دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: Atulya K. Nagar, Dharm Singh Jat, Gabriela Marín-Raventós, Durgesh Kumar Mishra سری: Lecture Notes in Networks and Systems ISBN (شابک) : 9811663688, 9789811663680 ناشر: Springer سال نشر: 2021 تعداد صفحات: 820 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 22 مگابایت
در صورت تبدیل فایل کتاب Intelligent Sustainable Systems: Selected Papers of WorldS4 2021, Volume 2 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب سیستم های هوشمند پایدار: مقالات برگزیده WorldS4 2021، جلد 2 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب بینشهایی از کنفرانس جهانی روندهای هوشمند در سیستمها، امنیت و پایداری (WS4 2021) ارائه میکند که به بخشهای مختلفی مانند زیرساخت فناوری اطلاعات هوشمند برای جامعه پایدار تقسیم میشود. چشم انداز مدیریت هوشمند برای جامعه پایدار؛ سیستمهای امن هوشمند برای فناوریهای نسل بعدی؛ گرایش های هوشمند برای گرافیک محاسباتی و مدل سازی تصویر. و Smart Trends for Biomedical and Health Informatics. مجموعه مقالات در دو جلد ارائه شده است. این کتاب برای محققین و دست اندرکاران فعال در این زمینه مفید است.
This book provides insights of World Conference on Smart Trends in Systems, Security and Sustainability (WS4 2021) which is divided into different sections such as Smart IT Infrastructure for Sustainable Society; Smart Management prospective for Sustainable Society; Smart Secure Systems for Next Generation Technologies; Smart Trends for Computational Graphics and Image Modeling; and Smart Trends for Biomedical and Health Informatics. The proceedings is presented in two volumes. The book is helpful for active researchers and practitioners in the field.
Preface Contents Editors and Contributors Wall-Distance Measurement for Indoor Mobile Robots 1 Introduction 2 Literature Review 3 Methodology 3.1 Image Acquisition and Resizing 3.2 Edge Detection 3.3 BRISK Key-Points Extraction 3.4 Pixel Counting and Distance Calculation 3.5 Characterization 4 Results and Discussion 5 Conclusion References Automating Cognitive Modelling Considering Non-Formalisable Semantics 1 Introduction 2 Non-formalisable Cognitive Semantics 3 Uncaused Decisions 4 Quantum and Wave Semantics 5 Automation of Cognitive Modelling 6 Discussion 7 Results and Conclusions References Using a Humanoid Robot to Assist Post-stroke Patients with Standardized Neurorehabilitation Therapy 1 Introduction 2 Training Tasks 2.1 Arm Basis Training (ABT) 2.2 Mirror Training 3 Robot-Supported Training Tasks 3.1 Model of a Patient 3.2 Model of a Helper 4 Related Work 5 Summary and Outlook References Human Resource Information System in Healthcare Organizations 1 Introduction 2 What Is Human Resources Information System 3 Roles of Human Resources Information System and its Importance in Healthcare 4 Functional Attributes 4.1 Employee Database 4.2 Employee Life Cycle [12] 4.3 Hiring Process 4.4 Payroll System 5 Non-functional Attributes 6 Challenges of Human Recourses Information System 7 Literature Review 8 Methodology 9 Data Analysis and Discussion 9.1 Overview of Respondents Analysis 9.2 Factors Measurement 9.3 Correlation Coefficient Analysis 9.4 Descriptive Statistics Analysis 9.5 Discussion 10 Limitations 11 Recommendations 12 Future of Human Resource Information System in Healthcare 13 Conclusion References Performance Prediction of Scalable Multi-agent Systems Using Parallel Theatre 1 Introduction 2 Background 2.1 An Overview of Parallel Theatre 2.2 Basic Concepts of Minority Game 2.3 Fundamental Behaviour of MG 2.4 A Genetic Extension of MG 3 A Formal Actor Model of the Minority Game 3.1 Checking Model Correctness 3.2 Performance Checks 4 Transforming the MG Model to Parallel Theatre 5 Performance Prediction of MG Models 6 Experimental Results of Parallel Execution 7 Conclusions References Dynamics of Epidemic Computer Subnetwork Models for Scan-Based Worm Propagation: An Internet Protocol Addressing Configuration Perspective 1 Introduction 2 Related Works 3 Methodology 4 Epidemic Models and Numerical Simulation 4.1 The SEI1I2R1R2 Model with Mass Action Incidence 4.2 The XYAZ Model 4.3 The SIR Model with Immunity Divisions and Standard Incidence 5 Conclusion References Security Analysis of Integrated Clinical Environment Using Attack Graph 1 Introduction 2 Integrated Clinical Environment (ICE) 2.1 ICE Topology 2.2 Formal Description of ICE 3 Attack Graph Generation 4 Conclusions References Smart University: Key Factors for a Cloud Computing Adoption Model 1 Introduction 2 Method 3 Proposed Model of Adoption of Cloud Computing 4 Conclusions References Agile Governance Supported by the Frugal Smart City 1 Introduction 2 Research Goal and Methodology 3 Post-crisis Participatory Governance Model 3.1 Prediction of Future Data—Casablanca 4 Discussion 5 Conclusion References Effect of Normal, Calcium Chloride Integral and Polyethene Sheet Membrane Curing on the Strength Characteristics of Glass Fiber and Normal Concrete 1 Introduction 1.1 Curing 1.2 Glass Fiber Concrete 2 Materials and Methods 2.1 Cement 2.2 Fine Aggregate 2.3 Coarse Aggregate 2.4 Mix Ratio 2.5 Calcium Chloride 2.6 Glass Fiber 2.7 Compression Strength Test 2.8 Tensile Strength Test 3 Results and Discussions 3.1 Glass Fiber Concrete 3.2 Calcium Chloride Integral Curing 3.3 Polythene Membrane Curing 3.4 Normal Concrete Under Different Curing Conditions 3.5 Glass Fiber Concrete Under Different Curing Conditions 3.6 Strength Characteristics of Normal Concrete and GFRC 4 Conclusions References Problems with Health Information Systems in Ecuador, and the Need to Educate University Students in Health Informatics in Times of Pandemic 1 Introduction 2 Method 3 Results 3.1 Participants 3.2 Years of Study 3.3 Health Informatics Research 3.4 Use of Information Technology by University Students 3.5 Knowledge in Health Informatics to be Received 4 Discussion References Utilizing Technological Pedagogical Content (TPC) for Designing Public Service Websites 1 Introduction 2 Theoretical Framework of TPCD 2.1 Pedagogical Content (PC) 2.2 Technological Content (TC) 2.3 Technological Pedagogy (TP) and Pedagogical Technology (PT) 3 From Theory to Action 3.1 Defining Objective Goals of Website 3.2 Selecting and Developing Materials 3.3 Inserting Content on Webpages 4 Conclusions References A Multidimensional Rendering of Error Types in Sensor Data 1 Introduction 2 Classification of Errors in Sensor Data 3 A Multidimensional Model of Errors in Sensor Data 4 Conclusion References Optimization of the Overlap Shortest-Path Routing for TSCH Networks 1 Introduction 2 System Model 2.1 Network Model 2.2 Flow Model 3 Problem Formulation 4 Epsilon Greedy Heuristic Optimization Method 5 Tests Scenarios 6 Results 7 Conclusions and Future Work References Application of Emerging Technologies in Aviation MRO Sector to Optimize Cost Utilization: The Indian Case 1 Introduction 1.1 Technology Penetration in the Aviation Sector 1.2 Current Status-Quo of Footprint of Technology in India 1.3 Sustainability 1.4 Data and Supply Chain Maintenance 1.5 Impact of Emerging Technology in MRO 1.6 Challenges 2 Research Design 2.1 Objectives 2.2 Hypotheses Declaration 2.3 Research Methodology 3 Description 4 Research Outcome 4.1 Cost Factor in Technology Implementation 4.2 AI and IoT (Emerging Technologies) in Indian MRO Industry and Global Aviation MRO Industry 4.3 Mental Bias of Age Group Towards AI and IoT in Aviation Sector 5 Conclusion 6 Recommendations References User Evaluation of a Virtual Reality Application for Safety Training in Railway Level Crossing 1 Introduction 2 Literature Review 3 Research Methodology 3.1 Participants 3.2 Overview of VR Training Prototype 3.3 Data Collection Process and Questionnaires 4 Results and Discussion 4.1 SUS Questionnaire 4.2 Sense of Presence (SoP) 5 Conclusion References GreenMile—Gamification-Supported Mobile and Multimodal Route Planning for a Sustainable Choice of Transport 1 Introduction 2 Related Work 3 GreenMile 4 Evaluation 5 Conclusion and Future Work References A Detailed Study for Bankruptcy Prediction by Machine Learning Technique 1 Introduction 2 Background 3 Proposed Model 3.1 Dataset Characteristics 3.2 Feature Engineering 4 Classification 5 Methodology 6 Model Evaluation and Assessment 7 Results 8 Conclusion References Design and Development of Tracking System in Communication for Wireless Networking 1 Introduction 2 Literature Review 3 Methodology 4 Proposed System 5 Implementation 6 Result Analysis 6.1 Comparison of Tracking Error of Existing and Proposed System 6.2 Throughput 7 Conclusion References Cyberbullying in Online/E-Learning Platforms Based on Social Networks 1 Introduction 1.1 Use of E-learning 2 What Is Cyberbullying 2.1 Cyberbullying Types 3 Cyberbullying Avoidance 3.1 Case Study: Cyberbullying in Social MediaText 3.2 Case Study: Cyberbullying Using Machine Learning 3.3 Case Study: Cyberbullying Using Social and Textual Analysis 4 Conclusion References Machine Learning and Remote Sensing Technique for Urbanization Change Detection in Tangail District 1 Introduction 2 Related Works 3 Data Acquisition and Methodology 3.1 Area of Study 3.2 Data Acquisition and Processing 3.3 Methodology 3.4 Training and Classification 4 Result and Analysis 5 Conclusion and Future Works References Enabling a Question-Answering System for COVID Using a Hybrid Approach Based on Wikipedia and Q/A Pairs 1 Introduction 2 Question-Answering Systems 2.1 Main Approaches 2.2 Question-Answering Approaches for COVID 3 Design of the QA System for COVID 3.1 Overview of the Architecture 3.2 Implementation of a Proof of Concept 4 Preliminary Evaluation 4.1 Performance of the Query Processor 4.2 Overall Qualitative Evaluation 5 Conclusion and Future Work References A Study of Purchase Behavior of Ornamental Gold Consumption 1 Introduction 2 Literature Review 3 Objectives 4 Research Methodology 5 Data Analysis and Findings 6 Results of Hypothesis Testing 7 Conclusion References Circularly Polarized Microstrip Patch Antenna for 5G Applications 1 Introduction 2 Antenna Design and Geometry 2.1 Workflow of Proposed Antenna 2.2 Antenna Geometry 3 Results and Analysis 4 Conclusion References An Approach Towards Protecting Tribal Lands Through ICT Interventions 1 Introduction 1.1 Role of ICT 2 E-Governance Initiatives Towards Land Protection 2.1 Strengthening of Revenue Administration and Updating of Land Records Scheme 2.2 Computerization of Land Records (CLR) Scheme 2.3 National Land Records Modernization Programme 3 Proposed Tribal Land Information Management System 4 Discussion and Conclusion References Urban Sprawl Assessment Using Remote Sensing and GIS Techniques: A Case Study of Ernakulam District 1 Introduction 2 Data Requirements 2.1 Study Location 2.2 Data Sources 2.3 Image Preprocessing 2.4 Normalized Difference Vegetation Index (NDVI) 2.5 Normalized Difference Built-Up Index (NDBI) 2.6 The Land Surface Temperature (LST) 2.7 Land Use/Land Cover (LULC)—Supervised Classification 2.8 Accuracy Assessment 3 Results and Discussion 4 Conclusion References Exploring the Means and Benefits of Including Blockchain Smart Contracts to a Smart Manufacturing Environment: Water Bottling Plant Case Study 1 Introduction 2 Background 2.1 Industry 4.0 2.2 Blockchain 2.3 Smart Contracts 3 Methodology 4 Conclusion and Future Work References Extreme Gradient Boosting for Predicting Stock Price Direction in Context of Indian Equity Markets 1 Introduction 2 Methods for Data Collection and Pre-processing for Implementation of Xgboost 2.1 Stock Selection 2.2 Dataset 2.3 Feature Extraction 2.4 Feature Pre-processing and Co-relation Mapping 3 Stock Price Direction Prediction Model Implementation Using Xgboost 3.1 High Level Architectural Diagram 3.2 Algorithm 4 Experimental Results 4.1 Metrics 4.2 Results and Comparison 5 Conclusions References Performance of Grid-Connected Photovoltaic and Its Impact: A Review 1 Introduction 2 Centralized and Decentralized GCPV System 2.1 Centralized Grid-Connected Photovoltaic System 2.2 Decentralized Grid-Connected System 3 Generations of Photovoltaic Cells 4 Sizing of GCPV System 5 Economical Aspects 6 Modelling and Simulation 6.1 Models of Grid-Connected Photovoltaic Systems 6.2 Real-Time Simulation 7 Performance Analysis 7.1 Faults 7.2 Synchronization 8 Conclusion References A Novel Approach of Deduplication on Indian Demographic Variation for Large Structured Data 1 Introduction 2 Literature Survey and Gap Analysis 2.1 Literature Survey 2.2 Gap Analysis 3 Methodology 3.1 Approach for Customization of Deepmatcher 3.2 Blocking 3.3 Entity Matching 3.4 Deduplication 4 Results 5 Conclusion and Future Work References Dual-Message Compression with Variable Null Symbol Incorporation on Constrained Optimization-Based Multipath and Multihop Routing in WSN 1 Introduction 2 Related Works 3 Effect of Source Coding on Transmission Energy 4 Network Model and Optimization Criterion 4.1 Network Model Description and Packet Distribution Policy 4.2 Energy Calculation 4.3 Solving Optimization Problem 5 Employ Source Coding Scheme 6 Effects of Device Characteristics 7 Result Analysis 7.1 Theoretical Energy Savings 7.2 Simulation on Real-Life Sensor Data 8 Conclusion References Spatio-temporal Variances of COVID-19 Active Cases and Genomic Sequence Data in India 1 Introduction 1.1 Spatio-temporal Data of COVID-19 1.2 Spatio-temporal Analysis of SARS-CoV-2 Genome Sequencing Data 2 Spatio-temporal Clustering for Epidemiological Analysis 2.1 ST Variations in India During the Second Wave of COVID-19 2.2 ST Clustering Helps to Understand COVID-19 Hotspots 2.3 ST Clustering Algorithms 2.4 Event Clustering for Disease Clusters 3 Spatio-temporal Variances of COVID-19 in India 3.1 Active Cases Have Seen Much More Clusters in the Second Wave 3.2 ST Clusters of Genomic Sequences in the Second Wave Are More but Lack Spatial Coverage 4 Comparing ST Clusters of Case Data with Genomic Data 4.1 Metrics for Measuring Similarity of ST Clusters 5 Conclusions References Significance of Thermoelectric Cooler Approach of Atmospheric Water Generator for Solving Fresh Water Scarcity 1 Introduction 2 Working Concept of TEC 3 Related Work on TEC Based AWG 4 Proposal for TEC Based AWG 5 Conclusion References A Comprehensive Analysis of Testing Efforts Using the Avisar Testing Tool for Object Oriented Softwares 1 Introduction 2 Related Work 3 AVISAR for Estimating the Testing Effort 4 Interfaces and Exploratory Setup of AVISAR 5 Results of Experiments 6 Conclusions References Fabrication of Energy Potent Data Centre Using Energy Efficiency Metrics 1 Introduction 2 Metrics Framework 3 Power Usage Effectiveness (PUE) 4 Proposed Work and Discussions 5 Conclusion References Performance Anomaly and Change Point Detection for Large-Scale System Management 1 Introduction 2 Statistical Exception and Trend Detection System (SETDS) 3 Anomaly Detection by Neural Network 4 Entropy-Based Method of Anomaly Detection References Artificial Intelligence Driven Monitoring, Prediction and Recommendation System (AIM-PRISM) 1 Introduction 2 Historical Background 3 Problem Definition 3.1 Limitations of Existing Solutions 3.2 Scope of AIM-PRISM System 4 Proposed Solution 4.1 Monitoring, Prediction and Recommendation Approach 4.2 Leveraged Advanced AI/ML and Associated Techniques 5 System Architecture 6 Advantages of Using AIM-PRISM 7 Results and Comparison with Benchmarks 8 Conclusion and Future Directions References Financial Forecasting of Stock Market Using Sentiment Analysis and Data Analytics 1 Introduction 2 Related Work 3 Proposed Model 3.1 Data Collection 3.2 Data Preparation 3.3 Classical Machine Learning Techniques 3.4 Deep Learning Techniques 4 Results 5 Conclusion References A Survey on Learning-Based Gait Recognition for Human Authentication in Smart Cities 1 Introduction 2 Background 3 Literature Review 4 Conclusion and Future Scope References Micro-arterial Flow Simulation for Fluid Dynamics: A Review 1 Introduction 2 Background of Small Vessel Disease 3 Evolution of Hemodynamics 4 Problem Statement and Objectives 5 Methodology 5.1 3D Model Reconstruction 5.2 Initial and Boundary Conditions 5.3 Analyzing the Model in CFD 6 Results and Discussions 7 Conclusion References Hip-Hop Culture Incites Criminal Behavior: A Deep Learning Study 1 Introduction 2 Methodology 3 Song Lyrics Dataset 4 Models 4.1 Support Vector Machine 4.2 Random Forest Classifier 4.3 Multinomial Naive Bayes 4.4 Long Short-Term Memory (LSTM) 5 Model Evaluation 6 LSTM Application and Outputs 7 Visualizations 8 Crime Data 9 Results 10 Future Scope 11 Conclusion References Complex Contourlet Transform Domain Based Image Compression 1 Introduction 1.1 Methods to Perform Lossy Compression 2 Contourlet Family-Based Transform Method 3 Methods Used 3.1 Quantization 3.2 Arithmetic Encoding Technique 4 Conclusion References HWYL: An Edutainment Based Mobile Phone Game Designed to Raise Awareness on Environmental Management 1 Introduction 2 Related Studies 3 Research Methodologies 4 Project Development 5 Results and Discussions 6 Conclusion and Recommendation References IoT and AI Based Advance LPG System (ALS) 1 Introduction 2 Related Work 3 Components 4 System Operation 4.1 Distributor and Customer/User Interface 4.2 Automatic Gas Booking System 4.3 Gas Leakage Detection System 4.4 Smart Gas Stove 5 Comparison 6 Results 7 Conclusion References ICT-Enabled Automatic Vehicle Theft Detection System at Toll Plaza 1 Introduction 1.1 Vehicle Theft Statistics in India 1.2 Current FIR Process for Vehicle Theft Detection 1.3 Current Vehicle Theft Recovery Process 1.4 Limitations of the Available Vehicle Theft Detection Systems 2 ICT-Enabled Vehicle Theft Detection System at Toll Plaza (Proposed Concept) 2.1 Elements of New Toll System 2.2 Working Mechanism 2.3 Flow Chart 3 Pros and Cons 4 Conclusion References RBJ20 Cryptography Algorithm for Securing Big Data Communication Using Wireless Networks 1 Introduction 2 Past Work 3 Methodology 3.1 RBJ20 Algorithm 3.2 RBJ20 Algorithm Encryption 3.3 Working of RBJ Decryption Algorithm 4 Comparison 5 Conclusion References Decision Tree for Uncertain Numerical Data Using Bagging and Boosting 1 Introduction 2 Research Objectives 3 Boosting and Bagging 4 Uncertain Data 5 Related Work 6 Problem Formulation 7 Research Methodology 8 Expected Outcome 9 Conclusion References A Comparative Study on Various Sharing Among Undergraduates in PreCovid-19 and Covid-19 Period Using Network Parameters 1 Introduction 1.1 Objective of the Study 2 Social Network Data 3 Results and Discussion 3.1 Intellectual Sharing, Financial Sharing, Emotional Sharing and Information Sharing in PreCovid-19 Period 3.2 Intellectual Sharing, Financial Sharing, Emotional Sharing and Information Sharing During the Period of Covid-19 3.3 A Comparative Study on Various Sharing Among Undergraduates in PreCovid-19 and Covid-19 Period Using Network Parameters 4 Conclusion References Adoption of Smart Agriculture Using IOT: A Solution for Optimal Soil Decision Tree Making 1 Introduction 2 Methodology 3 Related Work 3.1 Soil Parameters 3.2 Soil Report Analysis 4 Implementation 5 Results and Discussions 6 Conclusion References ThreatHawk: A Threat Intelligence Platform 1 Introduction 2 Related Work 3 Proposed Approach 4 Technologies Used 5 Experimental Severity 6 Conclusion References Network Slicing in Software-Defined Networks for Resource Optimization 1 Introduction 2 Related Work 2.1 Challenges 3 Proposed Model 3.1 Methodology 4 Implementation 4.1 Simulation Environment Setup 5 Result Analysis 6 Conclusion References A Tensor-Based Submodule Clustering for 2D Images Using l12-Induced Tensor Nuclear Norm Minimization 1 Introduction 2 Related Works 3 Proposed Method 3.1 Proposed l12-induced TNN Deduced Using Half Thresholding 3.2 Solution 4 Results and Discussions 5 Conclusions References A CNN-LSTM Approach for Classification of Major TCP Congestion Control Algorithms 1 Introduction 2 Related Work 3 Proposed Hybrid Classification Approach 3.1 Step 1: Generation of Congestion Window Value Files 3.2 Step 2: Normalization of Data 3.3 Step 3: Classifiers in the Proposed Approach 4 Simulation and Performance Analysis 4.1 Estimation of cwnd from Packet Traces 4.2 Normalization 4.3 Neural Network Classifiers 5 Conclusion References A Novel Approach for Detection of Intracranial Tumor Using Image Segmentation Based on Cellular Automata 1 Introduction 2 Related Work 3 Proposed Approach 3.1 Image Acquisition and Image Processing 3.2 Growing Regions with Modified Texture 3.3 CA Based Edge Detection 3.4 Algorithm Used for Image Segmentation 4 Experimental Results 5 Conclusions References Latency Evaluation in an IoT-Fog Model 1 Introduction 2 Background 2.1 Cloud Computing 2.2 Fog Computing 2.3 Internet of Things 3 Role of Latency in IoT-Fog-Cloud Model 4 Related Work 5 Discussion 6 Conclusion and Future Work References Effective Online Tools for Teaching Java Programming Course on an Online Platform 1 Introduction 2 Related Work 3 Online Tools 3.1 JDoodle 3.2 Codeshare 3.3 Poll Everywhere 4 Result Analysis 5 Conclusion References Interactive Learning Application for Indian Sign Language 1 Introduction 2 Literature Survey 3 Proposed Method 3.1 Architecture 3.2 Algorithm 4 Test Result and Performance Evaluation 5 Challenges 6 Future Work 7 Conclusion References Impact of IT Leadership on Transformation of the Role of IT in Improving Individual Tax Return Reporting Compliance at the Directorate General of Taxes 1 Introduction 2 Literature Studies 2.1 Taxpayer Compliance 2.2 The Role of IT in an Organization 2.3 IT Leadership Approaches to the Role of IT 3 Research Methodology 3.1 Research Data Collection Procedure and Instrument 3.2 The Research Methodology Stage 4 Result and Discussion 4.1 Changes in the Role of Information Technology 4.2 Information Technology Leadership 5 Conclusion and Suggestions References Self-driving Car Using Raspberry Pi 3 B+ and Pi Camera 1 Introduction 2 Methodology 3 Learning 4 Automation 5 Hardware Implementation 5.1 Raspberry Pi 5.2 Pi Camera 5.3 L298N Motor Driver 6 Results 7 Conclusion 8 Future Scope References Energy-Efficient Cluster Formation for Wireless Sensor Networks Using Fuzzy Logic 1 Introduction 2 Related Work 3 System Model 3.1 Fuzzy Logic Model 4 Result 4.1 Sample Network 1 5 Conclusions References Hierarchical Cluster-Based Model to Evaluate Accuracy Metrics Based on Cluster Efficiency 1 Introduction 2 Clustering Concept 2.1 Agglomerative Hierarchical Clustering Mechanism 3 Quality Analysis 3.1 Elapsed Time 3.2 Cohesion Measurement 3.3 Silhouette Index 4 Experimental Analysis 5 Methodology and Design 6 Conclusion References Digital Audio Watermarking: Techniques, Applications, and Challenges 1 Introduction 2 Important Properties of Digital Audio Watermarking 3 Watermarking Procedure [2, 4, 9–11] 3.1 Watermark Embedding 3.2 Watermark Extraction 4 Applications of Audio Watermarking [3, 4, 9, 11, 14] 5 Possible Attacks on Audio Watermarking [3–5, 11, 16] 6 Different Techniques Used for Audio Watermarking [3–5, 9, 17] 6.1 Time Domain 6.2 Transform Domain 6.3 Hybrid Techniques 7 Performance Evaluation Parameters [4, 6, 14, 17] 7.1 Peak Signal-to-Noise Ratio (PSNR) [1, 4] 7.2 Bit Error Rate (BER) [4, 6, 12] 7.3 Mean Squared Error (MSE) [1, 4, 14] 8 Conclusion References Transfer Learning for Handwritten Character Recognition 1 Introduction 2 Related Work 3 Preparation of Dataset 4 Architecture on Pre-trained Networks 4.1 AlexNet 4.2 Vgg Net 4.3 GoogLeNet 4.4 Residual Network (ResNet) 4.5 Experimental Results and Analysis 5 Conclusion and Future Work References IoT-Based Smart Solar Monitoring System 1 Introduction 2 Literature Review 3 Methodology 3.1 Solar Monitoring System 3.2 Sun Position Tracking 4 Applications 5 Conclusion References Conglomerate Elgamal Encryption-Based Data Aggregation and Knapsack-Based Energy Efficient Cryptosystem in Wireless Sensor Network 1 Introduction 2 Review of Literature 3 Proposed Methodology 3.1 Data Aggregation-Based ConglomerateElGamal Encryption 4 Performance Analysis 5 Conclusion References Optimization of Resource and Energy Utilization in Device-to-Device Communication Under Cellular Network 1 Introduction 2 Related Work 3 Proposed Methodology 4 Experimental Analysis 5 Conclusion and Future Work References Towards an Integrated Conceptual Model for Open Government Data in Saudi Arabia 1 Introduction 2 Literature Review 2.1 Open Government Data Adoption 2.2 Open Government Data Benefits 2.3 Barriers of Open Government Data 2.4 Theories of Technology Adoption 3 A Review of Proposed Models for OGD Adoption 4 The Proposed Model 4.1 The Category of Suppliers Side 4.2 The category of demand side 5 Methodology 6 Results 6.1 Data Governance 6.2 Data Integration 7 Conclusion References IoT-Based Horticulture Monitoring System 1 Introduction 2 Research Method 2.1 Design of the System 2.2 Electronic Components 2.3 Networking 3 Testing, Results and Discussion 3.1 Testing 3.2 Firebase and Android Application 3.3 MATLAB ThingSpeak 4 Conclusions and Future Work References A Comprehensive Review on the Role of PMU in Managing Blackouts 1 Introduction 2 State of the Art PMU Methods for Stability Evaluation 2.1 Review of Literature 3 Scope of PMU Applications in Network Situation Awareness 4 Blackouts: Causes and Control Actions 4.1 Causes for Blackouts 4.2 PMUs—Selections of Control Actions to Avoid Blackouts 5 Conclusions References Secure COVID-19 Treatment with Blockchain and IoT-Based Framework 1 Introduction 1.1 Background 1.2 Motivations 1.3 Covid Remedy Technique 1.4 Outline 2 Literature Review 3 Blockchain with COVID-19 4 Blockchain with COVID-19 4.1 Pandemic Tracking 4.2 User Confidentiality 4.3 Safe Procedure 4.4 Medical Ledger 4.5 Donation Record 5 IoT and Blockchain with COVID-19 5.1 Proposed Layered Architecture 5.2 Complete Healthcare Framework with IoT and Blockchain 5.3 Securing Patients Buy Insurance with a Proposed Framework 6 Conclusion References Design of a CPW-Fed Microstrip Elliptical Patch UWB Range Antenna for 5G Communication Application 1 Introduction 2 Theories of Elliptically Patch Microstrip Antenna 3 Selection of Substrate 4 CPW Theory 5 Proposed Antenna Structure 6 Simulation Results and Discussion 7 Conclusion References A Review on Consensus Protocol of Blockchain Technology 1 Introduction 2 Literature Review 3 Consensus Algorithm 3.1 Proof of Work (PoW) 3.2 Proof of Stake (PoS) 3.3 Delegated Proof of Stake (DPoS) 3.4 Proof of Elapsed Time (PoET) 3.5 Practical Byzantine Fault Tolerance (PBFT) 3.6 Proof of Activity (PoA) 4 Comparative Investigation of Consensus Algorithm 4.1 Basic Characteristics 4.2 Transaction Metrics 4.3 Network Aspect 4.4 Performance Metrics 4.5 Security Aspect 4.6 Block Aspect 5 Merits and Demerits 6 Conclusion References Author Index