دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Dinesh Goyal, Pradyumn Chaturvedi, Atulya K. Nagar, S.D. Purohit سری: Algorithms for Intelligent Systems ISBN (شابک) : 9811567069, 9789811567063 ناشر: Springer سال نشر: 2021 تعداد صفحات: 713 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 28 Mb
در صورت تبدیل فایل کتاب Proceedings of Second International Conference on Smart Energy and Communication: ICSEC 2020 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مجموعه مقالات دومین کنفرانس بین المللی انرژی هوشمند و ارتباطات: ICSEC 2020 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مقالات منتخب ارائه شده در دومین کنفرانس بین المللی انرژی و ارتباطات هوشمند (ICSEC 2020) را گردآوری می کند که در موسسه مهندسی و فناوری پورنیما، جیپور، هند، در 20 تا 21 مارس 2020 برگزار شد. این کتاب طیفی از موضوعات الکترونیک را پوشش می دهد. و مهندسی ارتباطات و مهندسی برق، از جمله طراحی مدارهای آنالوگ، پردازش تصویر، ارتباطات بی سیم و مایکروویو، اپتوالکترونیک و دستگاه های فوتونیک، نانو الکترونیک، انرژی های تجدیدپذیر، شبکه هوشمند، سیستم های قدرت و کاربردهای صنعتی.
This book gathers selected papers presented at the 2nd International Conference on Smart Energy and Communication (ICSEC 2020), held at Poornima Institute of Engineering and Technology, Jaipur, India, on March 20–21, 2020. It covers a range of topics in electronics and communication engineering and electrical engineering, including analog circuit design, image processing, wireless and microwave communication, optoelectronics and photonic devices, nano-electronics, renewable energy, smart grid, power systems and industry applications.
Preface Contents About the Editors An Evaluation into Deep Learning Capabilities, Functions and Its Analysis 1 Introduction 2 Motivation 3 Study 4 Techniques 5 Applications 6 Challenges 7 Conclusion References Mathematical Modeling and Simulation of DC-DC Converters Using State-Space Approach 1 Introduction 2 Mathematical Modeling of DC-DC Converters 2.1 Buck Converter 2.2 Boost Converter 2.3 Buck-Boost Converter 3 DC-DC Converter Simulink Modeling 3.1 Buck Converter 3.2 Boost Converter 3.3 Buck-Boost Converter 4 Result Discussion 5 Conclusion References Detection of Forgery in the JPEG Images Using Forward Quantization Noise Method 1 Introduction 2 JPEG Compression-Forgery Detection in an Image 3 Simulation Results 4 Conclusion References Error-Controlling Technique in Wireless Communication 1 Introduction 2 Golay Code 3 Proposed Methodology 3.1 Encoder: One Example on Generation of Check Bit Is Discussed Here 3.2 Architecture 3.3 Unit of Weight Measurement 4 Simulation Results 4.1 CRC Technique 4.2 Code Converter 5 Conclusion References Cloud Computing: The New World of Technology 1 Introduction 2 Cloud Service Models 2.1 Infrastructure as a Service (IaaS) 2.2 Platform as a Service (PaaS) 2.3 Software as a Service (SaaS) 3 Cloud Deployment Models 3.1 Private Cloud 4 Community Cloud 4.1 Public Cloud 4.2 Hybrid Cloud 5 Future of Cloud Computing 6 Conclusion References Questions Generation for Reading Comprehension Using Coherence Relations 1 Introduction 1.1 Background Overview 2 Related Work 3 Proposed Question Generation Method 3.1 Data Set Preparation 3.2 Paragraph Selection 3.3 Apply Rhetorical Structure Theory for Coreference Detection 3.4 Steps 4 Text Span Identification 3.5 Steps 5 Text Spans Syntax Transformations 3.6 Steps 6 Question Generation 4 Experimental Results 4.1 Grammatical Correctness of Questions 4.2 Semantic Correctness of Questions 5 Results Discussion 6 Conclusion and Future Scope References Segmentation of Brain Tumor from MRI Images Using Modified Morphological Novel Approach 1 Introduction 2 Proposed Methodology 2.1 MRI Database and Image Preprocessing 2.2 MRI Image Segmentation 3 Feature Extraction and Appropriate Reasoning 4 Experimental Result 5 Conclusion and Future Work References Implementation and Use of ERP System in Organization and Educational Institution 1 Introduction 2 Methodology 2.1 Drivers of Project 2.2 Project Management 2.3 Project Resources 2.4 Management Reviews 2.5 Delivery of Product 3 ERP Trends and Perspective 4 Implementation References WebGIS Concept of River Pollution Monitoring System—A Case Study of Yamuna River 1 Introduction 2 Research Methodology 2.1 WebGIS System Structure 3 Discussion 4 Conclusions References Data Mining in Crime Analysis 1 Introduction 2 Literature Review 3 Conclusion References Thermophotovoltaic Cells: Electrical Power Generation at Night 1 Introduction 2 Thermoradiative Photovoltaics 3 Integration 4 Conclusion References Insights of Kinship Verification for Facial Images—A Review 1 Introduction 2 Related Literature 3 Results 4 Findings 5 Conclusion and Future Work References Development of a Novel Approach for Classification of MRI Brain Images Using DWT by Integrating PCA, KSVM and GRB Kernel 1 Introduction 2 Existing Methods 3 Proposed Methodology 3.1 Feature Extraction Scheme Using DWT 3.2 Feature Reduction Using PCA 3.3 Kernel SVM 4 Performance Metrics 5 Simulation Results 5.1 Performance Evaluation 5.2 Time Analysis 6 Conclusion and Future Scope References Optimization of Sustainable Performance: Housing Project, Bahir Dar, Ethiopia 1 Introduction 1.1 Site Analysis 2 Research Aim 3 The Research Framework 3.1 Sustainable Architecture 3.2 Energy and Environment 3.3 Construction in Architecture 4 Research Approach 5 Case Study 6 Result and Findings 7 Analysis 8 Discussion 8.1 Sustainable Architectural Practice 8.2 Energy Environment Construction and Architecture 9 Conclusion and Recommendations References 3D Image Conversion of a Scene from Multiple 2D Images with Background Depth Profile 1 Introduction 2 Literature Review 3 Methodology 3.1 Depth Hue Separation 3.2 Estimation of the Foreground 3.3 Classification of Background Pixels 3.4 The Combined Depth Estimation 4 Post Processing of Resulted Images 4.1 Calculation of Background Profile 4.2 Enhancement of the Color Pixels 5 Results and Discussion 6 Conclusion References Optimization of a Stand-Alone Hybrid Renewable Energy System Using Demand-Side Management for a Remote Rural Area in India 1 Introduction 2 Study Area 3 Demand and Resource Estimation 3.1 Demand Estimation 3.2 Resource Estimation 4 Demand-Side Management 4.1 DSM Strategy 5 Modeling and Input Parameters 6 Results and Discussion 6.1 HRES with and Without DSM 6.2 Effect of Batteries on System Performance 6.3 Effect of DSM 7 Conclusion References Advance Security and Challenges with Intelligent IoT Devices 1 Introduction 1.1 Internet of Things (IoT) 1.2 Internet of Everything (IoE) 1.3 Internet of Nano Things (IoNT) 2 Related Work 2.1 IoT Security and Challenges 2.2 IoT Security with Artificial Intelligence 2.3 IoT Security with Machine Learning and Deep Learning 3 Proposed Methodology 3.1 Proposed Steps for Provide Security to ATM Arena 3.2 Advantages 4 Open Issues 5 Future Work 6 Conclusion References Systematic Assessment and Overview of Wearable Devices and Sensors 1 Introduction 2 Brief Categorization of Wearable Technology 3 Sensors Modality 3.1 Body Worn Sensors 3.2 Object Sensors 3.3 Ambient Sensors 3.4 Hybrid Sensors 4 Deep Models 4.1 Deep Neural Network 4.2 Convolutional Neural Network 5 Discussions 6 Conclusion References An Optimal Design of 16 Bit ALU 1 Introduction 2 Architectures of Various Digital Circuits 2.1 Carry Look Ahead Adder 2.2 Carry Skip Adder 2.3 Kogge–Stone Adder 2.4 Booth Multiplier 2.5 Vedic Multiplier 2.6 Barrel Shifter 2.7 Binary Division 2.8 Block Diagram of ALU 3 Results and Discussion 4 Conclusion References Preventing SSRF (Server-Side Request Forgery) and CSRF (Cross-Site Request Forgery) Using Extended Visual Cryptography and QR Code 1 Introduction 2 Survey Study 3 Methodology 3.1 Generating OTP 3.2 Forming OTP from QR Code 3.3 Applying EVC on QR and Generating Shares 3.4 Applying Steganography on Share A 3.5 Merging Back Shares into One QR Code Using De-steganography 3.6 QR Code Conversion to OTP 4 Result Comparison 5 Conclusion References IoT: Security Attacks and Countermeasures 1 Introduction 1.1 IoT Enabling Technologies 1.2 Structure of IoT 1.3 IoT Main Communication Protocols 2 Attacks in IoT 2.1 Vulnerabilities in Embedded Systems 2.2 Vulnerabilities in Firmware, Software and Applications 2.3 Vulnerabilities in Radiocommunications 3 Security Countermeasures 3.1 Countermeasures Against Embedded System Attacks 3.2 Countermeasures Against Firmware, Software, and Applications 3.3 Countermeasures Against Radio Communications 4 Conclusion References Intelligent Street Light System Using ARM Cortex M0+ 1 Introduction 2 Intelligent Street Light System 2.1 Street Light 2.2 Real-Time Clock with ARM Cortex M0+ Processor 2.3 Controlled Sensors with Object Movement 3 Proposed System 3.1 Mode 1 of Operation 3.2 Mode 2 of Operation 4 Conclusion and Future Scope References Image Segmentation 1 Introduction 2 Related Work 3 Network Architecture 3.1 Mask R-CNN 3.2 PSP-Net 4 Implementation 4.1 Mask R-CNN 4.2 PSP-Net 4.3 Spectral Matting 5 Results 6 Conclusions 7 Future Scope References Application of Bio Sensor in Carpal Tunnel Syndrome 1 Introduction 2 Biosensors 3 Types of Bio Sensors 3.1 Electrochemical Sensors 3.2 Piezoelectric Sensors 3.3 Surface Plasmon Resonance (SPR) 4 Diagnosis of Carpal Tunnel Syndrome 5 Design of Pressure Transducer for Diagnosis of Carpal Tunnel Syndrome 6 Data Acquisition and Signal Processing 6.1 Pressure Transducer 6.2 Analog Signal Processing (ASP) 6.3 Data Acquisition 6.4 Processor 7 Conclusion References Applications of Artificial Intelligence Techniques for Cognitive Networks 1 Introduction 1.1 Artificial Intelligence 1.2 AI for Cognitive Radio Networks 2 Attacks on CRN 2.1 Primary User Emulation Attack 2.2 Objective Function Attack 2.3 Jamming Attack 2.4 Spectrum Sensing Data Falsification Attack 2.5 Hello Attack 2.6 Sinkhole Attack 2.7 Key Depletion Attack 2.8 Lion Attack 3 AI Techniques for Cognitive Radio 3.1 Artificial Neural Networks (ANNs) 3.2 Metaheuristic Algorithms 3.3 Rule-Based System (RBS) 3.4 Ontology-Based Systems (OBS) 3.5 Case-Based System (CBS) 4 Applications of AI in Cognitive Radio Networks 4.1 Military 4.2 Healthcare 4.3 Transportation 4.4 Emergency and Public Safety 4.5 Automotive Industry 4.6 Robotics 4.7 Bandwidth-Intensive Applications 4.8 Real-Time Surveillance Applications 4.9 Indoor Applications References Design of Pitch Attitude Hold Mode for Commercial Aircraft Using Extended State Observer 1 Introduction 1.1 Pitch Attitude Hold Mode 1.2 State Observer Design 2 Result Analysis 2.1 Tuning, Design and Response of ADRC 2.2 Disturbance Rejection Characteristics with ESO 2.3 Comparison of Disturbance Rejection Between PID and ESO 2.4 Comparison of Disturbance Rejection Between PID and ESO 3 Conclusion and Future Work References UAV—A Boon Towards Agriculture 1 Introduction 2 Working of UAV 3 Advantages 4 Challenges 5 Future Scope 6 Conclusion References Modelling and Design of 5T, 6T and 7T SRAM Cell Using Deep Submicron CMOS Technology 1 Introduction 2 SRAM Cell Structure and Working 3 Simulation Results of 5T, 6T and 7T SRAM Cell 4 Conclusion References Machine Learning Approach Towards Road Accident Analysis in India 1 Introduction 2 Related Work 3 Dataset Analysis 4 Methodology 5 Result and Analysis 6 Conclusion References IoT-Based Big Data Storage Systems in Cloud Computing 1 Introduction 1.1 Notable Attributes of IoT-Based Information in Cloud Stages Are 2 Related Work 3 The Operational Framework of Cloud-Based IoT Applications 4 Structure and Objections 4.1 Data Acquisition and Integration Module 4.2 Data Storage Module 4.3 Data Management Module 4.4 Data Processing Module 4.5 Data Mining Module 5 Future Scope and Conclusion References Optimized Hybrid Electricity Generation 1 Introduction 2 Proposed Work 3 The Material and Method 4 Results Discussion 5 Result Analysis 6 Conclusion References Access Control of Door and Home Security System 1 Introduction 1.1 Proposed System 1.2 Implementation of the IoT-Based Security System 2 Methodology 2.1 Hardware Implementation 2.2 Software Implementation 3 Practical Implementation 3.1 Results and Discussion 4 Advantages 5 Limitations 6 Conclusion 7 Applications References Bluetooth-Based Smart Sensor Networks 1 Introduction 1.1 Technology Overview 2 Bluetooth-Based Sensor Network 2.1 Bluetooth Hardware Architecture 3 A Wireless Sensor Network 3.1 Sensor Network Implementation 3.2 Smart Sensor Nodes Discovery 4 Advantages 5 Limitations 6 Conclusion 7 Applications References Behaviour of Hollow Core Concrete Slabs 1 Introduction 2 Literature Review 3 Research Significance 4 Conclusions References Business Process Reengineering: Issues and Challenges 1 Introduction 1.1 Categories in Software Engineering 1.2 Aspects of Software Project Management 1.3 Software Reengineering 1.4 Software Engineering Techniques 2 Overview of Business Process Reengineering 2.1 Concept of Business Process Reengineering 3 Business Process Reengineering Methodology 4 Business Process Reengineering Life Cycle 4.1 In the Implementation of BPR Methods, Some Guiding Principles Include 5 Conclusion References Creating a Biological Intranet with the Help of Medical Sciences and Li-Fi 1 Introduction 2 Light Fidelity 3 Bionic Eye 4 Human Eye 5 Li-Fi for Eye 6 Proposed Working 7 Proposed Architecture 8 Creating an Intranet Using Li-Fi and Bionic Eye 9 Real-Life Applications 10 Present Restrictions 11 Challenges and Difficulties 12 Conclusion References Optimization of Low Power LNA Using PSO for UWB Application 1 Introduction 2 Mathematical Model of PSO for Optimization of Analog Circuit 3 Analysis of LNA Circuit 4 Results and Discussion 4.1 S-Parameters 4.2 Noise Figure 5 Conclusion References Automatic Segregation and Supervision of Waste Material Using Industrial Control Devices 1 Introduction 2 Methodology 3 Project Requirement 3.1 Software Requirement 3.2 Hardware Requirement 4 Results 5 Conclusion References An Improved Model for Breast Cancer Classification Using Random Forest with Grid Search Method 1 Introduction 2 Literature Survey 3 Machine Learning 3.1 Random Forest 3.2 Grid Search Method 4 Proposed Methodology 4.1 Data Collection 4.2 Indices of Performance Measure 5 Experimental Results 6 Conclusion and Future Scope Appendix References A Review on Low-Noise Amplifier for Wideband Applications 1 Introduction 2 Topologies 3 Conclusion References Effects of Single and Double Wide Slots on Microstrip Patch Antennas Characteristics Using Direct Contact Probe Feed Excitation with Broadsided Radiation 1 Introduction 2 Design of Slotted Patch Antennas 3 Measured and Simulated Results 3.1 Bandwidth of Conventional Rectangular Microstrip Antenna (C-RMA) 3.2 Bandwidth of Single Wide Slot-RMA (SWS-RMA) 3.3 Bandwidth of Double Wide Slot-RMA (DWS-RMA) 4 Conclusion References Solar Roadways: A Road Toward Betterment 1 Introduction 2 Working 3 Advantages 4 Challenges 5 Future Scope 6 Conclusion References A Review on Radiomic Analysis for Medical Imaging 1 Introduction 2 Tumors 3 Why Radiomics? 4 Process 4.1 Image Acquisition and Reconstruction 4.2 Image Segmentation 4.3 Feature Extraction and Qualifications 4.4 Database and Data Sharing 4.5 Ad Hoc Informatic Analysis 5 Application 6 Drawbacks 7 Future Scope References Design of CMOS 6T and 8T SRAM for Memory Applications 1 Introduction 2 Review of Existing SRAM Architectures 2.1 Conventional 6T SRAM 2.2 Conventional 8T RAM 2.3 10T Single-Ended SRAM 2.4 8T SRAM Cell with Virtual Ground 2.5 Proposed 6T Single-Ended SRAM Cell 3 Proposed SRAM 3.1 Proposed SRAM Reversible Cell with Read and Write Signals 4 Simulation Results 5 Conclusion References New Concept for Solar Efficiency Improvement 1 Introduction 2 Solar Tree 3 Related Work 4 Proposed Work 5 Conclusion References Sustainable Smart Cities and Their ICT Practices 1 Introduction 2 Review of Literature 3 Sustainable Smart Cities and ICT—Handshake 3.1 The Development of Latest Cities Badging Themselves as Smart 3.2 The Development of Older Cities Regenerating Themselves as Smart 3.3 The Development of Science Parks, Tech Cities, and Techno-poles Focused on High Technologies 3.4 The Development of Urban Services Using Contemporary ICT 3.5 The Use of ICT to Develop New Urban Intelligence Functions 3.6 The Development of Online and Mobile Sorts of Participation 4 Alternative Models that Ensure IT Initiatives’ Viability 5 Conclusion References Development of Hybrid Energy System for a Rural Area 1 Introduction 2 Methodology 2.1 Study Area 2.2 Load Demand 2.3 Resource Assessment 2.4 Modeling of HES Components 3 Results and Discussion 3.1 Feasible Configurations 3.2 Most Optimal Configuration 3.3 Sensitivity Analysis 4 Conclusion References Face Recognition with Inception-Based CNN Models 1 Introduction 2 Deep Learning Models 3 The Simulation Results 4 Conclusion References Design of Protocol for Handwriting Recognition Using FPGA 1 Introduction 1.1 Online Handwriting 1.2 Isolated Handwriting 1.3 Unconstrained Handwriting 1.4 Writer Independent 2 Hidden Markov Model 3 Artificial Neural Network 3.1 Artificial Neural Network BP 4 Canny Edge Detection 5 Probabilistic Patch-Based Filter 5.1 Proposed Block Diagram 5.2 Flowchart of the Proposed Work 6 Virtex-5 FPGA (XC5VLX50T) 7 Results and Discussion 8 Conclusion References Diesel Engine Performance with Coolant Temperature Control System and Phase Change Material (PCM) in the Cold Ambient Conditions: A Review 1 Introduction 2 Literature 2.1 The Selection Standards for PCM Are as Per the Following 2.2 An Improved One-Dimensional Model Is Introduced 3 Objective 4 Workflow Chart 5 Codes 6 Conclusion 7 Future Work References Mechanical Properties of Sisal Fibre and Human Hair Reinforced Epoxy Resin Hybrid Polymer Composite 1 Introduction 1.1 Sisal Plant Description 1.2 Human Hair Description 1.3 Sisal Fibre Processing Steps 1.4 Sisal Fibre Processing Steps 2 Conclusion References Simulation of Swirl Cup as Vane Angle with 58° 1 Introduction 2 Dimension of Swirler 3 Parameters to Flow Investigates 3.1 Evaluated the Swirl Number [1] 4 Geometric View of Model at 58ο 4.1 Meshing of Model 5 Result and Discussion 6 Conclusion References Data Acquisition Technique for Temperature Measurement Through DHT11 Sensor 1 Introduction 2 Background 3 Materials and Method 3.1 Arduino 3.2 Sensors 3.3 IDE 4 Implementation and Results 5 Conclusion References Urban Sprawl Over a Lotic Ecosystem of Doon Valley: Trend and Future Implications 1 Introduction 2 Study Area 3 Materials and Method 3.1 Database and Pre-processing 3.2 Land Use Change Detection and Transition Potential Modeling 3.3 Future Trend Modeling 3.4 Landscape Analysis 4 Results and Discussions 4.1 Landuse Change from 2005 to 2010 4.2 Transitional Probabilities 4.3 Landscape Analysis 5 Conclusions References Arduino-Based Therapy Device for Carpal Tunnel Syndrome 1 Introduction 2 Literature Survey 3 Review of Literature Survey 4 Fabrication 4.1 Electronic Part 4.2 Software Requirement 5 Experimental Setup 6 Working Routine 7 Results 8 Conclusion References IOT-Based Smart Traffic Light System for Smart Cities 1 Introduction 2 Proposed System 3 Conclusion and Future Scope References Self-Diagnosis Medical Chatbot Using Artificial Intelligence 1 Introduction 2 Literature Survey 3 Work Done 3.1 spaCy 3.2 Introduction to Dialogflow 4 Result 5 Conclusion References A Comparison Analysis of Mobile Forensic Investigation Framework 1 Introduction 2 Related Work 2.1 Four-Phase Methodology 3 Mobile Forensic Process and Types 4 Problem Statement 5 Proposed Model 6 Conclusion References Review in Energy Harvesting for Self-Powered Electronics Sensor 1 Introduction 1.1 Piezoelectric Energy Through Human Motion 1.2 Power Generate Through Bicycle 2 Working Principle 2.1 This Work in Two Modes 3 Design and Applications 3.1 Smart Textile 3.2 Smart Footwear 3.3 Smart Skin 4 Issues with Implementation and Design 5 Conclusion References Review in Smart Oculus Lenses 1 Introduction 2 Issues with the Smart Oculus Lenses 2.1 Computer Vision Syndrome 2.2 Retina Damage 2.3 Potential Cataracts 3 Application of Smart Lenses 3.1 Smart Eye Technology for Businesses with Significant Document Security Challenges 3.2 Health care 3.3 Aerospace and MRO 3.4 Retail and Logistics Management 3.5 Manufacturing and Training 4 Future Scope of Smart Oculus Lenses 5 Conclusion References Car Accident Prevention Using Alcohol Sensor 1 Introduction 2 Alcohol Sensor (MQ-3) 3 Display Driver IC (LM3914) 4 Relay 5 Starter Motor Circuit 6 Result 7 Conclusion References Performance Analysis Permanent Magnet Synchronous Motor Drives with Pulse Width Modulation Control Technique 1 Introduction 2 Modeling of PMSM Drive 3 Torque Control Scheme of PMSM Drive 4 Implementation of SVPWM Current Control Scheme of PMSM Drive 5 Simulation and Results of a Torque-Controlled Drive System 6 Conclusion References A Review on Methanol-Blended-Diesel Fuel Combustion in CI Engine for LTC Technology Using EGR 1 Introduction 1.1 Review Objectives 2 Methanol 3 Exhaust Gas Recirculation (EGR) 4 Effects and Discussion 4.1 Effect of Blends on Combustion and Engine Emissions 5 Conclusions References Current Trend and Methodologies of Content-Based Image Retrieval: Survey 1 Introduction 2 Content-Based Image Retrieval (CBIR) 3 CBIR at Early Years 3.1 Relevance Feedback: A Power Tool for Interactive CBIR 3.2 The Bayesian Image Retrieval System, PicHunter: Principle, Application, and Psychophysical Tests 3.3 An Image Retrieval System with Automatic Query Modification 3.4 CBIR Based on a Fuzzy Approach 3.5 CBIR: Methodologies and Trends of the New Age 3.6 CBIR: Theory and Applications 4 CBIR at the End of Early Years 4.1 Dynamic User Concept Pattern Learning Framework for CBIR 4.2 An Innovative Evolutionary Method for Improving Content-Based Image Indexing Procedures 4.3 Localized CBIR 4.4 Image Color Distributions Based Adaptive Color Feature Extraction 4.5 Methodologies, Challenges and Future Way of Image Retrieval 4.6 An Advanced System for CBIR Using Texture and Color Features 5 Current Trend and Methodologies 5.1 Effective Relevance Feedback by Mining User Navigation Patterns for CBIR 5.2 Local Tetra Patterns: An Innovative Feature Descriptor for CBIR 5.3 Deep Learning for CBIR: A Comprehensive Study 5.4 CBIR in E-Commerce for Quality Products 6 Comparison of Various CBIR Systems 6.1 Some of the Available Systems 7 Discussion and Conclusion References Number Plate Recognition: Concept and Its Applications 1 Introduction 2 Process of Vehicle Number Identification 2.1 Image Acquisition 2.2 Pre-processing and ROI Extraction 2.3 Region of Interests Based Analysis 2.4 Multifaceted Design Improvement Utilizing Histogram Change 2.5 Plate Impediment 2.6 Character Segmentation 3 Applications of the Vehicle Number Identification 3.1 Halting 3.2 Access Control 3.3 Motorway Road Tolling 3.4 Excursion Time-Based Measurement 3.5 Enforcement of Laws 4 Conclusion References Crowd Analysis in Public Transport Based on Face Detection 1 Introduction 2 Literature Survey 3 Existing Work 3.1 Dilax 3.2 Smart Bus 3.3 Prime Edge 4 Proposed Work 4.1 Online Mode 4.2 Offline Mode 5 Mathematical Model 6 Challenges 7 Conclusion References Review on Performance Analysis of PV Module at Different Sites and Locations 1 Introduction 2 Methodology 2.1 Architecture of Grid-Connected Solar PV System 2.2 Selection and Finalization of Different Location 2.3 Solar Radiation and Meteorology 2.4 Selection and Finalization PV Module Specification 2.5 Selection and Finalization Inverter Specification 2.6 Orientation and Horizon Finalization of PV Module 3 Interconnection of Inverter and Array 4 Performance Analysis of PV Module 4.1 Yield Simulation 4.2 Losses Simulation 4.3 Performance Ratio 4.4 Generation Simulation 5 Conclusion 5.1 Losses and Efficiency Simulation 5.2 Performance Ratio 5.3 Generation Forecasting References Digital Watermarking System Performance Using QIM Techniques and Wavelet Transforms 1 Introduction 2 Related Discussion 2.1 Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT) 2.2 Quantization Index Method (QIM) 3 Watermarking Scheme 3.1 Watermark Generation Process 3.2 Watermark Embedment Process 3.3 Watermark Extraction Process 3.4 Extracted Generated Watermark Process 4 Performance Evaluation 5 Experiment Results 6 Conclusion References A Distributed Spanning Tree-Based Scalable Fault-Tolerant Algorithm for Load Balancing in Web Server Farms 1 Introduction 2 Mathematical Model for DST-Based Load Balancing 3 DST-Based Load Balancing Algorithm 4 Conclusion 5 Future Enhancements References Context-Aware Computing for IoT: History, Applications and Research Challenges 1 Introduction 2 History and Evolution of Context-Aware Computing 3 Context-Aware Computing and IoT Applications 4 Research Issues and Future Challenges in Implementing Context-Aware Computing in IoT 5 Conclusion References Overview of IoT Privacy and Security Challenges for Smart Carpooling System 1 Introduction 2 IoT and Its Application 3 IoT-Based Carpooling 4 Security Analysis of IoT System 5 Security and Privacy Issues Related to IoT-Based Carpooling 6 Security Threats in the Carpooling 7 Conclusion References Author Index