0% found this document useful (0 votes)
1 views

Intelligent Computing Proceedings of the 2021 Computing Conference Volume 2 Lecture Notes in Networks and Systems 284 Kohei Arai (Editor) download

The document presents the proceedings of the 2021 Computing Conference, edited by Kohei Arai, which includes a collection of research papers covering various topics in intelligent computing and networks. It features 235 chapters selected from over 638 submissions, highlighting advancements in areas such as technology trends, machine vision, and security. The proceedings are part of the Lecture Notes in Networks and Systems series, aimed at rapid dissemination of research findings in the field.

Uploaded by

phueatamny
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

Intelligent Computing Proceedings of the 2021 Computing Conference Volume 2 Lecture Notes in Networks and Systems 284 Kohei Arai (Editor) download

The document presents the proceedings of the 2021 Computing Conference, edited by Kohei Arai, which includes a collection of research papers covering various topics in intelligent computing and networks. It features 235 chapters selected from over 638 submissions, highlighting advancements in areas such as technology trends, machine vision, and security. The proceedings are part of the Lecture Notes in Networks and Systems series, aimed at rapid dissemination of research findings in the field.

Uploaded by

phueatamny
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

Intelligent Computing Proceedings of the 2021

Computing Conference Volume 2 Lecture Notes in


Networks and Systems 284 Kohei Arai (Editor)
pdf download
https://ebookmeta.com/product/intelligent-computing-proceedings-
of-the-2021-computing-conference-volume-2-lecture-notes-in-
networks-and-systems-284-kohei-arai-editor/

Download more ebook from https://ebookmeta.com


We believe these products will be a great fit for you. Click
the link to download now, or visit ebookmeta.com
to discover even more!

Intelligent Computing Proceedings of the 2021 Computing


Conference Volume 3 Lecture Notes in Networks and
Systems 285 Kohei Arai (Editor)

https://ebookmeta.com/product/intelligent-computing-proceedings-
of-the-2021-computing-conference-volume-3-lecture-notes-in-
networks-and-systems-285-kohei-arai-editor/

Intelligent Computing: Proceedings of the 2021


Computing Conference, Volume 1 1st Edition Kohei Arai

https://ebookmeta.com/product/intelligent-computing-proceedings-
of-the-2021-computing-conference-volume-1-1st-edition-kohei-arai/

Intelligent Systems and Applications Proceedings of the


2021 Intelligent Systems Conference IntelliSys Volume 1
294 Lecture Notes in Networks and Systems Kohei Arai
(Editor)
https://ebookmeta.com/product/intelligent-systems-and-
applications-proceedings-of-the-2021-intelligent-systems-
conference-intellisys-volume-1-294-lecture-notes-in-networks-and-
systems-kohei-arai-editor/

Wolf Pack The U Boats at War Hitler s War Machine Bob


Carruthers

https://ebookmeta.com/product/wolf-pack-the-u-boats-at-war-
hitler-s-war-machine-bob-carruthers/
The Gaslighting Recovery Workbook Healing From
Emotional Abuse 1st Edition Amy Marlow Macoy

https://ebookmeta.com/product/the-gaslighting-recovery-workbook-
healing-from-emotional-abuse-1st-edition-amy-marlow-macoy/

Throttle The Driven World 1st Edition P. Sawyer

https://ebookmeta.com/product/throttle-the-driven-world-1st-
edition-p-sawyer/

Microsoft Word In 30 Minutes Make a bigger impact with


your documents and master the writing formatting and
collaboration tools in Word for Microsoft 365 and Word
for the Web 3rd Edition Angela Rose
https://ebookmeta.com/product/microsoft-word-in-30-minutes-make-
a-bigger-impact-with-your-documents-and-master-the-writing-
formatting-and-collaboration-tools-in-word-for-microsoft-365-and-
word-for-the-web-3rd-edition-angela-rose/

Dirty Queen Covington High 3 1st Edition Amelia Winters

https://ebookmeta.com/product/dirty-queen-covington-high-3-1st-
edition-amelia-winters/

Political Survival: Politicians and Public Policy in


Latin America Barry Ames

https://ebookmeta.com/product/political-survival-politicians-and-
public-policy-in-latin-america-barry-ames/
Marketing Management Fifteenth edition Philip Kotler

https://ebookmeta.com/product/marketing-management-fifteenth-
edition-philip-kotler/
Lecture Notes in Networks and Systems 284

Kohei Arai Editor

Intelligent
Computing
Proceedings of the 2021 Computing
Conference, Volume 2
Lecture Notes in Networks and Systems

Volume 284

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Fernando Gomide, Department of Computer Engineering and Automation—DCA,
School of Electrical and Computer Engineering—FEEC, University of Campinas—
UNICAMP, São Paulo, Brazil
Okyay Kaynak, Department of Electrical and Electronic Engineering,
Bogazici University, Istanbul, Turkey
Derong Liu, Department of Electrical and Computer Engineering, University
of Illinois at Chicago, Chicago, USA; Institute of Automation, Chinese Academy
of Sciences, Beijing, China
Witold Pedrycz, Department of Electrical and Computer Engineering,
University of Alberta, Alberta, Canada; Systems Research Institute,
Polish Academy of Sciences, Warsaw, Poland
Marios M. Polycarpou, Department of Electrical and Computer Engineering,
KIOS Research Center for Intelligent Systems and Networks, University of Cyprus,
Nicosia, Cyprus
Imre J. Rudas, Óbuda University, Budapest, Hungary
Jun Wang, Department of Computer Science, City University of Hong Kong,
Kowloon, Hong Kong
The series “Lecture Notes in Networks and Systems” publishes the latest
developments in Networks and Systems—quickly, informally and with high quality.
Original research reported in proceedings and post-proceedings represents the core
of LNNS.
Volumes published in LNNS embrace all aspects and subfields of, as well as new
challenges in, Networks and Systems.
The series contains proceedings and edited volumes in systems and networks,
spanning the areas of Cyber-Physical Systems, Autonomous Systems, Sensor
Networks, Control Systems, Energy Systems, Automotive Systems, Biological
Systems, Vehicular Networking and Connected Vehicles, Aerospace Systems,
Automation, Manufacturing, Smart Grids, Nonlinear Systems, Power Systems,
Robotics, Social Systems, Economic Systems and other. Of particular value to both
the contributors and the readership are the short publication timeframe and the
world-wide distribution and exposure which enable both a wide and rapid
dissemination of research output.
The series covers the theory, applications, and perspectives on the state of the art
and future developments relevant to systems and networks, decision making, control,
complex processes and related areas, as embedded in the fields of interdisciplinary
and applied sciences, engineering, computer science, physics, economics, social, and
life sciences, as well as the paradigms and methodologies behind them.
Indexed by SCOPUS, INSPEC, WTI Frankfurt eG, zbMATH, SCImago.
All books published in the series are submitted for consideration in Web of
Science.

More information about this series at http://www.springer.com/series/15179


Kohei Arai
Editor

Intelligent Computing
Proceedings of the 2021 Computing
Conference, Volume 2

123
Editor
Kohei Arai
Faculty of Science and Engineering
Saga University
Saga, Japan

ISSN 2367-3370 ISSN 2367-3389 (electronic)


Lecture Notes in Networks and Systems
ISBN 978-3-030-80125-0 ISBN 978-3-030-80126-7 (eBook)
https://doi.org/10.1007/978-3-030-80126-7
© The Editor(s) (if applicable) and The Author(s), under exclusive license
to Springer Nature Switzerland AG 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Editor’s Preface

It is a great privilege for us to present the proceedings of the Computing Conference


2021, held virtually on July 15 and 16, 2021.
The conference is held every year to make it an ideal platform for researchers to
share views, experiences and information with their peers working all around the
world. This is done by offering plenty of networking opportunities to meet and
interact with the world-leading scientists, engineers and researchers as well as
industrial partners in all aspects of computer science and its applications.
The main conference brings a strong program of papers, posters, videos, all in
single-track sessions and invited talks to stimulate significant contemplation and
discussions. These talks were also anticipated to pique the interest of the entire
computing audience by their thought-provoking claims which were streamed live
during the conferences. Moreover, all authors had very professionally presented
their research papers which were viewed by a large international audience online.
The proceedings for this edition consist of 235 chapters selected out of a total of
638 submissions from 50+ countries. All submissions underwent a double-blind
peer-review process. The published proceedings has been divided into three vol-
umes covering a wide range of conference topics, such as technology trends,
computing, intelligent systems, machine vision, security, communication, elec-
tronics and e-learning to name a few.
Deep appreciation goes to the keynote speakers for sharing their knowledge and
expertise with us and to all the authors who have spent the time and effort to
contribute significantly to this conference. We are also indebted to the organizing
committee for their great efforts in ensuring the successful implementation of the
conference. In particular, we would like to thank the technical committee for their
constructive and enlightening reviews on the manuscripts in the limited timescale.
We hope that all the participants and the interested readers benefit scientifically
from this book and find it stimulating in the process.

v
vi Editor’s Preface

Hope to see you in 2022, in our next Computing Conference, with the same
amplitude, focus and determination.

Kohei Arai
Contents

Balanced Weighted Label Propagation . . . . . . . . . . . . . . . . . . . . . . . . . . 1


Matin Pirouz
Analysis of the Vegetation Index Dynamics on the Base of Fuzzy Time
Series Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Elchin Aliyev, Ramin Rzayev, and Fuad Salmanov
Application of Data–Driven Fault Diagnosis Design Techniques
to a Wind Turbine Test–Rig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Silvio Simani, Saverio Farsoni, and Paolo Castaldi
Mathematical Model to Support Decision-Making to Ensure the
Efficiency and Stability of Economic Development of the Republic
of Kazakhstan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Askar Boranbayev, Seilkhan Boranbayev, Malik Baimukhamedov,
and Askar Nurbekov
Automated Data Processing of Bank Statements for Cash
Balance Forecasting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Vlad-Marius Griguta, Luciano Gerber, Helen Slater-Petty, Keeley Crocket,
and John Fry
Top of the Pops: A Novel Whitelist Generation Scheme for Data
Exfiltration Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Michael Cheng Yi Cho, Yuan-Hsiang Su, Hsiu-Chuan Huang,
and Yu-Lung Tsai
Analyzing Co-occurrence Networks of Emojis on Twitter . . . . . . . . . . . 80
Hasan Alsaif, Phil Roesch, and Salem Othman
Development of an Oceanographic Databank Based on Ontological
Interactive Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Oleksandr Stryzhak, Vitalii Prykhodniuk, Maryna Popova,
Maksym Nadutenko, Svitlana Haiko, and Roman Chepkov

vii
viii Contents

Analyzing Societal Bias of California Police Stops Through Lens


of Data Science . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Sukanya Manna and Sara Bunyard
Automated Metadata Harmonization Using Entity Resolution
and Contextual Embedding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Kunal Sawarkar and Meenakshi Kodati
Data Segmentation via t-SNE, DBSCAN, and Random Forest . . . . . . . . 139
Timothy DeLise
GeoTree: A Data Structure for Constant Time Geospatial Search
Enabling a Real-Time Property Index . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Robert Miller and Phil Maguire
Prediction Interval of Future Waiting Times of the Two-Parameter
Exponential Distribution Under Multiply Type II Censoring . . . . . . . . . 166
Shu-Fei Wu
Predictive Models as Early Warning Systems: A Bayesian
Classification Model to Identify At-Risk Students of Programming . . . . 174
Ashok Kumar Veerasamy, Mikko-Jussi Laakso, Daryl D’Souza,
and Tapio Salakoski
Youden’s J and the Bi Error Method . . . . . . . . . . . . . . . . . . . . . . . . . . 196
MaryLena Bleile
A New Proposal of Parametric Similarity Measures
with Application in Decision Making . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Luca Anzilli and Silvio Giove
The Challenges of Using Big Data in the Consumer Credit Sector . . . . . 221
Kirill Romanyuk
New Engine to Promote Big Data Industry Upgrade . . . . . . . . . . . . . . . 232
Jing He, Chuyi Wang, and Haonan Chen
Using Correlation and Network Analysis for Researching
Intellectual Competence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Sipovskaya Yana Ivanovna
A Disease Similarity Technique Using Biological Process
Functional Annotations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Luis David Licea Torres and Hisham Al-Mubaid
Impact of Types of Change on Software Defect Prediction . . . . . . . . . . 273
Atakan Erdem
Analyzing Music Genre Popularity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Jose Fossi, Adam Dzwonkowski, and Salem Othman
Contents ix

Result Prediction Using Data Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . 295


Hasan Sarwar, Dipannoy Das Gupta, Sanzida Mojib Luna,
Nusrat Jahan Suhi, and Marzouka Tasnim
A Systematic Literature Review on Big Data Extraction,
Transformation and Loading (ETL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Joshua C. Nwokeji and Richard Matovu
Accelerating Road Sign Ground Truth Construction with
Knowledge Graph and Machine Learning . . . . . . . . . . . . . . . . . . . . . . . 325
Ji Eun Kim, Cory Henson, Kevin Huang, Tuan A. Tran, and Wan-Yi Lin
Adjusted Bare Bones Fireworks Algorithm to Guard
Orthogonal Polygons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Adis Alihodzic, Damir Hasanspahic, Fikret Cunjalo, and Haris Smajlovic
Unsupervised Machine Learning-Based Elephant and Mice
Flow Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Muna Al-Saadi, Asiya Khan, Vasilios Kelefouras, David J. Walker,
and Bushra Al-Saadi
Automated Generation of Zigzag Carbon Nanotube Models
Containing Haeckelite Defects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
M. Leonor Contreras, Ignacio Villarroel, and Roberto Rozas
Artificial Intelligence Against Climate Change . . . . . . . . . . . . . . . . . . . . 378
Leila Scola
Construction Site Layout Planning Using Multiple-Level
Simulated Annealing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398
Hui Jiang and YaBo Miao
Epistocracy Algorithm: A Novel Hyper-heuristic Optimization
Strategy for Solving Complex Optimization Problems . . . . . . . . . . . . . . 408
Seyed Ziae Mousavi Mojab, Seyedmohammad Shams,
Hamid Soltanian-Zadeh, and Farshad Fotouhi
An Approach for Non-deterministic and Automatic Detection
of Learning Styles with Deep Belief Net . . . . . . . . . . . . . . . . . . . . . . . . . 427
Maxwell Ndognkon Manga and Marcel Fouda Ndjodo
Using Machine Learning to Identify Methods
Violating Immutability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Tamás Borbély, Árpád János Wild, Balázs Pintér, and Tibor Gregorics
Predicting the Product Life Cycle of Songs on the Radio . . . . . . . . . . . . 463
O. F. Grooss, C. N. Holm, and R. A. Alphinas
x Contents

Hierarchical Roofline Performance Analysis for Deep


Learning Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
Charlene Yang, Yunsong Wang, Thorsten Kurth, Steven Farrell,
and Samuel Williams
Data Augmentation for Short-Term Time Series Prediction
with Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Anibal Flores, Hugo Tito-Chura, and Honorio Apaza-Alanoca
On the Use of a Sequential Deep Learning Scheme for Financial
Fraud Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507
Georgios Zioviris, Kostas Kolomvatsos, and George Stamoulis
Evolutionary Computation Approach for Spatial
Workload Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524
Ahmed Abubahia, Mohamed Bader-El-Den, and Ella Haig
Depth Self-optimized Learning Toward Data Science . . . . . . . . . . . . . . 543
Ziqi Zhang
Predicting Resource Usage in Edge Computing Infrastructures
with CNN and a Hybrid Bayesian Particle Swarm Hyper-parameter
Optimization Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
John Violos, Tita Pagoulatou, Stylianos Tsanakas, Konstantinos Tserpes,
and Theodora Varvarigou
Approaching Deep Convolutional Neural Network for Biometric
Recognition Based on Fingerprint Database . . . . . . . . . . . . . . . . . . . . . . 581
Md. Saiful Islam, Tanhim Islam, and Mahady Hasan
Optimizing the Neural Architecture of Reinforcement
Learning Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
N. Mazyavkina, S. Moustafa, I. Trofimov, and E. Burnaev
Automatic Ensemble of Deep Learning Using KNN
and GA Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
Ben Zagagy, Maya Herman, and Ofer Levi
A Deep Learning Model for Data Synopses Management
in Pervasive Computing Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
Panagiotis Fountas, Kostas Kolomvatsos, and Christos Anagnostopoulos
DeepObfusCode: Source Code Obfuscation through
Sequence-to-Sequence Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Siddhartha Datta
Deep-Reinforcement-Learning-Based Scheduling with Contiguous
Resource Allocation for Next-Generation Wireless Systems . . . . . . . . . . 648
Shu Sun and Xiaofeng Li
Contents xi

A Novel Model for Enhancing Fact-Checking . . . . . . . . . . . . . . . . . . . . 661


Fatima T. AlKhawaldeh, Tommy Yuan, and Dimitar Kazakov
Investigating Learning in Deep Neural Networks Using Layer-Wise
Weight Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678
Ayush Manish Agrawal, Atharva Tendle, Harshvardhan Sikka,
Sahib Singh, and Amr Kayid
Deep Reinforcement Learning for Task Planning
of Virtual Characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
Caio Souza and Luiz Velhor
Accelerating Deep Convolutional Neural on GPGPU . . . . . . . . . . . . . . . 712
Dominik Żurek, Marcin Pietroń, and Kazimierz Wiatr
Enduring Questions, Innovative Technologies: Educational Theories
Interface with AI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
Rosemary Papa and Karen Moran Jackson
DRAM-Based Processor for Deep Neural Networks Without
SRAM Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743
Eugene Tam, Shenfei Jiang, Paul Duan, Shawn Meng, Yue Pan,
Cayden Huang, Yi Han, Jacke Xie, Yuanjun Cui, Jinsong Yu,
and Minggui Lu
Study of Residual Networks for Image Recognition . . . . . . . . . . . . . . . . 754
Mohammad Sadegh Ebrahimi and Hossein Karkeh Abadi
A Systematic Review of Educational Data Mining . . . . . . . . . . . . . . . . . 764
FangYao Xu, ZhiQiang Li, JiaQi Yue, and ShaoJie Qu
Image Classification with A-MnasNet and R-MnasNet
on NXP Bluebox 2.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 781
Prasham Shah and Mohamed El-Sharkawy
CreditX: A Decentralized and Secure Credit Platform for Higher
Educational Institutes Based on Blockchain Technology . . . . . . . . . . . . 793
Romesh Liyanage, D. P. P. Jayasinghe, K. T. Uvindu Sanjana,
H. B. D. R. Pearson, Disni Sriyaratna, and Kavinga Abeywardena
An Architecture for Blockchain-Based Cloud Banking . . . . . . . . . . . . . 805
Thuat Do
A Robust and Efficient Micropayment Infrastructure Using
Blockchain for e-Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825
Soumaya Bel Hadj Youssef and Noureddine Boudriga
Committee Selection in DAG Distributed Ledgers and Applications . . . 840
Bartosz Kuśmierz, Sebastian Müller, and Angelo Capossele
xii Contents

An Exploration of Blockchain in Social Networking Applications . . . . . 858


Rituparna Bhattacharya, Martin White, and Natalia Beloff
Real and Virtual Token Economy Applied to Games:
A Comparative Study Between Cryptocurrencies . . . . . . . . . . . . . . . . . . 869
Isabela Ruiz Roque da Silva and Nizam Omar
Blockchain Smart Contracts Static Analysis for Software Assurance . . . 881
Suzanna Schmeelk, Bryan Rosado, and Paul E. Black
Promize - Blockchain and Self Sovereign Identity Empowered
Mobile ATM Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891
Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty,
Nalin Ranasinghe, Kasun De Zoysa, and Wee Keong Ng
Investigating the Robustness and Generalizability of Deep
Reinforcement Learning Based Optimal Trade Execution Systems . . . . 912
Siyu Lin and Peter A. Beling
On Fairness in Voting Consensus Protocols . . . . . . . . . . . . . . . . . . . . . . 927
Sebastian Müller, Andreas Penzkofer, Darcy Camargo, and Olivia Saa
Dynamic Urban Planning: An Agent-Based Model Coupling
Mobility Mode and Housing Choice. Use Case Kendall Square . . . . . . . 940
Mireia Yurrita, Arnaud Grignard, Luis Alonso, Yan Zhang,
Cristian Ignacio Jara-Figueroa, Markus Elkatsha, and Kent Larson
Reasoning in the Presence of Silence in Testimonies:
A Logical Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 952
Alfonso Garcés-Báez and Aurelio López-López
A Genetic Algorithm Based Approach for Satellite Autonomy . . . . . . . . 967
Sidhdharth Sikka and Harshvardhan Sikka
Communicating Digital Evolutionary Machines . . . . . . . . . . . . . . . . . . . 976
Istvan Elek, Zoltan Blazsik, Tamas Heger, Daniel Lenger,
and Daniel Sindely
Analysis of the MFC Singuliarities of Speech Signals Using
Big Data Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987
Ruslan V. Skuratovskii and Volodymyr Osadchyy
A Smart City Hub Based on 5G to Revitalize Assets
of the Electrical Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1010
Santiago Gil, Germán D. Zapata-Madrigal, and Rodolfo García Sierra
LoRa RSSI Based Outdoor Localization in an Urban Area Using
Random Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1032
Winfred Ingabire, Hadi Larijani, and Ryan M. Gibson
Contents xiii

A Deep Convolutional Neural Network Approach for Plant Leaf


Segmentation and Disease Classification in Smart Agriculture . . . . . . . . 1044
Ilias Masmoudi and Rachid Lghoul
Medium Resolution Satellite Image Classification System
for Land Cover Mapping in Nigeria: A Multi-phase Deep
Learning Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056
Nzurumike L. Obianuju, Nwojo Agwu, and Onyenwe Ikechukwu
Analysis of Prediction and Clustering of Electricity Consumption
in the Province of Imbabura-Ecuador for the Planning
of Energy Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1073
Jhonatan F. Rosero-Garcia, Edilberto A. Llanes-Cedeño,
Ricardo P. Arciniega-Rocha, and Jesús López-Villada
Street Owl. A Mobile App to Reduce Car Accidents . . . . . . . . . . . . . . . 1085
Mohammad Jabrah, Ahmed Bankher, and Bahjat Fakieh
Low-Cost Digital Twin Framework for 3D Modeling
of Homogenous Urban Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1106
Emad Felemban, Abdur Rahman Muhammad Abdul Majid,
Faizan Ur Rehman, and Ahmed Lbath
VR in Heritage Documentation: Using Microsimulation Modelling . . . . 1115
Wael A. Abdelhameed
MQTT Based Power Consumption Monitoring with Usage Pattern
Visualization Using Uniform Manifold Approximation
and Projection for Smart Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1124
Ray Mart M. Montesclaros, John Emmanuel B. Cruz,
Raymark C. Parocha, and Erees Queen B. Macabebe
Deepened Development of Industrial Structure Optimization
and Industrial Integration of China’s Digital Music Under
5G Network Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1141
Li Eryong and Li Yukun
Optimal Solution of Transportation Problem with Effective
Approach Mount Order Method: An Operational Research Tool . . . . . 1151
Mohammad Rashid Hussain, Ayman Qahmash, Salem Alelyani,
and Mohammed Saleh Alsaqer
Analysis of Improved User Experience When Using AR
in Public Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1169
Vladimir Barros, Eduardo Oliveira, and Luiz Araújo
Autonomous Vehicle Decision Making and Urban
Infrastructure Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1190
George Mudrak and Sudhanshu Kumar Semwal
xiv Contents

Prediction of Road Congestion Through Application of Neural


Networks and Correlative Algorithm to V2V Communication
(NN-CA-V2V) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1203
Mahmoud Zaki Iskandarani
Urban Planning to Prevent Pandemics: Urban Design Implications
of BiocyberSecurity (BCS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1222
Lucas Potter, Ernestine Powell, Orlando Ayala, and Xavier-Lewis Palmer
Smart Helmet: An Experimental Helmet Security Add-On . . . . . . . . . . 1236
David Sales, Paula Prata, and Paulo Fazendeiro

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1251


Exploring the Variety of Random
Documents with Different Content
A new series of stories of Adventure in the North Woods
For Boys 12 to 16 Years
Handsome Cloth Binding

DICK KENT WITH THE MOUNTED POLICE

Dick and his friend Sandy meet with


ambush and desperate hand-to-hand
encounters while on a dangerous mission
with the Canadian Mounted Police.

DICK KENT IN THE FAR NORTH

Outwitting the notorious outlaw “Bear”


Henderson with the help of Malemute
Slade, the two boys discover the secret of
a lost gold mine.
DICK KENT WITH THE ESKIMOS

In their search, with the mounted police,


for an escaped murderer, Dick and Sandy
have thrilling experiences with ice floes
and animals in the Arctic.

DICK KENT, FUR TRADER

On the trail with Corporal Rand, Dick Kent


and his two associates unravel the mystery
of the fur thieves.

DICK KENT WITH THE MALEMUTE MAIL

Entrusted with the vaccine for an isolated


trading post, Dick and his friends win
through in spite of incredible difficulties.

DICK KENT ON SPECIAL DUTY

Corporal Rand and his young recruits solve


a mystery and find a hidden treasure.

247

The Boy Allies With the Navy


(Registered in the United States Patent Office)

BY
ENSIGN ROBERT L. DRAKE
For Boys 12 to 16 Years.
All Cloth Bound Copyright Titles

PRICE, 50 CENTS EACH


Postage 10c Extra

Frank Chadwick and Jack Templeton, young American


lads, meet each other in an unusual way soon after the
declaration of war. Circumstances place them on board
the British cruiser, “The Sylph,” and from there on, they
share adventures with the sailors of the Allies. Ensign
Robert L. Drake, the author, is an experienced naval
officer, and he describes admirably the many exciting
adventures of the two boys.

THE BOY ALLIES ON THE NORTH SEA PATROL; or,


Striking the First Blow at the German Fleet.
THE BOY ALLIES UNDER TWO FLAGS; or, Sweeping the
Enemy from the Sea.
THE BOY ALLIES WITH THE FLYING SQUADRON; or,
The Naval Raiders of the Great War.
THE BOY ALLIES WITH THE TERROR OF THE SEA; or,
The Last Shot of Submarine D-16.
THE BOY ALLIES UNDER THE SEA; or, The Vanishing
Submarine.
THE BOY ALLIES IN THE BALTIC; or, Through Fields of
Ice to Aid the Czar.
THE BOY ALLIES AT JUTLAND; or, The Greatest Naval
Battle of History.
THE BOY ALLIES WITH UNCLE SAM’S CRUISERS: or,
Convoying the American Army Across the Atlantic.
THE BOY ALLIES WITH THE SUBMARINE D-32; or, The
Fall of the Russian Empire.
THE BOY ALLIES WITH THE VICTORIOUS FLEETS; or,
The Fall of the German Navy.

248

The Boy Allies With the Army


(Registered in the United States Patent Office)

BY CLAIR W. HAYES
For Boys 12 to 16 Years.
All Cloth Bound Copyright Titles

In this series we follow the fortunes of two American


lads unable to leave Europe after war is declared. They
meet the soldiers of the Allies, and decide to cast their
lot with them. Their experiences and escapes are many,
and furnish plenty of good, healthy action that every
boy loves.

THE BOY ALLIES AT LIEGE; or, Through Lines of Steel.


THE BOY ALLIES ON THE FIRING LINE; or, Twelve Days’
Battle Along the Marne.
THE BOY ALLIES WITH THE COSSACKS; or, A Wild Dash
Over the Carpathians.
THE BOY ALLIES IN THE TRENCHES; or, Midst Shot and
Shell Along the Aisne.
THE BOY ALLIES IN GREAT PERIL; or, With the Italian
Army in the Alps.
THE BOY ALLIES IN THE BALKAN CAMPAIGN; or, The
Struggle to Save a Nation.
THE BOY ALLIES ON THE SOMME; or, Courage and
Bravery Rewarded.
THE BOY ALLIES AT VERDUN; or, Saving France from
the Enemy.
THE BOY ALLIES UNDER THE STARS AND STRIPES; or,
Leading the American Troops to the Firing Line.
THE BOY ALLIES WITH HAIG IN FLANDERS; or, The
Fighting Canadians of Vimy Ridge.
THE BOY ALLIES WITH PERSHING IN FRANCE; or, Over
the Top at Chateau Thierry.
THE BOY ALLIES WITH MARSHAL FOCH; or, The Closing
Days of the Great World War.

249

The Boy Scout Series

BY HERBERT CARTER
For Boys 12 to 16 Years
All Cloth Bound Copyright Titles

PRICE, 50 CENTS EACH


Postage 10c Extra
New Stories of Camp Life

THE BOY SCOUTS’ FIRST CAMPFIRE; or, Scouting with


the Silver Fox Patrol.
THE BOY SCOUTS IN THE BLUE RIDGE; or, Marooned
Among the Moonshiners.
THE BOY SCOUTS ON THE TRAIL; or, Scouting through
the Big Game Country.
THE BOY SCOUTS IN THE MAINE WOODS; or, The New
Test for the Silver Fox Patrol.
THE BOY SCOUTS THROUGH THE BIG TIMBER; or, The
Search for the Lost Tenderfoot.
THE BOY SCOUTS IN THE ROCKIES; or, The Secret of
the Hidden Silver Mine.
THE BOY SCOUTS ON STURGEON ISLAND; or,
Marooned Among the Game-Fish Poachers.
THE BOY SCOUTS DOWN IN DIXIE; or, The Strange
Secret of Alligator Swamp.
THE BOY SCOUTS AT THE BATTLE OF SARATOGA; A
story of Burgoyne’s Defeat in 1777.
THE BOY SCOUTS ALONG THE SUSQUEHANNA; or, The
Silver Fox Patrol Caught in a Flood.
THE BOY SCOUTS ON WAR TRAILS IN BELGIUM; or,
Caught Between Hostile Armies.
THE BOY SCOUTS AFOOT IN FRANCE; or, With The Red
Cross Corps at the Marne.

250

BOY SCOUT SERIES

By LIEUT. HOWARD PAYSON

A lively, interesting series of stories of travel, life in


camp, hunting, hiking, sports and adventure. No boy
should miss these tales of self-reliance, resourcefulness
and courage, in which every enjoyment known to scout
activity is accurately depicted.

Attractively Bound in Cloth.

THE BOY SCOUTS OF THE EAGLE PATROL

A speed boat race and an old sea captain


give the Eagle Patrol a busy summer.
THE BOY SCOUTS ON THE RANGE

Rob Blake and his friends among the


cowboys and Indians in Arizona.

THE BOY SCOUTS AND THE ARMY AIRSHIP

The Hampton Academy boys discover a


plot to steal Government airplane plans.

THE BOY SCOUTS’ MOUNTAIN CAMP

The Boy Scouts find a band of


“Moonshiners,” a lost cave and a hidden
fortune.

THE BOY SCOUTS FOR UNCLE SAM

The trial trip of a new submarine, a


strange derelict and a treasure hunt.

THE BOY SCOUTS AT THE PANAMA CANAL

Hunting and exploring in the tangled


forests of Panama.

THE BOY SCOUTS UNDER FIRE IN MEXICO

Searching for General Villa in War-torn


Mexico.

THE BOY SCOUTS ON BELGIAN BATTLEFIELDS


Between the lines in Belgium during the
World War.

THE BOY SCOUTS WITH THE ALLIES IN FRANCE

Raiding Uhlans, spies and air-raids in War-


wrecked France.

THE BOY SCOUTS AT THE PANAMA-PACIFIC


EXPOSITION

The adventures of four scouts at the


Exposition in San Francisco.

THE BOY SCOUTS UNDER SEALED ORDERS

The Boy Scouts’ exciting experiences while


searching for stolen Government property.

THE BOY SCOUTS’ CAMPAIGN FOR PREPAREDNESS

The Eagle Patrol on duty in a Government


munition plant.

251

The Golden Boys Series

BY L. P. WYMAN, PH.D.
Dean of Pennsylvania Military College.
A new series of instructive copyright stories for boys of
High School Age.

Handsome Cloth Binding.


PRICE, 50 CENTS EACH
POSTAGE 10c EXTRA

THE GOLDEN BOYS AND THEIR NEW ELECTRIC CELL


THE GOLDEN BOYS AT THE FORTRESS
THE GOLDEN BOYS IN THE MAINE WOODS
THE GOLDEN BOYS WITH THE LUMBER JACKS
THE GOLDEN BOYS RESCUED BY RADIO
THE GOLDEN BOYS ALONG THE RIVER ALLAGASH
THE GOLDEN BOYS AT THE HAUNTED CAMP
THE GOLDEN BOYS ON THE RIVER DRIVE
THE GOLDEN BOYS SAVE THE CHAMBERLAIN DAM
THE GOLDEN BOYS ON THE TRAIL

252

THE HUNNIWELL BOYS SERIES

By L. P. WYMAN
Author of “The Golden Boys” and “The Lakewood Boys” Series

Bill and Gordon Hunniwell, two enterprising and


inventive young Americans, have many thrilling
experiences far above the clouds in the “Albatross,” their
new electric airplane. Their adventures with the Secret
Service and narrow escapes in the fog, when searching
for the lost German aviators, are admirably described in
this new series.

THE HUNNIWELL BOYS IN THE AIR


THE HUNNIWELL BOYS’ VICTORY
THE HUNNIWELL BOYS IN THE SECRET SERVICE
THE HUNNIWELL BOYS AND THE PLATINUM MYSTERY
THE HUNNIWELL BOYS’ LONGEST FLIGHT

253

The Jack Lorimer Series

BY WINN STANDISH
For Boys 12 to 16 Years.
All Cloth Bound Copyright Titles

PRICE, 50 CENTS EACH


Postage 10c. Extra

CAPTAIN JACK LORIMER; or, The Young Athlete of


Millvale High.

Jack Lorimer is a fine example of the all-


around American high-school boys. His
fondness for clean, honest sport of all
kinds will strike a chord of sympathy
among athletic youths.

JACK LORIMER’S CHAMPIONS; or, Sports on Land and


Lake.
There is a lively story woven in with the
athletic achievements, which are all right,
since the book has been O. K’d. by
Chadwick, the Nestor of American Sporting
Journalism.

JACK LORIMER’S HOLIDAYS; or, Millvale High in Camp.

It would be well not to put this book into a


boy’s hands until the chores are finished,
otherwise they might be neglected.

JACK LORIMER’S SUBSTITUTE; or, The Acting Captain of


the Team.

On the sporting side, this book takes up


football, wrestling, and tobogganing.
There is a good deal of fun in this book
and plenty of action.

JACK LORIMER, FRESHMAN; or, From Millvale High to


Exmouth.

Jack and some friends he makes crowd


innumerable happenings into an exciting
freshman year at one of the leading
Eastern colleges. The book is typical of the
American college boy’s life, and there is a
lively story, interwoven with feats on the
gridiron, hockey, basketball and other
clean honest sports for which Jack Lorimer
stands.
254

The Oakdale Academy Series

BY MORGAN SCOTT

A series of real boys’ stories at the Oakdale Academy.


Ben Stone, the hero, wins his way under peculiar
circumstances and against great odds.

Clean-cut stories of real experiences in athletics and


sports of academy life, with adventures, mysteries and
clever descriptions.

Just the kind of books a boy 12 to 16 years would like


to read.
HANDSOME CLOTH BINDING.
JACKETS IN COLORS

PRICE, 50 CENTS EACH


POSTAGE 10c EXTRA

Copyright Titles

BEN STONE AT OAKDALE


BOYS OF OAKDALE ACADEMY
RIVAL PITCHERS OF OAKDALE
OAKDALE BOYS IN CAMP
THE GREAT OAKDALE MYSTERY
THE NEW BOYS AT OAKDALE

255

The Rex Kingdon Series

By GORDON BRADDOCK
A fine series of stories for boys of High School age,
written in an interesting and instructive style.

Rex Kingdon, the hero, a real, wide-awake boy,


interested in outdoor games, enters into the school
sports with enthusiasm. A rattling good baseball story
holds the interest to the very end. Rex and his
Ridgewood friends establish a campfire in the North
woods; there, mystery, jealousy and rivalry enter to
menace their safety, fire their interest and finally
cement their friendship.

Stories boys will want to read.

CLOTHBOUND. JACKETS IN COLORS.


Copyright Titles.
PRICE, 50 CENTS EACH
POSTAGE 10c EXTRA

REX KINGDON OF RIDGEWOOD HIGH


REX KINGDON IN THE NORTH WOODS
REX KINGDON AT WALCOTT HALL
REX KINGDON BEHIND THE BAT
REX KINGDON ON STORM ISLAND

For sale by all booksellers, or sent on receipt of price by the


Publishers
A. L. BURT COMPANY, 114-120 E. 23d St., NEW YORK

256

SAVE THE WRAPPER!

If you have enjoyed reading about the adventures of


the new friends you have made in this book and would
like to read more clean, wholesome stories of their
entertaining experiences, turn to the book jacket—on
the inside of it, a comprehensive list of Burt’s fine series
of carefully selected books for young people has been
placed for your convenience.

Orders for these books, placed with your bookstore or


sent to the Publishers, will receive prompt attention.
Transcriber’s Notes

Copyright notice provided as in the original—this e-text


is public domain in the country of publication.
Silently corrected palpable typos; left non-standard (or
amusing) spellings, punctuation, and dialect unchanged.
Added a Table of Contents based on chapter headings.
In the text versions, delimited italics text in
_underscores_ (the HTML version reproduces the font
form of the printed book.)
*** END OF THE PROJECT GUTENBERG EBOOK THE RADIO BOYS
WITH THE BORDER PATROL ***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying
copyright royalties. Special rules, set forth in the General Terms of
Use part of this license, apply to copying and distributing Project
Gutenberg™ electronic works to protect the PROJECT GUTENBERG™
concept and trademark. Project Gutenberg is a registered trademark,
and may not be used if you charge for an eBook, except by following
the terms of the trademark license, including paying royalties for use
of the Project Gutenberg trademark. If you do not charge anything
for copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG
LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund
from the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law
in the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name associated
with the work. You can easily comply with the terms of this
agreement by keeping this work in the same format with its attached
full Project Gutenberg™ License when you share it without charge
with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears,
or with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in
the United States and most other parts of the world
at no cost and with almost no restrictions
whatsoever. You may copy it, give it away or re-use
it under the terms of the Project Gutenberg License
included with this eBook or online at
www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of
the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning
of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute this
electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the Project
Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you


derive from the use of Project Gutenberg™ works
calculated using the method you already use to
calculate your applicable taxes. The fee is owed to the
owner of the Project Gutenberg™ trademark, but he has
agreed to donate royalties under this paragraph to the
Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each
date on which you prepare (or are legally required to

You might also like