Buy ebook Evolutionary Computing and Mobile Sustainable Networks Proceedings of ICECMSN 2020 V. Suma cheap price

Download as pdf or txt
Download as pdf or txt
You are on page 1of 55

Download the Full Version of textbook for Fast Typing at textbookfull.

com

Evolutionary Computing and Mobile Sustainable


Networks Proceedings of ICECMSN 2020 V. Suma

https://textbookfull.com/product/evolutionary-computing-and-
mobile-sustainable-networks-proceedings-of-
icecmsn-2020-v-suma/

OR CLICK BUTTON

DOWNLOAD NOW

Download More textbook Instantly Today - Get Yours Now at textbookfull.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

International Conference on Mobile Computing and


Sustainable Informatics : ICMCSI 2020 Jennifer S. Raj

https://textbookfull.com/product/international-conference-on-mobile-
computing-and-sustainable-informatics-icmcsi-2020-jennifer-s-raj/

textboxfull.com

Sustainable Communication Networks and Application


Proceedings of ICSCN 2020 1st Edition P. Karuppusamy

https://textbookfull.com/product/sustainable-communication-networks-
and-application-proceedings-of-icscn-2020-1st-edition-p-karuppusamy/

textboxfull.com

Innovative Mobile and Internet Services in Ubiquitous


Computing Proceedings of the 14th International Conference
on Innovative Mobile and Internet Services in Ubiquitous
Computing IMIS 2020 Leonard Barolli
https://textbookfull.com/product/innovative-mobile-and-internet-
services-in-ubiquitous-computing-proceedings-of-the-14th-
international-conference-on-innovative-mobile-and-internet-services-
in-ubiquitous-computing-imis-2020-leonard-b/
textboxfull.com

Ad Hoc Mobile and Wireless Networks 19th International


Conference on Ad Hoc Networks and Wireless ADHOC NOW 2020
Bari Italy October 19 21 2020 Proceedings Luigi Alfredo
Grieco
https://textbookfull.com/product/ad-hoc-mobile-and-wireless-
networks-19th-international-conference-on-ad-hoc-networks-and-
wireless-adhoc-now-2020-bari-italy-october-19-21-2020-proceedings-
luigi-alfredo-grieco/
textboxfull.com
Intelligent Computing Proceedings of the 2020 Computing
Conference Volume 3 Kohei Arai

https://textbookfull.com/product/intelligent-computing-proceedings-of-
the-2020-computing-conference-volume-3-kohei-arai/

textboxfull.com

Intelligent Computing Proceedings of the 2020 Computing


Conference Volume 2 Kohei Arai

https://textbookfull.com/product/intelligent-computing-proceedings-of-
the-2020-computing-conference-volume-2-kohei-arai/

textboxfull.com

Intelligent Computing Proceedings of the 2020 Computing


Conference Volume 1 Kohei Arai

https://textbookfull.com/product/intelligent-computing-proceedings-of-
the-2020-computing-conference-volume-1-kohei-arai/

textboxfull.com

Innovative Mobile and Internet Services in Ubiquitous


Computing Proceedings of the 12th International Conference
on Innovative Mobile and Internet in Intelligent Systems
and Computing Leonard Barolli
https://textbookfull.com/product/innovative-mobile-and-internet-
services-in-ubiquitous-computing-proceedings-of-the-12th-
international-conference-on-innovative-mobile-and-internet-in-
intelligent-systems-and-computing-leonard-barolli/
textboxfull.com

Genetic and Evolutionary Computing: Proceedings of the


Ninth International Conference on Genetic and Evolutionary
Computing, August 26-28, 2015, Yangon, Myanmar - Volume II
1st Edition Thi Thi Zin
https://textbookfull.com/product/genetic-and-evolutionary-computing-
proceedings-of-the-ninth-international-conference-on-genetic-and-
evolutionary-computing-august-26-28-2015-yangon-myanmar-volume-ii-1st-
edition-thi-thi-zin/
textboxfull.com
Lecture Notes on Data Engineering
and Communications Technologies 53

V. Suma
Noureddine Bouhmala
Haoxiang Wang Editors

Evolutionary
Computing
and Mobile
Sustainable
Networks
Proceedings of ICECMSN 2020
Lecture Notes on Data Engineering
and Communications Technologies

Volume 53

Series Editor
Fatos Xhafa, Technical University of Catalonia, Barcelona, Spain
The aim of the book series is to present cutting edge engineering approaches to data
technologies and communications. It will publish latest advances on the engineering
task of building and deploying distributed, scalable and reliable data infrastructures
and communication systems.
The series will have a prominent applied focus on data technologies and
communications with aim to promote the bridging from fundamental research on
data science and networking to data engineering and communications that lead to
industry products, business knowledge and standardisation.
** Indexing: The books of this series are submitted to SCOPUS, ISI Proceed-
ings, MetaPress, Springerlink and DBLP **

More information about this series at http://www.springer.com/series/15362


V. Suma Noureddine Bouhmala
• •

Haoxiang Wang
Editors

Evolutionary Computing
and Mobile Sustainable
Networks
Proceedings of ICECMSN 2020

123
Editors
V. Suma Noureddine Bouhmala
Research and Industry Incubation Center, Department of Technology
Department of Information Science and Maritime Innovation
and Engineering University of Southeast
Dayananda Sagar College of Engineering Horten, Norway
Bangalore, India

Haoxiang Wang
Go Perception Laboratory
Cornell University
Ithaca, NY, USA

ISSN 2367-4512 ISSN 2367-4520 (electronic)


Lecture Notes on Data Engineering and Communications Technologies
ISBN 978-981-15-5257-1 ISBN 978-981-15-5258-8 (eBook)
https://doi.org/10.1007/978-981-15-5258-8
© Springer Nature Singapore Pte Ltd. 2021
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
The 2020 ICECMSN conference is solely
dedicated to all the editors, reviewers,
and authors of the conference event.
Foreword

I extend my warm welcome in inviting you all to the proceedings of the


International Conference on Evolutionary Computing and Mobile Sustainable
Networks [ICECMSN 2020] organized at Sir M. Visvesvaraya Institute of
Technology, on 20–21 February 2020.
The theme of the conference event is “Emerging advances in Sustainable Mobile
Networks and Computational Intelligence”, topics that are quickly gaining research
attention from both academia and industries due to the relevance of maintaining
sustainability and enhancing intelligence in smart mobile networks. The already
established track record of computational intelligence models and sustainable
mobile networks seems to be very functional and reliable, where it mandates the
need for further exploration in this research area. This makes the ICECMSN 2020
an excellent forum for exploring innovative research ideas in the smart and intel-
ligent networks domain.
We would like to extend our sincere gratitude to Organizing Chair Dr. V. R. Manjunath,
Principal, SIR MVIT, Bangalore, India for his motivation and support to organize
the conference in a successful manner. We extend our hearty thanks to Keynote Speakers
Dr. Manu Malek, Editor in Chief, Elsevier CEE and Former Professor, Stevens Institute of
Technology, USA and Sri B. S. Bindumadhava Scientist G & Senior Director, Centre
for Development of Advanced Computing, Bengaluru, India for their valuable thoughts
and discussion.
The entire success of the ICECMSN 2020 conference event depends on the
research talents and efforts of the authors in the intelligent mobile networks and
computer science domains, who have contributed their submissions on almost all
the facets of the conference theme. An extensive appreciation is also deserved for
all the conference program and review committee members who have invested their

vii
viii Foreword

valuable time and professional expertise in assessing research papers from multiple
domains by maintaining the quality standards for this conference. We extensively
thank Springer for their guidance before and after the conference event.

Conference Chair
Dr. Manjula Sanjay Koti
Professor and HOD
Department of MCA
SIR MVIT, Bangalore, India
Preface

It is our pleasure to welcome you to the International Conference on Evolutionary


Computing and Mobile Sustainable Networks [ICECMSN 2020] in Bangalore,
India. The major goal of this conference is to bring together the academicians,
researchers and industrialists under a single roof to share and exchange their
research experience and results on various aspects of mobile sustainable networks
and computational intelligence research and discuss about the real-time challenges
and solutions adopted for it.
ICECMSN 2020 has received ample submissions of about 398 papers from both
academia and industrial tracks and based on the selection of conference review
committee and advisory committee members, a total of 90 papers appeared in the
conference proceedings of ICECMSN 2020. It is to be noted that, all the papers
regardless of their allotted tracks has extensively received at least 3 reviews from
the research experts.
We hope the readers will have a productive, satisfying and informative expe-
rience from the research works gathered from all over the world. Nevertheless, this
proceedings will provide a written record of a synergy of research works that exists
in communication networks communities and provides significant framework for a
new and futuristic research interactions. Moreover, this proceedings will pave way
for the applications of computational intelligence in Mobile Sustainable Networks
[MSN].

Bangalore, India Prof. Dr. V. Suma


Horten, Norway Dr. Noureddine Bouhmala
Ithaca, USA Dr. Haoxiang Wang

ix
Acknowledgments

We ICECMSN 2020 would like to extend our sincere thanks to all who have helped
in making this conference event a great success. We are much pleased in thanking
our educational institution Sir M. Visvesvaraya Institute of Technology, Bangalore,
India for their pervasive support and effective help during the conference.
The extended support of the conference committee members before and during
the conference event has helped to tackle many challenging tasks in a smooth and
efficient way, where it has significantly contributed to excel the quality of the
conference. Our special thanks belongs to all the conference reviewers, who played
an indispensable role in providing technical and semantic reviewing assistance to
all the research manuscripts received for the conference. We are thankful for their
help in guiding us to select the state-of-the-art high-quality papers that deserves the
publication under this conference. We also wish to thank all our faculty members
and staffs for their technical and non-technical contribution for maintaining the
conference participants’ contentment.
The conference organizers are particularly grateful for all the authors, who have
contributed their research ideas spanning over many active and emerging research
domains. Our very special thanks will go exceptionally to all the conference del-
egates for their active participation in the conference event.
At last, the organizers would like to gladly acknowledge the local organizing
committee, who ensured that all the formal steps of the conference event has been
completed in an effortless way.

xi
Contents

Optimal Resource Sharing Amongst Device-to-Device


Communication Using Particle Swarm Algorithm . . . . . . . . . . . . . . . . 1
H. M. Nethravathi and S. Akhila
A Systemic Method of Nesting Multiple Classifiers Using Ensemble
Techniques for Telecom Churn Prediction . . . . . . . . . . . . . . . . . . . . . . 13
J. Beschi Raja, G. Mervin George, V. Roopa, and S. Sam Peter
Hybrid Method in Identifying the Fraud Detection
in the Credit Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Pooja Tiwari, Simran Mehta, Nishtha Sakhuja, Ishu Gupta,
and Ashutosh Kumar Singh
Real-Time Human Locator and Advance Home Security
Appliances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Anand Kesharwani, Animesh Nag, Abhishek Tiwari, Ishu Gupta,
Bharti Sharma, and Ashutosh Kumar Singh
A Novel Implementation of Haptic Robotic Arm . . . . . . . . . . . . . . . . . 51
A. Kavitha, P. Sangeetha, Aijaz Ali Khan, and K. N. Chandana
A Survey on Partially Occluded Faces . . . . . . . . . . . . . . . . . . . . . . . . . 61
Shashank M. Athreya, S. P. Shreevari, B. S. Aradhya Siddesh,
Sandeep Kiran, and H. T. Chetana
Some Effective Techniques for Recognizing a Person
Across Aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Mrudula Nimbarte, Madhuri Pal, Shrikant Sonekar, and Pranjali Ulhe
A Comprehensive Survey on Federated Cloud Computing
and its Future Research Directions . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
S. R. Shishira and A. Kandasamy

xiii
xiv Contents

Decoy Technique for Preserving the Privacy in Fog


Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
K. P. Bindu Madavi and DR. P. Vijayakarthick
Design of Book Recommendation System Using Sentiment
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Addanki Mounika and Dr. S. Saraswathi
Review of Python for Solar Photovoltaic Systems . . . . . . . . . . . . . . . . 103
R. Sivapriyan, D. Elangovan, and Kavyashri S. N. Lekhana
Data Exploratory Analysis for Classification in Machine
Learning Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Jesintha Bala Chandrasekar, Shivakumar Murugesh,
and Vasudeva Rao Prasadula
Keystroke Dynamics for User Verification . . . . . . . . . . . . . . . . . . . . . . 127
Ashwini Sridhar and H. R. Mamatha
Activity Prediction for Elderly Using Radio-Frequency Identification
Sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Prashant Giridhar Shambharkar, Sparsh Kansotia, Suraj Sharma,
and Mohammad Nazmud Doja
The Role of Predictive Data Analytics in Retailing . . . . . . . . . . . . . . . 153
Mohammed Juned Shaikh Shabbir and C. M. Mankar
High-Performance Digital Logic Circuit Realization Using
Differential Cascode Voltage Switch Logic (DCVSL) . . . . . . . . . . . . . . 161
S. S. Kavitha and Narasimha Kaulgud
Analysis and Classification of Ripped Tobacco Leaves Using
Machine Learning Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
M. T. Thirthe Gowda and J. Chandrika
Next-Generation WSN for Environmental Monitoring Employing
Big Data Analytics, Machine Learning and Artificial
Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Rumana Abdul Jalil Shaikh, Harikumar Naidu, and Piyush A. Kokate
Generating Automobile Images Dynamically from Text
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
N. Sindhu and H. R. Mamatha
Body Mass Index Implications Using Data Analysis in the Soccer
Sports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Akash Dasmondal and P. K. Nizar Banu
Biogeography-Based Optimization Technique for Optimal Design
of IIR Low-Pass Filter and Its FPGA Implementation . . . . . . . . . . . . . 229
K. Susmitha, V. Karthik, S. K. Saha, and R. Kar
Contents xv

Invasive Weed Optimization-Based Optimally Designed High-Pass


IIR Filter and Its FPGA Implementation . . . . . . . . . . . . . . . . . . . . . . . 239
V. Karthik, K. Susmitha, S. K. Saha, and R. Kar
Identification of Online Auction Bidding Robots Using Machine
Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Pooja Maan and R. Eswari
Machine Learning-Based Green and Energy Efficient Traffic
Grooming Architecture for Next Generation Cellular Networks . . . . . 261
Deepa Naik, Pothumudi Sireesha, and Tanmay De
Robust Image Encryption in Transform Domain Using Duo Chaotic
Maps—A Secure Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
S. Aashiq Banu, M. S. Sucharita, Y. Leela Soundarya, Lankipalli Nithya,
R. Dhivya, and Amirtharajan Rengarajan
Analysis of Attention Deficit Hyperactivity Disorder Using Various
Classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Hensy K. George and P. K. Nizar Banu
A Technique to Detect Wormhole Attack in Wireless Sensor Network
Using Artificial Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Moirangthem Marjit Singh, Nishigandha Dutta,
Thounaojam Rupachandra Singh, and Utpal Nandi
A Survey on Methodologies and Algorithms for Mutual
Authentication in IoT Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Rashmi R. Sonth, Y. R. Pranamya, N. Harish Kumar, and G. Deepak
Emotion Scanning of the World’s Best Colleges Using Real-Time
Tweets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Sanjay Kumar, Yash Saini, Vishal Bachchas, and Yogesh Kumar
Generating Feasible Path Between Path Testing and Data Flow
Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
C. P. Indumathi and A. Ajina
Soft Constraints Handling for Multi-objective Optimization . . . . . . . . 337
Md. Shahriar Mahbub, Fariha Tahsin Chowdhury, and Anika Salsabil
Parking Management System Using Internet of Things . . . . . . . . . . . . 349
Aditya Sarin and Deveshi Thanawala
Machine Learning based Restaurant Revenue Prediction . . . . . . . . . . 363
G. P. Sanjana Rao, K. Aditya Shastry, S. R. Sathyashree, and Shivani Sahu
Solving Multi-objective Fixed Charged Transportation Problem
Using a Modified Particle Swarm Optimization Algorithm . . . . . . . . . 373
Gurwinder Singh and Amarinder Singh
xvi Contents

Binomial Logistic Regression Resource Optimized Routing in


MANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
M. Ilango, A. V. Senthil Kumar, and Amit Dutta
A Lightweight Approach for Policy-Based Messaging . . . . . . . . . . . . . 399
P. P. Abdul Haleem
A Lightweight Effective Randomized Caesar Cipher Algorithm for
Security of Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Vardaan Sharma, Sahil Jalwa, Abdur Rehman Siddiqi, Ishu Gupta,
and Ashutosh Kumar Singh
RPL-Based Hybrid Hierarchical Topologies for Scalable IoT
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
Animesh Giri and D. Annapurna
A Quick Survey of Security and Privacy Issues in Cloud
and a Proposed Data-Centric Security Model for Data Security . . . . . 431
Abraham Ekow Dadzie and Shri Kant
Homo Sapiens Diabetes Mellitus Detection and Classification . . . . . . . 445
Anu Agarwal, Anjay Sahoo, Indrashis Das, Siddharth S. Rautaray,
and Manjusha Pandey
Learning Platform and Smart Assistant for Students . . . . . . . . . . . . . . 455
R. Rashmi, Sharan Rudresh, V. A. Sheetal,
and Dexler information Solutions Pvt Limited
Eye Disease Detection Using YOLO and Ensembled GoogleNet . . . . . . 465
Saikiran Gogineni, Anjusha Pimpalshende,
and Suryanarayana Goddumarri
Comparative Analysis of MCT Load Balancing Approach in Cloud
Computing Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
Shabina Ghafir, M. Afshar Alam, and Ranjit Biswas
A Comparative Study of Text Classification and Missing Word
Prediction Using BERT and ULMFiT . . . . . . . . . . . . . . . . . . . . . . . . . 493
Praveenkumar Katwe, Aditya Khamparia, Kali Prasad Vittala,
and Ojas Srivastava
Data Formats and Its Research Challenges in IoT: A Survey . . . . . . . 503
Sandeep Mahanthappa and B. R. Chandavarkar
Software Fault Prediction Using Cross-Validation . . . . . . . . . . . . . . . . 517
Yeresime Suresh
Implementation of Recommendation System and Technology
for Villages Using Machine Learning and IoT . . . . . . . . . . . . . . . . . . . 527
B. Achyuth and S. Manasa
Contents xvii

IoT Based Inventory Management System with Recipe


Recommendation Using Collaborative Filtering . . . . . . . . . . . . . . . . . . 543
Atharva S. Devasthali, Adinath J. Chaudhari, Someshkumar S. Bhutada,
Snehal R. Doshi, and Vaishali P. Suryawanshi
Survey Paper on Smart Veggie Billing System . . . . . . . . . . . . . . . . . . . 551
T. V. Niteesh, B. Y. Lohith, Y. M. Gopalakrishna, R. Ashok Kumar,
and J. Nagaraj
An Optimized Approach for Virtual Machine Live Migration
in Cloud Computing Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
Ambika Gupta, Priti Dimri, and R. M. Bhatt
Digital Image Retrieval Based on Selective Conceptual Based
Features for Important Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
Premanand Ghadekar, Sushmita Kaneri, Adarsh Undre, and Atul Jagtap
A Novel Repair and Maintenance Mechanism for ‘Integrated
Circuits’ of Ubiquitous IoT Devices by Performing Virtual IC
Inspection Based on ‘Light Field Technology’ . . . . . . . . . . . . . . . . . . . 581
Vijay A. Kanade
Evolutionary Optimization of Spatial Light Modulator for Advanced
Wavefront Control in an Optically Addressable ‘Electric See-
Through Skin’ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
Vijay A. Kanade
Retrieval of Videos of Flowers Using Deep Features . . . . . . . . . . . . . . 605
V. K. Jyothi, D. S. Guru, N. Vinay Kumar, and V. N. Manjunath Aradhya
Analysis of Students Performance Using Learning Analytics—A
Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Manjula Sanjay Koti and Samyukta D. Kumta
A Case Study on Distributed Consensus Problem on Cloud-Based
Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
Ganeshayya Shidaganti, Ritu Pravakar, M. Shirisha, and H. R. Samyuktha
An IoT Framework for Healthcare Monitoring and Machine
Learning for Life Expectancy Prediction . . . . . . . . . . . . . . . . . . . . . . . 637
Anna Merine George, Anudeep Nagaraja, L. Ananth Naik, and J. Naresh
A Study on Discernment of Fake News Using Machine Learning
Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
Utkarsh, Sujit, Syed Nabeel Azeez, B. C. Darshan,
and H. A. Chaya Kumari
Detection of Diseased Plants by Using Convolutional Neural
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
M. Maheswari, P. Daniel, R. Srinivash, and N. Radha
xviii Contents

Emoticon: Toward the Simulation of Emotion Using Android Music


Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
Aditya Sahu, Anuj Kumar, and Akash Parekh
Multi-document Text Summarization Tool . . . . . . . . . . . . . . . . . . . . . . 683
Richeeka Bathija, Pranav Agarwal, Rakshith Somanna, and G. B. Pallavi
Cognitive Computing Technologies, Products, and Applications . . . . . 693
N. Divyashree and Prasad K. S. Nandini
Breast Cancer Prognosis Using Machine Learning Techniques
and Genetic Algorithm: Experiment on Six Different Datasets . . . . . . . 703
S. Jijitha and Thangavel Amudha
Detection Classification and Cutting of Fruits and Vegetables
Using Tensorflow Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
Rupal Mayo Diline D’Souza, S. R. Deepthi, and K. Aarya Shri
Detection of Counterfeit Cosmetic Products Using Image Processing
and Text Extraction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
Siddharth Mehta, Prajakta Divekar, Aditi Kolambekar,
and Amol Deshpande
Multiclass Weighted Associative Classifier with Application-Based
Rule Selection for Data Gathered Using Wireless Sensor
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Disha J. Shah and Neetu Agarwal
Void-Aware Routing Protocols for Underwater Communication
Networks: A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747
Pradeep Nazareth and B. R. Chandavarkar
A Comprehensive Survey on Content Analysis and Its
Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761
Ankitha A. Nayak and L. Dharmanna
Applications of Blockchain and Smart Contract for Sustainable
Tourism Ecosystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 773
Jaehun Joo, Joungkoo Park, and Yuming Han
Friendship and Location-Based Routing in Delay Tolerant
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 781
Nidhi Sonkar, Sudhakar Pandey, and Sanjay Kumar
Fake Account Detection Using Machine Learning . . . . . . . . . . . . . . . . 791
Priyanka Kondeti, Lakshmi Pranathi Yerramreddy, Anita Pradhan,
and Gandharba Swain
Contents xix

Multi-objective Task Scheduling Using Chaotic Quantum-Behaved


Chicken Swarm Optimization (CQCSO) in Cloud Computing
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803
G. Kiruthiga and S. Mary Vennila
ARIMA for Traffic Load Prediction in Software Defined Networks . . . 815
Sarika Nyaramneni, Md Abdul Saifulla, and Shaik Mahboob Shareef
Improved Logistic Map Based Algorithm for Biometric Image
Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825
Mahendra Patil, Avinash Gawande, and D. Shelke Ramesh
Data Security System for A Bank Based on Two Different
Asymmetric Algorithms Cryptography . . . . . . . . . . . . . . . . . . . . . . . . 837
Md. Ashiqul Islam, Aysha Akter Kobita, Md. Sagar Hossen,
Laila Sultana Rumi, Rafat Karim, and Tasfia Tabassum
Digital Signature Authentication Using Asymmetric Key
Cryptography with Different Byte Number . . . . . . . . . . . . . . . . . . . . . 845
Md. Sagar Hossen, Tasfia Tabassum, Md. Ashiqul Islam, Rafat Karim,
Laila Sultana Rumi, and Aysha Akter Kobita
Digital Signature Authentication for a Bank Using Asymmetric Key
Cryptography Algorithm and Token Based Encryption . . . . . . . . . . . . 853
Rafat Karim, Laila Sultana Rumi, Md. Ashiqul Islam, Aysha Akter Kobita,
Tasfia Tabassum, and Md. Sagar Hossen
Accuracy Analysis of Similarity Measures in Surprise
Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 861
Sanket Kamta and Vijay Verma
Computational Method for Cotton Plant Disease Detection of Crop
Management Using Deep Learning and Internet of Things
Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875
Bhushan V. Patil and Pravin S. Patil
Foot Ulcer and Acute Respiratory Distress Detection System for
Diabetic Patients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 887
M. S. Divya Rani, T. K. Padma Gayathri, Sree Lakshmi, and E. Kavitha
Cluster-Based Prediction of Air Quality Index . . . . . . . . . . . . . . . . . . . 899
H. L. Shilpa, P. G. Lavanya, and Suresha Mallappa
A Memetic Evolutionary Algorithm-Based Optimization for
Competitive Bid Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 917
Pritam Roy
Tunable Access Control for Data Sharing in Cloud . . . . . . . . . . . . . . . 927
S. Sabitha and M. S. Rajasree
xx Contents

Methodology for Implementation of Building Management System


Using IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 939
Ankita Harkare, Vasudha Potdar, Abhishek Mishra, Akshay Kekre,
and Hitesh Harkare
A Brief Understanding of Blockchain-Based Healthcare Service
Model Over a Remotely Cloud-Connected Environment . . . . . . . . . . . 949
Subhasis Mohapatra and Smita Parija
Ensemble Learning-Based EEG Feature Vector Analysis for Brain
Computer Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 957
Md. Sadiq Iqbal, Md. Nasim Akhtar, A. H. M. Shahariar Parvez,
Subrato Bharati, and Prajoy Podder
Cluster-Based Data Aggregation in Wireless Sensor Networks:
A Bayesian Classifier Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971
Lokesh B. Bhajantri and Basavaraj G. Kumbar
An Optimized Hardware Neural Network Design Using Dynamic
Analytic Regulated Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 981
V. Parthasarathy, B. Muralidhara, Bhagwan ShreeRam, and M. J. Nagaraj
Conceptual Online Education Using E-Learning Platform of Cloud
Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
Vivek Sharma, Akhilesh Kumar Singh, and Manish Raj
Efficient Deployment of a Web Application in Serverless
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 999
Vivek Sharma, Akhilesh Kumar Singh, and Manish Raj

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1005


About the Editors

Dr. V. Suma holds a B.E. in Information Science and Technology, M.S. in


Software Systems and Ph.D. in Computer Science and Engineering. Currently, she
is working as Dean of the Research and Industry Incubation Centre, and a Professor
at the Department of Information Science and Engineering, Dayananda Sagar
College of Engineering, Bangalore, India. She has more than 17 years of teaching
experience and has published over 180 papers, including research articles published
in leading international journals, such as ACM, ASQ, Crosstalk, IET Software, and
journals published by MIT and Dartmouth College in the USA. Her research has
also been published on NASA, UNI Trier, Microsoft, CERN, IEEE, ACM and
Springer portals.

Dr. Noureddine Bouhmala completed his Candidatus Magisterii in Computer


Science at the University of Bergen, Norway in 1992, and completed his Ph.D. in
Computer Science at the University of Neuchâtel, Switzerland in 1998 (funded by
the Swiss National Science Foundation). Currently, he is working as an Associate
Professor at the Faculty of Technology and Maritime Innovation at the University
SouthEast, and the Faculty of Engineering and Sciences at Agder University, both
in Norway. He has more than 25 years of teaching and research experience, and has
published numerous research papers in international journals and international
conferences. He is also an editorial board member for various respected interna-
tional journals. His areas of interest include artificial intelligence, machine learning,
optimization algorithms, parallel computing, data mining, autonomic and
safety-critical systems.

Dr. Haoxiang Wang is currently the Director and lead executive faculty member
of GoPerception Laboratory, New York, USA. His research interests include
multimedia information processing, pattern recognition and machine learning,
remote sensing image processing and data-driven business intelligence. He has
co-authored over 60 papers in these fields in journals such as MTAP, Cluster
Computing, IEEE TII, Communications Magazine, Computers & Electrical
Engineering, Computers, Environment and Urban Systems, Optik, Sustainable

xxi
xxii About the Editors

Computing: Informatics and Systems, Journal of Computational Science, Pattern


Recognition Letters, Information Sciences, Computers in Industry, Future
Generation Computer Systems, International Journal of Computers and
Applications, and at conference such as IEEE SMC, ICPR, ICTAI, ICICI, CCIS,
ICACI. He is a guest editor for IEEE Transactions on Industrial Informatics, IEEE
Consumer Electronics Magazine, Multimedia Tools and Applications, MDPI
Sustainability, International Journal of Information and Computer Security, Journal
of Medical Imaging and Health Informatics, Concurrency and Computation:
Practice and Experience.
Optimal Resource Sharing Amongst
Device-to-Device Communication Using
Particle Swarm Algorithm

H. M. Nethravathi and S. Akhila

Abstract Device-to-Device Communication (D2D) has been described as one of


the important innovations in the development of 5G networks. This form of D2D
networking has its own benefits of improved network capacity and reduced power
usage, making it as a primary candidate for the upcoming 5G cellular networks. In
this work, a single cell scenario with one base station and multiple cell users and D2D
pairs are considered. As sharing causes performance degradation due to interference
between CUs (cellular users) and D2D pairs, a permutation optimization strategy
based on Particle swarm optimization (PSO) has been proposed to optimize resource
sharing between cellular users and D2D pairs. This technique is found to maximize
system performance through better resource sharing.

Keywords 5G · D2D · 3GPP · PSO

1 Introduction

Worldwide, the number of users and data traffic is increasing every day. It overloads
the base stations resulting in transmission delay, latency and low data speed. In
such a situation, device-to-device (D2D) connectivity is a promising candidate for
fifth-generation cellular communication. In D2D communication devices transmit or
receive data without assistance from the base station. This reduces the base station
overload thereby increasing the overall system throughput. Optimal allocation of
resources for D2D interaction has become a very important research field, with
researchers showing a great deal of interest in this area. Each user will be able to
operate as a conventional cellular user or a D2D user depending on their chosen

H. M. Nethravathi (B) · S. Akhila


BMSCE, Bengaluru, India
e-mail: [email protected]
S. Akhila
e-mail: [email protected]

© Springer Nature Singapore Pte Ltd. 2021 1


V. Suma et al. (eds.), Evolutionary Computing and Mobile Sustainable Networks,
Lecture Notes on Data Engineering and Communications Technologies 53,
https://doi.org/10.1007/978-981-15-5258-8_1
2 H. M. Nethravathi and S. Akhila

strategy of need and mode. Based on their model, the resources will be allocated to
the associated user so as to optimize the device throughput.
D2D communication has been considered as a powerful technology to provide
improved quality of wireless services. Due to the limitations in various technologies,
such as power restrictions, high delays due to network congestion and adoption of new
services, new techniques have been developed to replace the prevailing technology
i.e., Long Term Evolution (LTE), D2D. Such approaches tackle the limitations of
existing networks and meet the new needs of end-users and of the operators [1].
The advantages that these techniques would bring to an end-user would be energy
savings, efficiency gains or new nearby services that can save the connection to the
base station. It also provides benefits from the perspective of network operators, such
as increasing the coverage area, increasing spectrum utilization or being able to meet
the demand of a larger number of linked terminals in the future at the same time.
3GPP considers the use of Long Term Evolution (LTE-Direct) and IEEE 802.11
(Wi-Fi Direct) for D2D communications [2].
To achieve the expected benefits of D2D communications, the technical challenges
that may arise from the difficult conditions of transmission between mobile devices
needs to be addressed. In addition, D2D communications can be highly inefficient
under conditions of uncertainty and low quality of connections [3]. With the use
of link adaptation and Power Control techniques, this form of inefficiency can be
tackled.
Aranit et al. [4] provides a review on LTE to assess its capacity to support ITS
and vehicular applications. The analysis conducted qualitatively captures the main
features, strengths and weaknesses of the under-development standard guidelines
and solutions. In [5], the energy minimization problem for D2D communication
underlying a multi-cell system has been considered to maximize throughput.
Multiantenna methods [6, 7] have also been implemented into the underlying D2D
communication to eliminate the interference between D2D and cellular users. D2D
communication as a cellular network underlay can share resources orthogonally or
non-orthogonally with cellular users. In the orthogonal case, D2D users are allocated
dedicated resources. Though simple to implement, they are unable to exploit the
full potential of D2D communication to increase spectral efficiency. This has been
addressed in nonorthogonal resource sharing methods. Feng et al. [8] address both
D2D and cellular users’ QoS specifications while optimizing the sum frequency.
D2D applications should share CU’s uplink resources since it is simple for the base
station (BS) to manage interference problems caused by underused uplink channels.
Liu et al. [9] investigated the power control for full-duplex D2D cellular network
communications. In this power control problem was formulated by maximizing
the achievable sum-rate of the full-duplex D2D connection while meeting the
cellular connection’s minimum rate required under the cellular users and D2D users’
maximum transmission power constraint.
Dynamic resource allocation is studied in [10,11, 12], where all subchannels can
be used by the D2D pairs. Nevertheless, the adjacent D2D pairs will inevitably suffer
extreme interference with each other.
Optimal Resource Sharing Amongst Device-to-Device … 3

Social and physical attributes based content sharing approach with D2MD cluster
formation approach is described in [13] for 5G cellular networks, enabling traffic
offloading from base stations to direct transmitting devices and enhancing power.
Interference due to resource sharing reduces network performance. In [8], authors
have proposed interference management strategy by incorporating orthogonality
between cellular links and D2D links.
Distance constrained based outage probability calculation is performed in [14],
to justify the objective of utilizing all the possible resources in the cellular system.
Deng et al. [15] proposed social aware distributed resource algorithm, this algorithm
achieves convergence and stability without loss of fairness.
Khuntia et al. [16] proposed an optimal spectral allocation strategy to enhance
the throughput of D2D while maintaining QoS for CUs and performance of D2D is
analyzed using outage probability analysis [17].
The paper is organized in the following way. Section 2 is about the formulation
of the system. Section 3 describes the methodology. The results of the simulation
obtained in Sects. 4 and 5 ends with a conclusion.

2 Formulation of the System

Figure 1 shows a cellular system for sharing the uplink resources in a device to device
communication framework with N number of orthogonal users and a base station
(BS) [18].
The frequency band indexed by each user is expressed by i = 1, . . . , N .
h ic represents the channel between the base station and cellular user i,
h id is the channel between D2D receiver and cellular user i,
gic is the channel between BS and D2D transmitter for frequency band i.
gic symbolizes the channel between D2D transmitter and the receiver for frequency
band i.
Let xic and xid be the transmitting signals for the cellular and D2D users respectively
for frequency band i.

Fig. 1 Cellular system in


D2D communication c
c h1
hN
c Cellular
h2
user 1
Cellular c
gi
user N
d
h1
h N BS
d
d
Cellular
h2 user 2
g id

D2D Tx D2D Rx
4 H. M. Nethravathi and S. Akhila

Equation (1) represents the signal received at the base station by the cellular user
i:

yic = h ic xic + gic xid + n ic (1)

where n ic is the Gaussian noise with variance σic by cellular user i.


And, Eq. (2) represents the signal reception for D2D user with frequency band i:

yid = gid xid + h id xic + n id (2)

where n id is the additive zero-mean Gaussian noise with variance σid by D2D user .
Suppose that the Gaussian codes are used by both D2D and cellular users, on each
frequency band i which transmits powers of
 2
qi  E xid  (3)

 2
pi  E xic  (4)

The throughputs for cellular and D2D users are given by the Eqs. (5) and (6)
respectively [18].
  c 2   
h  pi αi pi
i
Ric ( pi , qi )
 log 1 +  2 = log 1 + (5)
σic + gic  qi 1 + θi qi
  d 2   
 g  qi γi qi
i
Ri ( pi , qi )  log 1 +
d
  = log 1 + (6)
σ d + h d  pi 1 + βi pi
2
i i

| h c |2 |h d |2 | g d |2 | g c |2
where,αi  σi c , βi  σi d , γi  σi d and θi  σi d represents the normalized
i i i i
channel gains.
The resource sharing between cellular and D2D users must be designed so that
the D2D can achieve maximum benefit by fulfilling the cellular user’s requirements.
This is accomplished through resource sharing between the D2D and cellular users.
Theoretically, this is achieved by maximizing the throughput of D2D link [18]
and is represented as:


N
Rid ( pi , qi )
i=1
Maximize
Ric ( pi , qi ) ≥ ρi , i = 1, . . . , N
p, q (7)
0 ≤ pi ≤ Pi , 0 ≤ qi ≤ Q i , i = 1, . . . , N
subjected to :
N
qi ≤ Q
i=1
Optimal Resource Sharing Amongst Device-to-Device … 5

where the QoS threshold is symbolized by ρi , Pi is the power budget of cellular


user i, Q i for frequency band, i is the D2D user’s power limit and the overall power
budget for D2D user is symbolized by Q.
It is a very challenging task to achieve optimal resource sharing. The problem in
(7) is a non-convex problem as both Ric ( pi , qi ) and Rid ( pi , qi ) are not jointly concave
in ( pi , qi ). This work aims at providing an optimized solution for resource sharing
using the particle swarm optimization technique.

3 Methodology

The problem in Eq. (7) is feasible if and only if ωi  2ρi −1 ≤ αi Pi f ori = 1, . . . , N


[19].
The realization of optimal resource sharing is accomplished by assuming ωi ≤
αi Pi , for i = 1, . . . , N .
Let ( p ∗ , q ∗ ) denote the optimal solution to (7).
Define Ai  ωi βi θi (αi γi + ωi βi θi ),Bi  (αi + ωi βi )(2ωi βi θi + αi γi ), Ci (λ) 

(αi + ωi βi ) αi + ωi βi − λ1 αi γi and Di  min Q i , ω1i θi (αi Pi − ωi ) for i =
1, . . . , N .
N
If Di ≤ Q, then pi∗ = ωαii (1 + θi Di ) and qi∗ = Di ;
i=1

⎡ ⎤ Di
N
ωi  Bi
2
− 4 A i C i (λ) − Bi
If Di > Q, then pi∗ = 1 + θi qi∗ qi∗ = ⎣ ⎦ (8)
i=1
αi 2 Ai
0

Where [D]0Di symbolizes the projection onto the interval [0, Di ], and λ > 0 is

N
selected such that qi∗ = 0.
i=1
Substituting pi∗ into the frequency band i of D2D user denoted as Rid ( pi , qi ) leads
to:
 
αi γi qi
Rid ( pi , qi ) = log 1 + (9)
αi + ωi βi + ωi βi θi qi
αi γi qi
Let h(qi )  (αi +ωi βi +ωi βi θi qi )
, we get:

2αi γi ωi βi θi (αi + ωi βi )
h  (qi ) = − ≤0 (10)
(αi + ωi βi + ωi βi θi qi )3

The above equation represents that h(qi ) is a concave function. Therefore, Eq. (7)
can be rewritten as:
6 H. M. Nethravathi and S. Akhila


N  
αi γi qi
log 1 + αi +ωi βi +ωi βi θi qi
Maximize i=1
q 0 ≤ qi ≤ Di , i = 1, . . . , N (11)
subjected to 
N
qi ≤ Q
i=1

Since the objective in Eq. (11) is increasing for each qi , then the optimal solution
will be qi∗ = Di , and optimal solution to pi will be Rid ( pi , qi ).

3.1 Particle Swarm Optimization (PSO)

Let f : R n → R be the function that has to be minimized and S, the number


of particles that make up the swarm. Four vectors of dimension n are defined for
each particle as attributes: ki , vi , pbesti and gbesti. The position xi represents a
potential solution for the objective function, the velocity vi represents the direction
and intensity of the movement of the particle, pbesti represents the best position
found individually and gbesti the best position found by the particles in their vicinity
until the present moment [20].
In the PSO algorithm the steps of the canonical version of PSO are described. After
the initialization of its attributes, each particle proceeds to traverse the search space
by updating its speed and position. This process occurs iteratively and culminates
after a predetermined number of iterations T has elapsed.

3.2 PSO Algorithm Applied for Optimal Parameter


Calculation in D2D Communication

Define parameters constants and variables T, N , c1 , c2 , ki0 , vi0
Output: pi , qi and Rid according to Eq. (11)
for j = 1 to N do
pbesti0 ← ki0
end for
for j = 1 to N do
Update gbesti0
end for
for j = 1 to T do
for i = 1 to N do
Update vit and kit
Evaluate fitness function and update pbestit
end for
for i = 1 to N do
Optimal Resource Sharing Amongst Device-to-Device … 7

Update gbestit
end for
end for   
return gbest ← min gbesti f gbestiT
The updation of velocity and positions are represented by:
   
j = vi, j + c1 r 1i, j pbesti, j − ki, j + c2 r 2i, j gbesti, j − ki, j
vi,t+1 t t t t t t t
(12)

j = ki, j + vi, j
ki,t+1 t t+1
(13)

The position and frequency of the movements produced by each particle in the
search space, as shown in Eqs. (12) and (13), is determined by the influence of three
components. The first is the impulse or impetus that represents the force that is exerted
on the particle to continue the direction it leads at the current time. The second is the
cognitive component that represents the force that arises from the attraction of the
particle by its pbest, and the third is the social component that represents the force
that arises from the attraction of the particle by the gbest of his neighbourhood [21].

4 Simulation Results

This section evaluates the performance of the proposed system under various
parameters. Tables 1 and 2 provides simulation parameters and PSO parameters.
Figure 2 shows the average throughput versus SNR plot of optimal resource
sharing with 8 cellular users in D2D communication. It can be observed that average
throughput increases as the number of D2D SNR increase proportionally.
Figure 3 shows the average throughput versus SNR plot of PSO based resource
sharing with 8 cellular users in D2D communication. It can be observed that average
throughput increases as the number of D2D SNR increase proportionally.

Table 1 Simulation
Parameter name Value
parameters
Base station 1
No. of the frequency band 8
No. of cellular user 8
No. of D2D transmitter and receiver 1
Number of distance 50:50:450
SNR range 2:2:16
Dcell 300
dD2DRX 300
8 H. M. Nethravathi and S. Akhila

Table 2 PSO parameters


Parameter name Value
Cognitive parameter 1.2
Social parameter 0.012
Swarm size 100
Inertial weight 0.0004
Number of iteration 500

Fig. 2 Avg throughput


versus SNR plot of optimal
resource sharing with 8
cellular users in D2D

Fig. 3 Avg throughput


versus SNR plot of PSO
based resource sharing with
8 cellular users in D2D
communication

Figure 4 shows the average throughput versus distance between D2D and BS plot
of optimal resource sharing with 8 cellular users. As the distance between D2D and
BS increases throughput decreases proportionally
Optimal Resource Sharing Amongst Device-to-Device … 9

Fig. 4 Avg throughput


versus distance between
D2D and BS plot of optimal
resource sharing with 8
cellular user

From Fig. 5 it can be observed that average throughput is high as approximately 7


bits/s/Hz at 16 dB when PSO is applied. Similarly, the optimal strategy gives average
throughput is high as approximately 3bits/s/Hz at 16 dB. It can be observed that as
D2D SNR increases throughput increases and can be concluded that PSO provides
better performance than the optimal solution.
From Fig. 6 it can be observed that average throughput is high as 14 bits/s/Hz at
a minimum distance between the base station and D2D users when PSO is applied.
Further, the optimal strategy gives average throughput is high as 8 bits/s/Hz at
minimum distance 50 m. The observed gain in throughput is approximate 6 bit/s/Hz
at 50 m. It is observed that as distance increases between BS and D2D user throughput
decreases. It can be concluded that PSO enabled resource utilization performs better
than the optimal solution.

Fig. 5 Comparative result of


PSO optimized and optimal
strategy based average D2D
throughput vs D2D SNR
with 8 cellular users
Another Random Scribd Document
with Unrelated Content
works of art and the opinions of men of learning of the day upon
them. Extracts from books which she had read are also omitted;
though in many cases the titles of the books she read and her critical
remarks upon the contents are retained. By these it is possible to
form some opinion of her special tastes in literature, and discover by
what stages she was able to prepare herself to become the leader of
Whig society.
LIST OF PLATES TO VOLUME I.
Elizabeth, third Lady Holland, 1793 Frontispiece
From a painting by Robert Fagan.
Richard Vassall, 1793 To face p. 132
From a painting by J. Hoppner.
Elizabeth, third Lady Holland, 1795 „ 212
From a painting by Louis Gauffier.
JOURNAL OF ELIZABETH LADY
HOLLAND
In June 1791 I left England and went to Paris. During my stay the
King and Royal family escaped to Varennes, but were brought back.
I attended the debates in the National Assembly; I heard
Robespierre and Maury[1] speak. The Jacobin Club was then in
embryo. I wanted to hear a speech, and the Vicomte de Noailles
during dinner promised that he would gratify me by making one. He
accordingly took me to the box, and went into the Tribune and began
an oration upon some subject trivial in itself, but made important by
the vehemence of his manner. The Wyndhams[2] joined me at Paris;
Mr. Pelham[3] was also there, and several other English.
Towards July I went by the way of Dijon through the Jura
Mountains to Lausanne. I lived for three months at Mon Repos, a
spot celebrated as having been the residence of Voltaire and the
scene of much theatrical festivity; it was there he composed and
represented many of his chefs d’œuvre, Zaïre, I believe, among the
number.[4] My society was composed of a mixture of French and
English to the utter exclusion of the Swiss.
Gibbon had for several years withdrawn himself from the
turbulence and neglect of his own capital to share the quiet and
enjoy the adulation of the inhabitants of the Pays de Vaud. He was
treated by them more as a prince than as an equal. Whenever he
honoured their goutées with his presence every person rose upon
his entrance, and none thought of resuming their chairs till he was
seated. His whim arranged and deranged all parties. All, in short,
were subservient to his wishes; those once known, everything was
adapted to them. The Sheffields,[5] Trevors, Mr. Pelham, Duc de
Guines,[6] Mde. de Juigné, and Castries. I knew Tissot.[7] Having my
residence at Lausanne I made frequent excursions. I went through
Geneva to the Valley of Chamouny, saw the glaciers; and at a small
village in the road stopped to look at General Phiffer’s model of Mt.
Blanc; it was curious but inferior to that at Lucerne. Our party to
Chamouny consisted of the Sheffields, Mr. Pelham, and some others
whose names I have forgotten.[8]
Soon after my return to Lausanne I made a tour
through Berne to Lucerne. I was too great a SWITZERLAND
coward to go upon the lake, therefore I only saw
the views from the bridge and the high ground near the town, as I
was too indolent to ascend Mount Pilate. The spot so celebrated by
the heroic and incredible exploits of Guillaume Tell I only knew by
drawings, as it is not to be seen but by going to the Lac des Quatre
Cantons. Phiffer’s model of the whole of Switzerland is wonderful; it
is an exact representation of every object, lakes, mts., rivers. Such
representation of countries would be useful for military posts. I
returned by Soleure, Neuchâtel, and Fribourg and Vevey to
Lausanne.
Towards the middle or end of September I began a journey to
Nice. I stopped at Geneva a day or two, and went with the Messrs.
Calandrin to see Ferney; it was in a desolate, ruined state, and
showed few marks of taste or comfort. We followed the Rhône to
L’Écluse, where soon after that it loses itself for some miles
underground. The road is beautiful. Annecy, where Rousseau lived, I
believe we passed. Lyons is a magnificent city, two fine rivers and
broad, well-built quays with sumptuous houses. The manufacturers
complained of the revolutionary spirit which deprived them of orders
and workmen.
From thence I followed the Rhône to the Pont St. Esprit. The
bridge is singular and ingenious. The rapidity of the river had thrown
down the preceding bridges owing to a strong current rushing with
violence against the piers: to obviate this the architect made the
bridge of this form. It has succeeded, and the building is permanent.
The Pont de Gard is a magnificent remnant of Roman grandeur; it
fulfilled the double purpose of bridge and aqueduct. Orange, on
account of massacres at Avignon, we could not see. There are fine
remains of triumphal arches and other military trophies, raised to the
honour of Marius, who there defeated the formidable host of
Northern barbarians, the Teutons and Cimbri, though upon
recollection I think he fought them in the present Venetian territory.
Upon the road there are vestiges of triumphal buildings, erected in
the Middle Ages, if one may judge by the clumsy taste. At Nismes,
the amphitheatre and Maison Carrée. The latter is beautiful, and
being the first specimen of Grecian architecture I had ever seen I
was delighted with the richness and proportion of the edifice. The
amphitheatre is small, and disfigured by the filth and closeness of
the adjacent houses. Like St. Paul’s in London, it is impossible to
judge of its magnitude or graceful structure, as no exterior view can
be obtained.
Marseilles is charmingly situated; fine town, a forest of shipping,
busy quays; and the liveliness of the pretty Bastides, all white upon
the surrounding hills, is delightful. This was the first view I had of the
Mediterranean. The deep blueness of its waters and the constant
fulness of its shores struck me with increasing admiration, as I
always thought the variation of the tide was a defect; for pleasing as
variety is, uniformity is preferable to such change as the tide
produces—mud and stench.
Aix is a pleasing town. Crossed the Esterelles,
a high ridge of granite mts.; the passage was NICE
infested by banditti, and we were obliged to take
some maréchaussées to protect us. We passed without alarm or
interruption. Fréjus, the See of Fénelon, well deserves all the
disapprobation he bestows on it. Antibes, a gay pretty town; crossed
at Gué the torrent Var, and 4 miles after reached Nice. Some
antiquaries have supposed that the Var was the celebrated Rubicon,
which once passed was so fatal to the liberties of Rome.
I was left alone[9] at twenty years old in a foreign country without
a relation or any real friend, yet some of the least miserable, I might
add the most happy hours, of my life were passed there. I lived with
great discretion, even to prudery. I never admitted any male visitors
(except to numerous dinners), either in the morning or evening, with
the exception only of two—Dr. Drew, and a grave married man, a Mr.
Cowper. Drew used to spend the whole eve. with me, and give me
lectures on chemistry, natural history, philosophy, etc., etc. I made
frequent excursions about the neighbourhood, to Monaco, Villa
Franca, Monte Cavo, La Grotte de Chateauville, the convent of St.
Pons, old Cemenelium, etc.
In Feb. 1792 the Duncannons,[10] Dowr. Lady Spencer, Dss. of
Devonshire, came to Nice: my friendship begun there. I saw a
Maltese galley with some wretched Turkish slaves at the oar. The
English society was too numerous to be pleasant. I lived with a few
only,—Dss. of Ancaster, Ly. Rivers, Messrs. Ellis, Wallace, Cowper,
etc. C. Ellis[11] was a very old friend of mine; we were brought up for
many years absolutely together. As I had experienced such very
cruel usage from the unequal and ofttimes frantic temper of the man
to whom I had the calamity to be united, it was the wish of my
mother, Lady Pelham, Ly. Shelburne, and those I most respected,
that I should never venture myself in a journey alone with him,
therefore as Mr. Ellis was going part of the journey we meant to
make, he joined our party. We also conveyed an emigrant of the
name of Beauval, an excellent, ingenious young man.
Sunday, May the 6th, 1792.—Left Nice for Turin. We took the
road across the Col de Tende. Just above the Convent of St. Pons,
we crossed the torrent Paglione, from whence I took a farewell look
at the lovely plain of Nice. We dined at L’Escaleine, a small village
prettily situated in the mts. We wound for many hours the
numberless traverses of a steep and lofty mt., and at night reached
Sospello, a tolerable gîte.
7th.—Still among mts. Dined at Grandolla. Wretched inn at Tende
—no accommodation; only one room for us all.
On ye 8th the carriages were dismounted and carried over the
Col de Tende upon mules: I went over in a chaise à porteurs, so did
my child.
Snow was melting very fast, and made the
footing for the mules and guides very insecure. We TURIN
stopped at a small house at Borgo Limone as one
of the carriages was broken in getting it off the mule’s back.
11th.—Arrived at Turin. Ly. Duncannon and Dss. were already
arrived. In the evening I went to Trevor’s:[12] he was the English
Minister. A celebrated performer on the violin attempted to render by
sound the story of Werter; the imagination must have supplied
greatly to assist the effect. All that I could understand was the scene
where he shoots himself; the twang of the catgut made a crash,
which made one start, so it had that effect in common with the report
of a pistol. During my stay at Turin I attended chemical lectures at
Bonvoisin’s; had I been able to apply more I might under his care
have advanced considerably in information. Cte. Masin gave me a
very fine dinner. Before dinner he sent for one of the Professors, who
exhibited the cruel experiment upon a frog to prove animal electricity.
I went one morning with Ly. D., Dss. Devonshire, etc., to La
Venesia to be presented to the Prince and Princesse de Piémont.[13]
She is in person like her brother the King of France. Since the
downfall of the clergy in France she has constantly worn the dress of
a Sœur grise. They are both bigoted and superstitious. I had many
pleasant parties to Montcalieri, La Superga, the Colline, etc. The
Vallentin is a singular old château on the banks of the Po. It was built
by Christina, Dsse. de Savoie, one of the daughters of Henry IV. of
France. I made acquaintance for the first time with Mde. de Balbi.[14]
Previous to my leaving Turin we were surprised by the arrival of Ly.
Malmesbury[15] and G. Ellis.[16]
We left Turin on ye 10th June, 1792; our route was to Verona,
and to see Lago Maggiore in our way. We went to Arona that we
might cross the Ticino at Sesto, as there was a flood at Buffalora, the
usual ferry. Slept first night at Vercelli. After wading through very
deep water for a mile or two, caused by the overflowing of the lake,
we reached, on ye 12th, Arona, a small town charmingly situated on
the lake. The next day I summoned up courage and went upon the
lake to see the Borromean Islands. Just above the town of Arona
stands the colossal statue of St. Charles Borromeo, executed in
1650 by his family; it exceeds 100 ft. in height, allowing 64 for the
figure and 46 for the pedestal. This lake is longer than that of
Geneva. The islands are beautiful. The Isola Bella is the enchanted
spot, on which the fairy palace and gardens stand. Since the days of
Circe and Armida nothing has equalled the magic land, and little
worthy of detention would be an Ulysses and Rinaldo who could
repine at seclusion in such a voluptuous abode. The Palace is on an
eminence, and pastures and terraces descend from it to the water.
Some of the apartments are made like grottoes and are brought to
the margin of the lake: without exaggeration it is a spot apparently
made by magic art. Prince Augustus[17] was seeing the Palace. I
there met with him for the first time. He is handsome and well-bred.
13th.—Left Arona; crossed the Ticino and
arrived very late at Milan. The heat in the plains of 1792 PAVIA
Lombardy in the summer is intense; the AND MANTUA
thermometer varied from 92 to 96 degrees
Fahrenheit. The Litta family live with princely splendour. The Csse.
Maxe, celebrated in the annals of European gallantry, was very civil,
and showed me all that was worthy of notice. Padre Pini, an old
Barnabite monk, gave me many good specimens, especially of his
Adularia, a species of felspar he has discovered. I went over to
Pavia to see the celebrated Spallanzani:[18] he is the great friend of
Bonnet of Geneva, and he is the man who has made some filthy
experiments upon digestion.
Pavia is a curious old town, formerly the capital of the Lombard
Kings, and in more modern times the scene of the disaster of the
French army, and the captivity of its monarch. Francis ye 1st here
became prisoner to the unfeeling, politic Charles V. The Cathedral is
a specimen of very early Gothic, misshapen and clumsy. The Po and
Ticino join near the city. Great preparations among the emigrants of
Coblentz for marching into France.
22nd June.—Left Milan for Dresden. We skirted Lodi, famous for
its cheeses and deep sands. A violent thunderstorm came on at
Pizzighettone, where I stopped; and notwithstanding abuse and
threats I was resolved to stay and not risk my life and my child’s with
hot horses near a deep river during a heavy storm.
23rd.—Got to Mantua. The waters of the Mincio being suffered to
stagnate, the wells about Mantua are unwholesome and bad. The
Palais du T. [sic] is a pretty villa belonging to the ancient Princes of
Gonzaga. The walls are painted in fresco by Giulio Romano, the best
of Raphael’s scholars: the subject represents the ‘Battle of the
Giants.’ I looked around in vain for a beech tree under whose wide
spreading branches a Tityrus was wont to recline and amuse his little
lambkins with the soft notes of his pipe in the days of the Mantuan
Bard. Tho’ Vergil was born, one might doubt much if he was bred,
here; he seems to have described the pastoral manners of some
happier soil of Italy.
The party reached Verona on the 24th. ‘The town is handsome; the
bridge over the Adige very fine. The Corso is very noble.’ They left
again two days later, and at Ala entered the Tyrol.
The entrance is through a narrow gorge, apparently opened by
an earthquake, and probably widened by the deep and rapid course
of the Adige. The mts. are not very high till Mt. Baldo, which does not
exceed a 1000 ft. Between Ala and Roveredo we passed among
rocks that have suffered some great convulsion; at a distance they
resemble the ruins of a demolished city. A calcareous mountain
stood where the road now passes; probably in one tremendous night
when all the elements were waging war, the loud rolling thunder and
the forked lightning darting upon this ill-fated spot, the earth trembled
with the shock and the side of the mountain was split and broken into
a thousand pieces. The falling of the mt., tho’ no history records the
event, does not appear to have happened at an early period. The
fragments are still sharp and angular. Owing to a fair at Trent we
were forced to remain at Roveredo. Since the league of Cambray
Roveredo is no longer in the possession of the Venetians.
27th.—The road from thence is through a
tolerably well cultivated country of vines and 1792
mulberries, thro’ which the Adige moves along INNSPRUCK
irregularly, sometimes slowly, at other times
rapidly. The road in many places is very narrow with a precipice to
the river undefended by a parapet. Monr. de Calonne was
overturned into the river, and but for the assistance of Messrs.
Wallace and Ellis, in the year ’91, must have been drowned.
After passing Neumarck, the travellers arrived at Brixen on the
28th.
Brixen is prettily situated in a very fertile vale; vines and corn
appear in abundance. The hills are cultivated and a more genial soil
is the consequence. The churches and castles built on the tops of
craggy rocks along this valley are singularly romantic. The valley is
extremely populous, and the younger part of the inhabitants have
extremely pretty faces.
At Innspruck we were compelled to remain two nights, as we had
not the plea of being Aulic Counsellors or Ambassadors. It is a paltry
restriction on travellers that they must consent, unless privileged, to
remain eight and forty hours in Austrian territory—a sort of tax that
one must spend money in their dominions. In the principal church
there is a magnificent tomb erected to the memory of the Emperor
Maximilian, grandfather to Charles V. He was a complying, weak
Prince, of whom Abbé Raynal says in his Mémoires Historiques ‘Il
n’inspirait point de reconnaissance, quoiqu’il accordat presque tout
qu’on lui demandait: on sentait qu’il ne cherchait pas à obliger, mais
qu’il ne savait pas refuser.’ Near the town is a castle, the residence
of the Archduchess, Governor of the Tyrol; the arsenal contains a
curious collection of different suits of armour, which belonged to
some of the most celebrated of warriors. I went to a German play,
the pantomime of which, tho’ a deep tragedy, diverted me much, tho’
I did not comprehend a word of the dialogue.
2nd July.—Took the road to Munich. Immediately on leaving the
town began ascending; slept at Wallensee, prettily situated among
the mts., near a small lake. The change of temperature was
sensible: thermometer in the morning at Innspruck was 75, at
Wallensee fell to 59.
3rd July.—Large clumps of the spruce fir dotted over rich plains
and fertile hills, with a noble view of the mts. we were quitting, made
a view not altogether insipid.
The approach to Munich is not imposing; it denotes little of the
magnificence of a capital. The town is large and irregular; the houses
are more substantial and imposing than magnificent; many are
thatched, and those that are not have high roofs, gable ends, and
garret windows. I was labouring under such low spirits, that the
prejudice I felt against Munich was owing to the unhappiness I
endured there.
Count Rumford,[19] an American of the name of Benjamin
Thompson, was the Prime Minister of Bavaria. He has made some
excellent reforms in the governt. of that country, and created many
beneficial institutions for the poor. He was very civil, and showed me
with a degree of minuteness, with which I could have dispensed, all
his hospitals, manufactures, etc. I was compelled to see what I did
not wish, his beloved, a Mde. Nogarolla.
Went from Munich to Ratisbon. Here I first hailed the Danube, a
mighty stream, the prince of rivers. I purchased a gun and pair of
pistols of the famous Kerkenrüyter to make a present to Mr. Pelham.
The maker told me he had sold to Col. Lennox the identical pair he
used against the Duke of York. It was scarcely fair to use such sure
weapons.
Reached Dresden in ye night of the 21st. We
found a numerous society of English, Lord H. LORD HENRY
Spencer,[20] Mr. Robt. Markham, Mr. Elliot,[21] SPENCER
English Minister, Ct. Stopford, and afterwards Lds.
Boringdon and Granville Leveson-Gower. Ld. Henry was there on his
way to Vienna, whither he was to carry the compliment upon the
accession of the Emperor. He was then Secretary at the Hague
under Ld. Auckland. His abilities were spoken highly of; at Eton he
was known as a poet in the Microcosm.[22] His shyness
embarrassed him, and rendered his manner awkward. He was very
witty, and possessed a superabundant stock of irony. In short, he
became ardently in love with me, and he was the first man who had
ever produced the slightest emotion in my heart.
I was received at Dresden with a degree of distinction that was
highly flattering. I would not go to Court; the Princesses sent a civil,
reproachful message, and begged me to see them en particulier at
one of their villas. I went, and an embarrassing circumstance
occurred. The Prince Antony, by some mistake, took me for Ld.
Henry’s wife, complimented him upon my beauty, agréments, etc.,
and concluded by saying, ‘I see by your admiration and love for her
you are worthy to possess her.’ This said before ten people was too
painful to bear. Had I been very accessible to vanity on the score of
person, I could not have resisted the flattery I everywhere met with:
dinners, fêtes, etc., given to me; invitations sent to people on
purpose to meet ‘La charmante Miladi’; my dress copied, my manner
studied.
The 2nd of August, 1792.—Very pleasant supper at the French
Minister’s, Baron de Montesquieu. The Duke of Brunswick’s
Manifesto filled everybody with astonishment and alarm for the lives
and liberties of the Royal family.[23] This rash and violent diatribe
against the Parisians was a precursor of an invasion of France.
Seventeen thousand of the Provincial troops were to be assembled
on ye 14th July at Paris, and it was said that if the Prussians, etc.,
advanced into the country, that the King would be conveyed to Blois;
then troops are supposed to be already destined to that service, and
the Parisians are already jealous of them.
In England, the Association of the Friends of the People alarm
the steady, and the example of France terrifies even the moderate
innovators.[24] The Association was formed without the participation
of Mr. Fox;[25] he never was consulted about it. On the contrary the
Association seemed determined against all advice, but most
particularly against his. Thinking people apprehend more from the
superabundant loyalty of the country than from its Democracy. There
are to be Addresses from all parts of the Kingdom, thanking the King
for his Proclamation and professing attachment to his Person and
Governt. Extremes are dangerous.
Left Dresden in September; went by Prague to
Vienna. I was much pleased with my residence THE FRIENDS
there; I was fêted enough to gratify the most OF THE
unbounded vanity. I went to Court; a separate PEOPLE
private introduction to the Emperor and Empress.
Sir Robert Keith was the English Minister. The Countess Thuron was
the lady who went about with me. Made an excursion to Presburg,
the capital of Hungary. Ld. Henry was there. We parted on
September the 25th or 26th, not later.
From Vienna we went to Venice by the road of Gratz, thro’ Styria
and Carinthia. On our arrival at Venice Mr. Ellis was dangerously ill
of a putrid fever. He recovered by the care of a Jew doctor. We
stayed a short time after his recovery; went by way of Mantua to
Parma. From thence to Bologna and Florence. Mr. Ellis left us at
Florence to return to England. We went on by the road of Radicofani
to Rome (where we staid only two nights), then to Naples, which we
reached about the 2nd week in October.
As soon as I was a little rested after my journey I began to see
the wonderful environs, both of natural and artificial curiosities. The
English society was composed of many of my friends; the
Palmerstons,[26] Miss Carter, Sr. Charles Blagden, Dss. of Ancaster,
Ly. Plymouth with whom I became intimate. Soon came the
Bessboroughs (the old Father died), Ly. Spencer, Dss. of
Devonshire, Ly. E. Foster, Mr. Pelham. In January the French fleet
came and menaced Naples with a bombardment.[27] They were
moored in front of my house on the Chiaia. I was brought to bed of
my son Henry, on ye 10th Feb., 1793. I made my grossesse a
pretext for staying at home in the evening. I went out every morning
to see the objects most worthy of notice, and the evening I always
passed with friends who came to see me, Drew, Mr. Pelham, and
Italinski,[28] a Russian who grew much attached to my society.
March 22nd.—We set off for Paestum. Our
party consisted of the Palmerstons, Miss Carter, a ROAD TO
Mr. Poor (a very eccentric man), and Mr. Pelham. PAESTUM
About two miles from Pompeia the country begins
to be pretty, and we got more amongst the Apennines. The road is
excellent, it being made by ye King to go to a chasse of his at Eboli.
La Cava and Vietri are charmingly situated in their different styles;
the first has all the beauties of social life, small neat cottages
interspersed amongst vineyards, olives, and myrtles, upon the side
of a hill inclining towards a small torrent. The whiteness of the
houses contrasted with the verdure of spring vegetation in the
foreground, and the boldness of the scraggy rocks behind make a
lovely picture and fill the mind with pleasing sensations at the sight of
comfort and tranquillity, a lot that rarely befalls the peasantry of
France and England. There is an aqueduct traditionally called
Abelard’s bridge; why, the learned must determine, for I never knew
that victim to love left his native France. Vietri is situated upon a rock
above the sea, into which it abruptly ends; it commands a noble view
of the bay of Salerno. With a glass from hence one may discern the
temples of Paestum on the opposite coast. Salerno is a pretty little
town upon the edge of the sea; the detail of the country is charming.
On the right side of the bay is Amalfi, remarkable for being the spot
where the Justinian Code was discovered. The Cathedral at Salerno
is curious; in it are many sarcophagi brought by Robert Guiscard
from Paestum, and various columns of fine marble and granite,
which are placed to form a corridor in the court of the Cathedral, but
being of different sizes the whole has an awkward appearance. From
Salerno ye country is less interesting; excepting a few Baronial
castles perched upon the tops of scraggy, isolated rocks there is little
worthy of notice.
At Eboli we were obliged to change our carriages for smaller
ones on account of the roads, which to Paestum were called
abominable. We crossed ye Sele in a ferry; it is a torrent frequently
impassable. Here the wretched inhabitants by their emaciated and
squalid looks indicated the beginning of the malaria. Their
habitations were such that one could easier imagine oneself in
Siberia than in delightful Italy! Delicious country! as their homes, if
they deserve such an epithet, were an exact counterpart of a Tartar
hut. Circular mud walls raised about three feet from the ground,
thatched with reeds forming a conical summit; the only aperture a
door, which answered ye double purpose of admitting the wretched
owners and letting out the smoke, which was very abundant from a
fire lighted in the centre of the hut. But even in this disconsolate
dwelling there was an attempt to drive away the melancholy which
disease and penury must naturally inspire, for on one of the poles
which supported the roof and came across the interior of the dwelling
there hung a guitar. I persuaded one of the peasants to strike it: I
immediately perceived an illumination of joy upon the haggard
countenances of his auditors. Happy instrument! to suspend for a
moment the sensation of misery, and banish by its tones the anguish
of want from the breasts of the forlorn inmates. As we approached
Paestum the dreariness of the country quite oppressive; plains filled
with buffaloes, the most hideous of animals, stagnant ditches, and
stinted myrtles, were all the objects that met the eye.
Paestum itself is situated in a plain about a mile
from the sea, dedicated to Neptune and built by ye PAESTUM
Phoenicians about 250 years after the foundation
of Rome; 500 years before Christ. Near the amphitheatre (which is
much ruined) is the remains of a building with fluted columns nearly
as large as those of the temples, more upright marks still existing of
their bases; the capitals much worked in extraordinary designs. Parts
of the frieze lying about; figures of men from 24 to 30 inches high
worked on the frieze between the triglyphs. The stone of this building
is more of the colour of grey limestone, and appears less porous
than that of which the temples are built, that is a stone formed by
incrustation of water. Paestum formerly was famous for roses, the
sweetness of which is celebrated by several of the Latin poets; now
alas! brambles and malaria have extinguished the fragrance of ye
rose.
Our accommodation was but indifferent: I slept upon a table, the
repelling points of which rather annoyed my limbs and would have
convinced Boscovitch,[29] had he been in my place, of the existence
of hard matter. However, I tried to sleep, tho’ its ancient inhabitants,
ye Sybarites, would not have rested, if the story is true that one of
them complained that a curled rose leaf destroyed their rest. The first
view I had of ye temples was in ye dusk of ye evening; their
appearance was majestic, but precisely what I had conceived them
to be from the drawings I had seen. They are the only remains in
Italy of early Grecian architecture. The Doric, to my taste, is too
uneven. The columns are squat and clumsy. The inhabitants are
savage and ignorant.
Fix’d like a plant on his peculiar spot,
To draw nutrition, propagate, and rot,
seems exactly their state. The cicerone assured us that in one of the
temples there was a prodigious treasure inaccessible to men, as the
Devil kept guard over it.
We saw the temples again in the morning, and then proceeded to
Salerno, where we slept. I walked upon the terrace before my
window and enjoyed the beauty of the night; the moon shone bright,
which added to the lulling sound of the waves filled me with every
pleasing and melancholy recollection. Tho’ separated by land and
sea from some objects too dearly cherished, yet I was tranquil.
Prudence satisfied me that all was for the best. I could not help
casting an anxious thought towards my dear father stretched upon a
bed of sickness, perhaps to rise no more, but the reflection of never
having done anything that could disturb his peace, or render his last
moments painful from my misconduct, was a relief that God grant my
children may feel when they think of me in a similar situation.
Delicious as Salerno is, yet like all the goods of this life it is
counterbalanced by a portion of evil, as half the year it is untenable
on account of the malaria. We dined in the Temple of Isis at
Pompeia, on which day I completed my 22nd year; so old and yet so
silly.
On ye 1st of April, 1793, we set off for Beneventum, Lady
Plymouth,[30] Italinski, Mr. Pelham, and Mr. Swinburne. Aversa is the
first town of any consequence. The polichinello of the Neapolitan
stage, which resembles the harlequin of the Italian, derives its origin
from this town, and the dialect of this place belongs to him, as the
Bergamesque does to the harlequin—which harlequin is, bye the
bye, a burlesque on Charles Quint. Arienzo is the next town, only
remarkable for the strange costume of the women, their dress being
only two aprons tied behind and before, which leaves a considerable
aperture on each side equally unpleasant and indecent. The country
is a dead flat to within three miles of Arpaia.
Between Arienzo and Arpaia is the valley which
is supposed to have been the scene of the AN ITALIAN
disgrace of the Romans, when they were MÉNAGE
compelled by the Samnites to pass under ye yoke.
The weather towards evening grew bad, and we could not get out
and examine the defiles with the attention and accuracy Italinski
required. The Marchese Pacca, to whom we were recommended,
received us with that hearty kind of hospitality, which unfortunately
for the good fellowship of society is totally banished from our would
be refined country. His time, himself, and all he possessed, were at
our disposal. The interior of an Italian ménage I only knew from buffa
opera; it is worth seeing. Himself, his old palace, his antiquated
volantes, his equipages, his stubborn mules, all were sights. The old
Marchesa was also delightful, not to the eye, for she was hideous,
nor to the ear, for she squalled, nor to the nose, for she was an
Italian; yet, from her unbounded desire of pleasing, the tout
ensemble created more agreeable sensations than many more
accomplished could have inspired, as there is something infinitely
gratifying to our predominant sentiment of self-love to see another
solicitous to please, even tho’ the attempt should prove
unsuccessful. Fruitless as it was, the goodwill supplied the failure.
In consequence of the birth of a son to the Empress there was a
brilliant appartamente at the Queen’s.[31] I went with joy.
1st May.—The whole proceeding was conducted with the utmost
magnificence.
The post of ye 2nd brought the melancholy news of the death of
one of my warmest friends, poor Ly. Sheffield! She loved me most
tenderly, nor did the great disparity of years prevent me from
returning with cordiality her affection.
On ye fourth of May I went to see the celebrated miracle of the
liquefaction of the blood of St. Januarius.[32] The Duc de Sangro, in
whose house we saw the miracle, gave us afterward a ball. The
composition of the material puzzles the chemists. The miracle, such
as it is, requires the vigour and warmth of a young hand to reduce it
from its concrete state to fluidity.
Sunday, 5th May.—Prince Esterhazy, the Imperial Ambassador,
gave a splendid fête in honour of the young Archduke. The King,
Queen, and Prince Royal were present: the Queen came and sat by
me the greater part of the evening. She is lively and entertaining in
conversation. It was whispered about the room that the atrocious
Marseillais were marching upon Paris to destroy the Queen.
6th May.—Rode out as usual; a very pretty retired ride towards
the Camaldoli.
7th.—Infamously bad weather, which made us delay our project
of passing the day at Baia. We therefore confined ourselves within
hail (?) of land, and dined at Pollio’s villa upon Posilippo. We rowed
by the side of the charming Colline. The whole detail of the country is
delightful; the bright green of the vine contrasted with the brilliant
yellow of the tufa produces the most pleasing effect. Pollio’s villa is
on the East side of the Colline, from whence it commanded a fine
view of the chain of Apennines with the high point of St. Angelo
lowering above, the towns of Pompeia, Stabia, the promontory of
Minerva, and the whole of the bay including an oblique view of Capri.
We attempted to row round Nisida, but a threatening storm
prevented us. We rowed to the Porto Pavone, a lovely little harbour
formed like a peacock’s tail, which figure gave rise to the name. We
dined at Pollio’s villa during a violent thunderstorm. I conquered my
fears and behaved with great intrepidity.
The next day we embarked at Pozzuoli for
Baia. At Pozzuoli, a tolerable statue of Tiberius, BAIA
ornamented with bas-reliefs representing 14 cities
destroyed by an earthquake and restored by him; monster as he was
he could sometimes be betrayed into a good action. We passed
Mons Gaurus, on which grew the Falernian wine so much praised by
Horace, who either did not know what good wine was or the quality
of the grape has changed, as the wine it now yields has no claim to
encomium. The next summit is Monte Nuovo, raised by a terrible
earthquake and eruption out of the Lucrine Lake within the space of
24 hours; its elevation destroyed a small town situated on its banks.
The crater of Monte Nuovo gives one a very good notion of a
volcano: the hill composed of light volcanic ashes which will soon
become compact enough to be called tufa. We passed by Nero’s
baths and villa.
On landing at Baia, the first object is the Temple of Venus, an
octagon building; above it is a circular building dedicated to Mercury
and another to Diana, of which only half remains, like the section of a
building in architectural drawing. In the centre it had a cupola not
unlike the form of the Pantheon. The present castle of Baia is upon
the spot where Julius Caesar had a villa. Every atom of this once
favoured spot was either highly decorated with fine gardens,
fountains, porches, and terraces, or adorned with luxurious villas.
Marius was reproached in the Senate for living in a spot so much the
seat of pleasure. Sylla, Cicero, Lucullus, Pompey, Caesar,
Hortensius, all had villas. The baths of Nero are between Baia and
the Lucrine Lakes; the heat of the water is so great that an egg is
boiled in two minutes. The sand under the sea is so heated that one
could not with convenience hold it for any time. This all proves the
vicinity of that powerful agent so destructive to this beautiful country:
hourly may one expect some dreadful explosion that may perhaps
lay the very spot I am now on many hundreds of feet below its
present level, or raise it to the height of Vesuvius. The sea was
rough, and the periodical storm came on an hour later than the
preceding day. It is singular the degree of accuracy with which the
people foretell the approach of bad weather, and even the duration
of it. We returned by land. We passed the ruins of Cicero’s academic
villa. How grand it must have been in its days of splendour. Atticus
procured from Greece the pictures and statues; that they must have
been excellent one cannot doubt, both from his fine taste and the
facility with which he could obtain the finest subjects.
We went next day from Pozzuoli to Misenum: Lady Spencer
declined going from a reason which I did not know till afterwards, or
it doubtless would have operated in retaining me, viz., the length of
the sea excursion, and the probability of a storm. The sea was very
rough, and I, of course, was very nervous. We passed through
pieces of what are called Caligula’s Bridge, but more likely to have
been a mole beyond which he carried a bridge of boats over which
he rode to fulfil a prophecy, which was, “That it was as unlikely that
he should come to the Empire, as that he should ride across the Bay
of Baia on horseback.”
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like