دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Amit Kumar, Stefan Mozar, Jan Haase سری: Cognitive Science and Technology ISBN (شابک) : 9811980853, 9789811980855 ناشر: Springer سال نشر: 2023 تعداد صفحات: 1174 [1175] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 34 Mb
در صورت تبدیل فایل کتاب Advances in Cognitive Science and Communications: Selected Articles from the 5th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2022), Hyderabad, India به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب پیشرفت در علوم شناختی و ارتباطات: مقالات برگزیده از پنجمین کنفرانس بین المللی ارتباطات و مهندسی فیزیک سایبری (ICCCE 2022)، حیدرآباد، هند نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب شامل مقالات منتخب بررسی شده از پنجمین کنفرانس بین المللی ارتباطات و مهندسی فیزیک سایبری (ICCCE 2022) است که در 29 و 30 آوریل 2022 در حیدرآباد هند برگزار شد. مقالات ارائه شده در اینجا مربوط به نسل بعدی سیستم های شناختی، علوم اعصاب، سیستم های فیزیکی سایبری و تاثیر آنها بر فناوری های ارتباطی است. این کتاب شامل مطالب مرتبط با اختلالات شناختی، هوش محاسباتی، منطق فازی، محاسبات تکاملی است که برای استخراج نقشه راه برای تحقیقات آینده در علوم/سیستم ها و ارتباطات شناختی مهم هستند. ICCCE یکی از معتبرترین کنفرانسهایی است که در زمینههای بین رشتهای علوم شناختی و فناوری ارتباطات مانند روشهای زبانشناسی، علوم کامپیوتر، فلسفه و علوم اعصاب مفهومسازی شده است. این دوره از کنفرانس با حضور چندین متخصص و دانشگاهیان صنعت و سازمانهای دولتی برای پوشش طیف گستردهای از دیدگاهها، شیوهها و تخصص فنی مرتبط با فناوریهای شناختی و ارتباطات نسل بعدی برگزار شد. مقالات ارائه شده شامل نوآوری های صنعت، نتایج پیاده سازی ها و نتایج تحقیقات پیشرفته از حوزه های علم/فناوری شناختی و تاثیر آنها بر فناوری ارتباطات و مهندسی فیزیکی سایبری می شود. را
This book includes selected peer reviewed articles from The 5th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2022), held on 29th and 30th April 2022 in Hyderabad, India. Articles presented here relate to next generation cognitive systems, neuroscience, cyber physical systems and their impact on communication technologies. The book includes content related to cognitive disorders, computational intelligence, fuzzy logics, evolutionary computing that are important for deriving a roadmap for future research on cognitive science/systems and communications. ICCCE is one of the most prestigious conferences conceptualized in the transdisciplinary field of cognitive science and communication technology areas like methods of linguistics, computer science, philosophy, and neuroscience. This edition of the conference was attended by several Industry professionals and academicians, and Government agencies to cover a broad range of perspectives, practices, and technical expertise related to cognitive technologies and next generation communications. Articles presented cover innovations from industry, outcome of implementations and cutting-edge research outcomes from cognitive science/technology areas and their impact on communication technology and cyber physical engineering.
Contents A Methodology for Selecting Smart Contract in Blockchain-Based Applications 1 Introduction 2 Background 3 Smart Contract Use Cases 4 Challenges in Implementing Smart Contract 5 Proposed Methodology 6 Conclusion and Future Scope References Deep Learning Neural Networks for Detection of Onset Leukemia from Microscopic Images 1 Introduction 2 Literature Review 3 Algorithms 3.1 Fuzzy C-Means Algorithm 3.2 Active Contours 3.3 Convolutional Neural Network (CNN) 4 Methodology 5 Results and Discussion 6 Conclusion References Design of 4 × 4 Butler Matrix for 5G High Band of 26 GHz 1 Introduction 2 Design of Butler Matrix and Its Subcomponents 2.1 Design of Branch Line Coupler 2.2 Design of 0 dB Crossover 2.3 Design of Phase Shifter 2.4 Design of Rectangular Patch Antenna 2.5 Design of Overall Butler Matrix 3 Results and Analysis 4 Conclusion References Pedestrian and Vehicle Detection for Visually Impaired People 1 Introduction 2 Methodology 2.1 Data Acquisition and Pre-processing 2.2 Feature Extraction 2.3 Dimensionality Reduction 2.4 Classification of Vehicles and Pedestrian 3 Results and Discussion 4 Conclusion References Measuring Effectiveness of CSR Activities to Reinforce Brand Equity by Using Graph-Based Analytics 1 Introduction 2 Literature Review 3 Pre-processing of Data 4 Modelling and Analysis 5 Results and Conclusion References Design and Implementation of Built-In Self-Test (BIST) Master Slave Communication Using I2C Protocol 1 Introduction 1.1 Background 1.2 Objectives 1.3 Need and Importance 2 Literature Review 3 Methodology 3.1 Existing Methods 3.2 Proposed Method 4 Results 5 Conclusion Bibliography Implementation of Finite Element Method in Opera Software for Design and Analysis of High-Voltage Busbar Supports 1 Introduction 2 Technical Specifications of 33 kV Busbar Are of Use 3 Finite Element Method 4 Simulation Method 5 Design of High-Voltage Busbar Supports in Opera 6 Conclusion References InterCloud: Utility-Oriented Federation of Cloud Computing Environments Through Different Application Services 1 Introduction 2 System Architecture 3 Elements of InterCloud 3.1 Cloud Coordinator (CC) 3.2 Cloud Broker (CB) 4 The Performance of the Federated Cloud Environment 5 Conclusion References Cross-Cultural Translation Studies in the Context of Artificial Intelligence: Challenges and Strategies 1 Introduction 1.1 Challenges 1.2 Strategies 2 Cross Cultural Translation 3 Contextual Artificial Intelligence 4 Artificial Intelligence Translators 4.1 Advantages of Artificial Intelligence Translation 4.2 Disadvantages of Artificial Intelligence Translation 5 Conclusion References Design of Low-Power OTA for Bio-medical Applications 1 Introduction 2 Proposed Architecture of OTA 3 Simulation Results 4 Conclusion References Analysis of the Efficiency of Parallel Prefix Adders 1 Introduction 2 Conventional Multi-bit Adders 2.1 Ripple-Carry Adder 2.2 Carry-Skip Adder 2.3 Carry Lookahead Adder 3 Parallel Prefix Adders 3.1 Kogge-Stone Adder 3.2 Brent-Kung Adder 3.3 Han-Carlson Adder 3.4 Ladner-Fischer Adder 4 Performance Comparison of Parallel Prefix Adders 4.1 Analysis of Efficiency Utilizing Xilinx’s Vivado Design Suite 5 Conclusion References Design of Efficient 8-Bit Fixed Tree Adder 1 Introduction 2 Literature Survey 3 Architecture of FL-AT and FX-AT 4 Architecture of Truncated Fixed-Width Adder Tree (TFX-AT) 5 Improved ITFX-AT Architecture 6 Simulation Results 7 Conclusion References Design of T Flip-Flop Based on QCA Technology 1 Introduction 2 Basics of QCA 2.1 Basic Cell in QCA 3 QCA Implementation of Proposed T Flip-Flop 4 Simulation Results 5 Conclusion References Efficient Image Watermarking Using Particle Swarm Optimization and Convolutional Neural Network 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Feature Extraction 3.2 Optimization Coefficient (K) 3.3 Embedding of Watermark 4 Experimental Analysis 5 Conclusion and Future Work References A Review on Various Cloud-Based Electronic Health Record Maintenance System for COVID-19 Patients 1 Introduction 2 Corona Virus 2.1 Possibilities of Transmission 2.2 Diagnosis Methods 2.3 Prevention Methods 2.4 Severe Coronavirus Disease Patients with Coagulopathy 3 Implementation of Electronic Health Record 3.1 Attribute-Based Encryption 3.2 Privacy-Preserving Attribute-Based Mechanism 3.3 Fuzzy-Based Keyword Search in Document 3.4 Dynamic Multi-keyword-Based Search in Cloud 4 Conclusion References Contourlet Transformed Image Fusion Based on Focused Pixels 1 Introduction 2 Literature Review 3 Methodology 3.1 Existing Methods 3.2 Block Diagram 3.3 Implementation Tool 4 Experimental Results 5 Conclusion Bibliography Design of Efficient High-Speed Low-Power Consumption VLSI Architecture for Three-Operand Binary Adders 1 Introduction 2 Existing Methods 2.1 Carry-Save Adder 2.2 Han-Carlson Adder 3 Proposed Method 4 Simulation Results 5 Conclusion References DLCNN Model with Multi-exposure Fusion for Underwater Image Enhancement 1 Introduction 2 Related Works 3 DLCNN Architecture 4 Proposed Method 5 Results and Discussions 6 Conclusion References Machine Learning Approach-Based Plant Disease Detection and Pest Detection System 1 Introduction 2 Existing Method 3 Plant Leaf Disease Detection System 3.1 Image Acquisition 3.2 Image Preprocessing 3.3 Image Histogram 3.4 Image Segmentation 3.5 Feature Selection 3.6 Classifier 4 Pest Detection System 5 Results and Discussion 6 Conclusion References Design of Low Voltage Pre-settable Adiabatic Flip-Flops Using Novel Resettable Adiabatic Buffers 1 Introduction 2 Adiabatic Logic 2.1 Adiabatic Principle 2.2 Conventional Logic Switching 2.3 Adiabatic Switching 2.4 Adiabatic Logic Families 2.5 Steps of Adiabatic Circuit Design 3 Adiabatic Flip-Flops Using Novel Resettable Adiabatic Buffers 4 Results 5 Conclusion References Raspberry Pi-Based Smart Mirror 1 Introduction 2 Related Work 3 Proposed Work 4 Results 5 Conclusion References Deep Learning Framework for Object Detection from Drone Videos 1 Introduction 2 Literature Survey 3 Methodology 3.1 Training Phase 3.2 Inference Phase 4 Results 5 Conclusion References VoteChain: Electronic Voting with Ethereum for Multi-region Democracies 1 Introduction 2 Terminology 2.1 Blockchain 2.2 Consensus Algorithm 2.3 Proof of Work 2.4 Smart Contract 2.5 Ethereum Account 2.6 Solidity 3 Methodology 3.1 Create Election 3.2 Assign Candidates 3.3 Authenticate Voter 3.4 Serve Eligible Elections 3.5 Cast Vote 3.6 Declare Results 4 Prototype Implementation—VoteChain 4.1 Objectives 4.2 Application Layer 4.3 Service Layer 4.4 Data Persistence Layer 5 Smart Contract 5.1 Mappings 5.2 Add Election 5.3 Add Party 5.4 Add Candidate to Election 5.5 Mocha Tests 6 Conclusion Bibliography Design and Analysis of Multiband Self-complimentary Log Periodic Tripole Antenna (LPTA) for S and C-Band-Based Radar Applications 1 Introduction 2 Design of Self-complimentary Log Periodic Tripole Antenna (LPTA) 3 Results and Discussion 4 Conclusion References Performance of Cooperative Spectrum Sensing Techniques in Cognitive Radio Based on Machine Learning 1 Introduction 1.1 Spectrum Sensing 1.2 Machine Learning-Based SS 2 System Model 3 Conclusion and Future Work References Unified Power Quality Conditioner for V-V Connected Electrified Railway Traction Power Supply System 1 Introduction 1.1 Traction System Configuration 2 Design of D-STATCOM to Improve the Power Quality of Traction System 2.1 Control Algorithm of D-STATCOM 3 Design of UPQC Controller to Improve the Power Quality of Traction System 3.1 Design of DVR 3.2 Control Strategy of DVR 4 Simulation Result and Discussion 4.1 Without Any Compensator 4.2 With D-STATCOM 4.3 With DVR 4.4 With UPQC 5 Conclusion References Intrusion Detection System Using Deep Convolutional Neural Network and Twilio 1 Introduction 2 Proposed System 2.1 Objective 2.2 Overview 2.3 Tools and Methodologies Used 2.4 Working of the Proposed System 2.5 System Implementation 3 Experiment Results and Discussions 4 Conclusion and Future Scope Bibliography A Neural Network-Based Cardiovascular Disease Detection Using ECG Signals 1 Introduction 2 Literature Review 3 Methodology 3.1 ECG Signals 3.2 Buffering 3.3 Multimodal Fusion 3.4 Clustering 3.5 Extraction 3.6 Classification by Convolutional Neural Network 3.7 Train Data Set 4 Results 5 Conclusion References Detection and Classification of Lung Cancer Using Optimized Two-Channel CNN Technique 1 Introduction 2 Literature Survey 3 Methodology 3.1 Pre-processing 3.2 Segmentation with RCCN 3.3 Optimization by Cuckoo Search 3.4 Classification RCCN with Two-Channel CNN 3.5 Attributes 4 Results and Analysis 5 Conclusion References Design of High Efficiency FIR Filters by Using Booth Multiplier and Data-Driven Clock Gating and Multibit Flip-Flops 1 Introduction 1.1 Background 1.2 Objectives 1.3 Need and Importance 2 Existing Methods 3 Proposed Methodology 3.1 Using MATLAB 3.2 RTL Schematic Diagram 3.3 Data-Driven Clock Gating 3.4 Implementation Tool 4 Simulation Results 5 Conclusion References Detecting the Clouds and Determining the Weather Condition and Coverage Area of Cloud Simultaneously Using CNN 1 Introduction 1.1 Objectives 1.2 Need and Importance 2 Literature Review 3 Methodology 3.1 Existing Method 3.2 Proposed Method 4 Results 5 Conclusion References Traffic Prioritization in Wired and Wireless Networks 1 Introduction 2 Traffic Prioritization in Wired Networks 2.1 Explicit 802.1p 2.2 DSCP Marking 2.3 VLAN/Switch Port-Based Grouping 3 Traffic Prioritization in Wireless Networks 3.1 Enhanced Distribution Channel Access (EDCA) 3.2 HCF-Controlled Channel Access 4 Reservation Protocols 4.1 Bit-Map Protocol 4.2 Resource Reservation Protocol (RSVP) 5 Conclusion References Low Area-High Speed Architecture of Efficient FIR Filter Using Look Ahead Clock Gating Technique 1 Introduction 2 Existing Methodology 3 Proposed Methodology 4 Results and Analysis 5 Conclusion Bibliography Multimodal Medical Image Fusion Using Minimization Algorithm 1 Introduction 2 Multimodal Fusion 3 Results and Analysis 4 Conclusion Bibliography Pre-collision Assist with Pedestrian Detection Using AI 1 Introduction 2 Literature Survey 3 Implementation 3.1 Camera Subsystem 3.2 Alert Subsystem 3.3 Display Unit 3.4 Working 4 Methodology 4.1 Open CV 4.2 YOLO 5 Results 6 Conclusion and Future Scope References An Intrusion Detection System Using Feature Selection Based on Red Kangaroo Mating Algorithm 1 Introduction 2 Related Works 3 Proposed Model 3.1 Mating Behavior of Red Kangaroo 3.2 Red Kangaroo Mating Algorithm (RKMA) 4 Experimental Results 5 Conclusions References Heart Stroke Prediction Using Machine Learning Models 1 Introduction 2 Literature Review 3 Methodology 3.1 Data Collection 3.2 Data Pre-processing 3.3 Exploratory Data Analysis 3.4 Models 3.5 Metrics for Evaluation 4 Results 5 Conclusion and Future Work References Machine Learning-Based Pavement Detection for Visually Impaired People 1 Introduction 2 Literature Review 3 Methodology 3.1 Dataset Collection and Preprocessing 3.2 Feature Vector Compilation 3.3 Classification and Detection of Pavement 4 Results and Discussion 5 Conclusion References A Review on Location-Based Routing Protocols in Wireless Sensor Networks 1 Introduction 2 Background 3 Location-Based Routing Protocols 4 Comparison of Location-Based Protocols 5 Conclusion References Design of a Highly Reliable Low Power Stacked Inverter-Based SRAM Cell with Advanced Self-recoverability from Soft Errors 1 Introduction 2 Schematic and Its Normal Operation with Simulation Result 3 Single Node Upset Self-recovering Principle 4 Double Node Upset Self-recovering Principle 5 Conclusion References Image Aesthetic Score Prediction Using Image Captioning 1 Introduction 1.1 Composition 1.2 Lighting 1.3 Color Schemes 2 Related Work 2.1 Visual Attention Mechanism 2.2 Multimodal Analysis 2.3 Computational Approach for Image Aesthetic Score Prediction 3 Proposed Methodology 3.1 CNN 3.2 Caption Generator 3.3 Caption Analysis 4 Experimental Analysis 4.1 Training Dataset 4.2 Score Prediction with Caption Generation 4.3 General Model 5 Results 6 Conclusion References Pedestrian Crossing Signal Detection System for the Visually Impaired 1 Introduction 2 Literature Review 3 Methodology 3.1 Dataset Compilation 3.2 Feature Extraction and Feature Vector Compilation 3.3 Dimensionality Reduction 3.4 Classification and Detection of Pedestrian Crossing Light 4 Results 5 Conclusion References A Comparison of Different Machine Learning Techniques for Sentiment Analysis in Education Domain 1 Introduction 2 Related Work 2.1 Methods 2.2 Recent Advances 3 Results and Discussion 4 Conclusion References Design and Simulation of 2 × 2 Microstrip Patch Array Antenna for 5G Wireless Applications 1 Introduction 2 Antenna Design 3 Literature Overview 4 2 × 2 Microstrip Patch Array Antenna Without Insets 5 2 × 2 Microstrip Patch Array Antenna with Insets 6 Results 6.1 S Parameter 6.2 Bandwidth 6.3 Voltage Standing Wave Ratio (VSWR) 6.4 Radiation Plots 6.5 Gain 6.6 Directivity 7 Conclusion References Fake Currency Detection: A Survey on Different Methodologies Using Machine Learning Techniques 1 Introduction 2 Literature Review 3 Discussion of Drawbacks 4 Conclusion References Bi-directional DC-DC Converters and Energy Storage Systems of DVR—An Analysis 1 Introduction 2 DVR Topologies 3 DVR with Energy Storage Element 3.1 Energy Storage Element 3.2 Power Converter with Energy Storage 4 Comparison of DVR with Energy Storage and Converter 5 Conclusion References A Higher-Order Sliding Mode Observer for SOC Estimation with Higher-Order Sliding Mode Control in Hybrid Electric Vehicle 1 Introduction 2 Proposed System Model 3 HESS Modelling 4 RC Model for SOC Estimation 4.1 Second-Order RC Equivalent Model of Battery 4.2 SC RC Model 5 Energy Management System 6 SOC Estimation 6.1 Super-Twisting Observer 6.2 Design of the Super-Twisting Sliding Mode Observer for Battery SOC Estimation 6.3 Design of the Super-Twisting Sliding Mode Observer for SC SOC Estimation 7 Controller 8 Simulation Results 8.1 SOC Estimation 9 Conclusion References Analysis of Reversible Data Hiding Techniques for Digital Images 1 Introduction 2 Literature Survey 3 Proposed Method 3.1 Secure Force Algorithm 3.2 Data Hiding Algorithm 3.3 Extraction Algorithm 4 Result and Discussion 5 Conclusion References A Hybrid Cryptosystem of Vigenère and Hill Cipher Using Enhanced Vigenère Table 1 Introduction 2 Vigenère Cipher 2.1 Numeric Nature of Vigenère Cipher 3 Literature Survey 4 Proposed Approach 4.1 Assign Numerical Values to All Characters 4.2 Encryption Algorithm 4.3 Decryption Algorithm 5 Results 5.1 Encryption 5.2 Decryption 6 Conclusion References Intrusion Detection System Using Ensemble Machine Learning for Digital Infrastructure 1 Introduction 1.1 Signature-Based Detection IDS 1.2 Anomaly Detection-Based IDS 2 Training Dataset 2.1 Intrusion Detection and Real-Time Log Analysis 3 Data Preprocessing 4 Stacking Classifiers for IDS 5 Base Learners 6 Meta-Classifier (Meta-Learner) 7 Modeling and Training Pipeline 8 Analysis and Principal Component Analysis (PCA) Result 9 Training and K-Fold Cross-Validation 10 Conclusion References Integrating InceptionResNetv2 Model and Machine Learning Classifiers for Food Texture Classification 1 Introduction 1.1 Significance of Texture Analysis in Food Recognition 2 Related Work 3 Deep Learning Approach for Food Texture Classification by Proposed Method 3.1 Automated Feature Extraction Using Deep Networks 3.2 Machine Learning Classifiers 4 Experimental Analysis and Discussion 4.1 RawFooT Food Texture Dataset 4.2 Results 5 Conclusion References Sentiment Analysis of Customer on a Restaurant Using Review in Twitter 1 Introduction 2 Proposed Scheme 2.1 Data Set 2.2 Data Pre-processing 2.3 Feature Extraction 2.4 Sentiment Determination 3 Results 4 Conclusion References Fundus Image Processing for Glaucoma Diagnosis Using Dynamic Support Vector Machine 1 Introduction 2 Methodology 2.1 Preprocessing 2.2 STFM Features 2.3 DSVM Classification 3 Results and Discussions 4 Conclusion References A Case Study of Western Maharashtra with Detection and Removal of Cloud Influence: Land Use and Land Cover Change Detection 1 Introduction 2 Study Area 2.1 Data Product 3 Materials and Methods 3.1 Land Use/ Land Cover Detection 4 Results and Discussion 5 Conclusion References A Survey on Deep Learning Enabled Intrusion Detection System for Internet of Things 1 Introduction 2 IoT Security Requirements and Attacks 2.1 Classification of Attacks 2.2 Requirements of IDSs in IoT Networks 3 IDS for IoT Systems 4 Deep Learning for Intrusion Detection System 5 Conclusion, Challenges, and Future Discussion References Design and Development of Multithreaded Web Crawler for Efficient Extraction of Research Data 1 Introduction 1.1 State of Current Web 1.2 Introduction to Web Crawler 2 Current State of Research in Semantic Web 3 System Design 3.1 Application Architecture 3.2 Module Dependency Graph in Presentation Tier 3.3 Implementation of Multithreaded Web Crawler in Java 4 Results and Discussion 5 Conclusion and Scope for Future Work References Medical Image Classification Based on Optimal Feature Selection Using a Deep Learning Model 1 Introduction 2 Methodology 2.1 Existing Method 2.2 Proposed Method 3 Results 4 Conclusion References Real-Time Indian Sign Language Recognition Using Image Fusion 1 Introduction 2 Literature Survey 3 Proposed Methodology 3.1 Image Pre-psrocessing 3.2 Feature Extraction 3.3 Classification 3.4 Gesture Recognition 4 Experimental Results and Analysis 5 Conclusion References Design IoT-Based Smart Agriculture to Reduce Vegetable Waste by Computer Vision and Machine Learning 1 Introduction 2 Literature Review 3 Methodology 3.1 Computer Vision 3.2 Multispectral Camera 3.3 Software 3.4 OpenCV 3.5 Classification of Images by Using Machine Learning Algorithm 4 Results and Discussion 4.1 Problem Statement 4.2 Designing 4.3 Results 5 Conclusion References Analytical Study of Hybrid Features and Classifiers for Cattle Identification 1 Introduction 2 Literature Survey 3 Data Collection and Pre-processing 4 Methodology and Design of Proposed System 4.1 Feature Extraction Techniques 4.2 K-Means Clustering Algorithm 4.3 Locality Preserving Projection (LPP) 4.4 Classification Algorithms 5 Experimental Validation and Performance Analysis 6 Conclusion References A Secured Land Registration System Using Smart Contracts 1 Introduction 2 Literature Survey 2.1 Coding Issues in Smart Contracts 2.2 Security Issues in Smart Contracts 2.3 Privacy Issues in Smart Contracts 2.4 Performance Issues in Smart Contracts 3 Traditional Land Registration System 4 Our Approach to Land Registration System 5 Results and Discussion 6 Conclusion References A Constructive Feature Grouping Approach for Analyzing the Feature Dominance to Predict Cardiovascular Disease 1 Introduction 2 Related Works 3 Methodology 4 Numerical Results and Discussion 5 Summary References High-Band Compact Microstrip Patch Antenna for 5G Wireless Technologies 1 Introduction 2 Literature Review 3 Antenna Configuration and Design 3.1 Calculation of Cut Size 4 Methodology 5 Results and Discussion 6 Conclusion References A Cryptocurrency Price Prediction Study Using Deep Learning and Machine Learning 1 Introduction 2 Related Work 3 Proposed Work 3.1 Data 3.2 Model Description 4 Model Training and Validation 5 Results and Discussions 6 Conclusion References Regression for Predicting COVID-19 Infection Possibility Based on Underlying Cardiovascular Disease: A Medical Score-Based Approach 1 Introduction 2 Underlying Cardiovascular Disease Impact 2.1 Age 2.2 Gender 2.3 Diabetes 2.4 Blood Pressure 2.5 Cholesterol 2.6 Obesity 3 Methodology 3.1 Risk Score Module 3.2 Cardiovascular Module 4 Results 5 Conclusion References Evolution of 5G: Security, Emerging Technologies, and Impact 1 Introduction 2 Customized Need (Indian Perspective) and Emerging Technologies 2.1 Massive MIMO Technology 2.2 Spectrum Sharing 2.3 Interference Management 2.4 Advanced Receiver 2.5 Joint Scheduling 2.6 Device to Device Communication (D2D) 3 Challenges in Implementation of 5G 4 Advanced Technologies Used in 5G 4.1 Internet of Things (IoT) 4.2 Artificial Intelligence (AI) 4.3 f-OFDM 4.4 Virtual Reality (VR) and Augmented Reality (AR) 5 Security Issues in 5G 6 Conclusion and Future Scope References A Secure Multi-tier Framework for Healthcare Application Using Blockchain and IPFS 1 Introduction 2 Related Works 3 Methodology 4 Results and Discussion 5 Conclusion References Machine Learning Techniques to Web-Based Intelligent Learning Diagnosis System 1 Introduction 2 Machine Learning Algorithms 2.1 Artificial Neural Network (ANN) 2.2 Decision Tree (DT) 2.3 Naïve Bayes (NB) 2.4 Random Forest (RF) 3 Web-Based Intelligent Learning Diagnosis System 4 Conclusion References Phishing Website Detection Based on Hybrid Resampling KMeansSMOTENCR and Cost-Sensitive Classification 1 Introduction 2 Methodology 2.1 Dataset Description 2.2 Class Imbalance Handling 2.3 Proposed Model 2.4 Performance Metrics 3 Experimental Setup 4 Results and Discussion 5 Conclusion References A Brain-Inspired Cognitive Control Framework for Artificial Intelligence Dynamic System 1 Introduction 2 Literature Survey 3 A Brain-Inspired Cognitive Control Framework for AI 4 Results 5 Conclusion References Meandered Shape CPW Feed-Based SIW Slot Antenna for Ku-Band Applications 1 Introduction 2 Antenna Configuration and Theoretical Analysis 3 Simulation Results 4 Conclusion References Social and Mental Well-Being-COVID-19 After Effects Survey and Data Analysis 1 Introduction 2 Methodology 2.1 Participants and Their Characteristics 2.2 Statistical Analysis 2.3 Exploratory Data Analysis 3 Results and Discussion 3.1 Assessment of Social Interaction During Lockdown 3.2 Assessment of Emotional Well-Being During Home Arrest Situation 3.3 Assessment of Mental Health of People During Covid Lockdown 3.4 Assessment of Economic Condition of People 3.5 Future Outlook Regarding Covid and Other Pandemics 4 Conclusion References Covid Patient Monitoring System for Self-quarantine Using Cloud Server Based IoT Approach 1 Introduction 2 Literature Review 3 Proposed Methodology 4 Results and Discussion 5 Conclusion References Wood Images Classification Based on Various Types of K-NN Classifier 1 Introduction 2 Related Research 3 Methodology 3.1 Wood Image Database 3.2 Preprocessing 3.3 Feature Extraction 3.4 Classification of Wood Images 4 Experimental Setup and Results 5 Conclusion References Software Defect Prediction Survey Introducing Innovations with Multiple Techniques 1 Introduction 2 Literature Review 3 Different Models and Approaches 3.1 Soft Computing 3.2 Software Metrics 3.3 A General Defect Prediction Process 3.4 Machine Learning-Based Models 3.5 The Fuzzy Logic Approach 3.6 Code Pattern-Based Vulnerability Detection 3.7 Capture Recapture Analysis 3.8 Expert Opinions 3.9 Causal Model 3.10 Analogy-Based Predictions 3.11 Multivariate Regression 3.12 Constructive Quality Model (COQUALMO) 4 Automatic Software Program Repair 5 Conclusion References A Machine Learning and Fuzzy Heterogeneous Data Sources for Traffic Flow Prediction System 1 Introduction 2 Literature Survey 3 Traffic Flow Prediction System 4 Experimental Results 5 Conclusion References A Survey on Wireless Channel Access Protocols 1 Introduction 2 Carrier Sense Multiple Access Protocol (CSMA) 3 Carrier Sense Multiple Access Protocol with Collision Avoidance (CSMA-CA) 4 ALOHA 4.1 Pure ALOHA 4.2 Slotted ALOHA 5 Channelization 5.1 Frequency Division Multiple Access (FDMA) 5.2 Time Division Multiple Access (TDMA) 5.3 Code Division Multiple Access (CDMA) 6 Orthogonal Frequency Domain Multiple Access (OFDMA) 7 Spatial Division Multiple Access (SDMA) 8 Frequency Hopping Spread Spectrum (FHSS) 9 Direct-Sequence Spread Spectrum (DSSS) 10 Power Division Multiple Access 11 Orthogonal Power Division Multiple Access (OPDMA) 12 Non-orthogonal Multiple Access (NOMA) 13 Conclusion References Sahaay—A Web Interface to Improve Societal Impact 1 Introduction 2 Literature Survey 3 System Analysis and Design 3.1 Proposed System 3.2 Architecture Design 4 Implementation and Results 4.1 Modules 4.2 Output Screenshots 5 Conclusion and Future Enhancements References Summarization of Unstructured Medical Data for Accurate Medical Prognosis—A Learning Approach 1 Introduction 2 Literature Review 3 Methodology 3.1 Medical Transcript Summarization (MTS) via NLP 3.2 Machine Learning by Predicting Treatment 4 Results 5 Conclusion References A Screening Model for the Prediction of Early Onset Parkinson’s Disease from Speech Features 1 Introduction 2 Literature Survey 3 Methodology 3.1 Feature Extraction Methods 3.2 Filter Methods 3.3 Embedded Methods 4 Results 5 Conclusion and Future Work References Speed Control of Hybrid Electric Vehicle by Using Moth Flame Optimization 1 Introduction 2 System Description 2.1 Model Description 2.2 Plant Model Simplification and Linearization 2.3 PID Controller 3 Optimal Design of Proposed Controller 3.1 Moth Flame Optimization 3.2 Proposed MFO-Based PID Controller 3.3 Estimation of PID Controller 4 Results and Discussion 5 Conclusion References A Novel Hybrid Algorithm for Effective Quality of Service Using Fog Computing 1 Introduction 2 Security and Privacy Issues in Fog Computing 3 Novel Hybrid Algorithm Using Fog Computing 4 Conclusion References Hierarchical Learning of Outliers 1 Introduction 2 Related Work 3 Model 3.1 Overview 3.2 Hierarchical Clustering 3.3 Spotting Outliers 4 Experiment 4.1 Problem Definition 4.2 Dataset 4.3 Experiment Setup 5 Results and Analysis 5.1 Discussion 6 Conclusion References Smart ECG Monitoring System Based on IoT 1 Introduction 1.1 Internet of Things 1.2 Electrocardiogram (ECG) 2 System Architecture 2.1 Module 1: ECG Sensors 2.2 Module 2: Sensor-to-Machine Communication 2.3 Module 3: Network Gateway 2.4 Module 4: Machine-to-Machine (M2M) Communication 3 Conclusion References Ensemble Learning Techniques and Their Applications: An Overview 1 Introduction 2 Classification of Ensemble Learning Techniques 2.1 Boosting 2.2 Bagging 2.3 Stacking 2.4 Mixture of Experts (MoE) 2.5 Error-Correcting Output Codes (ECOC) 2.6 Cluster Ensembles 3 Different Kinds of Applications of Ensemble Learning 3.1 Remote Sensing 3.2 Person Recognition 3.3 One Versus All Recognition 3.4 Medical Applications 4 Conclusion References Impact of COVID-19 Pandemic on Indian Stock Market Sectors 1 Introduction 2 Literature Review 3 Methodology 3.1 Data 3.2 Proposed Methodology 4 Empirical Results 5 Conclusion References Advance Warning and Alert System for Detecting Lightning Risk to Reduce Human Disaster Using AIoT Platform—A Proposed Model to Support Rural India 1 Introduction 2 Literature Review 3 Existing Systems 3.1 Geospatial-Based Lightning Alert System 3.2 SMS-Based Lightning Alert System 3.3 IoT-Based Lightning Alert System 4 Proposed System 5 Conclusion References Fetal Health Prediction Using Machine Learning Approach 1 Introduction 2 Literature Survey 3 Proposed System and Methodology 4 Results and Discussion 5 Conclusion References BLDC Motor and Its Speed Characteristics Analysis Based on Total Harmonic Distortion 1 Introduction 2 Literature Survey 3 Block Diagram 4 Brushless DC Servomotor Drive System Modeling 5 Design of Controllers 6 Simulation Results 7 Conclusion References Calculating the Traffic Density of Real-Time Video Using Moving Object Detection 1 Introduction 2 Literature Review 3 Methodology 4 Experimental Results 5 Conclusion and Future Scope References Design and Analysis of Missile Control Effectiveness, Visualized through MATLAB 1 Introduction 1.1 Missiles 1.2 Problem Statement 1.3 Objectives 2 Literature Review 3 Equations 4 Operation of Missiles 5 Results and Discussion 6 Conclusion References An Unsupervised Sentiment Classification Method Based on Multi-level Sentiment Information Extraction Using CRbSA Algorithm 1 Introduction 2 Sentiment Analysis Methods 2.1 Machine Learning-Based Approach 2.2 Lexicon-Based Approach 3 Multi-level Fuzzy Computing with CRbSA Sentiment Classification 3.1 Sentiment Intensity Calculating Methods on the Word and Phrase Level 3.2 Computing Methods of Sentiment Intensity on the Sentence Level 3.3 Sentiment Classifier Based on Fuzzy Set 3.4 Splitting Sentences 3.5 Computing Sentiment Category Credibility of Review CM LC (Rm) 3.6 Document-Level Sentiment Extraction Using the CRbSA Algorithm 4 Results 5 Conclusion References Timestamp Prediction Using Enhanced Adaptive Correlation Clustering-Based Recommender System for the Long Tail Items 1 Introduction 2 Related Work 2.1 Recommendation Systems 2.2 Adaptive Clustering 2.3 Correlation-Based Clustering 2.4 Enhanced Adaptive Correlation-Based Clustering 2.5 Time Aware Recommendations 3 Proposed Methodology 3.1 Dataset 3.2 The Derived Variables 3.3 Flow Chart 3.4 Algorithm 4 Experimental Results 4.1 Two-Class Confusion Matrix for Time-Class Prediction 4.2 Eight- Class Confusion Matrix for Time-Class Prediction 5 Conclusion References In Cloud Computing Detection of DDoS Attack Using AI-Based Ensembled Techniques 1 Introduction 1.1 High Rate DDoS Attack 1.2 Low-Rate DDoS Attack 1.3 Life Cycle of DDoS Attack 1.4 Detection of DDoS Attack 2 Methodology 2.1 Classification Algorithm and Dataset 3 Results 4 Conclusion References Securing Data in Internet of Things (IoT) Using Elliptic Curve Cryptography 1 Introduction 2 Problem Statement 3 Proposed Method 3.1 Flow Diagrams 3.2 Process of Encryption and Decryption 3.3 Algorithms 4 Results and Performance Analysis 5 Conclusion References Sign Language Interpreter 1 Introduction 2 Earlier and Current Issues 3 Proposed Work 4 System Model 5 Implementation 6 Conclusion References Noise Removal Filtering Methods for Mammogram Breast Images 1 Introduction 2 Literature Survey 3 Preprocessing Mammogram Images Using Various Filtering Methods 3.1 Gaussian Filter 3.2 Tri-State Filter 3.3 Median Filter 3.4 Mean Filter 3.5 Threshold Filter 3.6 Bilateral Filter 3.7 Wiener Filter 3.8 Adaptive Median Filter 4 Results and Discussion 4.1 Mean-Square Error (MSE) 4.2 Peak-Signal–Noise-Ratio (PSNR) 5 Conclusion References Design and Implementation of Security Enhancement for Trusted Cloud Computing 1 Introduction 2 Related Works 2.1 Modern Cryptography 2.2 Searchable Encryption 2.3 Homomorphic Encryption 2.4 Encryption Based on Attribute 2.5 Hybrid Encryption 3 Proposed Methodology 3.1 Authentication, Authorization, and Access Control 3.2 Access Control 4 Experimental Analysis 5 Results 6 Conclusion References Multi-domain Opinion Mining: Authenticity of Data Using Sentiment Mining 1 Introduction 2 Related Work 3 Proposed Solution 3.1 Architecture 3.2 Use Case 4 Methodology 5 Results 6 Conclusion References A Novel Low-Power NMOS Schmitt Trigger Circuit Using Voltage Bootstrapping and Transistor Stacking 1 Introduction 2 Literature Review 3 Methodology 4 Results and Analysis 5 Conclusion References Dynamic Channel Allocation in Wireless Personal Area Networks for Industrial IoT Applications 1 Introduction 2 Related Works 3 Methodology of Dynamic Channel Allocation Algorithm 4 Experimental Results and Discussion 5 Conclusion References Preterm Birth Classification Using KNN Machine Learning Algorithm 1 Introduction 2 Literature Overview 3 Existing Methodology 4 Proposed Methodology 5 Results 6 Conclusion References IoT-Based Air Quality Monitoring System with Server Notification 1 Introduction 2 Related Work 3 Proposed System 4 System Architecture 5 Results 6 Conclusion References Hand Gesture Recognition Using CNN 1 Introduction 2 Related Work 3 Experimental Methodology 4 Results 5 Conclusion and Future Work References Community-Based Question Answering Site Using MVC Architecture for Rapid Web Application Development 1 Introduction 2 Literature Survey 3 Methodology 4 Existing Approaches 4.1 Yahoo Answers 4.2 Blurt It 4.3 Answers.Com 5 Dataset 6 Experimental Results 7 Conclusion and Future Scope References Automatic Alert and Triggering System to Detect Persons’ Fall Off the Wheelchair 1 Introduction 2 Existing Methods 3 Proposed Method 4 Objectives 5 Methodology 6 Results and Discussion 7 Conclusion References Dietary Assessment by Food Image Logging Based on Food Calorie Estimation Implemented Using Deep Learning 1 Introduction 2 Literature Review 3 Proposed System 3.1 System Architecture 3.2 Data Collection 3.3 Data Pre-processing 3.4 Feature Extraction and Classification 3.5 Calorie Extraction 4 Results and Discussion 5 Conclusion and Future Scope References Neck Gesticulate Based Vehicle Direction Movement Control System to Assist Geriatrics 1 Introduction 2 Block Diagram of Prototype 3 Hardware and Software Requirements 3.1 Proteus Software 3.2 Arduino Uno 3.3 Power Supply 3.4 Switches and DC Motor 3.5 RF Module 3.6 Motor Driver IC 4 Results and Discussion 5 Conclusions References Improved Numerical Weather Prediction Using IoT and Machine Learning 1 Introduction 2 Existing Methods 3 Proposed Method 4 Implementation of Proposed System 5 Methodology 6 Results and Discussion 7 Conclusion References Inductive Coupling-Based Wireless Power Transmission System in Near Field to Control Low-Power Home Appliances 1 Introduction 2 Existing Systems 3 Proposed System 4 Results and Discussion 5 Conclusion References IoT-Based Safety and Security System for House Boats 1 Introduction 2 Literature Review 3 Proposed System 4 Hardware Requirements in the Development of the Product 5 Results and Discussion 6 Conclusion and Future Scope References Video Surveillance-Based Underwater Object Detection and Location Tracking Using IoT 1 Introduction 2 Literature Survey 3 Proposed System 4 Results and Discussion 5 Conclusion References Pothole Detection and Warning System for Intelligent Vehicles 1 Introduction 2 Related Work 3 Proposed Approach 4 Simulation 5 Results 6 Conclusion and Future Scope References