ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Advances in Electrical and Computer Technologies: Select Proceedings of ICAECT 2021

دانلود کتاب پیشرفت‌ها در فناوری‌های برق و رایانه: مجموعه مقالات ICAECT 2021 را انتخاب کنید

Advances in Electrical and Computer Technologies: Select Proceedings of ICAECT 2021

مشخصات کتاب

Advances in Electrical and Computer Technologies: Select Proceedings of ICAECT 2021

ویرایش:  
نویسندگان: , ,   
سری: Lecture Notes in Electrical Engineering, 881 
ISBN (شابک) : 981191110X, 9789811911101 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: 1100 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 32 Mb 

قیمت کتاب (تومان) : 60,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 7


در صورت تبدیل فایل کتاب Advances in Electrical and Computer Technologies: Select Proceedings of ICAECT 2021 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب پیشرفت‌ها در فناوری‌های برق و رایانه: مجموعه مقالات ICAECT 2021 را انتخاب کنید نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب پیشرفت‌ها در فناوری‌های برق و رایانه: مجموعه مقالات ICAECT 2021 را انتخاب کنید

این کتاب شامل مجموعه مقالات منتخب کنفرانس بین المللی پیشرفت در فناوری های برق و کامپیوتر 2021 (ICAECT 2021) است. مقالات ارائه شده در این کتاب به صورت همتا بررسی می شوند و آخرین تحقیقات در زمینه برق، الکترونیک، ارتباطات و مهندسی کامپیوتر را پوشش می دهند. موضوعات تحت پوشش عبارتند از شبکه های هوشمند، تکنیک های محاسبات نرم در سیستم های قدرت، سیستم های مدیریت انرژی هوشمند، الکترونیک قدرت، سیستم های کنترل بازخورد، مهندسی پزشکی، سیستم های اطلاعات جغرافیایی، محاسبات شبکه، داده کاوی، پردازش تصویر و سیگنال، پردازش ویدئو، بینایی کامپیوتر، الگو تشخیص، رایانش ابری، محاسبات فراگیر، سیستم های هوشمند، هوش مصنوعی، شبکه عصبی و منطق فازی، ارتباطات پهن باند، ارتباطات موبایل و نوری، امنیت شبکه، VLSI، سیستم های تعبیه شده، شبکه های نوری و ارتباطات بی سیم. این کتاب برای دانشجویان و محققانی که در زمینه های مختلف همپوشانی مهندسی برق، الکترونیک و ارتباطات کار می کنند مفید است.


توضیحاتی درمورد کتاب به خارجی

This book comprises select proceedings of the International Conference on Advances in Electrical and Computer Technologies 2021 (ICAECT 2021). The papers presented in this book are peer-reviewed and cover the latest research in electrical, electronics, communication, and computer engineering. Topics covered include smart grids, soft computing techniques in power systems, smart energy management systems, power electronics, feedback control systems, biomedical engineering, geographic information systems, grid computing, data mining, image and signal processing, video processing, computer vision, pattern recognition, cloud computing, pervasive computing, intelligent systems, artificial intelligence, neural network and fuzzy logic, broadband communication, mobile and optical communication, network security, VLSI, embedded systems, optical networks, and wireless communication. The book is useful for students and researchers working in the different overlapping areas of electrical, electronics, and communication engineering.



فهرست مطالب

Contents
About the Editors
Towards Area-Delay Efficient Reverse Conversion of Higher-Radix Signed-Digit Number Systems
	1 Introduction
	2 The Background
		2.1 Signed-Digit Number Systems
		2.2 Encodings
		2.3 Reverse Conversion: Computer Arithmetic Interpretation
		2.4 On the Available Scheme for Higher-Radix
	3 The Proposed Algorithms: Schematic Specifications
		3.1 Proposed Scheme 1
		3.2 Proposed Scheme 2
		3.3 Proposed Scheme 3
		3.4 Proposed Scheme 4
	4 The Proposed Algorithms: Realizing Arithmetic Expressions
	5 Results and Discussion
	6 Conclusion
	References
Multilayer Perceptron Mode and ANN to Assess the Economic Impact and Human Health Due to Alcoholism and Its Effect in Rural Areas
	1 Introduction
		1.1 Medical Application and Process Extension
		1.2 Alcohol Addiction and the Implementation of IoT
	2 Data Analysis
		2.1 Normal Drinkers’ Prevalence with Respect to Occupation and Family
		2.2 Current Drinkers’ with Respect to Age Group, Education
	3 Multilayer Perceptron (MLP) for Prevalence of Alcoholism
		3.1 Steps to Implement Multilayer Perceptron
		3.2 Current Drinkers’ Health Seeking Pattern
		3.3 Health Seeking Pattern
	4 Prediction of Alcohol Addiction by Feed Forward Neural Network Trained with Back Propagation Algorithm
	5 Conclusion
	References
A Novel Approach to Predict Success of Online Games Using Random Forest Regressor for Time Series Data
	1 Introduction
		1.1 Problem Definition
	2 Background
		2.1 Churn Prediction
		2.2 Predıctıng Success of Vıdeo Games
		2.3 Predicting Retention in Sandbox Games
		2.4 Predicting Video Game Sales in the European Market
		2.5 Predicting Video Game Sales Using an Analysis of Internet Message Board Discussions
	3 Proposed System
		3.1 Flowchart
		3.2 Design Diagrams
	4 Dataset
	5 Methodology and Experiments
		5.1 Time Series Models
		5.2 Regressor Models
	6 Results
		6.1 Time Series Models
		6.2 Regressor Models
	7 User Interface
		7.1 Django
	8 Discussion
	9 Conclusion
	References
On Strong Proper Connection Number of Some Interconnection Networks
	1 Introduction
	2 An Overview of the Paper
	3 Strong Proper Connection Number of Some Interconnection Networks
		3.1 Butterfly Network mathcalBmathcalF( n )
		3.2 SPCN for Benes Networks B(r)
		3.3 Strong Proper Connection Number of Honeycomb Network HC( n )
	4 Conclusion
	References
A Virtual Assistant for the Visually Impaired
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Integrating Smart Devices with Google Cloud
		3.2 Natural Language Processing with Dialogflow
		3.3 Object Detection
		3.4 Reference Object Detection
	4 Implementation
	5 Results and Discussion
	6 Conclusion and Future Works
		6.1 Conclusion
		6.2 Future Works
	References
Automated Ultrasound Ovarian Tumour Segmentation and Classification Based on Deep Learning Techniques
	1 Introduction
	2 Materials and Methods
		2.1 Database
		2.2 Pre-processing Module
		2.3 Segmentation Module
		2.4 Feature Extraction and ACO-PCO
		2.5 Classification
	3 Results and Discussions
	4 Conclusion
	References
Magnitude Comparison in Canonical Signed-Digit Number System
	1 Introduction
	2 The Problem Statement
	3 The Proposed Algorithm
		3.1 Developing an Algorithm
		3.2 Realizing Arithmetic Equations for the Proposed Algorithm
	4 Results and Discussion
	5 Conclusion
	References
Region-Based Random Color Highlighting in Artistic Style Transfer Using CNN
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 Blurred Region-Based Random Color Image Generation
		3.2 Style Transfer Using Enhanced Total Loss
	4 Results and Discussion
	5 Conclusions and Future Scope
	References
A Novel Enhancement of Vigenere Cipher Using Message Digest
	1 Introduction
	2 Theoretical Background
	3 The Proposed Scheme
	4 Results and Analysis
		4.1 Security Analysis
		4.2 Avalanche Effect Analysis
		4.3 Frequency Analysis
	5 Conclusions and Future Work
	References
A Multi-criteria Decision-Making Approach to Analyze Python Code Smells
	1 Introduction
	2 Related Studies
	3 Research Study and Design
		3.1 Research Design
		3.2 Context Selection
	4 Experimental Setups
		4.1 Data Pre-processing
		4.2 Weight Estimation
		4.3 MCDM Techniques
	5 Results and Discussion
	6 Threats to Validity
	7 Conclusion and Future Scope
	References
The Importance of Validation Metrics in Chaotic Image Encryption
	1 Introduction
	2 Mathematical Background
	3 Methodology
	4 Security Analyses
		4.1 Correlation Coefficient Analysis
		4.2 Histogram Analysis
		4.3 Information Entropy
		4.4 Local Shannon Entropy Analysis
		4.5 Differential Attack Analysis
		4.6 Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR)
		4.7 Mean–Variance Analysis
		4.8 Chi-square Analysis
		4.9 Key Space Analysis
		4.10 Key Sensitivity Analysis
		4.11 Encryption Time
	5 Conclusion
	References
Application of Support Vector Machine and Convolutional Neural Network for Sentence-Level Sentiment Analysis of Companies Products Review
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Model Architecture Definition
	4 Results and Discussion
	5 Conclusion
	References
Application of XGBoost Algorithm for Sales Forecasting Using Walmart Dataset
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Data Collection
		3.2 Data Exploration
		3.3 Data Cleaning
		3.4 Feature Engineering
		3.5 Model Building Using XGBoost Algorithm
		3.6 Model Evaluation
	4 Results and Discussion
		4.1 Results of the Data Exploration
		4.2 Performance Evaluation of the Proposed Model
	5 Conclusion
	References
Comparison of Selected Algorithms on Breast Cancer Classification
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Adopted Classifiers
		3.2 Decision Tree Classifier (DTC)
		3.3 The Discriminant Analysis Algorithm (DAL)
		3.4 K Nearest Neighbor (KNN) Algorithm
		3.5 Naive Bayes Classifiers
		3.6 Sequential Model (SM)
	4 Results
	5 Conclusion
	References
PCA-Based Feature Extraction for Classification of Heart Disease
	1 Introduction
	2 Literature Review
	3 Materials and Method
		3.1 Dataset Attainment
		3.2 Proposed Method
		3.3 ML Classifiers
		3.4 Performance Evaluation
	4 Results and Discussion
		4.1 Experimental Setup
		4.2 Analysis of Result
		4.3 Discussion
	5 Conclusion
	References
Software Fault Prediction Using Machine Learning Algorithms
	1 Introduction
	2 Related Works
	3 Methodologies
		3.1 Dataset
		3.2 Data Preprocessing
		3.3 Feature Extraction Using Dimensionality Reduction Methods
		3.4 Feature Selection Using Correlation Method
		3.5 Classification
		3.6 Performance Evaluation
	4 Results and Discussion
		4.1 Comparison Results of Feature Selection and Feature Extraction
		4.2 Graphical Representation of Classification Models Using Feature Selection and Feature Extraction Methods
	5 Conclusions and Future Work
	References
Secret Key Generation: Single Edge-Triggered Flip-Flop PUF for IoT Environment
	1 Introduction
	2 Literature Survey
	3 Design Methodology
		3.1 Physical Unclonable Function
		3.2 PUF Metrics
		3.3 Single Edge-Triggered Flip-Flop PUF (SETFF PUF)
		3.4 Secret Key Storage and Generation
	4 Simulation Results
	5 Conclusion
	References
A Concise Survey on Solving Feature Selection Problems with Metaheuristic Algorithms
	1 Introduction
	2 Methodology and Background
		2.1 Feature Selection
		2.2 Metaheuristic Algorithms
		2.3 Evolution Based
	3 Metaheuristic Methods on FS
		3.1 Evolution Algorithm
		3.2 Swarm Analysis
		3.3 Evaluation Criteria
	4 Future Work and Conclusion
	References
A SUMO Simulation Study on VANET-Based Adaptive Traffic Light Control System
	1 Introduction
	2 Related Work
	3 VANET Model for Adaptive Traffic Control System
		3.1 Modeling
		3.2 Performance Index
	4 SUMO Simulation Model and Experiments Design
		4.1 Simulation Steps
		4.2 Vehicles and Intersections
		4.3 Adaptive Traffic Light Control
		4.4 Parameters Used During Simulation
		4.5 Experimental Results
		4.6 Average Time Loss
		4.7 Average Waiting Time
	5 Conclusion
	6 Future Work
	References
FINNger: To Ease Math Learning for Children using Hand Gestures by Applying Artificial Intelligence
	1 Introduction
	2 Literature Survey
	3 Proposed Application
		3.1 Our Methodology
	4 Datasets
	5 A Implementation
		5.1 Convex Hull
		5.2 Implementation of Convex Hull
		5.3 Binary Mask Preparation
		5.4 Find Contours and Finding the Convex Hull of the Hand
		5.5 Detection of Fingertips
	6 Results
		6.1 Finding the Convex Hull of the Contours and Testing the Detection of Fingertips
		6.2 FINNger
	7 Future Work
	8 Conclusion
	References
Control of Rice Blast Pathogens Using Back Propagation Fuzzy Neural Network
	1 Introduction
	2 Back Propagation Neural Network (BPNN)
	3 Algorithm
	4 Application
		4.1 Example
	5 Conclusion
	References
Comparison of Machine Learning Algorithms for Bearing Failures Classification and Prediction
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Bearing Diagnostics
		3.2 Dataset
	4 Results
		4.1 Comparison Results of the Classifier Machine Learning Algorithms
		4.2 Confusion Matrices
		4.3 Receiver Operating Characteristics (ROC)
	5 Conclusion
	References
A Parallelized Algorithm for Finding 3-D Mesh Illumination
	1 Introduction
	2 Methodology
	3 Results
	4 Conclusion
	References
An Useful Survey on Supervised Machine Learning Algorithms: Comparisons and Classifications
	1 Introduction
	2 Literature Survey
		2.1 Classification of Supervised Learning Algorithms
		2.2 Features of Machine Learning (ML) Algorithms
	3 Methodology
	4 Results
		4.1 Discussions
	5 Conclusion and Future Scope
	References
Image Encryption and Decryption Using Chaotic Bimodal Quadratic Map
	1 Introduction
	2 Literature Review
	3 Background
		3.1 The Logistic Map
		3.2 The Difference Map
	4 Implementation of Proposed Image Encryption Scheme
	5 Results and Security Analysis
		5.1 Statistical Analysis
		5.2 Maximum Deviation Analysis
		5.3 Irregular Deviation Analysis
		5.4 Differential Analysis
	6 Conclusion
	References
A Novel March XR Algorithm, Design, and Test Architecture for Memories
	1 Introduction
	2 Literature Survey
	3 Memory Faults and Algorithms
	4 Proposed March XR Algorithm
	5 Results and Discussion
	6 Conclusion
	References
Analysis of Heterogeneous Queueing Model with Unreliable Server and Working Vacation
	1 Prologue
	2 Construction of the Model
	3 Matrix Geometric Solution
		3.1 Evaluation of the Results
	4 Numerical Study
		4.1 Evaluation of the Results
	5 Conclusion
	References
Performance Analysis of Single Server Low-priority Queue Based on Electronic Transmitter
	1 Introduction
	2 Preambles
		2.1 Fuzzy Set
		2.2 Triangular Fuzzy Number
		2.3 Trapezoidal Fuzzy Number
	3 Non-preemptive Priority Fuzzy Queues
	4 Centroid of Incenters Ranking Method
	5 Real-life Application
		5.1 For Trapezoidal Fuzzy Number
		5.2 For Triangular Fuzzy Number
	6 Outcome
	References
Improved HELBP in Harsh Lightning Variations for Face Recognition
	1 Introduction
	2 Description of LBP, HELBP, and MBP
		2.1 Local Binary Pattern (LBP)
		2.2 Horizontal Elliptical LBP (HELBP)
		2.3 Median Binary Pattern (MBP)
	3 The Invented Descriptor
		3.1 HELBP Map
	4 Results
		4.1 Datasets Explanation
		4.2 Descriptors Feature Details
		4.3 Recognition Rate Estimation
	5 Conclusion
	References
Determination of the TOE Factors Influencing the Adoption of Internet Banking Services on SMEs in Yemen: A Moderated Mediation Approach
	1 Introduction
	2 Literature Review
		2.1 Internet Banking Services in Yemeni Banks
		2.2 SMEs and Yemen Economy
		2.3 Internet Banking Adoption
		2.4 Technology–Organization–Environment (TOE) Framework
		2.5 Factors Influencing IB Adoption (Independent Variables)
		2.6 Factors Influencing IB Adoption (Moderating Variable)
		2.7 Conceptual Framework and Hypotheses Testing
	3 Methodology
		3.1 Design of Questionnaire
	4 Analysis of Data
		4.1 Descriptive Statistics for Variables
		4.2 Assessment of PLS-SEM Path Model Results
		4.3 Convergent Validity
		4.4 Discriminant Validity
		4.5 Assessment of Effects Size (F2)
		4.6 Direct Hypotheses Results
		4.7 The Mediating Role (Indirect Hypotheses Results)
		4.8 Modeling Effect (Organization Type)
	5 Implications
		5.1 Practice Implication
		5.2 Managerial Implication
		5.3 Policymakers
	6 Conclusion
	References
Technological and Organizational Factors Influencing the Internet Banking Use Among SMES in Yemen: The Mediating Role of Attitude
	1 Introduction
		1.1 Research Objectives
		1.2 Research Gap
	2 Literature Review
		2.1 IBS Definition
		2.2 Factors Influencing the Use of IB
	3 Conceptual Framework
		3.1 Methodology and Data Collection
	4 Analysis and Results
		4.1 Descriptive Statistics for Variables
		4.2 Validity and Reliability
		4.3 Confirmatory Factor Analysis (CFA)
		4.4 Structural Model
		4.5 Direct Hypothesis Results
		4.6 Indirect Hypothesis Results—(Mediating Role)
	5 Discussion and Implication
		5.1 Discussion
		5.2 Practical Implication
		5.3 Managerial Implication
		5.4 Policy-Makers
		5.5 Conclusion
	References
Markovian Queueing Model with Server Breakdown, Single Working Vacation, and Catastrophe
	1 Debut
	2 Construction of the Model
	3 Matrix Geometric Solution
		3.1 Evaluation of the Results
	4 Mathematical Study
		4.1 Evaluation of the Results
	5 Conclusion
	References
Lessening Spectrum Sensing Data Falsification Attack by Weighted Fuzzy Clustering Means Using Simulation Annealing in Cognitive Radio Networks
	1 Introduction
	2 Related Work and Contributions
	3 Existing Method
		3.1 Multiple Trust Factor
		3.2 Evidence Theory
		3.3 Balanced Cluster-Based Redundancy Check Aggregation (BCRCA) Mechanism [15]
		3.4 XOR Distance Analysis
		3.5 Proposed Contribution
	4 Strategy Model
		4.1 Collaborative Spectrum Sensing
	5 Ill-Will User Detection Technique
		5.1 Process-I: ‘Strainer’ Process
		5.2 Process-II: ‘Lessen’ Process
		5.3 Server-III: ‘Secure’ Process
	6 Results
		6.1 Simulation Setup
		6.2 Simulation Results
	7 Conclusions
	8 Future Work
	References
34 Performance Analysis of Thinning Algorithms for Offline-Handwritten Devanagari Words
	1 Introduction
		1.1 Classification of Thinning Algorithms
			1.1.1 Iterative Thinning Algorithms
				Parallel Thinning Algorithms
				Sequential Thinning Algorithm
			1.1.2 Non-Iterative Thinning Algorithms
		1.2 Motivation
		1.3 Requirements of a Good Thinning Algorithm
		1.4 Challenges
	2 Related Works
	3 Implementation of Thinning Algorithms
		3.1 A Brief Overview of [ZSu] Algorithm
		3.2 A Brief Overview of [GHa] Algorithm
		3.3 A Brief Overview of [LKC] Algorithm
	4 Performance Metrics
		4.1 Objective Performance Metrics
			4.1.1 Reduction Rate (RR)
			4.1.2 Sensitivity Measurement (SM)
			4.1.3 Thinness Measurement (TM)
		4.2 Subjective Performance Metrics
	5 Results and Evaluation
		5.1 Dataset Description and Preprocessing
		5.2 Performance Analysis and Comparison
	6 Conclusions and Future Scope
	References
Application of Digital Image Correlation Technique to Study Strain Localization in Fe–Ni–W Alloy
	1 Introduction
	2 Methodology
		2.1 Fundamentals of DIC
		2.2 Materials
	3 Results and Discussion
		3.1 Computation of Strain and Statistical Analysis in Fe–Ni–W Alloys
	4 Conclusion
	References
Design and Construction of Analogue Signal Processing System for Distributed Fibre Optic Sensors
	1 Introduction
	2 Optical Signal Processing System
		2.1 Transimpedance Amplifier Design Criteria
		2.2 Circuit Design
		2.3 Circuit Simulation
		2.4 Hardware Design
		2.5 Hardware Results
	3 Conclusion
	References
Design of Versatile Reconfigurable ADC for Wide Range of Resolution and Conversion Time
	1 Introduction
	2 A New Proposed Design
		2.1 Reconfiguration for 4-bit Flash ADC
		2.2 Reconfiguration for 6-bit Subranging ADC
		2.3 Reconfiguration for 8-bit Recirculating Type ADC
		2.4 Reconfiguration for 10-bit Subranging ADC
		2.5 Reconfiguration for 12-bit Interpolation ADC
		2.6 Reconfiguration for 16-bit Subranging ADC
	3 Design of the Switches to Configure Resistive String, Input Signal, and Residue Signals
		3.1 Arrangement of Basic Components
		3.2 Switches for Resistive String Configuration for 4-bit Flash ADC
		3.3 Switches for Resistive String Configuration for 6-bit 2 Stage Subranging ADC
		3.4 Switches for Resistive String Configuration for 10-bit 5 Stage Subranging ADC
		3.5 Switches for Comparator Input Signal Configuration (4-bit Flash ADC)
		3.6 Switches for Comparator Input Signal Configuration (6-bit Subranging ADC)
		3.7 Switches for Comparator Input Signal Configuration (10-bit Subranging ADC)
	4 Timing Analysis of Reconfigurable ADC
	5 Validation
	6 Figure of Merit
	7 Conclusion and Future Scope
	References
Mini Interconnect IC Protocol and Camera Command Set Controller for Camera Communication in Mobile Phones
	1 Introduction
		1.1 Camera Serial Interface Protocol
		1.2 Camera Command Register Set (CCS) Memory
		1.3 Mini Interconnect IC Protocol (MI2C)
	2 Methodology
		2.1 MI2C Module
		2.2 Camera Command Set (CCS) Module
	3 Results and Discussion
	4 Conclusion
	References
Automatic Estimation of Multiplicity in Partial Discharge Sources Using Machine Learning Techniques
	1 Introduction
		1.1 Literature Survey on PD Source Classification
	2 Proposed Methodology
	3 Clustering Algorithms for PD Sources Discrimination
		3.1 K-Means
		3.2 Finite Mixture Model
		3.3 Gaussian Mixture Modelling
		3.4 Bayesian Mixture Modelling
	4 Data Set Generation Using Weibull Distribution
	5 Results and Discussion
	6 Conclusion
	References
Comparison of Encryption Techniques to Encrypt Private Parts of an Image
	1 Introduction
	2 Related Work
	3 Methods Used
		3.1 Combination of AES, RSA, LSB
		3.2 Hash Function (Chaotic Method)
	4 Security Test and Comparative Study
		4.1 Statistical Analysis
		4.2 Information Entropy Analysis
		4.3 Encryption Quality–PSNR, NPCR, UACI Analysis
	5 Conclusions
	References
Speaker Identification Using Multiple Features and Models
	1 Introduction
	2 Speech an Overview
		2.1 Formalizing the Speech
		2.2 Framing and Windowing
		2.3 Understanding the Cepstrum
	3 Feature Extraction
		3.1 Mel-frequency Cepstral Coefficients (MFCC) [2]
		3.2 Gammatone Cepstral Coefficients (GTCC) [7–10]
		3.3 How Many MFCC and GTCC Coefficients?
		3.4 Why Discrete Cosine Transform Instead of IDFT?
	4 K-means Clustering [3]
	5 Convolutional Neural Network [4, 11]
		5.1 Why not Fully Connected Neural Network?
		5.2 Why Convolutional Neural Network?
		5.3 What is Convolutional Neural Network?
		5.4 How CNN Works?
		5.5 Test Phase
	6 Results and Discussions
		6.1 Feature Extraction Results
		6.2 Convolution Neural Network Results
	7 Conclusions
	References
Performance Analysis on Flexible Modified Koch Fractal Patch Antenna for Wearable Healthcare Application
	1 Introduction
	2 Antenna Design
	3 Results and Discussion
		3.1 Evaluation of Return Loss
		3.2 Structural Conformability Evaluation (SCE)
		3.3 Far Field Radiation Pattern
	4 Analysis on SAR for Wearable Safety
	5 Conclusion
	References
Intelligent ICH Detection Using K-Nearest Neighbourhood, Support Vector Machine, and a PCA Enhanced Convolutional Neural Network
	1 Introduction
	2 Methodology
		2.1 Data Set and Preprocessing
		2.2 KNN-Based Classifier
		2.3 SVM-Based Classifier
		2.4 CNN-Based Classifier
	3 Results and Discussion
		3.1 Performance Metrics
		3.2 Multichannel Visualization of Layer Interpretations
		3.3 Training and Validation Accuracy
	4 Conclusion
	References
Feature Selection and Diagnosis Performance Evaluation of Breast Cancer
	1 Introduction
	2 Related Work
	3 Background
		3.1 Data set
		3.2 Data Set Pre-processing
		3.3 Feature Selection Algorithm: Least Absolute Shrinkage Selection Operator
		3.4 Support Vector Machine
		3.5 K-Nearest Neighbour
		3.6 Naive Bayes
		3.7 Decision Tree
		3.8 Random Forest
		3.9 Evaluation Measures
	4 Proposed Methodology
	5 Results and Discussion
	6 Conclusion
	References
Grading and Classification of Retinal Images for Detecting Diabetic Retinopathy Using Convolutional Neural Network
	1 Introduction
	2 Methodology
		2.1 Dataset
		2.2 Preprocessing
		2.3 Convolutional Neural Network Architecture (CNN)
	3 Results and Discussion
	4 Conclusion
	References
Ensured Configuration Security of FPGAs against CAD Attacks
	1 Introduction
	2 Overview
	3 Proposed Method
		3.1 Threat Model
		3.2 FPGA-oriented Defense
	4 Experimental Analysis
		4.1 Defense Line 1 Results
		4.2 Defense Line 2 Results
		4.3 Trojan Hit Rate Assessment in DFL1 and DFL2
		4.4 Power, Delay, and Utilization Variations with Defense Method
	5 Conclusion
	References
Configuration Security of FPGA in IoT Using Logic Resource Protection
	1 Introduction
	2 Overview
	3 Proposed Methodology
	4 Experimental Analysis
		4.1 Experimental Setup
		4.2 Results and Analysis
	5 Conclusion
	References
A Novel Construction of Multiband Compact Microstrip Patch Antenna and Its Applications in WiMAX, HiPERLAN
	1 Introduction
	2 Basic Structure Geometry
	3 Parameter Analysis of Proposed Compact Antenna
	4 Conventional Versus Design Proposed Antenna
	5 Antenna Results and Discussion
	6 Conclusion
	References
Integrated Smart Alert System for Industrial Applications using Transceiver Module Analysis
	1 Introduction
	2 Literature Review
	3 System Overview
		3.1 System Components
		3.2 Software Initialization
	4 System Flow
		4.1 Login Analysis
		4.2 Ambience Analysis
		4.3 Intrusion Analysis
	5 Results
		5.1 Prototype
		5.2 Visualization
	6 Conclusion
	References
Analyzing Beamforming for Secure Transmission of MIMO-NOMA-Based CRN using Power Allocation Based on Second-Order Perturbation
	1 Introduction to MIMO-NOMA Model
	2 Methodology
		2.1 A Novel Second-Order Perturbation Approach for the Secure Beamforming in MIMO-NOMA-Based CRN
		2.2 Secure the Downlink MIMO-NOMA Framework by using a Novel Second-Order Perturbation Technique
		2.3 Performance Metrics and Analysis
	3 Results and Discussion
	4 Conclusion
	References
A High Merit Factor Preamble Sequence for Better Synchronization in WiMAX
	1 Introduction
	2 Signal Model for Transmitted and Received OFDM
	3 System Model for Estimating Frequency and Time Offsets
	4 Desired Parameters for Preamble Sequences
	5 CAZAC-Based Preamble
	6 Results
	7 Conclusion
	References
Deep Learning Technique-Based Pulmonary Embolism (PE) Diagnosis
	1 Introduction
	2 Deep Learning Technique
	3 Pulmonary Embolism Detection
	4 Results of Pulmonary Embolism Diagnosis
	5 Conclusion
	References
Analysis of Daubechies 2 Wavelet in WPM System for Adhoc Network
	1 Introduction
	2 Related Work
	3 Wavelet Packet Modulation
	4 Simulation Results
		4.1 BPSK Modulation Using Daubechies (Db2) Wavelet
		4.2 Working of Daubechies (Db2) Wavelet for QPSK Modulation
		4.3 Working of Daubechies (Db2) Wavelet for 16-PSK Modulation
	5 Conclusion and Future Scope
	References
Adiabatic Multiplexer and Delay Flip-Flop
	1 Introduction
	2 Adiabatic Logic
	3 Design of 4 × 1 Multiplexer
	4 Delay Flip-Flop
	5 Power Consumption Analysis and Comparison
	6 Conclusion
	References
A MobileNet-V2 COVID-19: Multi-class Classification of the COVID-19 by Using CT/CXR Images
	1 Introduction
	2 Literature Survey
	3 Deep Learning Algorithm for COVID-19 Detection
		3.1 DnCNN Algorithm for Denoising of CT Images
		3.2 Feature Extraction of COVID CT Images
		3.3 Classification of COVID-19 Images by MobileNet
	4 Implementation Results
		4.1 Experimental Dataset
		4.2 DnCNN-Based Denoising of Medical Dataset
		4.3 Classification of COVID-19 Cases by Deep Learning Models
	5 Conclusion
	References
A Novel Method to Improve the Resolution of FLASH ADC for High-Resolution and High-Speed Applications
	1 Introduction
	2 Literature Survey
	3 Proposed Method to Improve Resolution of ADC
		3.1 Design Considerations
	4 Results of Simulation
	5 Conclusion and Future Scope
	References
FPGA Implementation of Radix-2 Pipelined FFT Algorithm for High-throughput Applications
	1 Introduction
	2 Overview of FFT Algorithm
		2.1 High-radix FFT
		2.2 Split Radix FFT
	3 Pipelined FFT Architectures
		3.1 Processing Element
	4 Proposed Pipelined FFT Architectures
	5 Results and Discussion
	6 Conclusion
	References
Design of High Speed Approximate Carry Select Adders Using RCPFA
	1 Introduction
	2 Prior Approximate Adders
	3 Conventional CSLA with 28Transistor Full Adder
	4 Approximate Carry Select Adders
		4.1 Carry Select Adder with RCPFA-I
		4.2 Carry Select Adder with RCPFA-II
		4.3 Carry Select Adder with RCPFA-III
	5 Results and Discussion
	6 Conclusion
	References
Data Driven Approach to Achieve Coordinated Charging Among Electric Vehicles
	1 Introduction
	2 Data Driven Approach
	3 Background of Machine Learning Techniques Used
		3.1 KNN
		3.2 Random Forest
	4 Model Used
	5 Results
	6 Conclusion
	References
A 4-element Dual Band MIMO Antenna with L-Shaped Decoupling Stub for 5G Applications
	1 Introduction
	2 Materials and Methods
		2.1 MIMO Considerations
		2.2 Antenna Setup
	3 Results and Discussion
		3.1 Reflection Coefficient
		3.2 Transmission Coefficient
		3.3 Envelope Correlation Coefficient
		3.4 Efficiency
	4 Conclusion
	5 Future Work
	References
An Efficient Hybrid Genetic Algorithm and Whale Optimization Algorithm for Benefit Maximization of Optimal Sitting and Sizing Problem of DG in Distribution Systems
	1 Introduction
	2 Problem Formulation
		2.1 Objective Function
		2.2 Optimal Location of DG
		2.3 Economic Analysis
	3 Optimal Location and Sizing of Distribution Generation
		3.1 Genetic Algorithm
		3.2 Whale Optimization Algorithm
		3.3 Proposed Methodology
	4 Simulations and Results
		4.1 Performance Analysis
	5 Conclusion
	References
The Tensor of Conductivity with the External Fields in Rectangular Quantum Wire for the Case of Electrons—Acoustic Phonon Scattering
	1 Introduction
	2 Calculating of Conductivity
	3 Discussion
	4 Conclusions
	References
An Implementation of Hybrid CNN-LSTM Model for Human Activity Recognition
	1 Introduction
	2 Methodology
		2.1 Dataset
		2.2 Input Stage “Data Preprocessing”
		2.3 Convolutional Neural Networks
		2.4 Long Short-Term Memory Layer
		2.5 Implementation of the Model
	3 Analysis and Results
		3.1 Neurons in LSTM
		3.2 Learning Rate
		3.3 Batch Normalization (BN)
		3.4 Batch Size
		3.5 Dropout
		3.6 Hyperparameters
		3.7 Classification Report
		3.8 Train and Test Verification
	4 Conclusion
	References
Sliding Mode Control-Based Standalone Wind Energy System
	1 Introduction
	2 Description of Proposed Wind-Battery Microgrid
	3 Modeling of Wind Energy Conversion Systems
	4 Modeling of Battery Storage System
	5 Sliding Mode Control of Wind and Battery Converters
	6 Results and Discussion
	7 Conclusion
	References
Instantaneous Power Estimation Algorithm in Hybrid Power Filter for Power Quality Improvement
	1 Introduction
	2 Shunt Hybrid Filter Topology
	3 Control Strategy for Shunt APF
		3.1 Design of Shunt Passive Filter
	4 Simulation Results for Hybrid Filter
	5 Experimental Verification
	6 Conclusion
	References
Multi-objective Optimal Power Flow Using Whale Optimization Algorithm Consists of Static VAR Compensator
	1 Introduction
	2 Mathematical Formulation of Multi-Objective Optimal Power Flow (MOOPF) Problems
		2.1 Equality Constraints
		2.2 Inequality Constraints
		2.3 Mathematical Model of SVC
	3 Whale Optimization Algorithm (WOA)
	4 Simulation Results
	5 Conclusion
	References
Standalone PMSG-Based Wind Energy Conversion System Under Unbalanced Load Conditions
	1 Introduction
	2 System Description
		2.1 Block Diagram
		2.2 Design
	3 Control Logic
		3.1 Control Methodology for Boost Converter
		3.2 Control Methodology for Inverter
		3.3 Control Methodology for Battery Connected Switch
	4 Simulation Results
	5 Conclusion
	References
Application of Pythagorean Fuzzy Rough Distance Method in MCDM Problem for Buying Induction Motor
	1 Introduction
	2 Preliminaries
	3 Application in MCDM Problem for Buying 3-Phase Induction Motor
	4 Conclusion
	References
Real-Time Monitoring of Buses Utilizing Phasor Measurement Units for a 24-Bus System
	1 Introduction
	2 Objective of This Paper
	3 Voltage Stability Analysis Approaches to Find Identification of Critical Buses
		3.1 Voltage Stability-Index (L)
		3.2 Proposed Approach
		3.3 24-Bus Equivalent Indian Southern Grid
	4 Observability Analysis
	5 Conclusions
	References
State-Space Modelling for Two-Area Multiple-Source AGC Using PI, PID, PI-PD Controllers
	1 Introduction
		1.1 AGC Approach for Multiple Areas Integrated with Multiple-Source Power Systems
	2 PI-PD Approach for Two-Area AGC
	3 Two-Area Diverse Source AGC Power System Employed with PID and PI-PD Control
		3.1 Representation of State-Space Model of Two-Area Integrated Multiple-Source Power System
	4 Optimal Quadratic Controller Design
	5 Results
	6 Conclusion
	Appendix
	References
Optimization of Power Generation Costs Through Soft Computing Techniques
	1 Introduction
	2 Mathematical Representation
		2.1 Genetic Algorithm
		2.2 Evolutionary Programming
		2.3 Particle Swarm Optimization
		2.4 Hybrid Particle Swarm Optimization
		2.5 Multi-agent System
		2.6 Multi-agent Particle Swarm Optimization
		2.7 Bacterial Foraging Algorithm (BF)
		2.8 Particle Swirl Algorithm (PSA)
		2.9 Hybrid Multi-Agent-Based Particle Swarm Optimization (HMAPSO)
	3 Test System and Discussion
	4 Conclusion
	References
Implementation of Binary Particle Swarm Optimization for Image Thresholding using Memristor Crossbar Array
	1 Introduction
	2 Objective Functions
		2.1 Kapur’s Entropy Function
		2.2 Otsu’s Function
	3 Binary Particle Swarm Optimization (BPSO)
	4 Memristor Implementation of BPSO
		4.1 Memristor Model and Crossbar
		4.2 Implementation of BPSO using Memristor Crossbar
	5 Results
		5.1 Results and Explanation for Standard Images
		5.2 Biomedical Image Processing using the Proposed Methodology.
	6 Conclusion
	References
Performance Analysis of Solar PV-fed BLDC Motor Under Partial Shading Condition Using Various PSO MPPT Algorithms
	1 Introduction
	2 Partial Shading and Fast Varying Solar Irradiation in PV Systems
	3 Particle Swarm Optimization
		3.1 Weighted Particle Swarm Optimization
		3.2 Accelerated PSO Algorithm (APSO)
		3.3 Constriction Coefficient PSO (CPSO)
	4 Proposed Topology
	5 Results and Analysis
		5.1 Results—Partial Shading Condition (PSC)
		5.2 Results—Fast Varying Solar Irradiation (FVSI)
	6 Conclusion
	References
Design and Analysis of Fuzzy-Based Hybrid PV-Wind Power Quality Improvement for Local Nonlinear Loads Using MLMS
	1 Introduction
	2 Modeling and Control of the Proposed Wind Photo-Voltaic Cogeneration System
		2.1 MPPT and P&O Method
		2.2 Wind Generator
		2.3 Adjusting Machine Voltage (VSR)
	3 Design of PV System
	4 Wind Modeling
	5 Fuzzy Logic Controller
	6 Results and Discussion
	7 Conclusion
	References
Small-Signal Analysis of Inverter to Maximise Power from Two PV Subarrays Under Different Environmental Conditions
	1 Introduction
	2 Inverter Modelling and Its Operation
		2.1 Modelling of PV
		2.2 Small-Signal Analysis of Buck-Boost Inverter
		2.3 Working of the Inverter
		2.4 Design of L1, L2, Lg, C1 and C2
	3 Simulation Model and Analysis
	4 Results
	5 Conclusion
	References
Some Properties of Silicene Nanoribbons When Doped with Two Lead Atoms in an Electric Field
	1 Introduction
	2 Configurations
	3 Discussions
	4 Conclusions
	References
Optimal Solution of Economic Emission Load Dispatch Using a Hybrid Technique
	1 Introduction
	2 Formulation of Multi-objective Optimization Problem
		2.1 Cost Function
		2.2 Constraint of Equality
		2.3 Constraint of Inequality
	3 Methodology
		3.1 Particle Swarm Optimization
		3.2 Tabu Search
		3.3 Hybrid Method
	4 Results and Discussion
	5 Conclusion
	References
Solution of Unit Commitment Using Genetic Algorithm with Population Refreshment
	1 Introduction
	2 Problem Formulation
		2.1 Equality Constraint
		2.2 Spinning Reserve Constraint
		2.3 Power Generation Limits Constraints
		2.4 Minimum Down and Uptime
	3 Methodology
		3.1 Genetic Algorithm
		3.2 Procedure of Applying GA with Refreshed Population
	4 Results and Discussion
	5 Conclusion
	References
Modelling Series RLC Circuit with Discrete Fractional Operator
	1 Introduction
	2 Preliminaries and Basic Lemmas
	3 LRC Series Circuit
		3.1 Undamped Series Circuit Analogue System
		3.2 Damped Series Circuit Analogue System
	4 Analytical and Experimental Results
		4.1 Discussion
		4.2 Experimental Implementation of Fractional Derivatives in Series RLC Circuit
	5 Conclusion
	References
Design of Cascaded Multilevel Inverter-based STATCOM for Reactive Power Control with Different Novel PWM Algorithms
	1 Introduction
	2 Cascaded Multilevel STATCOM
	3 Modulation Methods for Cascaded Multilevel STATCOM
		3.1 Sinusoidal Pulse Width Modulation
		3.2 Modified Space Vector Pulse Width Modulation
		3.3 Third Harmonic Injected Pulse Width Modulation
	4 Control Strategy for Cascaded Multilevel Inverter-Based STATCOM
	5 Simulation Results and Analysis
		5.1 STATCOM Performance for Sinusoidal Phase Shifted Carrier PWM
		5.2 Performance of STATCOM for Sinusoidal Phase Disposition Pulse Width Modulation
		5.3 STATCOM Performance for Third Harmonic Phase Shifted Carrier PWM
		5.4 STATCOM Performances for Modified Space Vector Phase Shifted Carrier PWM
		5.5 STATCOM Performance for Modified Space Vector Phase Disposition PWM
	6 Conclusion
	References
Outlier Detection Using Linear Regression in Wind and Solar Integrated Power Systems
	1 Introduction
	2 Flow Chart
	3 Data Preprocessing
	4 Linear Regression
	5 Results and Discussion
	6 Conclusion
	References
Photovoltaic Systems Incorporated with Energy Storage System for Agricultural Implementation
	1 Introduction
	2 Prosed Multi-PV System and Control
		2.1 Single Model of Photo-Voltaic Cell
		2.2 MPPT Algorithm—P&O
		2.3 DC/DC Boost Converter
	3 Bi-Directional Converters
	4 Energy Storage Systems
	5 Simulation Result and Analysis
	6 Conclusion
	References
Residential Feeder Energy Audit Analysis and Recommendation with  Aid of Software
	1 Introduction
	2 Literature Study on Residential Audit
	3 Data Observation and Simulation
	4 Data Observation
	5 Recommendation
	6 Conclusion
	References
An Investigation into the Applications of Real-Time Simulator in Experimental Validation of PMSM-Based Electric Drive System
	1 Introduction
	2 Real-Time Simulation
	3 Features of the Typhoon HIL Real-Time Simulator
		3.1 Software Section
		3.2 The Hardware Module
	4 Implementation of Drive System
		4.1 Rapid Batch Simulation
		4.2 Rapid Control Prototyping
	5 Simulation and Experimental Results
		5.1 Rapid Batch Simulation
		5.2 Rapid Control Prototyping
	6 Conclusion
	References
A Genetic Algorithm Approach for the Optimal Allocation of On-Site Generation in Radial Distribution Networks
	1 Introduction
	2 Problem Formulation
	3 Proposed Methodology
	4 Problem Modeling with Genetic Algorithm
	5 Implementation and Results
		5.1 Results of Computations Using Genetic Algorithm Approach
	6 Conclusion
	References
Enhanced Thermophysical Properties and Productive Yield of Pyramid Solar Still Combined with Shallow Solar Pond by Incorporating ZnO/Al2O3 Nanocomposites
	1 Introduction
	2 Materials and Methods
		2.1 Synthesis of ZnO/Al2O3 Nanocomposites
		2.2 Fabrication of Pyramid Solar Still (PSS)
		2.3 Construction of Shallow Solar Pond (SSP)
		2.4 Experimental Arrangement
		2.5 Characterization Techniques
	3 Thermophysical Properties
	4 Heat Transfer Modes in PSS
		4.1 Internal Heat Transfer Modes
		4.2 External Heat Transfer Modes
	5 Efficiency
	6 Results and Discussion
	7 Conclusion
	References




نظرات کاربران