دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Deepak Gupta, Rajat Subhra Goswami, Subhasish Banerjee, M. Tanveer, Ram Bilas Pachori سری: Lecture Notes in Electrical Engineering, 888 ISBN (شابک) : 9811915199, 9789811915192 ناشر: Springer سال نشر: 2022 تعداد صفحات: 814 [815] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 19 Mb
در صورت تبدیل فایل کتاب Pattern Recognition and Data Analysis with Applications به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تشخیص الگو و تجزیه و تحلیل داده ها با برنامه های کاربردی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب آخرین پیشرفتها در زمینههای یادگیری ماشین، بینایی کامپیوتر، تشخیص الگو، نظریه یادگیری محاسباتی، تجزیه و تحلیل دادههای بزرگ، هوش شبکه، پردازش سیگنال و کاربردهای آنها در دنیای واقعی را پوشش میدهد. موضوعات تحت پوشش در یادگیری ماشین شامل استخراج ویژگی، انواع ماشین بردار پشتیبانی (SVM)، ماشین یادگیری شدید (ELM)، شبکه عصبی مصنوعی (ANN) و سایر حوزهها در یادگیری ماشین است. تجزیه و تحلیل ریاضی بینایی کامپیوتری و تشخیص الگو شامل استفاده از تکنیکهای هندسی، درک صحنه و مدلسازی از ویدئو، تشخیص اشیاء سه بعدی، محلیسازی و ردیابی، تجزیه و تحلیل تصویر پزشکی و غیره است. تئوری یادگیری محاسباتی شامل انواع مختلفی از یادگیری مانند افزایشی، آنلاین، تقویتی، چندگانه، چند کاره، نیمه نظارتی و غیره است. علاوه بر این، چالشهای بلادرنگ مربوط به پردازش تجزیه و تحلیل دادههای بزرگ و پردازش جریانی با ادغام هوشمند را پوشش میدهد. خدمات محاسباتی داده و اتصال به یکدیگر. علاوه بر این، پیشرفتهای اخیر هوش شبکه برای تجزیه و تحلیل اطلاعات شبکه و در نتیجه تطبیق الگوریتمها به صورت پویا برای بهبود کارایی را پوشش میدهد. در آخر، شامل پیشرفت در پردازش سیگنال برای پردازش دستههای عادی و غیرعادی سیگنالهای دنیای واقعی، به عنوان مثال سیگنالهای تولید شده از دستگاههای IoT، سیستمهای هوشمند، گفتار، ویدئوها و غیره است، و شامل پردازش سیگنالهای زیستپزشکی است: الکتروکاردیوگرام ( ECG)، الکتروانسفالوگرام (EEG)، مگنتوآنسفالوگرافی (MEG) و الکترومیوگرام (EMG).
This book covers latest advancements in the areas of machine learning, computer vision, pattern recognition, computational learning theory, big data analytics, network intelligence, signal processing and their applications in real world. The topics covered in machine learning involves feature extraction, variants of support vector machine (SVM), extreme learning machine (ELM), artificial neural network (ANN) and other areas in machine learning. The mathematical analysis of computer vision and pattern recognition involves the use of geometric techniques, scene understanding and modelling from video, 3D object recognition, localization and tracking, medical image analysis and so on. Computational learning theory involves different kinds of learning like incremental, online, reinforcement, manifold, multi-task, semi-supervised, etc. Further, it covers the real-time challenges involved while processing big data analytics and stream processing with the integration of smart data computing services and interconnectivity. Additionally, it covers the recent developments to network intelligence for analyzing the network information and thereby adapting the algorithms dynamically to improve the efficiency. In the last, it includes the progress in signal processing to process the normal and abnormal categories of real-world signals, for instance signals generated from IoT devices, smart systems, speech, videos, etc., and involves biomedical signal processing: electrocardiogram (ECG), electroencephalogram (EEG), magnetoencephalography (MEG) and electromyogram (EMG).
Preface Contents About the Editors Revolutions in Infant Fingerprint Recognition—A Survey 1 Introduction 2 Fingerprint Recognition System 3 Fingerprint Sensor Module 3.1 Optical Sensors 3.2 Solid-state Sensors 3.3 Ultrasound Sensors 4 Feature Extraction Module 4.1 Local Ridge Orientation and Frequency 4.2 Segmentation 4.3 Singularity Detection 4.4 Enhancement 4.5 Minutiae Extraction 5 Matching and Decision-Making Module 6 Infant Fingerprint Age-Progression 7 Infant Database Module 8 Discussion and Challenges 8.1 Fingerprint Matching 8.2 Growth Model for Infant Fingerprint 8.3 Database Collection 9 Conclusion References A Review of High Utility Itemset Mining for Transactional Database 1 Introduction 2 Literature Review 2.1 Apriori-Based Algorithm 2.2 Tree-Based Algorithm 2.3 Utility List-Based Algorithm 2.4 Hybrid-Based Algorithm 2.5 Other Variations 2.6 Interestingness Measures 2.7 Overall Observations and Analytical Key Findings 3 Conclusion References A Cross-Sectional Study on Distributed Mutual Exclusion Algorithms for Ad Hoc Networks 1 Introduction 2 Ad Hoc Network 3 Literature Survey 4 Comparative Study 5 Open Challenges and Future Research Directions 5.1 Challenges 5.2 Group Mutual Exclusion and Self-stabilizing Algorithms 5.3 Machine Learning/Blockchain Approach 6 Conclusion Appendix 1 References Estimation of Electromagnetic Pollution Index of Macrocell 1 Introduction First Section 2 Literature Review 3 EMP and EPI in Mobile Communications 3.1 Estimate of EPI for Free Space Model 4 Algorithm 5 Illustration 6 Conclusion Appendix References Prediction of Train Delay System in Indian Railways Using Machine Learning Techniques: Survey 1 Introduction 2 Empirical Study 2.1 Models for Train Delay Prediction System 2.2 Big Data Analytics 2.3 Support Vector Regression 2.4 Train Delay Prediction Based on Machine Learning Techniques 3 Conclusion and Future References Valence of Emotion Recognition Using EEG 1 Introduction 2 Related Literature 3 Methods 4 Model Formation 5 Machine Learning Classifier 6 Model Performance 7 Discussions and Implications 8 Future Work 9 Conclusion References A Deep Learning-Based Approach for an Automated Brain Tumor Segmentation in MR Images 1 Introduction 2 Background and Related Work 2.1 Background 2.2 Related Work 3 Methodology 3.1 Preprocessing 3.2 Convolution Neural Network 3.3 Pooling 3.4 Post-processing 3.5 Rectified Linear Unit 3.6 Loss Function 4 Results and Discussion 5 Conclusion References MZI-Based Electro-optic Reversible XNOR/XOR Derived from Modified Fredkin Gate 1 Introduction 2 Overview of Modified Fredkin Gate 3 XNOR/XOR BPM Layout 4 Simulation Results and Mathematical Modeling 5 Study of Performance Metrics 5.1 Insertion Loss 5.2 Excess Loss 5.3 System-level Analysis 6 Conclusion References Secured Remote Access of Cloud-Based Learning Management System (LMS) Using VPN 1 Introduction 2 Secured Remote Access 2.1 Virtual Private Network (VPN) 2.2 SSL VPN 2.3 Citrix Access Gateway/NetScaler Gateway 2.4 Security Aspect 2.5 Optimal Usability 3 Related Work 4 Proposed Works and Methodology 4.1 Installing the Access Gateway 4.2 Creating a Signed Certificate 4.3 Installing License on the Access Gateway 4.4 Creating Virtual Server 4.5 Creating Local Users and Groups 4.6 Creating Name Server for Access Gateway 4.7 Configuring Name Resolution 4.8 Browser Plugin 4.9 Assembling of Both Access Gateway Appliances in High Availability (HA) Mode 5 Result Analyses 6 Conclusions and Future Scope References Surface EMG Signal Classification for Hand Gesture Recognition 1 Introduction 2 Dataset 3 Methodology 4 Numerical Results 5 Conclusions References Improved Energy Efficiency in Street Lighting: A Coverage-Based Approach 1 Introduction 2 Related Work 3 Preliminaries and System Model 3.1 Network Model 3.2 Target Area Layout 3.3 Coverage Used 4 Problem Statement 5 Proposed Methodology 6 Result and Performance Comparison 7 Conclusion References Cognitive IoT for Future City: Architecture, Security and Challenges 1 Introduction 2 Integrated Technologies 2.1 IoT and AI 2.2 Cognitive AI and Cognitive IoT 3 CIoT Potential Application for Future City 3.1 Intelligent Living 3.2 Intelligent Health Care 3.3 Home Appliances 3.4 Autonomous Vehicles 3.5 Social Surveillance 3.6 Climate Prediction 3.7 Real-Time Monitoring 4 Cognitive IoT Architecture for Future City 4.1 Future City Application Platform 4.2 Data Knowledge Layer 4.3 Cognitive Service Layer 5 Overview of Security Issue and Discussion 6 Future Direction 7 Conclusions References A Heuristic Model for Friend Selection in Social Internet of Things 1 Introduction 1.1 Social Network 1.2 Social Internet of Things 2 Related Work 3 Problem Definition 4 The Proposed Model 4.1 Flow Chart 4.2 Algorithm 4.3 Parameters 5 An Illustrative Example 6 Performance Analysis 6.1 Experiment 1 6.2 Experiment 2 7 Conclusion References 14 A Fuzzy String Matching-Based Reduplication with Morphological Attributes Abstract 1 Introduction 1.1 Types of Reduplication 2 Previous Study on Reduplication 3 Problem in Existing System and Proposed Solution 3.1 Fuzzy-Based String Matching 4 Results and Discussion 4.1 Error Analysis 5 Conclusion References Accelerating LOF Outlier Detection Approach 1 Introduction 2 Related Work 3 Proposed Methodology 4 Experimental Results 4.1 Dataset Description 4.2 Result Analysis References Evaluating Quality of Machine Translation System for Digaru-English with Automatic Metrics 1 Introduction 2 Related Works 3 Automatic Evaluation 3.1 The BLEU Metric 3.2 The NIST Metric 3.3 The METEOR 3.4 TER Metric 4 Human Evaluation 5 Corpus Description 6 Result and Analysis 6.1 BLEU Score With and Without Tuning 6.2 NIST Score With and Without Tuning 6.3 Automatic Evaluation on Digaru-English Corpus 6.4 Human Evaluation for Digaru-English 7 Summary/Conclusion References PREP: Prerequisite Relationship Extraction Using Position-Biased Burst Analysis 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Burst Extraction 3.2 Pattern Identification 3.3 Determining Prerequisite Relationship 4 Evaluation 4.1 Dataset 4.2 Evaluation Metrics 4.3 Experimentation 5 Results and Discussion 5.1 Chapter-Wise Division 5.2 Part-Wise Division 5.3 Sliding Window 5.4 Hypothesis Testing 5.5 Observations 6 Conclusion and Future Work References Enhancing the Security and Performance of Cloud-Based Distance Education System 1 Introduction 1.1 Cloud Computing 1.2 Challenges and Issues in Distance Education Cloud Computing 2 Related Work 2.1 Researches in Area of Cloud Computing in Education System 2.2 Researches in Cryptographic Security 2.3 Researches Data Compression 3 Problem Statement 4 Methodology Used in Proposed Work 4.1 Internal Working of Proposed Work 4.2 Data Compression Using Replacement Mechanism 4.3 XOR-Based Encryption 5 Implementation 5.1 Simulation for Time/Error/Packet Size 5.2 Matlab Simulation for Comparative Analysis of Security 6 Conclusion and Scope of Research 7 Future Work References Hate-Speech Detection in News Articles: In the Context of West Bengal Assembly Election 2021 1 Introduction 2 Related Work 3 Hate Speech in Other Domain 4 Contribution of This Work 5 Data Preparation and Methodology 5.1 Data Preparation 5.2 Methodology 6 Experiment and Result 7 Error Analysis 8 Conclusion References A Structural Equation Modeling Approach for Adoption of Big Data Analytics by SMEs in India 1 Introduction 2 Literature Review 2.1 Big Data Analytics in Small and Medium Enterprises 2.2 TOE Framework and Hypothesis Development 3 Research Methodology 3.1 Sampling 3.2 Demographics of the Respondents 4 Data Analysis 4.1 Reliability and Validity 4.2 Exploratory Factor Analysis (EFA) 4.3 Construct Validity (CV) 4.4 Structural Equation Modeling (SEM) 5 Discussion 6 Conclusion References Optimized Distributed Job Shop Scheduling Using Balanced Job Allocation and Modified Ant Colony Optimization 1 Introduction 1.1 Contribution 2 Literature Survey 3 Methodology 3.1 Problem Statement and Constraints 3.2 Graphical Representation of the DJSP 3.3 Job Assignment Phase 3.4 Ant Colony Algorithm 3.5 Modified Ant Colony Optimisation 4 Results and Analysis 5 Conclusion References Detection of Copy–Move Image Forgery Applying Robust Matching with K-D Tree Sorting 1 Introduction 2 Literature Review 3 Methodology 3.1 Taking Input Image 3.2 Divide Image into Overlapping Block 3.3 DCT Calculation 3.4 K-D Tree Sorting Calculation 3.5 Common Shift Sector Analysis 3.6 Forgery Detection Using Pixels 3.7 Color the Pixels in Duplicated Region 3.8 Exact and Robust Match 4 Experimental Details 5 Discussion 6 Conclusion References Recognize Meaningful Words and Idioms from the Images Based on OCR Tesseract Engine and NLTK 1 Introduction 2 Related Work 3 Methodology 3.1 Word and Line Finding 3.2 Recognized Words 3.3 Classification of Static Character 3.4 Linguistic Analysis 3.5 Adaptive Classifier 4 Experimental Details 5 Result 5.1 Performance Analysis of Tesseract OCR 6 Conclusions References Identification of Four Major Dialects of Assamese Language Using GMM with UBM 1 Introduction 2 Literature Survey 3 Speech Database 4 Experiment Setup 5 Results and Discussion 6 Conclusion References Digitization Through SNS: Issues, Challenges, and Recommendations—A Case Study 1 Introduction 2 Literature Review 3 Proposed Model 4 Issues and Challenges in Existing Techniques 4.1 Issues with SNS 4.2 Challenges with SNS 5 Recommendations 6 Conclusion References FPGA Implementation of Optimized Code Converters with Reversible Logic Gates 1 Introduction 2 Overview 2.1 Reversible Logic Gates 3 Proposed Design of Reversible Code Converters 3.1 Gray–Binary (GTB) and Binary–Gray (BTG) Reversible Code Converter 3.2 Ex-3-BCD Code (E3TB) and BCD-Ex-3 (BTE3) Reversible Code Converter 4 Results and Discussion 5 Conclusion References A Security Provocation in Cloud-Based Computing 1 Introduction 2 Literature Review 3 Cloud Organization 3.1 Cloud End User 3.2 Cloud Service Contributor 3.3 Cloud Checker 3.4 Cloud Assent 3.5 Cloud Dealer 3.6 Cloud Carrier 4 Cloud Security Service 4.1 Data Confidentiality 4.2 Data Integrity 4.3 Availability 4.4 Data Authentication 4.5 Non-repudiation 5 Security Attacks and Threads in Cloud Computing 5.1 Threat Model 5.2 Spoofing Attack 5.3 Tampering Attack 5.4 Repudiation Attack 5.5 Backdoors Attack 5.6 Direct-Access Attack 5.7 Pretexting Attack 5.8 Watering Hole Attack 6 Current Movement in Cloud Computing 6.1 Virtual Web Allocation 6.2 Forensic Recovery of Cloud Evidence 6.3 Cloud Databases Under Multiple Keys 6.4 Cloud Systems Data Mobility 6.5 Cryptographic for Secure Information Transmission 7 Conclusion References Ocean Current Rigid Localization for Seabed WSN 1 Introduction 2 Literature Review 3 Proposed Model: Ocean Current Rigid Localization (OCR) 3.1 Backtracking of Anchor-Nodes 3.2 Localization of Unknown-Nodes 4 Complexity Comparison of OCR 5 Simulation Result and Analysis 5.1 Trial 1: To Observe the Impact of Communication Range 5.2 Trial 2: To Observe the Impact of Total Number of Sensor-Nodes 5.3 Trial 3: To Observe the Impact of Density of Anchor-Nodes 5.4 Trial 4: To Observe the Impact of Communication Noise 6 Conclusion References Detection of Motor Activity in Visual Cognitive Task Using Autoregressive Modelling and Deep Recurrent Network 1 Introduction 2 Material and Methods 3 Methodology 3.1 Autoregressive Modelling 3.2 Classification 4 Results and Discussions 5 Conclusion References An Approach for Secure Data Sharing in Cloud and Fog-Based IoT Network 1 Introduction 2 Related Work 3 Comparison Factors 4 Proposed Approach 4.1 System Architecture 4.2 Step-by-Step Procedure 5 Security Analysis 6 Conclusion and Future Work References Privacy Protection of Edge Computing Using Homomorphic Encryption 1 Introduction 2 Related Works 3 Proposed Model 4 Edge Computing 4.1 Defining Edge Computing 4.2 Functions of Edge Computing 4.3 Edge Computing Three Tier Model and Architecture 4.4 Edge Computing Security and Privacy 5 Homomorphic Encryption 5.1 HE Definition 5.2 HE Properties 5.3 Homomorphic Encryption in Edge Computing 6 Test and Analysis 7 Conclusion References Cybercrime Detection Using Live Sentiment Analysis 1 Introduction 2 Literature Review 3 Limitation of Existing System 4 Methodology 4.1 Proposed Work 4.2 Classifier Implementation 4.3 LSTM Networks 5 Data Description and Data Cleaning 6 Experimental Design 6.1 Result and Analysis 6.2 Precision and Recall 7 Conclusion and Future Work References Analysis of Power Quality for TOSA-PID Controller-Based Hybrid Power Generation System 1 Introduction 2 Related Work 3 Power Quality Analysis of Hybrid Renewable Energy System 3.1 PV Array Modelling 3.2 WECS Modelling 3.3 Diesel Generator Modelling 3.4 Battery Modelling 3.5 Converter 3.6 Controller 4 Result and Discussion 4.1 Performance Analysis 5 Conclusion References Investigation of Sensing Ability of Double-Slot Hybrid Plasmonic Waveguide for Liquid Analyte 1 Introduction 2 Device Structure and Theoretical Formulation 3 Results and Discussion 4 Conclusion References Prediction of the Final Rank of the Players in PUBG with the Optimal Number of Features 1 Introduction 2 Data Cleaning 3 Features Engineering and Selection 4 Result and Discussion 5 Conclusion References Cryptanalysis of a Security Scheme for Smart Traffic Lighting System Based on Fog Computing 1 Introduction 2 Literature Review 3 Review of Khalid et al. Authentication Scheme 3.1 Installation 3.2 Registration 3.3 Communication 4 Cryptanalysis of Khalid et al. Authentication Scheme 4.1 Side-Channel Attack 4.2 Code Injection Attacks 5 Conclusion References Gaining Actionable Insights in COVID-19 Dataset Using Word Embeddings 1 Introduction 2 Related Work 3 Data Specifications 4 Methodology 4.1 Word2Vec Architecture 4.2 GloVe Architecture 5 Results 6 Conclusion and Future Work References Phrase-Based English–Nyishi Machine Translation 1 Introduction 2 Related Works 2.1 SMT for Low-Resource Language 2.2 Moses in PBSMT 3 System Descriptions 3.1 Corpus Preparations 3.2 Language Model 3.3 Translation Model 3.4 Decoding 3.5 PBSMT Experimental Design for English–Nyishi 4 Results and Analysis 4.1 About BLEU and NIST Score 4.2 Human Evaluation 5 Analysis of Translation 6 Conclusion and Future Work References Capacitated Vehicle Routing Problem Using Genetic Algorithm and Particle Swarm Optimization 1 Introduction 2 Related Work 3 Problem Formulation 4 Proposed Algorithms 4.1 Genetic Algorithm 4.2 VRP Using GA 4.3 Particle Swarm Optimization 4.4 VRP Using PSO 5 Experimental Study 5.1 Simulation Study 6 Conclusion References A Secure Health Management Framework with Anti-fraud Healthcare Insurance Using Blockchain 1 Introduction 2 Related Works 3 Preliminaries 4 Proposed Model 4.1 System Model 4.2 Workflow of the Model 5 Key Analysis and Distribution 6 Performance Analysis 6.1 Different Attacks 6.2 Computational Performance 7 Conclusion References An Energy-Aware Fog-Enabled Optimized VM Consolidation Scheme for Real-Time Applications 1 Introduction 2 Related Works 3 Optimized VM Consolidation Model 3.1 Fog Layer Architectural Design 3.2 Power Model 3.3 GA-Based VM Consolidation 4 Simulation Setup and Result Discussion 4.1 Simulation Details 4.2 Result Discussion 5 Conclusion References Spatio-temporal Analysis of Flood Hazard Zonation in Assam 1 Introduction 2 Study Area and Data Used 3 Methodology 3.1 Flood Hazard Zonation Schema 3.2 Flood Hazard Index 3.3 Computation of Intra-Year Flood Frequency 3.4 Generation of Flood Hazard Zonation 4 Results and Discussion 5 Conclusions References A Pilot Study on Human Pose Estimation for Sports Analysis 1 Introduction 2 Recent Work 3 Methodology 3.1 Dataset 3.2 MobileNet Model 3.3 Human Pose Estimation 3.4 Calculations 4 Results 4.1 Video Input 4.2 Calculation of Data from the Frames 4.3 Graphical Representation 4.4 Analysis 5 Conclusion 6 Limitations 7 Future Work References Optimal Sizing of a Hybrid System for Litan, Manipur 1 Introduction 2 Methodology and Numerical Formulation 2.1 Mathematical Modeling of the Required Components 2.2 Strategy of Energy Management 2.3 Optimal Sizing Methodology 2.4 Required Constraints 2.5 Total Cost 2.6 Objective Function 3 Site Selection and Load Estimation 4 Resources and Elements 4.1 The Resources and Elements that Are Viewed for the Optimization Procedure Are Listed in the Table Below 4.2 Solar Energy and Wind Energy Resources 5 Results and Discussion 6 Conclusion References An Intrusion Detection Approach Based on Decision Tree-Principal Component Analysis Over CICIDS2017 1 Introduction 2 Literature Review 3 Proposed Framework 3.1 CICIDS 2017 Datasets 3.2 Data-Initialization and Pre-processing 3.3 Principle Component Analysis 3.4 Decision Tree Algorithms 3.5 Prediction and Evaluation 4 Experiment and Results 5 Conclusion References Detection of Epilepsy Using Graph Signal Processing of EEG Signals with Three Features 1 Introduction 2 Review of Related Work 3 Methodology 4 Results and Discussion 4.1 Database 4.2 Performance Assessment 5 Conclusion and Future Work References Hybrid Approach for Fake Profile Identification on Social Media 1 Introduction 2 Related Work 3 Dataset 4 Proposed Method 5 Implementation 5.1 Principal Component Analysis 5.2 Classification Model 6 Results and Discussion 6.1 Evaluation Criteria 6.2 Results 7 Conclusion and Future Work References Electroencephalogram-Based Emotion Recognition Using Random Forest 1 Introduction 2 Dataset Preparation 3 Methodology 3.1 Preprocessing 3.2 Feature Extraction 3.3 Random Forest 3.4 Grid Search Random Forest Algorithm (GSRF) 4 Results 4.1 Confusion Matrix 4.2 Region of Convergence (ROC) 5 Comparative Analysis 6 Conclusion References Controlled Active Rectifier Circuit-Based Extreme Fast Charging System for Electric Vehicles 1 Introduction 2 Model of XFC System 2.1 Controlled Active Rectifier Circuit 2.2 Solid State Transformer (SST) 2.3 Partial Power Charging Unit (PPCU) 2.4 Battery Current Controller 3 Simulation Results 4 Conclusion References Ambient Fine Particulate Matter and COVID-19 in India 1 First Section 2 Materials and Methods 3 Materials and Methods 4 Discussion 4.1 Limitations 5 Conclusion References Artificial Neural Network Based Synthesis of 12-Lead ECG Signal from Three Predictor Leads 1 Introduction 2 Method 2.1 Preprocessing 2.2 DWT of ECG Signal 2.3 Artificial Neural Network Architecture Design 3 Results and Discussion 4 Conclusion References Understanding Quantum Computing Through Drunken Walks 1 Introduction 2 Quantum Walks Using Coins 3 A Quantum Drunk 4 Get Started Programming with Quantum Computers 5 Result Analysis 6 Conclusion References Survey on Recent Malware Detection Techniques for IoT 1 Introduction 2 Related Works 3 IoT Mobile Malware 4 Malware Detection Methods for IoT 4.1 Using Machine Learning Classifier 4.2 Using Blockchain Technology 4.3 Using Convolutional Neural Network 5 Conclusion References Enhancing Accuracy of Symptom-Based Disease Prediction Using Ensemble Techniques and Feature Selection 1 Introduction 2 Literature Review 3 Proposed Methodology 4 Materials and Methods 4.1 Dataset Description 4.2 Classification Algorithms 4.3 Ensemble Techniques 5 Experimentation and Results 5.1 Ensemble Techniques 5.2 Feature Selection 6 Conclusion References Pruning for Compression of Visual Pattern Recognition Networks: A Survey from Deep Neural Networks Perspective 1 Introduction 2 Background 3 Pruning Techniques 3.1 Categories of Pruning 4 Comparison of Pruning Techniques 5 Discussion and Conclusion References Performance Comparison of Classification Models for Identification of Breast Lesions in Ultrasound Images 1 Introduction 2 Proposed Methodology 2.1 Data Collection 2.2 Selection of Regions of Interest (ROIs) 2.3 Feature Extraction 3 Results 4 Conclusion References Analysis of Randomization-Based Approaches for Autism Spectrum Disorder 1 Introduction 2 Randomization-Based Approaches 2.1 Extreme Learning Machine (ELM) 2.2 Random Vector Functional Link Network (RVFL) 3 Autism Spectrum Disorder Datasets Description 4 Numerical Results 5 Conclusion and Future Work References A Twin Kernel Ridge Regression Classifier for Binary Classification 1 Introduction 1.1 A Subsection Sample 2 Related Works 2.1 The SVM Model 2.2 The TWSVM Model 2.3 The KRR Model 3 The Proposed TKRR Model 4 Numerical Experiments 4.1 Simulation on an Artificial Dataset 4.2 Simulation on a Few Real-World Datasets 4.3 Statistical Analysis 5 Conclusion and Future Direction References Performance Evaluation of CMOS Voltage-Controlled Oscillator for High-Frequency Communication System 1 Introduction 2 Overview of Voltage-Controlled Oscillator 2.1 Ring Oscillator 2.2 Current Starved Oscillator 2.3 VCO Using Operational Amplifier 3 Schematic Design and Implementation 3.1 Schematic Design of Ring Oscillator 3.2 Schematic Design of Current Starved Oscillator 3.3 Schematic Design of Op-amp Based VCO 4 Simulation Results and Analysis 4.1 Schematic Simulations of Five-Stage Ring Oscillator 4.2 Schematic Simulation of Current Starved Oscillator 4.3 Schematic Simulation of Op-amp VCO 5 Conclusion References Kernelized Random Vector Functional-Link Network 1 Introduction 2 RVFL Networks 3 Kernelized Random Vector Functional-Link Network (RVFLker) 4 Experimental Study 5 Conclusion References Data Analytics Research in Nonprofit Organisations: A Bibliometric Analysis 1 Introduction 2 Materials and Methods 2.1 Data Collection and Pre-Processing 2.2 Co-term Analysis 2.3 Scientific Evolutionary Pathways 3 Results 3.1 Co-term Analysis 3.2 Evolutionary Relationship Identification 4 Limitations of This Study 5 Conclusions Appendix 1 References Analyzing Donors Behaviors in Nonprofit Organizations: A Design Science Research Framework 1 Introduction 2 Literature Review 2.1 Decision Support System 2.2 Donors Behaviors 2.3 DSS in NPOs 3 Design Science Research 3.1 Research Framework 4 Data Collection and Analysis 5 Research Contribution and Expected Results 6 Conclusion References Intelligent Health Care System Using Modified Feature Selection Algorithm 1 Introduction 2 Related Works 3 Proposed System 4 Experimental Results 4.1 Comparison of Features Chosen 4.2 Comparison of Dimensionality Reduction Ratio 4.3 Comparison of Accuracy 4.4 Comparison of Root Mean Square Error 5 Conclusion References Design of High Step-up Interleaved Boost Converter-fed Fuel Cell-Based Electric Vehicle System with Neural Network Controller 1 Introduction 2 Design and Analysis of PEM Fuel Cell 3 Design of Perceptron Neural Network MPPT Controller 4 Design of an Interleaved High Step-up Boost Converter 5 Simulation Results 5.1 Static Temperature Condition of Fuel Cell Stack (335 K) 5.2 Dynamic Temperature Condition of Fuel Cell Stack (335 K, 315 K, and 355 K) 6 Conclusion References Design of Adaptive VSS-P&O-Based PSO Controller for PV-Based Electric Vehicle Application with Step-up Boost Converter 1 Introduction 2 Modeling of Three-diode-based SPV Cell 3 Design of an Adaptive VSS-P&O-based PSO Controller 4 Design of High Step-up Boost Converter 5 Analysis of Simulation Results 5.1 First Shading Condition of Solar PV (1000 W/m2, 900 W/m2, 700 W/m2) 5.2 Second Shading Condition of Solar PV (1000 W/m2, 800 W/m2, 700 W/m2) 6 Conclusion References Spatiotemporal Data Compression on IoT Devices in Smart Irrigation System 1 Introduction 2 CORDIC-Based Compression in Smart Irrigation System 2.1 Energy-Efficient CORDIC for Data Compression 2.2 Data Compression Algorithm in IoT Device for Smart Irrigation 3 Experimental Analysis 4 Conclusion and Future Scope References Author Index