ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems: ICCCES 2022

دانلود کتاب مجموعه مقالات چهارمین کنفرانس بین المللی ارتباطات، محاسبات و سیستم های الکترونیک: ICCCES 2022

Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems: ICCCES 2022

مشخصات کتاب

Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems: ICCCES 2022

ویرایش:  
نویسندگان: , ,   
سری: Lecture Notes in Electrical Engineering, 977 
ISBN (شابک) : 9811977526, 9789811977527 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 1047
[1048] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 37 Mb 

قیمت کتاب (تومان) : 30,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems: ICCCES 2022 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مجموعه مقالات چهارمین کنفرانس بین المللی ارتباطات، محاسبات و سیستم های الکترونیک: ICCCES 2022 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مجموعه مقالات چهارمین کنفرانس بین المللی ارتباطات، محاسبات و سیستم های الکترونیک: ICCCES 2022

این کتاب شامل مقالات تحقیقاتی با کیفیت بالا است که در چهارمین کنفرانس بین‌المللی سیستم‌های ارتباطات، محاسبات و الکترونیک (ICCCES 2022)، که در مؤسسه فناوری PPG، کویمباتور، هند، در 15 تا 16 سپتامبر 2022 برگزار شد، ارائه شده است. در مورد روندهای تحقیقاتی در رایانش ابری، محاسبات تلفن همراه، هوش مصنوعی و سیستم های الکترونیک پیشرفته. موضوعات تحت پوشش عبارتند از: اتوماسیون، VLSI، سیستم های جاسازی شده، ارتباطات نوری، ارتباطات RF، مهندسی مایکروویو، هوش مصنوعی، یادگیری عمیق، تشخیص الگو، شبکه های ارتباطی، اینترنت اشیا، سیستم های فیزیکی-سایبری و انفورماتیک مراقبت های بهداشتی.


توضیحاتی درمورد کتاب به خارجی

This book includes high-quality research papers presented at the Fourth International Conference on Communication, Computing and Electronics Systems (ICCCES 2022), held at the PPG Institute of Technology, Coimbatore, India, on September 15–16, 2022. The book focuses mainly on the research trends in cloud computing, mobile computing, artificial intelligence and advanced electronics systems. The topics covered are automation, VLSI, embedded systems, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, communication networks, Internet of things, cyber-physical systems and healthcare informatics.



فهرست مطالب

Preface
Contents
About the Editors
Study of Different Control Strategies Applied to a Second-Order Nonlinear Tank Process
	1 Introduction
	2 Process Description
	3 Mathematical Modelıng
		3.1 Determination of Valve Discharge Coefficients
	4 Desıgn of Gain-Scheduled PI Controller
	5 Desıgn of Fuzzy Gaın-Scheduled PI Controller
	6 Simulation Results
	7 Conclusions
	References
A Review of Direction of Arrival Estimation Techniques in Massive MIMO 5G Wireless Communication Systems
	1 Introduction
		1.1 Applications and Challenges
		1.2 Review Methodology
		1.3 Organization
	2 DOA Signal Model
	3 Conventional DOA Estimation
		3.1 Delay and Sum Method
		3.2 Minimum Variance Distortion Less Response (MVDR) Method
		3.3 Multiple Signal Classifier (MUSIC)
		3.4 Estimation of Signal Parameters via Rotational Invariance (ESPRIT)
		3.5 FT-DOA
		3.6 Performance Analysis
	4 Compressive Sensing for DOA Estimation
		4.1 Convex Optimization Approach (l1—Norm Minimization)
		4.2 Greedy Algorithm
		4.3 Iterative Algorithm
		4.4 Statistical Sparse Recovery
		4.5 Performance Analysis
	5 Deep Learning
		5.1 Deep Neural Network (DNN)
		5.2 Performance Analysis
	6 Open Issues and Future Directions
	7 Conclusion
	References
Generation of Counters and Compressors Using Sorting Network
	1 Introduction
	2 Literature Survey
	3 Proposed Work
	4 Results
	5 Discussion
	6 Conclusion and Future Scope
	References
Gujarati Language Automatic Speech Recognition Using Integrated Feature Extraction and Hybrid Acoustic Model
	1 Introduction
	2 Preliminaries
		2.1 Mel-Frequency Cepstral Coefficients (MFCC)
		2.2 Constant Q Cepstral Coefficients (CQCC)
		2.3 Crowdsourced High-Quality Gujarati Multi-Speaker Speech Dataset
	3 Proposed Automatic Speech Recognition (ASR) System
		3.1 Combined MFCC + CQCC-Based Feature Extraction Technique
		3.2 Two-Dimensional Convolutional Neural Network (Conv2D) + Bi-Directional Gated Recurrent Units-Based (BiGRU) Backend Model
	4 Experimental Setup
	5 Performance Analysis
		5.1 Results
		5.2 Comparative Analysis with Existing Approaches
	6 Conclusion
	References
Graphene and Fullerene in Energy Storage Devices: A Comprehensive Review
	1 Introduction
	2 Role of Graphene in Energy Storage
		2.1 Graphene in Enhancing Performance of Energy Storage Devices
	3 Role of Fullerene in Energy Storage
		3.1 Fullerene in Enhancing Performance of Energy Storage Devices
	4 Conclusion
	References
A Robust Ensemble Learning Model for Fine-Grained Detection of Cyber Harassment
	1 Introduction
	2 Background and Related Work
		2.1 Text Representation Word Embedding Models
		2.2 Machine Learning Methodologies in Cyber Harassment Detection
		2.3 Ensemble Model for Cyber Harassment Detection
	3 Proposed Work
		3.1 Exploration About the Dataset
		3.2 Architecture Diagram
		3.3 Modules of the Proposed Framework
	4 Survey Results
	5 Conclusion
	References s
IoT-Based E-Parking System for Multiplexes and Shopping Malls
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Results and Discussion
	5 Conclusion and Future Scope
	References
Enhancing S-Box Nonlinearity in AES for Improved Security Using Key-Dependent Dynamic S-Box
	1 Introduction
	2 Background of Static S-Box in AES
	3 AES Using Dynamic S-Box
		3.1 Strict Avalanche Criterion (SAC)
		3.2 Hamming Distance (Bit Difference)
		3.3 Balanced Output
	4 Proposed Algorithm
		4.1 Dynamic S-Box in AES
		4.2 Steps to Generate Dynamic S-Box
	5 Experimental Results
		5.1 Hamming Distance and SAC in Ciphertext
		5.2 Balanced Output of Ciphertext
	6 Conclusion
	References
Estimated Computing for Effective Configurable Adder
	1 Introduction
	2 Proposed
	3 Results
	4 Discussion
	5 Literature Review
	6 Conclusion
	7 Future Directions
	References
E-Waste Is Becoming a Predominant Pollutant in Future India—An IoT Based Proposal to Monitor and Report the Air Quality Index
	1 Introduction
		1.1 Background
		1.2 Analysing Pollutants Using IoT
		1.3 Contributions of This Study
		1.4 Organization of the Work
	2 Literature Survey
		2.1 Existing Methods for Monitoring Air Pollution
		2.2 Monitoring Air Pollution Using IoT
	3 Industrial Scenarios for Reducing Air Pollution
	4 Case Study of Air Pollution in Vellore
		4.1 Necessity of Choosing Vellore
		4.2 Proposed and Significance of the Work
		4.3 Limitations
	5 Conclusion and Future Work
	References
Continuous Passenger Monitoring and Accident Detection (CPMAD) System
	1 Introduction
	2 Design and Working
		2.1 ADXL335
		2.2 MQ2
		2.3 SW420
		2.4 MAX30100
		2.5 SIM28M
		2.6 MCP3208
		2.7 LCD Display
		2.8 I2C LCD Display
	3 Results and Discussion
		3.1 PHP Server and Webpage Interface
	4 Conclusion
	References
Design and Implementation of a Safety Device—Protecta Watch
	1 Introduction
	2 Literature Review
	3 System Design
	4 Result
		4.1 Initialization
		4.2 GPS Screen
		4.3 Call Screen
		4.4 Message Screen
		4.5 Battery Screen
		4.6 Emergency Situation
		4.7 Wi-Fi Unavailability
		4.8 BLYNK App
	5 Conclusion
	6 Future Scope
	References
A Survey on Energy Management Evolution and Techniques for Green IoT Environment
	1 Introduction
	2 Green Internet of Things
	3 Literature Survey
	4 Inference from Existing Work
	5 Conclusion
	References
Ayurvedic Medicinal Plant Identification System Using Embedded Image Processing Techniques
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 Dataset
		3.2 Image Pre-processing
		3.3 Image Segmentation
		3.4 Deep Learning Model (CNN)
		3.5 Machine Learning Model
	4 Results
		4.1 Deep Learning (CNN) Results
		4.2 Machine Learning Model Results
		4.3 Segmentation Results
		4.4 Hardware Output
	5 Conclusion and Future Work
	References
FIR and IIR Filter Design Using Modified Dadda Multiplier
	1 Introduction
	2 Literature Survey
	3 Methodology
	4 Results
	5 Conclusion
	References
High Speed and Power Efficient Multiplier and Adder Designs for Linear Convolution
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Matrix Method of Linear Convolution
		3.2 Proposed Reversible Vedic Multiplier
		3.3 Proposed Reversible Kogge–Stone Adder
		3.4 Proposed Fast Convolution Architecture
	4 Results
	5 Conclusion
	References
A Decision-Making System for Dynamic Scheduling and Routing of Mixed Fleets with Simultaneous Synchronization in Home Health Care
	1 Introduction
		1.1 Main Contribution of Research
	2 Model Description
		2.1 Problem Formulation
		2.2 Assumptions
	3 Mathematical Formulation
		3.1 Parameters and Notations
		3.2 Decision Variables
	4 Proposed Methodology of the Revised Version of Discrete Firefly Algorithm
		4.1 Pseudocode of RVDFA
	5 Discussion and Computational Outcomes
		5.1 Mixed-Fleet Synchronization Simultaneously
	6 Conclusion
	References
Accuracy Comparison of Neural Models for Spelling Correction in Handwriting OCR Data
	1 Introduction
	2 Related Work
	3 Data Description
	4 System Description
		4.1 BERT
		4.2 SC-LSTM
		4.3 CHAR-CNN-LSTM
		4.4 CHAR-LSTM-LSTM
	5 Results and Discussion
		5.1 Character Error Rate (CER)
	6 Conclusion
	References
An Insight into EDGE-Based Solutions for Augmented Reality
	1 Introduction
		1.1 Overview of Augmented Reality
	2 A Brief History of AR
	3 Components of AR
	4 Applications of Augmented Reality
		4.1 General Application
		4.2 Domestic Application
	5 Limitations of AR
		5.1 State-of-the-Art Solutions
	6 AR and EDGE
	7 Future Prospects
	References
Smart Door Unlocking System
	1 Introduction
	2 Literature Review
		2.1 Using Artificial Neural Networks Approach for Face Detection System
		2.2 About the Study on Automatic Speech Recognition
		2.3 Automatic Speech Recognition
		2.4 Design of a Real-Time Face Detection and Evaluation of a Real-Time Face Recognition System Using CNN also Called as Convolutional Neural Networks
		2.5 Deep Learning for Face Recognition: A Critical Analysis
		2.6 Speech Recognition by Machine
	3 Proposed Work
		3.1 Design Methodology
		3.2 Description of Algorithm
	4 Description of Datasets and Tools Used
		4.1 Datasets
		4.2 Requirements
	5 Results and Observations
		5.1 Stepwise Description of Results
		5.2 Social Benefits
	6 Conclusion and Future Work
	References
An Insight into AI and ICT Towards Sustainable Manufacturing
	1 Introduction
	2 Literature Review
		2.1 Artificial Intelligence
		2.2 Information Communication Technology (ICT)
		2.3 Sustainable Manufacturing
		2.4 Industry 4.0
		2.5 Sustainable Manufacturing (AM) and Industry 4.0
	3 Conclusion
	References
FPGA Implementation of Efficient 32-Bit 3-Operand Addition Using Kogge–Stone (KS) Parallel Prefix Adder
	1 Introduction
	2 The 3-Operand Binary Adder Techniques
	3 The Proposed 3-Operand Adder Architecture
	4 The Effectiveness of the MDCLCG Architecture When Combined with the Proposed Adder Architecture Performance
	5 Results and Implementations
	6 Conclusion
	References
Automatic Mulching Machine
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Software Modelling
		3.2 Hardware Modelling
		3.3 Software Interface
	4 Conclusion
		4.1 Limitations and Future Scope
	References
Multi-user Hybrid Beamforming for mmWave Systems Using Learning-Aided Link Adaptation
	1 Introduction
	2 Related Works
	3 Proposed Work
		3.1 HBF
		3.2 Improved Energy-Efficient HBF
		3.3 Conventional Adaptation
		3.4 Learning-Assisted Adaptation
	4 Results
	5 Conclusion
	References
Prediction of Disease Using Retinal Image in Deep Learning
	1 Introduction
	2 Literature Review
	3 Proposed Model
		3.1 Dataset
		3.2 Preprocessing
	4 Result and Discussion
	5 Conclusion and Future Enhancement
	References
Plant Health Analyzer Using Convolutional Neural Networks
	1 Introduction
	2 Literature Review
	3 Proposed System
		3.1 Dataset
		3.2 Block Diagram of the System
	4 Implementation and Results
		4.1 Preprocessing
		4.2 Convolutional Neural Networks (CNN)
		4.3 Area Calculation of Diseased Leaves
	5 Conclusion
	References
Behaviors of Modern Game Non-playable Characters
	1 Introduction
	2 Objectives of Games
	3 Massive Multiplayer Online Game [MMOG]
	4 Fairness and Strategies in Game
	5 NPC Behavior in Games
	6 Case Study of Some Behaviors in NPC’s of Grand Theft Auto
	7 Behavior-Based Learning for NPC
	8 Conclusion
	References
Low-Noise Amplifier with Co-designed Microstrip Antenna for 60 GHz Wireless Communications
	1 Introduction
	2 Antenna Design and Challenges
	3 LNA Design and Challenges
	4 Results and Discussion
		4.1 Antenna Results
		4.2 LNA Results
		4.3 Co-design of Antenna with LNA
	5 Conclusion
	References
Impact of High Dimensionality Reduction in Financial Datasets of SMEs with Feature Pre-processing in Data Mining
	1 Introduction
	2 Related Works on High Dimensionality Reduction
		2.1 High Data Dimensionality Reduction Methods
	3 Review on Assessing Financial Datasets in Small Major Enterprises
	4 Materials and Methods in Data Mining
		4.1 Algorithms in the Financial Predictions for SMEs
	5 Frameworks in Existence to Perform HDR in Financial Datasets
	6 Research Gaps in the Methods
	7 Conclusion
	References
Deep Learning-Based Triphase Community Detection for Multimedia Data
	1 Introduction
	2 Literature Survey
	3 Proposed Methodology
		3.1 Graph Detection Phase
		3.2 Similarity Weightage Analysis
		3.3 Community Detection Using Convolution Neural Network
	4 Experimental Analysis
	5 Conclusion
	References
Design of a High-Speed and Low-Power AES Architecture
	1 Introduction
	2 AES Algorithm
	3 Proposed Architecture
	4 Implementation Results and Analysis
	5 Conclusion
	References
Improving Sleep Apnea Screening with Variational Mode Decomposition and Deep Learning Techniques
	1 Introduction
	2 System Description
		2.1 Database
		2.2 Variational Mode Decomposition (VMD)
		2.3 Feature Extraction
		2.4 Support Vector Machine (SVM)
		2.5 Convolutional Neural Networks (CNNs)
	3 Results and Discussion
		3.1 Baseline System
		3.2 CNN and BNF Models
	4 Conclusion
	References
Effect of Selectively-Filled-Ethanol on Dispersion Characteristics of Circular Shaped Hollow Core Photonic Crystal Fiber
	1 Introduction
	2 PCF Design
	3 Results and Discussion
	4 Conclusion
	References
A Demand Management Planning System for a Meat Factory Based on the Predicted Market Price Under Indian Market Scenario
	1 Introduction
	2 Deregulated Electricity Industry
	3 Methodology
		3.1 Pre-processing
		3.2 Resampling
		3.3 Decomposition
		3.4 Autoregressive Integrated Moving Average Model
		3.5 Mean Absolute Percentage Error
		3.6 Demand Management System Under Deregulated Environment
	4 Results and Discussion
	5 Conclusion
	References
Performance Comparison of MCML, PFSCL, and Dynamic CML Gates with Parametric Analysis in 45 nm CMOS Technology
	1 Introduction
	2 Different CML Topologies
		2.1 MOS Current Mode Logic (MCML) Gates
		2.2 Dynamic Current Mode Logic (DyCML) Gates
		2.3 Positive Feedback Source Coupled Logic (PFSCL) Gates
	3 Simulation Results of MCML, Dynamic CML, and PFSCL Gates
		3.1 Output Waveform of MCML, PFSCL, and Dynamic CML
		3.2 Monte Carlo Analysis
		3.3 Parametric Analysis
		3.4 Overall Performance Comparison of MCML, DyCML, and PFSCL
	4 Conclusion
	References
VANET Authentication with Privacy-Preserving Schemes—A Survey
	1 Introduction
	2 Requirements of Security and Privacy
		2.1 Security Requirements
		2.2 Privacy Requirements
		2.3 Attack Model
		2.4 Challenges
	3 Related Works
	4 Review of the Existing Schemes Based on Lightweight Privacy Preserving Schemes
	5 Conclusion
	References
An Effective Protection Approach for Deceive Attacker in AES Attack
	1 Introduction
	2 AES-128 Encryption and Decryption
	3 Trojan Attack on the 128-Bit AES Encryption
	4 Proposed Protection Model
	5 Results and Discussions
	6 Conclusion
	References
Effective EMI Reductıon in Medical Devices and Automotive Power Converters
	1 Introduction
	2 Literature Survey
	3 Methods to Mitigate EMI
	4 Existing and Proposed System
	5 Results and Discussions
	6 Conclusion
	References
Conformal Antenna with Bow and Arrow Shaped Radiator for Wireless Capsule Endoscopy
	1 Introduction
	2 Antenna Design
		2.1 Case-1
		2.2 Case-2
	3 Results
		3.1 Case-1
		3.2 Case-2
		3.3 Changing Battery Length
	4 Conclusion
	References
Dense Video Captioning Using Video-Audio Features and Topic Modeling Based on Caption
	1 Introduction
	2 Literature Review
	3 Dense Video Captioning and Topic Modelling (DVCTM)
		3.1 Temporal Event Proposals
		3.2 Feature Extraction for Caption Generation
		3.3 Caption Generation
		3.4 Topic Modeling
		3.5 DVCTM Algorithm
	4 Results
	5 Conclusion
	References
Impact of Autonomous Vehicles Accidents on the Public Attitude Towards This Emerging Technology
	1 Introduction
	2 Literature Review
	3 Research Gap and Study Objectives
	4 Methodology
	5 Results
		5.1 Impact of AVs’ Accidents on the Public Attitude Towards AVs
		5.2 Perception of AVs for Different Age Groups Before and After AVs Accidents
		5.3 Impact of AVs’ Accidents on the Public Attitude of Males and Females
		5.4 Impact of AVs’ Accidents on Respondents with Different Household Incomes
		5.5 Impact of AVs’ Accidents on Respondents with Different Educational Levels
	6 Conclusion
	7 Limitations and Recommendations for Future Studies
	References
Increasing Efficiency in the Correlation Processing of Information Signals for Radar
	1 Introduction
	2 Improved Mathematical Model of Probing Signals Taking into Account Amplitude and Angular Fluctuations
		2.1 Correlation Functions of Radio Signals
		2.2 Formulation General Principles Simulation Radar Echo-Signal Active Radiolocation
	3 Radar Echo Model with Multiple Possible Probing Factors
		3.1 Mathematical Modeling of Radar Signals
		3.2 Radar Resolution Enhancement Method Based on Autocorrelation Estimation Algorithm
	4 Conclusions
	References
Sketching How Synthetic Cells Can Function as a Platform to Investigate Chemical AI and Information Theories in the Wetware Domain
	1 Synthetic Cell Research: A Brief Introduction
		1.1 Synthetic Biology
		1.2 What Are Bottom-Up Synthetic Cells?
	2 Synthetic Cells as ``Smart'' Drug Delivery Agents
		2.1 Chemical Communications Between Biological Cells and Synthetic Cells
	3 Where Do These Recent Research Directions Bring the Field?
	4 Synthetic Cells as a Platform to Investigate Chemical AI and Information Theories in the Wetware Domain.
		4.1 AI in the Chemical Domain
		4.2 Cognition and Its Roots in Organization
		4.3 Biological Cell-Synthetic Cell Interaction
		4.4 Evolutionary Optimization Relies on the Embodiment of ``Meaning'' in Forms of Organization
	5 Conclusions and Outlooks
	References
Investigation of Effectiveness of Deep Learning on OFDM and NOMA Systems
	1 Introduction
	2 System Model
		2.1 OFDM Structure
		2.2 NOMA-OFDM
	3 Deep Neural Network
	4 Simulations Results
	5 Conclusion
	References
Diagnostic System and Classification of Diabetic Retinopathy Using Convolutional Neural Network
	1 Introduction
	2 Materials and Methods
		2.1 Dataset
		2.2 Segmentation of Fundus Images
		2.3 Classification of the Stage of Diabetic Retinopathy
	3 Results and Discussion
		3.1 Segmentation of Fundus Images
		3.2 Stage Classification of Diabetic Retinopathy
		3.3 User Interface
	4 Conclusion
	References
Design and Implementation of an FPGA-Based Digital Twin  for an Electric Motor
	1 Introduction
	2 Motor Modeling for FPGA
	3 Developing of FPGA-Based Digital Twin
	4 System Design and Results
	5 Conclusions
	References
Novel Approach Implementation of AES Algorithm Based on Radiation-Tolerant FPGA for Secure Mission in Satellite Remote Sensing: LST-SW Case
	1 Introduction
	2 AES Algorithm
	3 Proposed T-Box Approach for the Secure LST-SW Algrithm
	4 Hardware Results and Simulation
		4.1 Hardware Results
		4.2 Simulation Results
	5 Performance Comparison with Existing Implementation
	6 Conclusion
	References
Detecting Intrusion in WiFi Network Using Graph Neural Networks
	1 Introduction
	2 Related Works
	3 Graph Neural Networks
	4 Experimental Results
		4.1 Dataset
		4.2 Results
	5 Conclusions
	References
An IoT-Based System for Monitoring Power Failure in 22-KV Distribution Transformer Substations Using LoRa Communication
	1 Introduction
	2 System Design
		2.1 Sensor Nodes
		2.2 Gateway Station
		2.3 Cloud Server
	3 Experimental Results
	4 Conclusions
	References
Effects of Proton Irradiation on Optocouplers with Bipolar and MOSFET Technologies, a Comparison of In-Situ and Ex-Situ Results
	1 Introduction
	2 Experimental
		2.1 Investigated Devices
		2.2 Proton Irradiation Setup and Conditions
	3 Results and Discussion
		3.1 Optocoupler In-Situ LED Degradation Monitoring
		3.2 Bipolar Optocoupler Stability Under Radiation
		3.3 MOS Photorelay Stability Under Irradiation
		3.4 Optocoupler Switching Time Changes Due to Irradiation
	4 Conclusions
	References
Infant Crying Patterns’ Analysis Using Machine Learning
	1 Introduction
	2 Related Work
	3 Datasets
	4 Discussion
	5 Conclusions
	References
A Performance Evaluation Study to Optimize Encryption as a Service (EaaS)
	1 Introduction
	2 Cryptographic Algorithms Overview
		2.1 Asymmetric Key Algorithms
		2.2 Symmetric Key Algorithms
		2.3 Algorithmic Comparison
	3 Experimental Modeling and Evaluation
		3.1 Analyzing Encryption Time
		3.2 Analyzing Decryption Time
		3.3 Analyzing Memory Consumption
		3.4 Analyzing Throughput
	4 Challenges and Limitations
	5 Conclusion and Future Work
	References
Experimental Investigations on Turbine-Generator Shaft Under Subsynchronous Resonance
	1 Introduction
	2 Theoretıcal Approach of Shaft Model
	3 Proposed Approach
	4 Test Rıg I and Its Operatıon
	5 Test Rıg II and Its Operatıon
	6 Results and Analysis
	7 Analysis of Results
	8 Conclusion
	References
Advantages of Using IP Network Modeling Platforms in the Study of Power Electronic Devices
	1 Introduction
	2 Platform for Modeling, Monitoring Tools and Technology
		2.1 Platform Used for Modeling
		2.2 Monitoring Tools and Monitoring Technology Used
	3 Models of IP Networks Used for Studying PED
		3.1 Model of an IP Network Used for Characterizing the Generated Traffic from the PED
		3.2 Model of an IP Network Used to Study the Impact of the Studied PED Over the Performance of the IP Network When It Is Connected to It
		3.3 Model of an IP Network Supplying a Secure Data Exchange
	4 Conclusion
	References
Predicting Online Job Recruitment Fraudulent Using Machine Learning
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Process
		3.2 Dataset Description
		3.3 Feature Analysis
	4 Algorithm Implementation and Analysis
		4.1 Algorithms
		4.2 Naïve Bayes Algorithm
		4.3 Logistic Regression
		4.4 Random Forest Algorithm
	5 Result and Discussion
		5.1 Accuracy Prediction
		5.2 Performance Comparison with Evaluation Metrics
	6 Conclusion and Future Work
		6.1 Conclusion
		6.2 Future Work
	References
Delay-Efficient Vedic Multiplier Design Using 4:3 Counter for Complex Multiplication
	1 Introduction
	2 Multiplication Using Urdhva Tiryagbhyam Sutra
	3 Proposed Vedic Multiplier
		3.1 Proposed 4:3 Counter
		3.2 Proposed 8-Bit Wallace Tree Multiplier
		3.3 Proposed 16-Bit Vedic Multiplier
		3.4 Architecture of Complex Multiplier
	4 Results and Discussions
	5 Conclusion
	References
Improved Logistic Map and DNA-Based Video Encryption
	1 Introduction
	2 Analysis of the Related Theory
		2.1 Logistic Map
		2.2 DNA Sequencing and Its Rules
	3 Proposed Video Encryption Approach
	4 Results
		4.1 Experimental Setup
		4.2 Observation
	5 Conclusion and Future Works
	References
Interval Type-2 Fuzzy Logic Controller Development for Coreless DC Micromotor Speed Control Applications
	1 Introduction
	2 Coreless DC Micromotor Theory and Problem Statement
	3 Interval Type-2 Fuzzy Logic Controller Development
	4 Experimental Results and Discussion
	5 Conclusions
	References
Performance of a Low-Power 6T-SRAM Cell for Energy-Efficient Leakage Reduction Using DTMOS Technique
	1 Introduction
	2 6T-SRAM Cell Design and Stability
		2.1 Standard Model of a 6T-SRAM Cell
	3 Low-Power Leakage Techniques
		3.1 DTMOS
		3.2 SRAM Cell Using DTMOS Approach
		3.3 Power Gating
	4 Implementation
		4.1 6T-SRAM Cell
		4.2 Conventional 6T-SRAM Cell
	5 Simulation and Results
	6 Conclusion
	References
Tuning XGBoost by Planet Optimization Algorithm: An Application for Diabetes Classification
	1 Introduction
	2 Background and Related Works
		2.1 The XGBoost Algorithm
	3 The Planet Optimization Algorithm (POA)
		3.1 Stage 1: Optimal Start
		3.2 Stage 2: M Factor
		3.3 Stage 3: Global Search
		3.4 Stage 4: Local Search
	4 Experiments and Discussion
		4.1 Dataset Description
		4.2 Experimental Setup and Metrics
		4.3 Comparative Analysis
	5 Conclusion
	References
A Survey on Image Processing Techniques for Detection of Cavities in Dental X-ray Images
	1 Introduction
	2 Literature Survey
		2.1 Image Enhancement
		2.2 Image Segmentation
		2.3 Feature Extraction
	3 Conclusion
	References
Polar Decoder-Based Full Adders: Implementation and Comparative Analysis Using 180 nm and 90 nm Technologies in Cadence
	1 Introduction
	2 Literature Survey
		2.1 Related Works
	3 Full Adder Description for the Comparative Analysis in Cadence
	4 Polar Decoder Implementation in Cadence
	5 Results
		5.1 Cadence Virtuoso Implemented Model
		5.2 Analysis on Performance and Simulation Outcomes in Cadence
		5.3 Comparative Analysis of Simulation Outcomes
	6 Conclusion
	References
LFSR Schema Using CMOS VLSI Technologies—Design, Implementation and Comparative Analysis
	1 Introduction
	2 Related Works
	3 Proposed Methodology
		3.1 Building Blocks of LFSR
		3.2 Results and Discussion
	4 Conclusion
	References
A Review on Image Denoising Algorithms for Various Applications
	1 Introduction
	2 Literature Survey
		2.1 Median Filter
		2.2 Adaptive Median Filter (AMF)
		2.3 Mean Filter (MF)
		2.4 Iterative Mean Filter (IMF)
		2.5 Recursive Mean Filter
		2.6 Distance-Based Mean Filter (DBMF)
		2.7 Non-local Means (NLM) Filter
		2.8 Probabilistic Non-local Means (PNLM) Filter
		2.9 Bilateral Filter (BF)
		2.10 Guided Image Filtering
		2.11 Guided Bilateral Filter (GBF)
		2.12 Unsharp Mask Guided Filtering
		2.13 Weiner
		2.14 Collaborative Weiner Filter and Explicit Guided Filter for Denoising—A Hybrid Approach
	3 Conclusion
	References
An Analysis of Codebook Optimization for Image Compression: Modified Genetic Algorithm and Particle Swarm Optimization Algorithm
	1 Introduction
	2 Literature Review
		2.1 Contribution by Researchers
		2.2 Problem Definition
		2.3 Motivation
	3 Novel Idea of the Proposed Technique Andmodels
		3.1 A. Vector Quantization and Codebook Optimization Method
		3.2 Codebook Structure and Fitness Function
		3.3 Algorithm for Initial Codebook Generation is Given as Follows
		3.4 Quality Measures Are as Follows
	4 Codebook Optimization Models
		4.1 Modified Genetic Algorithm
		4.2 Particle Swarm Optimization Algorithm
	5 Experimental Results
	6 Conclusion
	References
Design and Simulation of GaAs/InP and Si/SiC Heterojunction Solar Cells
	1 Introduction
	2 Tools and Techniques
	3 Working of Solar Cell
	4 Results and Discussions
	5 Conclusions
	References
Exploration Metrics Based on Scientific Mapping in the Use of Social Networks and Politics 2.0
	1 Introduction
	2 State of the Art
	3 Methodology
	4 Results
	5 Conclusion
	References
Artificial Intelligence and Replacement of Human Talent: Case Study of Higher Education in Times of Pandemic
	1 Introduction
	2 State of the Art
	3 Methodology
	4 Results
	5 Conclusions
	References
A Proposed Approach to Detect Incident and Violation Through CCTV Using Convolutional Neural Network
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Dataset
		3.2 Data Preprocessing
		3.3 Dealing with Objects
		3.4 Splitting the Dataset
		3.5 Data Normalization
		3.6 Data Augmentation
		3.7 Model
	4 Model Evaluation
		4.1 Learning Curve
		4.2 Accuracy and Loss
		4.3 Prediction
	5 Conclusion
	References
Fiber Bragg Grating Strain Sensors in Smart Factories: Review of Opportunities and Challenges
	1 Introduction
		1.1 A Historical Context of Fiber Bragg Gratings
	2 Literature Survey
	3 Theory of Fiber Bragg Grating Sensors (FBG's)
	4 Strain Optical Response
		4.1 Calibration of FBG Strain Sensors
	5 FBG Strain Sensor Opportunities in Smart Factories
	6 Challenges of FBG Strain Sensors
	7 Conclusion and Future Scope
	References
Development of Converged Contents Applications Using Beacon with Bluetooth v4.0
	1 Introduction
	2 Related Works
		2.1 Beacon Service
		2.2 Comparison of Beacon and NFC
	3 Development Details
		3.1 Test Environment for Beacon App
		3.2 Development Configurations
		3.3 Beacon App Setting
	4 Experiments and Evaluations
		4.1 Beacon and App Integration Test
		4.2 Converged Contents Service Test
		4.3 Performance Evaluation
	5 Conclusion
	References
A CNN-Based Underage Driver Detection System
	1 Introduction
	2 Related Works
	3 Proposed System
		3.1 Software Implementation
		3.2 Hardware Implementation
	4 Experimental Setup and Results
	5 Conclusion
	References
EC-MAC Protocol for Energy Harvesting Wireless Sensor Networks
	1 Introduction
	2 Existing System
	3 EC-MAC Design
		3.1 Overview of the Protocol
	4 Experimental Results and Discussion
	5 Conclusion
	References
Prediction of Brain Diseases Using Machine Learning Models: A Survey
	1 Introduction
	2 Literature Review
	3 Research Gap and Proposed Work
	4 Conclusion and Future Work
	References
Cardiac Arrhythmia Detection and Prediction Using Deep Learning Technique
	1 Introduction
		1.1 The Human Heart
		1.2 Arrhythmias
		1.3 Deep Learning Approach
	2 Literature Review
	3 Materials and Methods
		3.1 EEG Dataset
		3.2 Methodology
		3.3 Convolution Neural Network
		3.4 Activation Function
		3.5 Pooling Layers
		3.6 Fully Connected Layer and Softmax Activation
		3.7 Back Propagation and Gradient Descent
		3.8 Transfer Learning with Deep Convolution Neural Network
		3.9 VGG16 Model
	4 Implementation
	5 Result
	6 Conclusion
	7 Future Enhancement
	References
Hardware Prototype Model of Conventional Gas Stove Automation System—Application of Random Forest Regression Algorithm
	1 Introduction
	2 Proposed Gas Automation System
	3 Hardware Implementation of the Proposed Gas Stove Automation System
		3.1 Knob Control Model
		3.2 GUI Development
	4 Testing of Hardware Prototype
	5 Conclusions
	References
A Review on the Impact of Cognitive Factors in Introductory Programming
	1 Introduction
	2 Research Methodology
		2.1 Research Questions
		2.2 Data Collection
	3 Cognitive Factors
	4 Cognitive Factors on Predicting Introductory Programming Performance
		4.1 Cognitive Style
		4.2 Problem-Solving Skills and Prior Programming Experience
		4.3 Decomposition Skills
		4.4 Study Habits
		4.5 Rainfall Problem
		4.6 Performance and Engagement Patterns
		4.7 Practice
		4.8 Class Attitude and Class Experience
		4.9 Programming Self-efficacy
		4.10 Implicit Intelligence Beliefs
		4.11 Constructive Learning Theories
		4.12 Cognitive Load
		4.13 Goal Orientation
	5 Results and Discussion
	6 Future Work
	References
Improving Robustness of Two Speed Serial Parallel Booth Multiplier Using Fault Detection Mechanism
	1 Introduction
	2 Literature Survey
	3 Proposed Work
	4 Results and Discussion
		4.1 Simulation Results
		4.2 Multiplier Comparisons
	5 Conclusion
	6 Future Scope
	References
Development of a Categorized Alert Management Tool for the City of Madrid
	1 Introduction
	2 Architecture
		2.1 Architecture
		2.2 Data Model
	3 Functionality
		3.1 Web Application
		3.2 App Android
	4 Conclusions and Future Work
	References
Non-destructive Food Quality Monitoring System
	1 Introduction
	2 Related Works
	3 Existing Method
	4 Methodology
		4.1 Hardware
		4.2 Software
	5 Experimental Results
	6 Conclusion
	References
Author Index




نظرات کاربران