دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Geetam Singh Tomar (editor), Narendra S. Chaudhari (editor), Jorge Luis V. Barbosa (editor), Mahesh Kumar Aghwariya (editor) سری: ISBN (شابک) : 9811506329, 9789811506321 ناشر: Springer سال نشر: 2020 تعداد صفحات: 1635 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 56 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب International Conference on Intelligent Computing and Smart Communication 2019: Proceedings of ICSC 2019 (Algorithms for Intelligent Systems) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب کنفرانس بین المللی محاسبات هوشمند و ارتباطات هوشمند 2019: مجموعه مقالات ICSC 2019 (الگوریتم هایی برای سیستم های هوشمند) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مقالات تحقیقاتی با کیفیت بالا ارائه شده در اولین کنفرانس بین المللی، ICSC 2019، سازماندهی شده توسط موسسه مهندسی و فناوری برق آبی THDC، تهران، هند، از 20 تا 21 آوریل 2019 را گردآوری می کند. دو بخش عمده - محاسبات هوشمند و ارتباطات هوشمند. برخی از حوزه های تحت پوشش عبارتند از سیستم های موازی و توزیع شده، خدمات وب، پایگاه های داده و برنامه های داده کاوی، انتخاب ویژگی و استخراج ویژگی، الگوریتم های داده کاوی با کارایی بالا، کشف دانش، پروتکل ها و معماری های ارتباطی، ارتباطات پرسرعت، ولتاژ بالا. فناوریها، تشخیص و محافظت از خطا، تجزیه و تحلیل سیستم قدرت، سیستمهای جاسازی شده، معماری، الکترونیک در انرژیهای تجدیدپذیر، CAD برای VLSI، الکترونیک سبز، پردازش سیگنال و تصویر، تشخیص و تجزیه و تحلیل الگو، تجزیه و تحلیل با وضوح چندگانه و تصویربرداری موجک، 3D و و شبکه های عصبی.
This book gathers high-quality research papers presented at the First International Conference, ICSC 2019, organised by THDC Institute of Hydropower Engineering and Technology, Tehri, India, from 20 to 21 April 2019. The book is divided into two major sections – Intelligent Computing and Smart Communication. Some of the areas covered are Parallel and Distributed Systems, Web Services, Databases and Data Mining Applications, Feature Selection and Feature Extraction, High-Performance Data Mining Algorithms, Knowledge Discovery, Communication Protocols and Architectures, High-speed Communication, High-Voltage Insulation Technologies, Fault Detection and Protection, Power System Analysis, Embedded Systems, Architectures, Electronics in Renewable Energy, CAD for VLSI, Green Electronics, Signal and Image Processing, Pattern Recognition and Analysis, Multi-Resolution Analysis and Wavelets, 3D and Stereo Imaging, and Neural Networks.
Preface About This Book Contents About the Editors A Survey of Fuzzy Logic Inference System and Other Computing Techniques for Agricultural Diseases 1 Introduction 1.1 Agricultural Diseases and Different Computing Techniques 1.2 Fuzzy Logic 2 Fuzzy Logic in the Agricultural Sector 3 Discussion 4 Conclusion References Credit Card Fraud Detection Using Correlation-Based Feature Extraction and Ensemble of Learners 1 Introduction 2 Related Work 3 Background 3.1 Attribute Extraction 3.2 Naive Bayes 3.3 KNN 3.4 Random Forest 4 Proposed Model 5 Experimental Setup 5.1 Dataset 5.2 Training and Test Data 5.3 Discussion 6 Conclusion References A Model for Predicting Occurrence of Leaf Blast Disease in Rice Crop by Using Fuzzy Logic Techniques 1 Introduction 2 Literature Review 3 Proposed Methodology 3.1 Input Parameters 3.2 Output 4 Experimental Results 5 Conclusions References Improving the Effectiveness of Moving Target Defenses by Amplifying Randomization 1 Introduction 2 Related Work 3 Various MTD Techniques 4 Proposed Work 4.1 Overview 4.2 Client-to-Proxy Assignment 4.3 Proxy Server Under Attack 4.4 Attack Detection and Amplifying Randomization 5 Security Analysis 6 Conclusion References Remaining Life Assessment of Solid Insulation in Power Transformer Using Fuzzy Inference System (FIS) 1 Introduction 2 Calculation of DP Using Mathematical Models Formulated by Correlation Between 2FAL and DP of Paper Insulation 3 Calculation of DP Using Fuzzy Logic System 3.1 Fuzzy Logic 3.2 Scheme for Calculating DP Using Fuzzy Inference System (FIS) 4 Results and Discussions 5 Conclusions References Comparison of Fuzzy Logic Based MPPT of Grid-Connected Solar PV System with Different MPPT 1 Introduction 2 Methodology 2.1 Modeling of PV Array 2.2 Maximum Power Point Tracking (MPPT) 2.3 Boost Converter 2.4 Three-Level Inverter 3 Simulation and Result 4 Conclusion References Comparative Study of Different Classification Models on Benchmark Dataset of Handwritten Meitei Mayek Characters 1 Introduction 2 Meitei Mayek Script 3 Classification Models 3.1 Convolutional Neural Network Model 4 Experimental Results 4.1 Dataset 4.2 Experimental Results and Discussion 5 Conclusion and Future Work References A Literature Review on Energy-Efficient Routing Protocols for Heterogeneous WSNs 1 Introduction 2 Clustering Process in Heterogeneous Wireless Sensor Networks 2.1 Homogeneous Clustering Approach 2.2 Heterogeneous Clustering Approach 3 Literature Survey 3.1 The (SEP) Stable Election Protocol for Heterogeneous Networks 3.2 The (DEEC) Distributed Energy Efficient Clustering Protocol 3.3 The (TSEP) Threshold Sensitive Stable Election Protocol 3.4 The (ETSSEP) Enhance Threshold Sensitive Stable Election Protocol 3.5 The (DCHRP) Dual Cluster Head Routing Protocol 3.6 The (DCHRP4) Dual Cluster Head Routing Protocol with Four-Level Heterogeneity 4 Findings from the Reviewed Literature 5 Summary of the Reviewed Literature 6 Conclusion References Location-Based Proactive Handoff Mechanism in Mobile Ad Hoc Network 1 Introduction 2 Literature Survey 3 Proposed Method 4 Architecture 5 Result Analysis 6 Conclusion References PSO-Based Improved DV-Hop Localization Algorithm in Wireless Sensor Networks 1 Introduction 2 Related Works 3 Brief Overview of PSO 4 PSO-Based DV-Hop Algorithm 5 Results and Discussions 6 Conclusions and Future Scope References Countermeasures Against Variants of Wormhole in Wireless Sensor Networks: A Review 1 Introduction 2 Sinkhole-Based Wormhole and Its Countermeasures 3 Denial of Service-Based Wormhole and Its Countermeasures 4 Black hole-Based Wormhole and Its Countermeasures 5 Conclusion References Adaptive Backup Power Management in Ad Hoc Wireless Network 1 Introduction 2 Related Work 2.1 Power Control Algorithms 2.2 Gap 2.3 Different Power Control Scheme and Power Scheduling 2.4 Gap 3 Proposed Power Awareness Scheme 4 Simulation and Results 4.1 Evaluation of Different Case Statements 5 Conclusion References Spatial Correlation Based Outlier Detection in Clustered Wireless Sensor Network 1 Introduction 2 Related Work 3 Proposed Work 3.1 Network Model 3.2 Proposed Algorithm 4 Results and Discussion 5 Conclusions References Guidelines for an Effective Network Forensic System 1 Introduction and Background 1.1 Categorization of Network Forensics 2 A Generalized Network Forensic System Architecture 2.1 Capturing 2.2 Preservation and Storage 2.3 Analysis 2.4 Investigation and Attribution 2.5 Forensic Reporting 3 Conclusion References Handling Incomplete and Delayed Information Using Optimal Scheduling of Big Data Stream 1 Introduction 2 Related Work 3 Methodology 3.1 Features Based Task Analysis and Selection 3.2 Feedback ID Generation 3.3 Enthalpy Measure 3.4 Optimal Scheduling of Big Data Streams 3.5 Krill Herd Optimization Algorithm 4 Results 5 Conclusion References Twitter Sentimental Analytics Using Hive and Flume 1 Introduction 2 Related Work 3 Methodology 4 Datasets and Result Analysis 5 Conclusion References KKG-512: A New Approach for Kryptos Key Generation of Size 512 Bits Using Plaintext 1 Introduction 2 Literature Review 3 Proposed Algorithm 4 Implementation 5 Results and Conclusion References HD-MAABE: Hierarchical Distributed Multi-Authority Attribute Based Encryption for Enabling Open Access to Shared Organizational Data 1 Introduction 2 Related Work 3 Data Access Scenario and System Model 4 Access Structure 5 HD-MAABE Scheme Construction 5.1 Global Setup Algorithm 5.2 RootAASetup Algorithm 5.3 Level1Setup Algorithm 5.4 Level2Setup Algorithm 5.5 UserKeyGen Algorithm 5.6 Encrypt Algorithm 5.7 Decrypt Algorithm 6 Security Analysis 6.1 Collusion Resistance 6.2 Data Confidentiality 6.3 Fine-Grained Access Control 7 Conclusion References A Unified Platform for Crisis Mapping Using Web Enabled Crowdsourcing Powered by Knowledge Management 1 Introduction 2 Crisis Mapping 2.1 GIS to Neogeography 2.2 Crisis Mapping Approach 3 Unified Problem Solving Platform (UPSP) 3.1 Key Challenges 4 Architecture 4.1 Knowledge Processes 4.2 Upsp Functioning 4.3 Upsp Layout 5 Filters and Classifications 5.1 Basic Information 5.2 Location Information 5.3 Media Information 5.4 Personal Info 6 Conclusion and Future Work References Web Image Authentication Using Embedding Invisible Watermarking 1 Introduction 2 Literature Survey 3 Proposed Method 3.1 The Discrete Cosine Transform (DCT) 3.2 DCT Encoding 4 System Design 5 Implementation 5.1 Embedding of Image 5.2 Encoding 5.3 Decoding 5.4 Extraction of Image 6 Result Analysis 7 Conclusion References Frequent Item Set, Sequential Pattern Mining and Sequence Prediction: Structures and Algorithms 1 Introduction 2 Related Techniques and Structures 2.1 Support 2.2 Confidence 2.3 ID-List 2.4 Bit-Vector 2.5 Projected Database [1] 2.6 SAX 2.7 Diff-Sets [3] 2.8 Item Set Tree 2.9 Compressible Prefix-Tree 2.10 Compact Prediction Tree 3 Module-1: Frequent Item Set Mining 3.1 Traditional Algorithms for FIM 3.2 Pattern-Growth Algorithm for FIM 3.3 Dynamic Algorithms for FIM 4 Sequential Pattern Mining 4.1 Sequential Data: Problem Statement 4.2 Pioneer Algorithms 4.3 Pattern-Growth SPM Algorithms 4.4 Special Cases of Sequential Pattern Mining 5 Module-3: Sequence Prediction 5.1 Traditional Models 5.2 Advanced Model 5.3 Comparative Performance Analysis 6 Conclusion References Study of AdaBoost and Gradient Boosting Algorithms for Predictive Analytics 1 Introduction 2 Ensemble Machine Learning Techniques 2.1 AdaBoost 2.2 Gradient Boost 3 Methodology 4 Experimental Results 5 Conclusion References Enhancing Privacy and Security in Medical Information with AES and DES 1 Introduction 2 Related Work 3 Proposed Work 3.1 Block Diagram of Health Center and Secure Communication Between Entities 3.2 Securing Communication in Health Center with AES and DES 4 Implementation and Results 5 Conclusion and Future Scope References A Comprehensive Review on Unsupervised Feature Selection Algorithms 1 Introduction 2 Related Work 2.1 Methods for Feature Selection 2.2 Methods for Feature Extraction 2.3 Evaluation Metrics 2.4 External Clustering Evaluation Metrics 3 Experiments 3.1 Data Sets 3.2 Experiment Setting 3.3 Results and Discussion 4 Conclusion and Future Work References On the Prerequisite of Coprimes in Double Hashing 1 Introduction 2 Open Addressing 3 Double Hashing 4 Prerequisite of Coprimes 5 Conclusion References Multilingual Machine Translation Generic Framework with Sanskrit Language as Interlingua 1 Introduction 1.1 Background 2 Sanskrit Language as Interlingua 2.1 Structure of the Sanskrit Language and Word Formation in Sanskrit Language 2.2 Advance Discussion Over Sanskrit Grammar 2.3 Comparison of Sanskrit Grammar with Context-Free Grammar 3 Two-Way ExT (Extended) Translation Model 4 Algorithmic Steps for Translation Model 5 Conclusion and Future Work References Machine Learning Approach for Crop Yield Prediction Emphasis on K-Medoid Clustering and Preprocessing 1 Introduction 2 Background Study 3 Dataset Used 4 Methodology and Experimental Result 5 Conclusion References Combined Approach to Classify Human Emotions Based on the Hand Gesture 1 Introduction 2 Tools and Techniques 2.1 Libraries and Tools Used 3 Implementation 4 Experimental Results 5 Comparison Matrix 6 Conclusion References Detecting Gene Modules Using a Subspace Extraction Technique 1 Introduction 2 Materials and Method 2.1 Network Module Extraction 3 Experimental Results 4 Conclusion References A Web Portal to Calculate Codon Adaptation Index (CAI) with Organism Specific Reference Set of High Expression Genes for Diverse Bacteria Species 1 Introduction 2 Limitations in Existing Implementation of CAI 2.1 Using Correspondence Analysis for Estimating Codon Usage in High Expression Gene Set May Not Be Appropriate 2.2 Considering Default E. coli Reference Set May Generate Erroneous Result 3 Codon Adaptation Index (CAI) Web Portal 3.1 Reference Set of High Expression Genes Available in the Web Portal 3.2 Server Configuration and Language Used for the Web Portal 3.3 Description of How to Use our Web Portal 4 Conclusion References Blockchain-Based Transparent and Secure Decentralized Algorithm 1 Introduction 1.1 Web 3.0: The Future 2 Related Work 3 Problems in Blockchain 3.1 Problem Statement 3.2 Technique that Can Be Used to Solve This Problem 3.3 Problem Solution 4 Conclusion References Prediction of Cancer Diagnosis Patients from Fine-Needle Aspirates Using Machine Learning 1 Introduction 2 Research Design and Methodology 2.1 Dataset 2.2 Dataset Preprocessing 2.3 Support Vector Machine and Artificial Neural Network 2.4 Feature Extraction Using Principal Component Analysis 3 Experiments and Result Discussions 3.1 Experiment-I 3.2 Experiment-II 3.3 Experiment-III 4 Performance Evaluation 5 Results Evaluation and Discussion 6 Conclusion References Recognition of Facial Expression Based on the Position of Hands Surrounding the Face Through Median Filter 1 Introduction 2 Proposed Work 3 Segmentation and Feature Extraction and Selection 4 Classification 5 Result 6 Distribution 7 Conclusion References Secure Sharing of Location Data Using Elliptic Curve Cryptography 1 Introduction 2 Related Works 3 Research Methodology 3.1 Elliptic Curve Diffie–Hellman Key Exchange Algorithm 3.2 Proposed Work 4 Results and Discussion 4.1 Secure Agreement of Geographic Location Using ECC 4.2 Receiving the Intermediate Data 4.3 Computation Time and Space Requirement 4.4 Security Analysis 5 Conclusion References Cyberbullying Checker: Online Bully Content Detection Using Hybrid Supervised Learning 1 Introduction 2 Related Work 3 System Architecture 3.1 Data Collection and Preprocessing 3.2 Identification of “Bad” Words 3.3 Addition of Features to the Original Dataset 3.4 Classification 4 Result and Discussions 5 Conclusion References Location-Wise News Headlines Classification and Sentiment Analysis: A Deep Learning Approach 1 Introduction 2 Literature Survey 3 Model Analysis 3.1 Clustering 3.2 Classification 3.3 Sentiment Analysis 4 Experiment Analysis 4.1 Dataset 4.2 DBSCAN Clustering 4.3 Preprocessing 4.4 LSTM for Classification and Sentiment Analysis 4.5 Experimental Analysis 5 Conclusion and Discussion References Review of Plagiarism Detection Technique in Source Code 1 Introduction 2 Literature Review 2.1 Algorithm Architecture 2.2 Algorithm Properties 2.3 Algorithms Used for Plagiarism Detection 3 Proposed Evaluation Measures 3.1 Similarity Metrics 3.2 Model Performance Measures 4 Future Scope 5 Conclusion References Study on the Future of Enterprise Communication by Cloud Session Border Controllers (SBC) 1 Introduction 2 Cloud Session Border Controller Virtualization (SBC—Virtualization) 3 Cloud Session Border Controller (SBC) Virtualization Benefits 4 Cloud Session Border Controller (SBC) Virtualization View in the Cloud 5 Cloud Session Border Controller (SBC) Virtualization Test Setup in the Cloud 6 Cloud Session Border Controller (SBC) Key Differentiators 7 Cloud Session Border Controller (SBC) Virtualization Big Data Analytics 8 Difference Between Cloud Session Border Controller (SBC) and Cloud PBX (Private Branch Exchange) 9 Cloud Session Border Controller (SBC) Virtualization Conclusion References Task Scheduling Based on Hybrid Algorithm for Cloud Computing 1 Introduction 2 Background 3 Proposed Method 3.1 Shortest Job First 3.2 Priority Based Scheduling 3.3 Proposed Algorithm 4 Experimental Results 5 Conclusion References An Integrated Approach for Botnet Detection and Prediction Using Honeynet and Socialnet Data 1 Introduction 1.1 Botnets 1.2 Honeypot 2 Related Work 3 Methodology 3.1 Phase-I 3.2 Phase-II 4 Results and Discussion 5 Conclusion and Future Works References Teaching–Learning-Based Functional Link Artificial Neural Network for Short-Term Electrical Load Forecasting 1 Introduction 2 Structure of the Artificial Neural Network Filters 2.1 Multilayer Perceptron 2.2 Functional Link ANN 2.3 Different Functional Expansions 3 Different Optimization Techniques 3.1 Least Mean Square (LMS) 3.2 Particle Swarm Optimization (PSO) 3.3 JAYA 3.4 Teaching–Learning-Based Optimization (TLBO) 4 Proposed Technique 5 Simulation Study 5.1 Performance Indices 5.2 Simulation Result 6 Conclusion References An Enhanced K-Means MSOINN Based Clustering Over Neo4j with an Application to Weather Analysis 1 Introduction 2 Literature Survey 3 Methodology 3.1 The K-Means MSOINN Clustering Algorithm 3.2 Distance Measure 3.3 Cluster Assignment Step 3.4 Centroid Update Step 4 Implementation 4.1 The Dataset 4.2 Implementation in Neo4j 5 Results 6 Conclusion References Proactive Preventive and Evidence-Based Artificial Intelligene Models: Future Healthcare 1 Introduction 2 Literature Review 2.1 Proactive AI Model 2.2 Prevention AI Model 2.3 Evidence-Based AI Model 3 Discussion 4 Conclusion References Utilization of Artificial Neural Network for the Protection of Power Transformer 1 Introduction 2 Simulation of Power System 2.1 Training of Neural Network 2.2 Testing of Neural Network 2.3 Result 3 Conclusion References Analysing Tweets for Text and Image Features to Detect Fake News Using Ensemble Learning 1 Introduction 2 Related Works 3 Dataset 4 Feature Extraction 4.1 Text Features 4.2 Image Features 5 Proposed Approach 5.1 What is Ensemble Learning? 5.2 Dynamic Weighting of Feature Outputs 5.3 Design Architecture 6 Experiments And Results 6.1 Sentiment Analysis 6.2 Resolution of Image 6.3 Number of Faces 6.4 Convolutional Neural Network 6.5 Ensemble Learning Results 7 Conclusion and Future Works References A Patchy Ground Antenna for Wide Band Transmission in S-Band Application 1 Introduction 2 Designing of Antenna 3 Optimization of Various Antenna Geometries 4 Radiation Pattern 5 Conclusion References Electromagnetic Scattering From Two Crossed Ferromagnetic Microwires 1 Calculation of The Unknown Expansion Coefficients 2 Discussion on Results 3 Conclusion References Performance Analysis of Wearable Textile Antenna Under Different Conditions for WLAN and C-Band Applications 1 Introduction 2 Design of Proposed Antenna 3 Effect on Scattering Coefficient Under Variation of Parameters 4 Results and Discussion 4.1 S11 Parameter of Proposed Antenna 4.2 Performance of Proposed Antenna Under Various Conditions 4.3 Comparison of Gain and Radiation Characteristics of Fabric Antenna 5 Conclusion References Chip Resistor Loaded Fractal Frequency Selective Surface Based Miniaturized Broadband Microwave Absorber from 2 to 18 GHz 1 Introduction 2 Design of FFSS Based MASs 3 Results and Discussion 4 Conclusion References Design and Analysis of Triple Split Ring Resonator-Based Polarization-Insensitive, Multiband Metamaterial Absorber 1 Introduction 2 Design of Absorber 3 Results and Discussion 3.1 Parametric Analysis for the Optimal Design of Absorber 3.2 Constitutive Electromagnetic Parametric Retrieval and Physical Interpretation 4 Conclusion References Design and Analysis of Slot Loaded C-Shaped Trapezoidal Microstrip Antenna 1 Introduction 1.1 Antenna Material and Design 2 Results 3 Conclusion References Calculation of SAR on Human Brain Model and Analysis of the Effect of Various Dielectric Shielding Materials to Reduce SAR 1 Introduction 1.1 SAR Definition 2 Human Head Model and SAR Calculation 2.1 Monopole Antenna and Human Head Model Characteristics 2.2 Calculate the SAR for the Human Brain with Variable Distance of the Antenna 3 Calculate the SAR for Human Brain When Antenna is Shielded by Various Dielectric Materials 4 Conclusion References Equivalent Circuit Model Analysis of Single Square Loop FSS for Transmission Mechanism 1 Introduction 2 Design of FSS 3 Result and Discussion 4 Conclusion References Design of a Dual Annular Ring CPW Fed UWB Antenna for Wireless Applications 1 Introduction 2 Antenna Structure and Design 3 Results and Discussion 4 Conclusion References Path Loss Calculation at 900 MHz and 2.4 GHz in WBAN 1 Introduction 2 Literature Survey 3 Experimental Setup and Measurements 4 Conclusion References Ladder Mat Shape Microstrip Patch Antenna for X Band 1 Introduction 2 Antenna Design Configuration 3 Result and Discussion 3.1 Return Loss S11 3.2 VSWR 3.3 Radiation Pattern 3.4 Directivity 3.5 Gain 3.6 Bandwidth 4 Conclusion References Frequency Agile Slotted Diagonally Sliced Elliptically Polarized Square Patch Antenna 1 Introduction 2 Antenna Design and Geometry 3 Biasing Circuit and Effect of PIN Diode’s Position 4 Results and Observations 4.1 Reflection Coefficient 4.2 Gain and Axial Ratio (AR) 4.3 Radiation Pattern and Smith Chart 4.4 E Field Patterns 5 Conclusions References Drone Shape Slot Array Microstrip Patch Antenna for X-Band 1 Introduction 2 Antenna Design Configuration 3 Results 4 Conclusion References An Optimal Design of Split-Ring Resonator and Electronic Waste Composite-Based Cost-Effective Microwave Absorber for Low Observable Applications 1 Introduction 2 Design of Absorber 3 Results and Discussion 4 Conclusion References Design of Rectangular Microstrip Patch Antenna and Array for Broadband Applications 1 Introduction 2 Antenna Designs 3 Results and Comparison 4 Conclusion References Solar Rectenna to Power Wireless Sensors and Implanted Electronic Applications 1 Introduction 2 Design of Wearable Antenna 3 Microwave Rectification 3.1 Analysis of Voltage Doubler 3.2 Dual-Band Impedance Matching 4 Experimental Setup and Results 5 Conclusion References Design and Performance Enhancement of Wearable Textile Antenna 1 Introduction 2 Process of Antenna Design 3 Simulated Results 4 Conclusions References Wideband E-Shaped Planar Antenna for Cellular, GPS, and Wireless Applications 1 Introduction 2 Wideband Antenna Design 3 Parametric Study 4 Results and Discussion 5 Conclusion References Radial Velocity Distortion Reduction for NLFM-Based Radar System Using a Notch Filter 1 Introduction 1.1 Related Works 1.2 Motivation 1.3 Contribution 2 Problem Formulation 2.1 Notch Filter Modeling 3 Simulations and Results 4 Conclusion References Design of Compact Two-Element MIMO F-Antenna 1 Introduction 2 F-Single Antenna Element 3 Result and Discussion 3.1 Single F-Antenna 3.2 Design of Double Antenna Element 4 Conclusion References Chebyshev Polynomials-Based Pulse Compression Waveform for Modern Microwave Radars 1 Introduction 2 Problem Formulation 3 Simulations and Results 3.1 Performance Parameters Analysis 3.2 Discussion with Bandwidth 3.3 Ambiguity Function Observations 4 Conclusion References Wideband MIMO Antenna with Diverse Polarization and Radiation Pattern for 5G Applications 1 Introduction 2 Development of Proposed Antenna 3 Results and Discussion 4 Conclusion References Study the Effect of Dielectric Constant on Notch-Loaded U-Shaped Microstrip Patch Antenna 1 Introduction 2 Geometrical Specifications Estimate Dimensions of MPA 3 Antenna 4 Designing Process 5 Comparative Analysis and Discussion 6 Conclusion References Triple-Band Reconstruct Circular Aperture Loaded CDRA Deploying HE11δ and HE21δ Modes for Wireless Applications 1 Introduction 2 Antenna Geometry 3 Antenna Analysis 4 Results and Discussion 5 Conclusion References Tumor Detection in Multilayer Brain Phantom Model by Symmetrical-Shaped DGS Rectangular Microstrip Patch Antenna 1 Introduction 2 Antenna Design 2.1 Multilayer Brain Phantom Model 2.2 Multilayer Brain Phantom Model with Cancer Tumor 3 Results and Discussion 4 Conclusion References Design and Optimization of S-Shape Multi-resonant Microstrip Antenna 1 Introduction 2 Antenna Design 3 Results and Discussions 4 Conclusion References Sigma-Structured Microstrip Antenna for Harvesting Energy for Low-Power Devices 1 Introduction 2 Antenna Design 3 Calculation of Received Power and Voltage of Antenna 4 Rectifier Circuit 5 Illustration of Results 6 Conclusion References Nodal Pricing Analysis of Distribution System with Wind Power and D-STATCOM for Realistic ZIP and RIC Loads 1 Introduction 2 Problem Formulations 2.1 Formulation of Optimal Load Flow 2.2 Determination of Nodal Prices Using MLCs 3 Wind and D-STATCOM, Load Modeling 3.1 Index Vector 3.2 Combined Power Loss Sensitivity 3.3 Modeling of Load 4 Steps to Calculate Nodal Prices 5 Results and Discussions 6 Conclusion References Enhancement of Bandwidth and Gain of a Slotted E-Shaped Patch Antenna 1 Introduction 2 Formula Used for Antenna Design 3 Demonstration of Antenna Design 4 Procedures for Designing of Antenna 5 Discussions of Simulation Results 6 Conclusion References Circularly Polarized Compact Monopole Antenna with an Offset Microstrip Feedline for C-Band Applications 1 Introduction 2 Design Procedure 3 Results and Discussion 4 Conclusions References An H-Shaped Reconfigurable Slot Antenna Using SIW Technology 1 Introduction 2 Antenna Design 3 Frequency and Polarization Reconfigurable Antenna 4 Radiation Reconfigurable Antenna 5 Simulated Results 6 Discussions References Frequency Scanning SIW Leaky Wave Horn Antenna for Wireless Application 1 Introduction 2 Geometry of Proposed Antenna 3 Results 4 Conclusions References Randomizing Vigenere Cipher in Polyalphabetic Substitution Scheme 1 Introduction 2 Vigenere Cipher 3 Review on Existing Enhancements of Vigenere Cipher 4 Proposed Work 5 Vigenere Versus Randomized Vigenere 6 Conclusion References Novel Tool to Determine Kinetic Parameters of Thermoluminescence (TL) Glow Curve—CGCD: CaZrO3: Eu3+, Tb3+ 1 Introduction 2 Experimental 3 Results and Discussion 3.1 XRD Analysis 3.2 Thermoluminescence Glow Curve Analysis and Trapping Parameters for CaZrO3:Eu3+ and Tb3+ 4 Conclusions References Determination of Spectroscopic Parameters via Judd–Ofelt Analysis of Eu3+ Doped La2Zr2O7 Phosphor 1 Introduction 2 Experimental 3 Results and Discussion 3.1 XRD Analysis of Prepared Phosphor 3.2 PL Spectra Analysis of LZO Doped with Eu3+ Phosphor 4 Conclusion References CGCD Technique for Thermoluminescence Studies of Y2Zr2O7:Eu3+ Phosphor 1 Introduction 2 Experimental 3 Results and Discussion 4 Conclusion References A Study of Thermally Induced Vibrations of Circular Plate of Nonuniform Thickness 1 Introduction 2 Mathematical Analysis 3 Solution 4 Edges Condition 5 Results and Conclusion References Industrial Motor Bearing Fault Detection Using Vibration Analysis 1 Introduction 2 Bearing Faults: Causes and Remedies 3 Bearing Characteristics Frequencies 3.1 Fundamental Train Frequency (FTF)/Cage Defect 3.2 Ball Pass Frequency Inner Race (BPFI) 3.3 Ball Pass Frequency Outer Race (BPFO) 3.4 Ball Spin Frequency (BSF)/Rolling Element Defect 4 Experimental Setup 5 Conclusions References A New Modified Form of Murnaghan Thermodynamic Equation of State 1 Introduction 2 Theory 3 Applications References A Study of Shear and Temperature on Vibrations of Infinite Plate 1 Introduction 2 Mathematical Formulation 3 Solution 4 Edge Conditions and Frequencies Equation 5 Results and Conclusion References Voltage Stability Analysis of Wind Integrated Grid 1 Introduction 2 Problem Formulation 3 Literature Survey 4 Descriptions of the Components and Model 5 Implementation Procedure 6 Results and Discussions 7 Conclusion References CDM-Based PID Controller with Filter Design for Performance Improvement of Two-Mass Drive System 1 Introduction 2 Mathematical Analysis of the Two-Mass System 3 Controller and Filter Design 4 Simulation Result 5 Conclusion References Autonomous Vehicle Power Scavenging Analysis for Vehicular Ad Hoc Network 1 Introduction 2 Piezoelectric Transducer Theoretical Background 3 Vibration in a Vehicle 3.1 Engine as a Vibration Generator 3.2 Measurement Equipment 3.3 Detected Vibration 4 Piezoelectric RMS Power SIMSCAPE Model 5 Power Recovered by Transducer 6 Conclusion References Cuckoo Search Algorithm and Ant Lion Optimizer for Optimal Allocation of TCSC and Voltage Stability Constrained Optimal Power Flow 1 Introduction 1.1 Motivation 1.2 Literature Review 1.3 Organization 2 Problem Formulation 2.1 Objective Function 2.2 Model of TCSC Device 3 Cuckoo Search Algorithm 3.1 Utilization of Levy Flight 4 Ant Lion Optimization 4.1 Initialization—Random Movement of Ants 4.2 Fitness Evaluation and Updating Process 4.3 Trap Building by Ant Lion 4.4 Prey Catching and Process of Trap Reconstruction 5 Solution Methodology 5.1 Determination of Optimal TCSC Location 5.2 Determination of Optimal TCSC Size 6 Numerical Results and Discussion 7 Conclusion References A New Approach to Smart Knock Detection Based Security System for Door Lock 1 Introduction 2 Implementation 3 Hardware and Software Requirements 3.1 Hardware 3.2 Software 4 Circuit Diagram and Layout 5 Conclusion 6 Future Outcome References Effective Control Strategy in Microgrid 1 Introduction 2 Architecture of Microgrid 3 PQ Control of Microgrid 3.1 PQ Controller Design 4 Droop Control in Autonomous Mode 4.1 Droop Controller Design 5 Simulation Result 6 Conclusion References An Efficient Trust-Based Approach to Load Balanced Routing Enhanced by Virtual Machines in Vehicular Environment 1 Introduction 2 Related Works 3 Network Model 3.1 Setting up the Network in Vehicular Environment 3.2 Development of Optimized Route Discovery Mechanism 3.3 Development of the Trust Model 4 Introduction to Virtual Machines (VM) for Solution to Load Balancing Problem 5 Performance Analysis 6 Conclusion References Parameter Optimization of a Modified PID Controller Using Symbiotic Organisms Search for Magnetic Levitation Plant 1 Introduction 2 Magnetic Levitation Plant 3 The Proposed PID Controller 4 Symbiotic Organisms Search 4.1 Mutualism 4.2 Commensalism 4.3 Parasitism 5 Simulation and Results 6 Conclusion References Review of Literature—Analysis and Detection of Stress Using Facial Images 1 Introduction 1.1 Stress 1.2 Objective of the Study 1.3 Methodology 2 Literature Review 3 Conclusion References A Survey on Text Detection from Document Images 1 Introduction 2 Related Work 3 Challenges 4 Conclusion References Object Recognition Using SBMHF Features 1 Introduction 2 Related Work 3 Proposed Methodology 4 Results and Discussion 5 Conclusion References DWT Based Compression Algorithm on Acne Face Images 1 Introduction 2 Two-Dimensional DWT and Arithmetic Coding 2.1 Two-Dimensional DWT 2.2 Arithmetic Coding 3 Proposed Algorithm 4 Result and Discussion 5 Conclusion References Segmentation of Blood Vessels from Retinal Fundus Images Using Bird Swarm Algorithm and River Formation Dynamics Algorithm 1 Introduction 1.1 Related Work 2 BSA-RFD Vessel Extraction Approach 2.1 Exploration Region 2.2 Foraging and Vigilance 2.3 Selecting Optimal Path Using RFD 2.4 Selecting the Best Threshold 3 Results and Discussions 4 Conclusion References Image Processing for UAV Using Deep Convolutional Encoder–Decoder Networks with Symmetric Skip Connections on a System on Chip (SoC) 1 Introduction 2 Image Capturing and Analysis in UAV 2.1 UAV Applications Using Images 2.2 Issues with UAV Images 3 Deep Neural Networks Based Image Analysis 4 Deep Convolutional Encoder–Decoder Networks with Symmetric Skip Connections 5 Results 6 Conclusions References A Comparison of Different Filtering Strategies Used in Attribute Profiles for Hyperspectral Image Classification 1 Introduction 2 Attribute Filtering Strategies and Attribute Profiles 2.1 Attribute Filtering Strategies 2.2 Attribute Profiles 3 Hyperspectral Data Sets 4 Experimental Results 4.1 Results on University of Pavia Data Set 4.2 Results on KSC Data Set 5 Conclusion References Standard Statistical Feature Analysis of Image Features for Facial Images Using Principal Component Analysis and Its Comparative Study with Independent Component Analysis 1 Introduction 2 Literature Review 3 Principal Component Analysis (PCA) 3.1 Dimensionality Problem 3.2 PCA 3.3 Process of Finding the Principal Component (PC) 3.4 PCA with Singular Value Decomposition (SVD) Method 4 Independent Component Analysis (ICA) 5 Juxtaposition Between PCA and ICA 6 Applications of PCA and ICA 6.1 Application of PCA 6.2 Applications of ICA 7 Conclusion and Future Work References Indian Currency Recognition Using Radial Basis Function and Support Vector Machine 1 Introduction 2 Literature Review 3 Methodology 3.1 Image Acquisition 3.2 Image Preprocessing 3.3 Edge Detection 3.4 Statistical Features 3.5 RBF and SVM Classifier 3.6 Training Dataset 3.7 Testing of the Classifier 4 Result 5 Conclusion 6 Future Enhancement References LDA- and QDA-Based Skin Lesion Melanoma Detection 1 Introduction 2 Literature Review 3 Methodology 3.1 Image Acquisition 3.2 Image Preprocessing 3.3 Feature Extraction 3.4 LDA 3.5 QDA 3.6 RFC 3.7 Training 3.8 Testing 3.9 Detection 4 Results 5 Conclusion 6 Future Enhancement Refrences Design and Analysis of a Multilevel DC–DC Boost Converter 1 Introduction 1.1 Design Considerations 1.2 Modelling and Control of DC–DC Converters 1.3 Efficiency of DC–DC Converter 1.4 Boost Converter 2 Design of Multilevel DC–DC Boost Converter 2.1 Switch-ON Condition (T1 = DTs) 2.2 Switch-OFF Condition [T2 = (1 – D)Ts] 2.3 Effect of Parasitic Resistance (RL) 2.4 Analytical Expressions for Output Voltage and Source Current Without Parasitic Resistance 3 Results 4 Conclusion and Future Scope References Improved Image Quality of Hybrid Underwater Image Restoration (IR) Using the Dark Channel Prior (DCP), Color Attribution Prior, and Contrast Stretching 1 Introduction 2 Different Methods 2.1 Dark Channel Prior (DCP) 2.2 Color Attenuation Prior 2.3 Contrast Stretching (CS) 3 Literature Survey 4 Problem Statement and Propose a Methodology 4.1 Problem Statement 4.2 Proposed Methodology 4.3 Propose Algorithm 5 Experiment Result Analysis 6 Conclusion References Design of Low Voltage High-Speed Universal Logic Gates Using Different Models of CMOS Schmitt Trigger 1 Introduction 2 Implementation and Circuit Description 3 Results and Discussion 3.1 Analysis of Different Designs of Schmitt Trigger 4 Conclusion and Future Scope References Design and Analysis of 3-Bit Shift Register Using MTCMOS Technique 1 Introduction 2 Power Dissipation 2.1 Static Power Dissipation 2.2 Dynamic Power Dissipation 2.3 Components Which Contribute to the Average Power Consumption (Pavg) 2.4 Techniques for Reducing the Leakage Power 2.5 Shift Registers 2.6 D Flip-Flop for Shift Register 2.7 Schematic Diagram of CMOS D Flip-Flop Circuit 3 Different Parameters Used for Experimentation 4 Methodology 5 Description of Performance Measures 5.1 Details of Experiment 6 Result and Discussion 7 Conclusion References Dynamic Power Reduction Techniques for CMOS Logics Using 45 nm Technology 1 Introduction 2 Proposed Methodology for Power Reduction 2.1 Dynamic Power 2.2 Static Power 2.3 GALEOR Technique 2.4 Power Gating 2.5 Drain Gating 2.6 Drain Footer and Power Header (DFPH) Technique 3 Result and Discussion 3.1 Simulation 4 Conclusion References Design of an Optimal Integer Frequency Synthesizer for 5GHz Frequency at 45nm CMOS Technology 1 Introduction 2 Design Methodology 2.1 Phase Frequency Detector 2.2 Low-Pass Filter 2.3 Voltage Controlled Oscillator 3 Results and Discussion 4 Conclusion References Performance Evaluation of Hybrid RF/FSO Communication System in High-Speed Train 1 Introduction 2 Network Architecture of High-Speed Train 3 System Model for Hybrid RF/FSO System 3.1 Received Signal for the Individual Scheme 3.2 Capacity for the Integrated RF/FSO Scheme 4 Simulation Result 4.1 Maximum Capacity Versus Link Distance Between Transmitter and Receiver 4.2 Maximum Capacity Versus Visibility Under Foggy Condition 5 Conclusion References Real-Time Analysis of Low-Cost Software-Defined Radio Transceiver Using ZigBee Protocol 1 Introduction 2 About Software-Defined Radio 2.1 ZigBee and IEEE 802.15.4 2.2 Different Uses of ZigBee 3 Related Work 4 General Transceiver for ZigBee-Based SDR 4.1 Transmitter Section 4.2 Receiver Section 5 About the Hardware Used XBEE-PRO 6 Analysis of the Experiment Results Using Eye Diagram, BER and Constellation Diagram 7 Result Discussion 8 Conclusion References Comparative Overview of Profit-Based Unit Commitment in Competitive Electricity Market 1 Introduction 2 Literature Review 3 Profit-Based Unit Commitment Problem Formulation 4 Conclusion References THD Analysis of New Multilevel Inverter Topology with Different Modulation Techniques 1 Introduction 2 Proposed Multilevel Inverter Topology 3 Modulation Strategies 3.1 Phase Disposition Modulation (PD PWM) 3.2 Phase Opposition Disposition Modulation (PODPWM) 3.3 Alternate Phase Opposition Disposition Modulation (APODPWM) 3.4 Inverted Sine Carrier PWM (ISCPWM) 3.5 Inverted Sine Carrier with Variable Frequency PWM (ISCVF) 3.6 Inverted Alternate Phase Opposition Disposition PWM Techniques (Inverted APOD) 4 Simulation Result 5 Conclusion References Sensitivity-Based Adaptive Activity Mapping for Optimal Camera Calibration 1 Introduction 1.1 Adaptive Background Subtraction 1.2 Normalized Half-Gaussian Distribution 1.3 Multilayered Thresholding 2 Related Work 3 Proposed Methodology 4 Results Obtained 5 Conclusion References Spectral–Spatial Active Learning with Attribute Profile for Hyperspectral Image Classification 1 Introduction 2 Proposed Spectral–Spatial AL Model 3 Experimental Results 4 Conclusion References Secrecy Performance Analysis of Hybrid-Amplify-and-Decode-Forward (HADF) Relaying Scheme Under Multi-hop Scenario 1 Introduction 2 System Model 2.1 Cooperative Relaying Schemes 3 Secrecy Rate Analysis 3.1 DF Relaying Protocol 3.2 AF Relaying Protocol 3.3 HADF Relaying Protocol 4 Simulated Results 5 Conclusion References A Review on Photonic Crystal Fibers 1 Introduction 2 Review on Literature 3 Types of Photonic Crystal Fibers 3.1 Index Guiding Photonic Crystal Fiber 3.2 Photonic Bandgap Fiber 4 Analysis of Optical Properties 4.1 Birefringence 4.2 Chromatic Dispersion 4.3 Confinement Loss 4.4 Effective Mode Area 4.5 Nonlinearity 4.6 Zero Dispersion Wavelengths (ZDW) 5 Applications of PCF 6 Conclusion References Multiplier-Less Architecture for 4-Tap Daubechies Wavelet Filters Using Algebraic Integers 1 Introduction 2 Background 3 Proposed Method 4 FPGA Implementation and Results 5 Conclusions References Bit Representation for Candidate Itemset Generation 1 Introduction 1.1 Association Rule Mining 1.2 Apriori Algorithm 1.3 Representation of Itemsets 2 Problem Definition 3 Bit Representation for Candidate Generation 3.1 Experimental Analysis 4 Conclusion References PROD: A Potential Rumour Origin Detection Model Using Supervised Machine Learning 1 Introduction 2 Related Work 3 Potential Rumour Origin Detection (PROD) Model 4 Results 5 Conclusion References Double-Stage Sensing Detectors for Cognitive Radio Networks 1 Introduction 2 System Description 3 The Proposed System Model 3.1 Double-Stage Sensing Detectors 4 Numerical Results and Analysis 5 Conclusion References Modified Soft Combination Scheme for Cooperative Sequential Detection Considering Fast-Fading in Cognitive Radios 1 Introduction 2 System Model 3 Sequential Detector for Fast-Fading Scenario 3.1 Sequential Detector with GLLR 3.2 Log-Likelihood Ratio When P(V0m) and P(V1m) Are Unknown 3.3 Modified Soft Combination Rule 4 Simulation and Results 5 Conclusion References Role of Chaos in Spread Spectrum Communication 1 Introduction 2 Chaos Theory 3 Chaos-Based Communication 4 Chaos-Based DS-SS (CDS-SS) Communication 5 System Overview 6 Synchronization in DS-SS System 6.1 Serial Search 6.2 Parallel Search 7 Matched Filter Correlator 8 Sequential Search 9 Sequence Acquisition for Chaos-Based Spreading Sequences 10 Sequence Tracking for DS-SS Systems 10.1 Sequence Tracking for Chaos-Based Spreading Sequences 11 Discussion and Conclusion References Design Analysis of CG-CS LNA for Wideband Applications Using Noise Cancelation Technique 1 Introduction 2 Circuit Analysis 3 Simulation Results 4 Conclusion References Performance Evaluation of Hybrid Renewable Energy System for Supplying Electricity to an Institution and a Hospital Using HOMER 1 Introduction 2 Methodology 3 Load Profile and Site Selection 4 Components and Resources Available 4.1 Photovoltaic Panels 4.2 Small Wind Turbine 4.3 Diesel Generator 4.4 Battery 4.5 Converter 4.6 Solar Energy Resources 4.7 Wind Resources 5 Results and Discussion 6 Conclusion References Energy Scheduling of a Household with Integration of Renewable Energy Considering Different Dynamic Pricing Schemes 1 Introduction 2 Energy Scheduling 2.1 System Model 2.2 Pricing Schemes 3 Objective Function and Proposed Solution 4 Case Study and Results 5 Conclusion References Optimum Design of Photovoltaic System For a Medical Institute Using HOMER 1 Introduction 2 Methodology 3 Load Estimation 4 Resource and Components 4.1 Solar Energy Resource 4.2 Solar PV Panels 4.3 Battery 4.4 Converter 4.5 Diesel Generator 5 Result 6 Conclusion References Raising Concerns on High PV Penetration and Ancillary Services: A Review 1 Introduction 2 Solar Photovoltaic: Principle and Working 2.1 PV Cell 2.2 Grid-Connected Solar PV 2.3 Other Factors in PV Installations 3 High PV Penetration 3.1 System Inertia 3.2 Ancillary Services 4 Conclusions References Analysis of 150 kW Grid-Connected Solar PV System Using Fuzzy Logic MPPT 1 Introduction 2 Methodology 2.1 Modeling of PV Array 2.2 Maximum Power Point Tracking (MPPT) 2.3 Boost Converter 2.4 Three-Level Inverter 3 Simulation and Result 4 Conclusion References Clock System Architecture for Digital Circuits 1 Introduction 2 Related Work 3 Clocked Distribution Network 4 Proposed Clock System Architecture (CSA) with Clock Gaters 5 Simulation Setup 6 Result and Discussion 7 Conclusion References TCAD Modeling and Analysis of sub-30nm Strained Channel MOSFET 1 Introduction 2 Tri-Layer Channel MOSFET 2.1 Device Structure 2.2 Simulation Approach 3 Results and Discussion 4 Conclusion and Outlook References InGaAs MOSFET for High Power Applications 1 Introduction 2 MOS Structure 3 Simulation Results 4 Conclusion References Low Power Efficient Si0.7Ge0.3 Pocket Junction-Less DGTFET with Sensing Ability for Bio-species 1 Introduction 2 Device Model and Structures 3 Results and Discussions 4 Conclusion References Three-Layered Channel with Strained Si/SiGe/Si HOI MOSFET 1 Introduction 2 MOSFET Device Structure 3 Results and Discussion 4 Conclusion References Electric Field Modeling and Critiques of Dual-Halo Dual-Dielectric Triple-Material Surrounding-Gate MOSFET 1 Introduction 2 Analytical Model 3 Results and Discussion 3.1 Electric Field 4 Comparison 5 Conclusion References Modeling and Logic Synthesis of Multifunctional and Universal 3 × 3 Reversible Gate for Nanoscale Applications 1 Introduction to Reversible Logic 2 Proposed Gate 3 Proposed Gate as Universal Structure 4 Implementation of 13 Standard Functions Using Proposed Gate 5 Performance Comparison 6 Future Work 7 Conclusion References Logic Design and Modeling of an Ultraefficient 3 × 3 Reversible Gate for Nanoscale Applications 1 Introduction to Reversible Logic 2 Proposed Gate 3 Proposed Gate as Universal Structure 4 Implementation of 13 Standard Functions Using Proposed Gate 5 Performance Comparison 6 Future Work 7 Conclusion References A Novel Reversible DSG Gate and Its Quantum Implementation 1 Introduction 2 Proposed Novel Reversible DSG Gate 3 Quantum Implementation of DSG Gate 4 Application of DSG Gate 5 Conclusion References Performance Analysis of Various Embedded Linux Firmwares for ARM Architecture Based IoT Devices 1 Introduction 2 Various Embedded Linux Os for Raspberry Pi 2.1 Raspbian OS 2.2 Yocto Project 2.3 PiLFS 3 Conclusion References Landslides Detection in Prone Hilly Areas Using Raspberry Pi 1 Review of Literature 2 Introduction 3 Block Diagram 3.1 Connections 3.2 Raspberry Pi 3.3 Raspberry Pi Camera 3.4 PIR Sensor 3.5 BMP180 3.6 MEMS Accelerometer 3.7 DHT11/22 3.8 Buzzer 4 Circuit Diagram 5 Software Development 6 Results and Discussion 7 Conclusion References Image and Video Capturing for Proper Hand Sanitation Surveillance in Hospitals Using Euphony—A Raspberry Pi and Arduino-Based Device 1 Introduction 2 Review of Literature 3 Block Diagram and Hardware Description 4 Software Description and Algorithm 5 Result and Discussion 6 Conclusion References Industrial Hazard Prevention Using Raspberry Pi 1 Introduction 2 Review of Literature 3 Block Diagrams 3.1 Positioning 3.2 End Device Node 3.3 Central Node 4 Circuit Diagram 5 Software Developments 6 Results and Discussion 7 Conclusion References IoT-Based Traffic Management System Including Emergency Vehicle Priority 1 Introduction 2 Working of the Proposed System 3 Algorithm for Emergency Vehicles 4 Fault Tolerance 5 Testing and Validation of the System 6 Conclusion References Design and Development of IoT-Enabled Portable Healthcare Device for Rural Health Workers 1 Introduction 2 The IoT-Based Healthcare System in Rural Areas 3 Proposed System 3.1 Proposed Electronic Healthcare System 3.2 Block Diagram of the Proposed System 4 Hardware Implementation 4.1 Developed Prototype 4.2 Hardware Description 5 Results 5.1 Getting Started with Healthcare Device 5.2 System Performance 6 Conclusion References Head-Gesture-Based Human–Computer Interface for Disabled People 1 Introduction 2 Research Methodology 3 Equipment, Material, and Experimental Setup 4 Results and Discussion 5 Summary and Conclusions References Intelligent and Hybrid Control Techniques for Robotic Manipulator 1 Introduction 2 Intelligent Control Techniques 2.1 Artificial Neural Network (ANN) 2.2 Fuzzy Logic (FL) 2.3 Genetic Algorithm (GA) 3 Hybrid Control Techniques 3.1 Neuro-fuzzy 3.2 Neuro-genetic 3.3 Neuro-fuzzy-genetic 4 Comparison 5 Conclusion References Health Monitoring Gadgets 1 Introduction 2 Hardware Development 2.1 ECG (Electrocardiogram) AD8232 2.2 Accelerometer 3 ThingsSpeak Server 4 Conclusion and Future Scope References Evaluating Input Stream for IoT Commodity Eyes 1 Introduction 2 Camera Features 3 Activation Function 3.1 Identity Function 3.2 Binary Step Activation Function 3.3 Logistical or Sigmoid Function 3.4 Tanh Activation Function 3.5 ArcTan Function 3.6 ReLU 3.7 Leaky ReLU 3.8 SoftMax Function 4 File Format and CODEC 5 Architectural Model of IoT Eye 6 Actuating Devices/Concentrators Nodes 7 Conclusion References Application of Sensors Using IoT for Waste Management System 1 Introduction 2 Comparative Study 3 Methodology 3.1 Hardware Components: 4 Procedure 4.1 Innovative Idea 5 Test Case Generation and Analysis 5.1 Unit Testing 5.2 System Testing 6 Results 7 Conclusion References Nodal Price Determination for Radial Distribution System Using Load Flow Approach 1 Introduction 2 Nodal Pricing Methodology 2.1 Determination of Marginal Loss Coefficients 2.2 Reconciliated Marginal Loss Coefficients 2.3 Load Modeling 3 Results and Discussions 4 Conclusion References Smart Quadripod Walking Stick for the Aid and Security of Visually Challenged and Elderly People 1 Introduction 2 Literature Survey 3 Processors and Sensors Used 3.1 Arduino Uno R3 3.2 Ultrasonic Sensor 3.3 Vibrating Motor 3.4 Photoresistor (LDR Sensor) 3.5 GPS Module 3.6 GSM Module 3.7 Push Button 3.8 Other Electronic Components 4 Architecture of Smart Walking Stick 5 Methodology 5.1 Interfacing Ultrasonic Sensor and Arduino 5.2 Adding Vibrating Motor to Arduino 5.3 Adding LDR and LED to the Circuit 5.4 Interfacing GSM and GPS Module with the Arduino 5.5 Interfacing Push Button 5.6 Assembled Hardware of the Smart Walking Stick 6 Comparison with the Existing Models 7 Results and Discussions 7.1 Ultrasonic Sensor and Vibrating Motor 7.2 Photoresistor and LED 7.3 GSM Module and GPS Module 7.4 Setting Up ThingSpeak 7.5 Analysis 8 Conclusion 9 Recommendations References Real-Time Tracking and Lane Line Detection Technique for an Autonomous Ground Vehicle System 1 Introduction 2 Overview of Proposed Approach 3 Tracking of Car Using Roadside Static Camera 3.1 Object Detection 3.2 Tracking Using Kalman Filter [19–21] 4 Lane Line Detection 4.1 Required Pre-processing 4.2 Mask Generation and ROI 4.3 Hough Transform [15, 16] 5 Algorithm 5.1 Vehicle Tracking 5.2 Lane Line Detection 5.3 Hardware Setup 6 Experimental Results 6.1 Vehicle Tracking 6.2 Lane Line Detection 7 Conclusion References Wireless Controlled Lake Cleaning System 1 Introduction 2 System Description 2.1 ATmega328 Microcontroller 2.2 Relays 2.3 DC Geared Motors 2.4 Conveyor System 2.5 Catamaran Hull Structure 2.6 Trans-receiver 2.7 Lithium–Ion Polymer Battery 3 Experimental Setup Design 3.1 Block Diagram of Proposed System 3.2 Flowchart of Proposed System 3.3 Chassis 3.4 Conveyor Assembly 3.5 Propulsion 3.6 Wireless Control 4 Experimental Results 5 Conclusion References Multipurpose Voice Control-Based Command Instruction System 1 Introduction 2 System Description 2.1 A Subsection Sample 2.2 Receiver Section 2.3 Computational Algorithm 3 Hardware Modules 3.1 Component Specifications 3.2 Component Specifications 4 Experimental Results 5 Conclusion References IoT-Based Cross-Functional Agribot 1 Introduction 2 Literature Review 3 Proposed System 3.1 Hardware Components 3.2 Software Components 4 Methodology 4.1 Locomotion of the Bot 4.2 Ploughing 4.3 Seeding 4.4 Watering 4.5 Levelling 5 Future Enhancement 6 Conclusion References A Novel Interfacing Scheme for Analog Sensors with AMLCD Using Raspberry Pi 1 Introduction 2 Literature Survey 3 Raspberry Pi Communication Protocols 4 Waveshare High-Precision AD/DA Board 5 4D Systems uLCD-43P—AMLCD 6 Interfacing with ADC 7 Conclusion References Author Index