the number of documents of class cj which
contains the term ti, bij is the number of documents of class cj which does not
contain term ti, cij is the number of documents which contains term ti and does not
Another random document with
no related content on Scribd:
A Long Journey

At any rate the Gregorian chant flourished and was so loved that
Benedict Biscop, and other monks interested in music, came from
far-off England to learn the chant invented by St. Gregory. A long
journey! In 675 Biscop sent to Rome for singers and built
monasteries very close to a pagan temple, where the Anglo-Saxons
still worshipped the Roman Sun god, Apollo, also god of music.
These he filled with beautiful relics, paintings and stained glass
windows, Bibles and service books illuminated in gold and color,
which he brought from Rome.
Bringing things from Rome may sound easy to you, but fancy the
travel and inconvenience when there were no steamships, no
railroads, no aeroplanes, but only Roman roads, which however
marvelous, were long and wearisome by foot or by horse, or mule
and rude wagons. This shows how much the people of Britain desired
music and beauty in their church services.
Venerable Bede

About this time, there lived a man in England so loved and


respected that he was called the Venerable Bede. Although music had
no such variety, melody and richness as today, just see what the
Venerable Bede says about it: “Music is the most worthy, courteous,
pleasant, joyous and lovely of all knowledge; it makes a man
gentlemanly in his demeanor, pleasant, courteous, joyous, lovely, for
it acts upon his feelings. Music encourages us to bear the heaviest
afflictions, administers consolation in every difficulty, refreshes the
broken spirit, removes headache and cures crossness and
melancholy.”
Isn’t it remarkable for a man to have said this so long ago, when
scientists, today, have just begun to think that music may have a
power of healing ills of the mind and of the body! Truly—“there is
nothing new under the sun!”
So Bede used the plain chant of Gregory and through his influence,
spread this dignified music throughout England, and wherever a
monastery was founded, a music school was started.
The Venerable Bede writes that Ethelbert of Kent, King of Britain,
was a worshipper of Odin and Thor, Norse gods, but he married a
French Princess who was a Christian. One day, writes the Venerable
Bede, forty monks led in solemn procession by St. Augustine, passed
before the king singing a chant. After hearing this marvelous hymn,
he became a Christian and gave permission to the English to become
worshippers of Christ instead of Norse and Druid gods. This hymn
which converted Ethelbert in 597 A.D. was sung thirteen hundred
years later (1897) in the same place, Canterbury, by another group of
Benedictine monks!
At first the songs were sung unaccompanied, but later as in the
time of David, the Church allowed instruments. The lyre and the
harp were used first but the cymbals and the dulcimer, somewhat
like our zither, were considered too noisy.
The Venerable Bede called music made by instruments artificial
music, and that of the human voice, natural music. Whether at that
time the viol, the drum, the organ or the psaltery (an instrument like
the dulcimer) were used in the Church, is not known positively.
After Bede’s death, Alcuin, a monk and musician, continued his
work. He was appointed by Charlemagne, Emperor of France, to
teach music in the schools of Germany and France to spread the use
of the Gregorian chant.
A Curious Music System

In 900 A.D. an important thing happened, by which the reading


and learning of music was much simplified. A red line was drawn
straight across the page and this line represented “F” the tone on the
fourth line of the bass staff. The neumes written on this red line were
“F” and the others above or below, were of higher or lower pitch. This
worked so well, that they placed a yellow line above the red line and
this they called “C.” These two lines were the beginnings of our five
line staff, but much happened between the two-line days and the five.
At this time people did not sing in parts, known as they are to us—
soprano, alto, tenor, bass, but everybody sang the same tune, that is,
sang in unison, and when men and women or men and boys sang
together, the men’s voices sounded an octave lower than the
women’s and the boy’s. Some voices have naturally a high range and
others low, and no doubt in these plain chant melodies the singers
who could not reach all the tones comfortably, dropped
unconsciously to a lower pitch, and in that way, made a second part.
Soon the composers made this melody in the medium range of the
voice a part of their pieces instead of trusting the singers to make it
up as they went along. The principal tune sung or carried by most of
the singers was given the name tenor (from the Latin teneo, to hold
or carry). We use the same word to indicate the man’s voice of high
range.
Hucbald and Organum

Hucbald (840–930), a Flemish monk, first wrote a second part,


always a fifth above or a fourth below the tenor or “subject.” (The
Latin name for the subject is cantus firmus—fixed song.) Hucbald
probably used the fifth and fourth because they were perfect
intervals, and all others except the octave, were imperfect. There
were often four parts including the cantus firmus, for two parts were
doubled. This succession of fourths and fifths sounds very crude and
ugly (just try the example), but these people of the Middle Ages must
have liked it, for it lasted several centuries and was an attempt at
making chords. This music was called organum or diaphony (dia-
two, phony-sound: two sounds). As early as 1100, singers tried out
new effects with the added parts and introduced a few imperfect
intervals, thirds and sixths, and tried singing occasionally in contrary
motion to the subject,—this was called discant from a Greek word
meaning discord. Maybe at first it sounded discordant but soon it
came to mean any part outside of the cantus firmus or subject. (See
musical illustrations.)

Organum (IXth and Xth Centuries)

Diaphony
Discant (XIIth Century)

Example of Organum, Diaphony, Discant

There was also a kind of diaphony in which a third voice was


written as a bass, a fifth below the cantus firmus, but it was actually
sung an octave higher than it was written and sounded much better
that way. As it was not a bass at all it received the name of false bass
or faux bourdon. This was the beginning of chords such as we use.
So, Hucbald started the science of harmony,—the study of chords.
Hucbald called this ars organum—the art of organating or
organizing.
Hucbald also invented a system of writing music on a staff. It was
not a staff such as we use today for he wrote in the spaces the initials
T and S. T meant that the singer was to sing a whole tone, S, a
semitone or half-step. He used a six line staff and wrote words in
script instead of notes like this:
Guido d’Arezzo and His Additions to Music

The next great name in music history is Guido d’Arezzo, a


Benedictine monk (995–1050), famous for his valuable additions to
music.
He invented the four-line staff, using both lines and spaces and
giving a definite place on the staff to each sound:

Yellow line C————————————


Black line .............
Red line F————————————
Black line .............

In the Middle Ages, the men did most of the singing so the music
was written in a range to suit their voices. C is middle C, and F the
bass clef.
All music had to be written by hand and the monks made
wonderful parchment copies of works composed for the church
services. They soon grew careless about the yellow lines and red
lines, so Guido placed the letters C and F at the beginning of the lines
instead of using the colored lines.
Sometimes there were three lines to a staff, sometimes four, five,
and even eleven! The use of clefs showing which line was C or F,
made reading of music much easier. At the end of the 16th century
the question of the number of lines to the staff was definitely
decided, then they used four lines for the plain chant and five for all
secular music. By calling the fifth line of the eleven, middle C, two
staffs of five lines resulted—the grand staff of today.
Here is a table to show you how clefs grew:
Hucbald built his scales in groups of four tones like the Greek
tetrachords but Guido extended this tetrachord to a hexachord or
six-toned scale, and by overlapping the hexachords, he built a series
of scales to which he gave the name, gamut, because it started on the
G which is the first note of our grand staff (lowest line, bass clef) and
the Greek word for G is “Gamma.”

In the lowest hexachord, the B is natural, in the second hexachord


there is no B and in the third hexachord, the B is flattened. Our sign
(♭) for flat comes from the fact that this B was called a round B and
the sign ( ♮ ) for natural was called a square B. The sharp ( ♯ ) came
from the natural and both meant at first raising the tone a half-step.
Guido once heard the monks in the monastery of Arezzo singing a
hymn in honor of St. John the Baptist. He noticed that each line of
the Latin poem began on ascending notes of the scale,—the first line
on C, the second on D, and so on up to the sixth on A. It gave him the
idea to call each degree of the hexachord by the first syllable of the
line of the Latin hymn, thus:
Utqueant laxis,
Resonare fibris,
Mira gestorum,
Famuli tuorum,
Solve polluti,
Labia reatum.

Hymn to St. John the Baptist

Here is a translation:
Grant that the unworthy lips of Thy servant
May be gifted with due harmony,
Let the tones of my voice
Sing the praises of Thy wonders.

We still call our scale degrees ut (frequently changed to do), re, mi,
fa, sol, la. The French today use these syllables instead of the letters
of the alphabet, and Guido is known as the man who originated this
solmization (the word taken from the syllables sol and mi).
Where did the syllable si, the seventh degree of the scale, come
from? This hymn was written to St. John and in Latin his name is
Sancte Ioannes, the initials of which form the syllable si which came
into use long after Guido’s time.
This system was very difficult for the singers to learn as it was
quite new to them, so Guido used his hand as a guide to the singers.
Each joint represented a different syllable and tone, and a new scale
began on every fourth tone. Look at the Guidonian hand on the next
page.
Guido was so great a teacher and musician that he was given credit
for inventing much that already existed. He gathered all the
knowledge he could find into a book, that was sent to the
monasteries and music schools. He put in much that never before
had been written down, explained many things that had never been
clear, and added much that was new and useful.
Sometimes his name was written Gui or Guion. When he lived
people had no last names but were called by the name of their native
towns; as Guido was born in Arezzo, a town of Tuscany, he was called
Guido d’Arezzo; Leonardo da Vinci, the great painter, was born in
the village of Vinci; and the great Italian composer Pierluigi da
Palestrina came from Palestrina.
Guido’s work was considered revolutionary and not in accord with
the old ways which the church fathers reverenced. Because of plots
against him, he was cast into prison. But the Pope, realizing his
greatness and value, saved him. The inventors of new ideas always
suffer!
Mensural Music or Timed Music

Before Guido invented it, there had been no system of counting


time.
If you are studying music, you know all about time signatures and
what metre a piece is in, from the ¾, ⁶⁄₈, ⁹⁄₈, ²⁄₄, ⁴⁄₄ or sign Ⅽ at the
beginning of the composition, but you probably do not know how or
when these signs came into use. In the Gregorian plain song and in
Organum, there was practically no variety of rhythm and no need for
showing time or marking off the music into measures. The accents
fell quite naturally according to the words that were sung, much as
you would recite poetry. But as music grew up and became more
difficult, it was necessary for a chorus singing in three or four
different parts, to sing in time as well as in tune, in order, at least, to
start and finish together!
The first metre that was used was triple (three beats to the
measure). It was called perfect and was indicated by a perfect circle,

, the symbol of the Holy Trinity and of perfection. Duple


metre (two beats to the measure) was imperfect and was indicated by

an incomplete circle, . Our sign for common time (four beats to

the measure), comes from this incomplete circle. ⁹⁄₈ was

written ; ¾ was ; ⁶⁄₈ was ; and ⁴⁄₄ was .


A monk named Franco, from Cologne, on the Rhine, early in the
twelfth century, invented these time signatures, and notes which in
themselves indicated different time values. Hucbald’s neumes were
no longer suited to the new music, and besides time signatures it
became necessary to have a music language showing very clearly and
definitely the composer’s rhythm.
Franco used four kinds of notes. Here they are translated into the
time values of today.
Organs

In the 10th century, organs came into use in the churches, but they
were ungainly and crude, sounding only a few tones, and were
probably only used to keep the singers on pitch. The organ had been
invented long before this, and had been used in Greece and Egypt. It
was built on the principle of Pan’s Pipes and was very simple. There
were many portable organs, called portatives, small enough to be
carried about.
One organ (not a portative!) at Winchester, England, had four
hundred pipes and twenty-six pairs of bellows. It took seventy men
to pump air into it and two men to play it by pounding on a key with
their fists or elbows. The tone was so loud that it could be heard all
over the town. Fancy that!
During these centuries, music was growing slowly but surely. Out
of organum and discant and faux bourdon, arose a style called
counterpoint, in which three, four or more melodies were sung at the
same time. The writing of counterpoint, or line over line, is like a
basket weave for the different melodies weave in and out like pieces
of willow or raffia forming the basket. Later will come the chorale,
written in chords or up and down music like a colonnade or series of
columns. Keep this picture in mind. (St. Nicolas Tune, Chapter XI.)
The word point means note so counterpoint means note against
note. The word was first applied in the 13th century to very crude
and discordant part-writing. But, little by little the monks learned
how to combine melodies beautifully and harmoniously and we still
use many of their rules.
Gradually great schools of church music flourished in France,
Germany, Spain, England, Italy and the Netherlands in the 14th, 15th
and 16th centuries.
Bit by bit this vast musical structure was built. It did not grow
quickly; each new idea took centuries to become a part of music, and
as often the idea was not good, it took a long time to replace it.
CHAPTER VIII
Troubadours and Minnesingers Brought Music to Kings and People

Except for the first few chapters in this book, we have told you of
music made by men who wanted to improve it. You have seen how
the fathers of the Church first reformed music, and gave it a
shorthand called neumes; before that, the music laws of the
Egyptians, the scales and modes of the Arab, the Greek scales which
the churchmen used in the Ambrosian and the Gregorian modes.
Then came the two-lined staff, and the beginnings of mensural or
measured music by which they kept time. Then you saw how two
melodies were fitted together and how they grew into four parts. All
this we might call “on purpose” music. At the same time, in all the
world, in every country, there was Song ... and never have the world
and the common people (called so because they are neither of the
nobility nor of the church) been without folk song which has come
from the folks of the world, the farmers, the weavers, and the
laborers.
The best of these songs have what the great composers try to put
into their music—a feeling of fresh free melody, design, balance, and
climax, but more of this in the chapter on Folk Song.
This chapter is to be about Troubadours, Trouvères, and
Minnesingers, who have left over two thousand songs. In most of
these, they made up both words and music, but sometimes they used
new words made up for folk tunes that everyone knew, or for
melodies from the plain-chants which they had heard in church;
sometimes they used the same melody for several different poems,
and often they set the same words to several melodies. Many of these
troubadour songs and minnelieder became the people’s own folk
songs.
But now you must hear of the folk who lived hundreds of years
before these poet singers. Unknowingly, out of the heart and soul
and soil of their native lands, they made songs and sang poetry and
played sometimes other peoples’ song, scattering their own wherever
they went.
From these traveling singers and players, in all countries, came the
professional musicians who were minstrels, bards, troubadours, etc.,
according to when, where and how they lived.
The Why of the Minstrel

The people sang and played not only because they wanted to, or
because they loved it, but because they were the newspaper and the
radio of their time, singing the news and doings of the day. These
minstrels who traveled from place to place “broadcasted” the events.
No music was written down and no words were fastened by writing
to any special piece. The singer would learn a tune and when he sang
a long story (an epic) he would repeat the tune many times so it was
necessary to find a pleasing melody, or singers would not have been
very welcome in the courts and market places. These musical news
columns entertained the people who had few amusements. The
wandering minstrels with their harps or crwth (Welsh harps), or
whatever instrument they might have used in their particular
country, were welcomed with open arms and hearts.
This sounds as if these singers and players traveled, and indeed
they did! They sprang up from all parts of Europe and had different
names in different places. There were bards from Britain and
Ireland, skalds from the Norse lands, minstrels from “Merrie
England,” troubadours from the south of France, trouvères from the
north of France, jongleurs from both north and south who danced
and juggled for the joy of all who saw them, and minnesingers and
meistersingers in Germany.
Druids and Bards

Centuries before this, Homer the great Greek poet was called the
Blind Bard and he chanted his poems, the Iliad and the Odyssey, to
the accompaniment of the lyre, the favorite instrument of the Greeks.
But when we speak of bards in this chapter we mean the poets and
musicians of ancient Britain, when that island was inhabited and
ruled by the Druids, 1000 B.C. We do not know when the bards first
began to make music or when they were first called bards, but it is
certain that for many centuries before the Christian era, these rude,
barbarous people of the countries we know as Wales, England,
Ireland and Scotland, had many songs, dances and musical
instruments.
Look at a map of France, and see how much like a teapot it is
shaped. The western part, the spout, is Brittany! As its name shows,
this part of France was inhabited by the same race of people as were
in Britain, they spoke the same language, had the same religion and
made the same music. These people were Celts and their priests were
called Druids. Much we said about primitive people is true of these
early Britons. They expressed their feelings, and tried to protect
themselves from Nature and human foes by means of religious rites
and ceremonies in which music and dancing played the leading part.
They had no churches, but held religious services in the open
under the oak trees. They piled boulders on top of each other to form
altars, or built large circular enclosures of huge flat rocks, inside of
which they gathered for worship, or to assist at some ceremonial in
which sacrifices of animals and occasionally of human beings were
made. These human sacrifices occurred once a year at the Spring
Festival which was celebrated in much the same fashion as in Greece.
These masses of stone are found not only in the British Isles, the
most famous of which is Stonehenge (which was recently bought by
an American), but there are also many of these so-called cromlechs
and menhirs in Brittany.
It is curious how often men and women do the same things at
times and places so completely separated that they could not have
been influenced by each other, but did what was natural for them. It
seems that between the state of being primitive or savage and of
being cultured, mankind must pass through certain states of mind
and certain bodily actions common to all men. In tracing the growth
of any habits and actions of people,—in government, religion,
amusements, art, music, manners and customs, and language, we
find the same customs constantly repeated among different races. If
you remember this point, you will be interested to watch, in this
book, the difference between these experiences common to all
mankind and those which later on, were caused by the influence that
one race had on another through meeting, through conquest and
through neighborly contact.
The bards belonged to the priesthood and were Druids. They sang
in verse the brave deeds of their countrymen, praises of the gods and
heroes, and legends of war and adventure, accompanying themselves
on primitive harps, or on an instrument something like the violin
without a neck, called a crwth. They wore long robes and when they
were acting as priests, these were covered with white surplices
somewhat like the gowns of our own clergy. From a bit of
information handed down by the bards, we learn that in Ireland, the
graduate bard wore six colors in his robes, said to be the origin of the
plaid of the Scotch Highlanders; the king wore seven colors; lords
and ladies, five; governors of fortresses, four; officers and gentlemen,
three; soldiers, two, and the people were allowed to wear only one.
Even their dress seemed important and marked the rank!
There were three kinds of bards: priestly bards who took part in
the religious rituals and were also the historians, domestic bards who
made music in honor of their masters, and heraldic bards whose
duties were to arouse patriotism through songs in praise of their
national heroes. They had to pass examinations to become bards,
and the lower ranks were tested for knowledge and ability before
being promoted to the higher ranks. Recently there has been a
revival in Wales of the Eisteddfod, or song contests of the Druids.
“Minstrelsy,” or singing to the crwth or harp, lived on long after
Druidism had been replaced by the Christian faith. Did you ever
wonder where the custom came from of mistletoe at Christmas time?
Or of dancing around a Maypole? Or building bonfires for May-day
and St. John’s eve? Celebrating All-Hallowe’en with pumpkins and
black cats? And of having Christmas trees? Well, these customs are
all relics of Druidism of 2000 or more years ago.
Skalds

In the land of the fierce Vikings or Norsemen, who inhabited


Scandinavia, Iceland and Finland before and during the Middle Ages,
there were bards called Skalds or Sagamen. They recited and sang
stories telling of their Norse gods, goddesses and heroes, Woden,
Thor, Odin, Freya, Brynnhild, and of the abode of the gods, Walhalla.
These ballads formed the national epics called sagas and eddas,
from which Richard Wagner drew the story for his immortal music
dramas, the Nibelungenlied.
Odin, who was considered a Norse god, probably was a Saxon
prince who lived in the 3rd century, A.D. He revived the Norse
mythology and rites with the aid of minstrels, seers, and priests. His
teachings lasted until the reign of Charlemagne, a devout Christian,
who put an end to pagan rites.
In the 5th century came the Saxons, Hengist and Horsa,
descendants of Odin, and much of Britain fell under their rule; with
them, came the skalds whose duty it was to celebrate the deeds of
their lords. They appeared at the great state banquets, and also on
the battle fields, encouraging the warriors with their songs of
heroism, and comforting the wounded soldiers.
When the Danes, the Angles and the Jutes came to Britain in this
same century, the country was called England or Angle-land.
Harpers and gleemen followed in the footsteps of the Scandinavian
skalds. These musician-singers went as honored guests from court to
court, and received valuable presents. A popular gleeman was given
the title of poet-laureate, and crowned with a laurel wreath.
The songs were taught orally and learned by heart, as there was no
notation at this early date (500 A.D.). They accompanied themselves
on small harps which could be carried easily. The harp was handed
around the banquet table so that each guest in turn might sing a song
as his share of the entertainment. Singing and composing poetry
were a necessary part of a gentleman’s education.
The “Venerable” Bede (Chapter VII) wrote that “Cædmon the poet
(600 A.D.) never could compose any trivial or vain songs, but only
such as belonged to a serious and sacred vein of thought ... he was

You might also like