دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1st ed. 2020 نویسندگان: Millie Pant (editor), Tarun Kumar Sharma (editor), Rajeev Arya (editor) سری: Advances in Intelligent Systems and Computing ISBN (شابک) : 9811540314, 9789811540318 ناشر: Springer سال نشر: 2020 تعداد صفحات: 1093 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 43 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Soft Computing: Theories and Applications : Proceedings of SoCTA 2019 (Advances in Intelligent Systems and Computing) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب محاسبات نرم: نظریه ها و کاربردها: مجموعه مقالات SoCTA 2019 () نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب بر محاسبات نرم و چگونگی استفاده از آن برای حل مشکلات دنیای واقعی ناشی از حوزههای مختلف، اعم از پزشکی و مراقبتهای بهداشتی، مدیریت زنجیره تامین، پردازش تصویر و تحلیل رمزی تمرکز دارد. این مقالات با کیفیت بالا ارائه شده در کنفرانس بین المللی محاسبات نرم: نظریه ها و کاربردها (SoCTA 2019)، که توسط موسسه ملی فناوری Patna، هند برگزار شده است، گردآوری می شود. این کتاب با ارائه بینشهای ارزشمندی در مورد محاسبات نرم برای معلمان و محققان به طور یکسان، الهامبخش تحقیقات بیشتر در این زمینه پویا خواهد بود.
This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Conference on Soft Computing: Theories and Applications (SoCTA 2019), organized by the National Institute of Technology Patna, India. Offering valuable insights into soft computing for teachers and researchers alike, the book will inspire further research in this dynamic field.
Preface Contents About the Editors Performance Optimization by MANET AODV-DTN Communication 1 Introduction 2 Background and Related Network 2.1 Mobile Ad Hoc Networks (MANETs) 2.2 Ad Hoc on Demand Distance Vector (AODV) [5] 2.3 Delay Tolerant Networks (DTN) 3 Simulation Design 4 Result and Analysis 4.1 1st Scenario 4.2 2nd Scenario 4.3 3rd Scenario 5 Conclusion References Effectiveness of Whale Optimization Based I+PD Controller for LFC of Plug-in Electric Vehicle Included Multi-area System 1 Introduction 2 System Modeling 2.1 Proposed System 2.2 Proposed Controller 3 Whale Optimization Algorithm 4 Simulation Results 4.1 Comparison with PIDN Controller 4.2 Effectiveness of Proposed Control Scheme Under Variable Load Disturbance 5 Conclusion Appendix References Dual Band Printed Rectangular Ring-Shaped Monopole Antenna for Wireless Communication 1 Introduction 2 Antenna Design 3 Result Discussion 4 Conclusion References Printed U-Shaped Monopole Dual Band Antenna for Wireless Application 1 Introduction 2 Antenna Design 3 Result Discussion 4 Conclusion References IoT-Enabled Early Prediction System for Epileptic Seizure in Human Being 1 Introduction 2 Proposed System 3 Results and Discussions 4 Conclusions References Effective Author Ranking Using Average of Different h-Index Variants 1 Introduction 2 Related Work 3 Dataset 4 Methods and Model 4.1 Methods 4.2 Model 5 Results and Analysis 6 Conclusion and Future Work References A Survey Report on Recent Progresses in Nearest Neighbor Realization of Quantum Circuits 1 Introduction 2 Background 3 Works on NN-Based Representation 4 Conclusion References Annual Rainfall Prediction Using Time Series Forecasting 1 Introduction 2 Methodology 2.1 ARIMA Method 2.2 Simple Exponential Smoothing Method 2.3 ETS Method 2.4 Neural Network 2.5 Measures of Accuracy 3 Results and Discussions 3.1 Annual Rainfall Data 3.2 Forecasts of Different Techniques 3.3 Error Analysis 4 Conclusion References A Novel Approach for Design 7:3 and 5:3 Compressors 1 Introduction 2 Proposed Method and Circuit Description 3 Simulation Result and Discussion 4 Conclusion References High-Accurate, Area-Efficient Approximate Multiplier for Error-Tolerant Applications 1 Introduction 2 Attributes of Contemporary ETM 3 Experimental Results 4 Conclusions References Hoax and Faux of Information Credibility in Social Networks: Explored, Exemplified and Experimented 1 Introduction 2 Information Credibility—Corollaries 2.1 The Essentiality of Credible Information [4–6] 2.2 The Compromising Contexts of Information Credibility [7] 3 The Nuances of Compromised Credibility—Bulletin Ballots 3.1 Businesses Caught Posting Fake Reviews [8] 3.2 Postage of Bogus, Bribed Reviews by Amazon Retailer [8] 3.3 The Incident of Blemished Heritage [8] 3.4 Amazon Sues 1,000 ‘Fake Reviewers’ [9] 3.5 Falsified Reviews Procures Imprisonment [10] 4 The Tools Exposition—Automated Approaches 5 Result Analysis—Experiment’s Explications 6 Intricacies to Interpreting Fakeness—Manual Approaches 7 Automated Tools Analysis—Tabulated Transcript 8 Conclusion 9 Future Work References Minimize Power Ratio (PR) in OFDM Using Tone Reservation Method 1 Introduction 2 PAPR Reduction Technique Used 2.1 SLM Technique 2.2 Tone Reservation 3 Combined SLM and Proposed Tone Reservation 3.1 Simulation and Result 4 Conclusion References A Single-Phase Multi-level Inverter Using a Lesser Number of Switching Devices 1 Introduction 1.1 Proposed MLI configuration 1.2 Proposed Nine-Level Inverter 1.3 Modulation and Control Procedure of the Proposed MLI 2 Simulation and Experimental Results 3 Conclusion Appendix 1 References Symmetric Key Generation and Distribution Using Diffie-Hellman Algorithm 1 Introduction 1.1 Existing Diffie–Hellman Algorithm 1.2 Methodology 1.3 Result and Analysis 1.4 Conclusion References Design of Controllers Using PSO Technique for Second-Order Stable Process with Time Delay 1 Introduction 2 Particle Swarm Optimization Technique 3 Problem Formulation and Controller Parameter Setting 3.1 SMC Controller 3.2 PID Controller 4 Simulation Studies and Results 5 Conclusion References A Green Dynamic Internet of Things (IoT)-Battery Powered Things Aspect-Survey 1 Introduction 2 Summary of Efficient IoT System 3 Greener Communication System 3.1 Data Reduction 3.2 Sleep/Wake-up Techniques 3.3 Radio Techniques 3.4 Routing Approaches 3.5 Power Management Techniques 4 Greener Cloud Computation 5 Greener Data Center 6 Applications of Green IoT 7 Conclusion References An Efficient Layout of Single-Layer Full Adder Using QCA 1 Introduction 2 Experimental Details, Methods and Materials 2.1 QCA Cell 2.2 QCA Wire 2.3 Basic Logical Devices 2.4 Clocking in QCA 2.5 Proposed Layout of Full Adder 3 Observations 4 Conclusion References A Review of mm-Wave Power Amplifiers for Next-Generation 5G Communication 1 Introduction 2 Importance of PA Device Technologies 3 PA Architectures and Considerations 3.1 Doherty Power Amplifier (DPA) in 0.15 µm GaAs Technology 3.2 Two-Stack FET nMOS PAs 3.3 3-Stage, 4-Stack FET CMOS PA 3.4 Multistage 0.13 μm GaN HEMT DPA 3.5 Two-Stage 15 GHz Fully Integrated GaN-Based Power Amplifier 3.6 28 GHz 5G PA in 28 nm Bulk CMOS 4 Parametric Performance of 5G PA 5 Conclusion References Vision-Based Automated Traffic Signaling 1 Introduction 2 Proposed Methodology 2.1 Pre-processing 2.2 Traffic Management Strategy 3 Training 4 Traffic Monitoring GUI 5 Results and Discussion 6 Conclusion 6.1 Future Scope References Performance Comparison of SVM and ANN for Reversible ECG Data Hiding 1 Introduction 2 Watermark Embedding 2.1 Prediction Error Expansion 2.2 Embedding and Extraction 3 Estimation Mechanisms 3.1 SVM 3.2 ANN 4 Results and Discussion 4.1 Experiments and Results 5 Conclusion References Application of Multi-criteria Decision-Making Method for the Evaluation of Tamilnadu Private Bus Companies 1 Introduction 2 Literature Support 2.1 MCDM Techniques 3 Research Methods 4 Case Study—Southern India, Tamilnadu, Chennai Passengers 4.1 Hierarchy Formation 4.2 Application of AHP Method 5 Results of the MCDM–AHP Technique 6 Conclusion References CNC Machine Shop Floor Facility Layout Design Using Genetic Algorithm 1 Introduction 2 Literature Support 3 Research Methodology 4 Case Study: CNC Machine Shop Floor 4.1 Parameters to Be Considered 4.2 MFFC—Existing Layout 4.3 MFFC—Proposed Layout Design—1 4.4 MFFC—Proposed Layout Design—2 4.5 MFFC—Proposed Layout Design—3 5 Results of Genetic Algorithm 6 Conclusion References Source of Treatment Selection for Different States of India and Performance Analysis Using Machine Learning Algorithms for Classification 1 Introduction 2 Literature Review 3 Methodology 3.1 Design Model 4 Conclusion and Future Scope References Ant Lion Optimization Technique for Minimization of Voltage Deviation Through Optimal Placement of Static VAR Compensator 1 Introduction 2 FACTS Allocation in the System 2.1 FACTS Description 2.2 Problem Formulation 3 Ant Lion Optimization—An Overview 3.1 Basic Concept of Ant Lions 3.2 Mathematical Modeling of the ALO 4 Application and Results 4.1 Case 1: Load Factor Multiplied with Real and Reactive Power of Load 4.2 Case 2: Load Factor Multiplied with Real and Reactive Power of Generator and Load 5 Conclusion References On Vector Variational Inequalities and Vector Optimization Problems 1 Introduction 2 Definitions and Preliminaries 3 Relationship Between (MVVI), (SVVI), and (VOP) 4 Existence of Solutions for (MVVI) and (SVVI) References Characterizations of the Solution Sets for Constrained Pseudolinear Semi-infinite Programming Problems 1 Introduction 2 Definitions and Preliminaries 3 Pseudolinear Semi-infinite Programming Problem 4 Pseudolinear Multiobjective Semi-infinite Programming Problem 5 Conclusions References Novel Chaotic Elephant Herding Optimization for Multilevel Thresholding of Color Image 1 Introduction 2 Problem Formulation 3 Optimization 3.1 EHO Algorithm 3.2 Choas Theory 4 CEHO in Multilevel Image Thresholding 5 Experimental Result and Discussion 6 Conclusion References Forecasting Groundwater Fluctuation from GRACE Data Using GRNN 1 Introduction 1.1 GRACE Data 1.2 General Regression Neural Network (GRNN) 2 Methodology 2.1 Study Area 2.2 Groundwater Data of Uttarakhand 2.3 Different Input Used in Formation of GRNN Model 3 Results And Discussion 4 Conclusion References Android Application for Recognition of Indian Origin Agricultural Products 1 Introduction 2 Literature Review 3 Tools and Software’s 3.1 Deep Learning for Image Classification 3.2 Tensorflow 3.3 MobileNets 3.4 Amazon Web Services (AWS) 4 Methodology 4.1 Data Acquisition 4.2 Data Augmentation 5 Results 6 Scope of Future Work References A Fuzzy Logic Based Approach for Prediction of Squamous Cell Carcinoma 1 Introduction 2 Related Work 3 The System Architecture 3.1 Inputs 3.2 Output 4 Simulation Results 5 Conclusion and Future Work References Investigating Multilevel Hesitated Patterns Using Vague Set Theory 1 Introduction 1.1 Architectural Design 1.2 Architectural Components 2 Background 3 Preliminaries 3.1 Terminologies 3.2 Vague Set Theory 3.3 Multilevel Frequent Pattern Mining 4 Proposed Algorithm 5 Illustration 6 Results Interpretation 7 Conclusion References Six Switch Three Phase Five-Level Inverter with Sinusoidal Pulse Width Modulation 1 Introduction 2 Mathematical Modeling and Operation of Proposed Technique 2.1 Inverter Model 2.2 Pulse Width Modulation Technique 2.3 Generation of Switching Pulses Using SPWM Technique 2.4 Proposed Switching Strategy with Output Voltage 2.5 Simulation Results and Discussion 3 Conclusion References AI-Enabled Real-Time Sign Language Translator 1 Introduction 2 Literature Survey 3 Objectives 4 Proposed Methodology 4.1 Image Pre-processing 4.2 Convolutional Neural Network Classifier 5 Results and Discussion 6 Conclusion 7 Future Enhancement References A Comparative Performance of Sorting Algorithms: Statistical Investigation 1 Introduction 2 Relative Performance of Sorting Algorithms for Zero-Truncated Binomial Input 3 Relative Performance of Sorting Algorithms for Zero-Truncated Poisson Input 4 Empirical Complexity of Sorting Algorithms 5 Conclusion References Evolutionary Computing for Designing Cryptographic Primitives for Block Cipher: Challenges and Opportunities 1 Introduction 2 Cryptographic Primitives and Problem Formulation 3 Background 3.1 S-Box Representation 3.2 Cryptographic Properties and Bounds 4 Evolutionary Computing 4.1 Genetic Algorithm 4.2 Memetic Algorithm 5 Practical Results and Discussion 6 Challenges and Future Direction 7 Conclusion References A True Event-Based Metaheuristic Algorithm Optimized AGC Mechanism for a Multi-area Power System 1 Introduction 2 System Description 3 Controller Design and Optimization Technique 3.1 PIDN Controller 3.2 Optimization Technique 4 Results and Discussion 4.1 PSO Versus VPL Algorithm 4.2 Robustness of the Proposed Scheme 4.3 Supremacy of the Proposed Scheme 5 Conclusion Appendix References Wireless Emanation of Braille to Text/Voice and Vice Versa 1 Introduction 2 Literature Survey 3 Proposed System 3.1 Working of System 3.2 Implementation 4 Conclusion References An Exploratory Analysis Pertaining to Stress Detection in Adolescents 1 Introduction 1.1 Sentiment Analysis 2 Related Work 3 Proposed Method 3.1 Data Collection 3.2 Preprocessing 3.3 Sentiment Analysis of Tweets 3.4 Sentiment Classification Using Machine Learning 4 Experiments and Results 5 Conclusion and Future Work References Load Frequency Control of an Interconnected Multi-source Power System Using Quasi-oppositional Harmony Search Algorithm 1 Introduction 2 System Investigated 3 QOHS Optimization Technique 3.1 QOHS Algorithm 3.2 Simulation Results and Discussion 4 Conclusion References An Extensive Investigation of Wavelet-based Denoising Techniques for Various ECG Signals Utilizing Thresholding Function 1 Introduction 2 Related Works 2.1 ECG Signal, Noise and Wavelet Transform 2.2 Thresholding 2.3 Metrics 3 Thresholding Rules 3.1 Visu Rule 4 Proposed New Mixed Function 5 Methodology 5.1 Practical Design 5.2 Simulation Parameters 6 Practical Results 7 Conclusion and Future Works References Effect of Noise on Segmentation Evaluation Parameters 1 Introduction 2 Literature Survey 3 Lung Cancer 4 Reconstruction of Nodules 5 Methodology 6 Results and Evaluation 7 Conclusion and Future Scope References A Review Paper on Feature Selection Techniques and Artificial Neural Networks Architectures Used in Thermography for Early Stage Detection of Breast Cancer 1 Introduction 2 Feature Selection and ANN Architecture Used in Breast Cancer Detection 3 Features Reduction Technique and ANN for Breast Cancer Detection in Early Stage 4 Discussion 5 Conclusion References An Artificial Neural Network Model for Estimating the Flood in Tehri Region of Uttarakhand Using Rainfall Data 1 Introduction 1.1 Study Area 1.2 Working of Artificial Neural Network (ANN) 1.3 Climate Change and Its Impact on Discharge 2 Methodology 3 Results and Discussion 3.1 Performance of the ANN Model 3.2 Pseudo Codes and Program Codes 3.3 Flood Forecast 4 Conclusions and Limitations References Advanced Virtual Apparel Try Using Augmented Reality (AVATAR) 1 Introduction 2 Literature Survey 3 Proposed System 3.1 IoT Smart Mirror 3.2 Hand Gesture Mouse Control 3.3 Adding Virtual Clothes on the Video 3.4 AVATAR Web Interface 3.5 Skin Segmentation and Dominant Tone/Color Extraction 3.6 Recommendation Module 4 Conclusion References A Novel Fault-Detection Scheme for Nearest-Neighbor-Based Reversible Circuits 1 Introduction 2 Background 3 Motivation and Problem Formulation 4 Proposed Method 4.1 Testable Design for Detecting SWAP Gate Missing Fault 5 Experimental Results 6 Conclusion References Automated Railway Gate Control Using Internet of Things 1 Introduction 2 Literature Survey 3 Proposed System 4 Results and Discussion 5 Conclusion References Simulated Annealing Based Algorithm for Tuning LDA Hyper Parameters 1 Introduction 2 Related Work 3 Proposed Algorithm 3.1 SA-LDA Algorithm 4 Experimental Setup and Results 5 Conclusion References A Better Group Consensus Ranking via a Min-transitive Fuzzy Linear Ordering 1 The Group Consensus Ranking Problem 2 Existing Fuzzy Methods 2.1 An Unsuccessful Variant of Eq. (1) 2.2 Another Naive Approach 3 Our New Fuzzy Approach 3.1 A Min-transitive Fuzzy Partial Order on S from Px's 3.2 Extending an FPO to an FLO 3.3 Applying Lemma 1 3.4 Simultaneous Use of Lemma 1 for Multiple Node Pairs 4 A Greedy Heuristic for Optimal Extension 5 Conclusion References A Novel Metaheuristic Approach for Resource Constrained Project Scheduling Problem 1 Introduction 2 The Resource-Constrained Project Scheduling Problem 3 Related Work 3.1 Heuristic Methods 3.2 Metaheuristic Methods 4 Discrete Firefly Algorithm 4.1 Basic Firefly Algorithm 4.2 Discrete Firefly Algorithm (DFA) 5 Benchmark Test Problem and Parameters 6 Experimental Results 7 Conclusion References A Novel Approach to Handle Huge Data for Refreshment Anomalies in Near Real-Time ETL Applications 1 Introduction 2 Reasons for Refreshment Anomalies 3 Reduce Query Execution Time with Updated Records 4 Implementation and Results 5 Conclusion and Future Work References Comparison of Photodetection Capability of Spin Coated TiO2 Thin Film and In2O3 Thin Film Devices 1 Introduction 2 Experiments 3 Results and Discussion 3.1 Field Emission Scanning Electron Microscopy (FESEM) 3.2 Optical Property 4 Conclusion References Development of IDS Using Supervised Machine Learning 1 Introduction 2 Related Work 3 Materials and Methods 3.1 Network Data Packet Collection 3.2 Intrusion Detection Engine 3.3 Alert Generation 4 Experiments and Result Analysis 4.1 Experimental Work Flow 4.2 Result Analysis 4.3 Comparative Analysis 5 Conclusion References Automated Traffic Light Signal Violation Detection System Using Convolutional Neural Network 1 Introduction 2 Literature Survey 3 Proposed Methodology 3.1 Traffic Line Detection 3.2 Vehicle Detection 3.3 Traffic Light Detection 3.4 Detection of Vehicle Crossing 4 Conclusion and Future Work References An Enhanced Butterfly Optimization Algorithm for Function Optimization 1 Introduction 2 Butterfly Optimization Algorithm 3 Symbiosis Organisms Search 3.1 Mutualism Phase 3.2 Commensalism Phase 3.3 Parasitism Phase 4 Proposed Methodology 5 Experimental Set-up and Results 5.1 Numerical Benchmarks and Experimental Criteria 5.2 Compared Algorithms and Parametric Setup 5.3 Results Discussion 6 Conclusion References Dynamic Analysis of Wind Turbine Drivetrain Under Constant Torque 1 Introduction 2 Mathematical Model of the Drivetrain 3 Numerical Analysis 4 Results and Discussion 5 Conclusions References To Build Scalable and Portable Blockchain Application Using Docker 1 Introduction 2 Background 3 Proposed Model 4 Design and Implementation 5 Conclusion and Future Work References Text Summarization: An Extractive Approach 1 Introduction 2 Related Work 3 Methodology Used 3.1 Term Frequency-Inverse Document Frequency 3.2 Graph Method for Summarization 3.3 Text Rank Algorithm 4 Result and Discussion 5 Conclusion References Clifford+T-based Fault-Tolerant Quantum Implementation of Code Converter Circuit 1 Introduction and Motivation 1.1 Previous Work and Problem Definition 2 Preliminaries 2.1 Reversible Circuit and Reversible Gate 2.2 Quantum Circuit and Performance Parameters 2.3 BCD Code, Excess-3 Code and 2`s Complement Code 3 Proposed Technique 3.1 4-Bit BCD-to-Excess-3 Code Converter Quantum Circuit 3.2 4-Bit BCD-to-2's Complement Code Converter Quantum Circuit 4 Comparison with Previous Work and Analysis 5 Conclusion and Future Work References Applying Deep Learning for Discovery and Analysis of Software Vulnerabilities: A Brief Survey 1 Introduction 2 Deep Learning for Software Vulnerability 2.1 Choosing Proper Input Data Representation for Deep Neural Network 2.2 Vulnerability Databases/Resources 2.3 Choosing Deep Neural Network Model/Architecture 3 Conclusion References Fuzzy Decision Making System for Better Staff Performance Appraisal in Institutional Organization 1 Introduction 2 Fuzzy Logic—An Overview 3 Academic Performance Factors—An Overview 4 Structural Design of Proposed System 5 Implementation of FIS 5.1 Factors affecting on Responsibility and Punctuality 5.2 Membership Functions 5.3 Fuzzy Rule 5.4 Results Analysis 6 Conclusion References A Graph-Theoretic Approach for Sustainable New Product Development (SNPD) in Supply Chain Environment 1 Introduction 2 Structural Analysis of a Sustainable New Product Development Using Graph Theory 3 Case Study 4 Conclusions References Generalization Performance Comparison of Machine Learners for the Detection of Computer Worms Using Behavioral Features 1 Introduction 2 Methodology 2.1 Datasets 2.2 Feature Engineering Experiments 2.3 Machine Learning Algorithms 2.4 Machine Learning Experiments 3 Discussion of Results 4 Conclusion References Fully Annotated Indian Traffic Signs Database for Recognition 1 Introduction 2 Related Work 3 Database Design 4 Discussion 5 Conclusion References Streamlining Choice of CNNs and Structure Framing of Convolution Layer 1 Introduction 2 Basic Description of CNN Structure 2.1 Output of CNN 2.2 Fully Connected Layer 2.3 Dropout Layer 2.4 Pooling Layer 2.5 Activation Layer 2.6 Convolutional Layer 3 Transfer Learning 4 Decision Making on Choices of, Pre-trained CNN or Customized CNN 4.1 Pre-trained Versus Custom CNN 4.2 Designing Guidelines for Convolution Layer 5 Implementation and Results of Choices of Pre-trained VGG16 and Custom Designed CNN 5.1 Datasets 5.2 Results 6 Conclusions 7 Future Work References SNAP N’ COOK—IoT-Based Recipe Suggestion and Health Care Application 1 Introduction 2 Literature Survey 3 Proposed System 3.1 Vegetable Recognition Module 3.2 Recipe Suggestion Module 3.3 Health Preference and Calorie Intake Module 3.4 Stale Vegetable Detection 3.5 Mobile Application on the User’s Device 3.6 Online Social Media Platform 4 Conclusion References Accuracy-Based Performance Analysis of Alzheimer’s Disease Classification Using Deep Convolution Neural Network 1 Introduction 1.1 Alzheimer’s Disease 2 Related Work 3 Proposed Methodology 3.1 Data Pre-processing 3.2 Network Architecture 3.3 Database 4 Experimental Setup and Results 5 Summary and Future Scope References Multiple Information Fusion and Encryption Using DWT and Yang-Gu Mixture Amplitude-Phase Retrieval Algorithm in Fractional Fourier Domain 1 Introduction 2 Theory 2.1 Two-Coupled Logistic Maps 2.2 Fractional Fourier Transform 2.3 Yang-Gu Mixture Amplitude-Phase Retrieval Algorithm 3 Proposed Asymmetric Cryptosystem 4 Numerical Results 5 Conclusion References Development of Intrusion Detection System Using Deep Learning for Classifying Attacks in Power Systems 1 Introduction 2 Related Work 3 System Architecture 4 Classification Methodology 4.1 OneR 4.2 K Nearest Neighbour 4.3 Random Forests 4.4 Naïve Bayes 4.5 Support Vector Machines 4.6 Deep Neural Network 5 Experimental Results and Discussion 5.1 Mississippi State University and Oak Ridge National Laboratory Dataset (MSU-ONL Dataset) 5.2 Experimental Results and Discussion 6 Conclusion References An Improved Adaptive Transfer Function for Explosion Spark Generation in Fireworks Algorithm 1 Introduction 2 FWA-ATF 2.1 Adaptive Transfer Function (ATF) 2.2 Generation of ``Explosion Sparks'' 2.3 Random Mutation Operator 2.4 Best Selection Strategy 3 Proposed Method 3.1 Improved ATF 3.2 Generation of Explosion Sparks and Mutated Sparks 3.3 Group Best Selection 4 Experimental Results 4.1 CEC2015 Benchmark Functions 4.2 Parameter Settings 4.3 PC Configuration 4.4 Results 5 Discussion 5.1 Performance Analysis 5.2 Computational Complexities 5.3 Analysis of the Effectiveness of Different Components of FWA-IATFGS 6 Conclusion References NSE Stock Prediction: The Deep Learning Way 1 Introduction 2 Related Works 3 Background 3.1 Neuron 3.2 Neural Network 3.3 Recurrent Neural Network 3.4 Grated Recurrent Unit 3.5 Long Short-Term Memory 4 Experiments 5 Results and Discussions 6 Conclusions and Future Scope References Recent Development of AI and IoT in the field of Agriculture Industries: A Review 1 Introduction 2 Literature Review 3 Discussion 4 Conclusions References Optimized Fuzzy Rule-Based System to Measure Uncertainty in Human Decision Making System 1 Introduction 2 Fuzzy-Based Performance Evaluation—A Literature Review 3 Proposed Methodology 3.1 Scores in Test 3.2 Fuzzification 3.3 Fuzzy Rule Base and Inference 3.4 Evaluation of Performance Value by Defuzzification 3.5 Enhanced GA-Based Fuzzy Rules 4 Experimental Results Generation 4.1 Discussion and Analysis 5 Conclusion References A Review on Detection of Breast Cancer Cells by Using Various Techniques 1 Introduction 2 Literature Work 3 Existing Methodologies 4 Result 5 Conclusion 6 Future Scope References Analysis of Security Issues and Possible Solutions in the Internet of Things for Home Automation System 1 Introduction 2 Literature Review 3 Existing Techniques 3.1 Security System Using Zigbee 3.2 Symmetric Encrypted Scheme with Secret Keys 3.3 Smart Surveillance Monitoring System 3.4 Authentication System Using Voiceprint 3.5 Biometric-Based IoT System 3.6 Three-Level Kerberos Authentication 4 Result 5 Applications 6 Conclusion and Future Scope References Utilization of the Internet of Things in Agriculture: Possibilities and Challenges 1 Introduction 2 Literature Review 2.1 During Cultivation of the Crop 2.2 Harvesting 2.3 Packaging 2.4 Transporting 2.5 At the Retail Stores 3 Existing Techniques 3.1 Polyhouses 3.2 Robotic Arms 3.3 RFID Tags 3.4 Sensors 3.5 Global Positioning System (GPS) 3.6 Cloud Computing 4 Result 5 Applications 6 Conclusion References Study on Real-Time Face Recognition and Tracking for Criminal Revealing 1 Introduction 2 Literature Evaluation 3 Techniques of Criminal Detection Using Video Surveillance 3.1 Automatic Detection of Crimes Using Motion Analysis Technique 3.2 Real-Time Monitoring Scheme Utilizing the Design Identical Technique 3.3 Tracking People Using Facial Recognition Technique 3.4 Skin Filter Method 4 Results and Discussion 5 Applications 6 Conclusion References Analysis of Precision Agriculture Technique by Using Machine Learning and IoT 1 Introduction 2 Literature Work 3 Existing Methodologies 4 Design Methodology 5 Result 6 Applications 7 Conclusion References Dispersive Nature of the FEL Amplifiers in the Whistler Mode 1 Introduction 2 Evaluation of Raman Regime in FEL Amplifiers 3 Momentum and Efficiency in FEL Amplifiers 4 Results and Discussion 5 Conclusion References An Improved Energy-Efficient Faulty Information Extraction Scheme Using PFDIAES and PFDIF Algorithms 1 Introduction 2 Proposed Work 3 PFDIAES and PFDIF Algorithms 4 Gang Attack with Injection of False Data 5 Results and Discussion 5.1 End-to-End Delay 5.2 Packet Drop 5.3 Packet Delivery Ratio 5.4 Throughput 5.5 Energy Efficiency 6 Conclusion References Cyber Attacks and Security—A Critical Survey 1 Introduction 2 Related Work 2.1 Cyber Crime 2.2 Types of Cybercrime 3 Analysis Survey 4 Case Studies 4.1 Call Fraud in Mphasis Citibank Pune 4.2 The Bank NSP Case 4.3 SONY.SAMBANDH.COM Case 5 Is Internet Safe 5.1 Impact of Social Media 5.2 Cyber-Terrorism 6 Prevention and Measure 6.1 Initiatives by the Government of India 6.2 Ways to Protect Ourselves 7 Conclusion References A Comparative Study on Different Techniques of Sentimental Analysis 1 Introduction 2 Related Work 3 Methods Under Comparison for Sentimental Analysis 3.1 Machine Learning 3.2 Stanford NLP Libraries 3.3 Sentimental Sentence Dictionary 4 Analysis Survey 5 Discussion 6 Conclusion References An Approach to Select the Proper Combination within Positional and Non-positional Average Values of Features in Protein Classification 1 Introduction 2 Literature Review 3 Positional-Average Molecular Weight & Positional-Average Isoelectric Point: The Feature Values of Protein Classification 4 Problem Identification Along with Research Methodology 5 Experimental Result 6 Conclusion References Areca Nut Disease Detection Using Image Processing 1 Introduction 2 Related Work 3 Problem Definition 4 Background Process 4.1 Segmentation 4.2 Feature Extraction 4.3 Spot Region Detection 5 Conclusion References Simulink Simulation for Predicting Thermodynamic Properties of Water–Lithium Bromide Solution Using ANN 1 Introduction 2 Artificial Neural Network 3 MATLAB/Simulink Environment 4 Results and Analysis 4.1 Training and Validation of ANN 5 Conclusions References A New Bit Plane Specific Longest Repeating Pattern Test for Statistical Analysis of Bit Sequences 1 Introduction 2 Background 2.1 Bit Plane 2.2 Chi-Square (χ2) Goodness of Fit 3 Proposed Bit Plane Specific Statistical Test 4 Experimental Setup 5 Experimental Results 5.1 Performance of LRP Test Over NIST Suite 6 Conclusion References Intelligent Interference Minimization Algorithm for Optimal Placement of Sensors using BBO 1 Introduction 2 Related Work 3 Classical Biogeography-Based Optimization 3.1 Migration Phase 3.2 Mutation Phase 4 Network Model and Problem Formulation 4.1 Network Model 4.2 Problem Formulation 5 Proposed BBO-Based Algorithm 5.1 Encoding of Habitats 5.2 Initialization of Habitats 5.3 Derivation of Fitness Function 5.4 Migration 5.5 Mutation 6 Results and Discussion 7 Conclusion References Classification of SOA-Based Cloud Services Using Data Mining Technique 1 Introduction 2 Proposed Approach 3 Experiments and Analysis 4 Related Work 5 Conclusion References A Novel Clustering-Based Gene Expression Pattern Analysis for Human Diabetes Patients Using Intuitionistic Fuzzy Set and Multigranulation Rough Set Model 1 Introduction 2 Preliminaries 2.1 Construction of Intuitionistic Fuzzy Set 2.2 Rough Set Model for Microarray 3 Proposed Methodology 3.1 Preprocessing 3.2 Conversion to Fuzzy and IFS Plane 3.3 Multigranulation Rough-Fuzzy c-Means Clustering 4 Experimental Results and Discussion 4.1 Description of Datasets 4.2 Performance Evaluation Metrics and Baseline Methods 4.3 Gene Clustering Analysis 4.4 Validation 5 Conclusion References Investigation on HRV Signal Dynamics for Meditative Intervention 1 Introduction 2 Materials and Methods 2.1 Time Domain Parameters 2.2 Frequency Domain Parameters 2.3 Nonlinear Dynamical Parameters 3 Results and Discussion 4 Conclusion References A Review on Deep Learning-Based Channel Estimation Scheme 1 Introduction 2 Channel Estimation Theory 3 The Overview of Different Deep Learning-Based Algorithms for Channel Estimation 4 Open Research Challenges 5 Conclusion References Patient Diabetes Forecasting Based on Machine Learning Approach 1 Introduction 2 Literature Review 3 Diabetes Forecasting System Model 4 Investigational System and Method 4.1 Software Used 4.2 Experimental Setup 4.3 Machine Learning Algorithms Used for Experimental Setup 5 Discussion and Conclusion References Pose Invariant Face Recognition Using Principal Component Analysis 1 Introduction 2 Proposed Methodology 2.1 Face Frontalization 2.2 Face Recognition 3 Experimental Evaluation 4 Results 4.1 Comparison on Color FERET Dataset 5 Conclusions References An Autonomic Resource Allocation Framework for Service-Based Cloud Applications: A Proactive Approach 1 Introduction 2 Literature Survey 3 Autonomic Resource Allocation Framework 3.1 Mathematical Model 3.2 Monitor Phase 3.3 Analysis Phase 3.4 Planner Phase 3.5 Executor Phase 4 Simulation Setup and Results Analysis 5 Conclusions and Future Work References Index Point Detection and Semantic Indexing of Videos—A Comparative Review 1 Introduction 2 Motivation 3 Video Structure Analysis 4 Literature Review 4.1 Online Video Lecture 4.2 Video Segmentation 4.3 Text and Feature Extraction for Videos 4.4 Text Similarity 4.5 Video Indexing 4.6 Learning in Video Analysis 5 Conclusion References Classification of Neuromuscular Disorders Using Machine Learning Techniques 1 Introduction 2 Literature Survey 3 Research Methodology 3.1 Data Preparation 3.2 Tools 3.3 Feature Selection 3.4 Confusion Matrix 3.5 Performance Evaluation 3.6 Evaluation Metrics 3.7 Results 4 Conclusion and Future Work References Comparative Study of the Ultrasonic and Infrared Person Counter 1 Introduction 2 Hardware Components for Counter 2.1 Arduino UNO R3 Board 2.2 LCD Display 2.3 IR Sensor 2.4 Ultrasonic Sensor 2.5 Jumper Wires 2.6 Breadboard 2.7 Arduino USB Cable 3 Circuit Diagram 4 Methodology 5 Types of Counter 5.1 Infrared Sensor 5.2 Ultrasonic Sensor 6 Conclusion References Fuzzy Logic Based Improved Control Design Strategy for MPPT of Solar PV Systems 1 Introduction 2 Photovoltaic System Description and Characteristics 3 Proposed Methodology for Fuzzy Logic Controller of MPPT 4 DC-DC Converter Analysis 5 Boost Converter 6 PI Controller for Buck Converter 7 Performance Evaluation and Discussion 8 Conclusion References Evaluation of Soil Physical, Chemical Parameter and Enzyme Activities as Indicator of Soil Fertility with SFM Model in IA–AW Zone of Rajasthan 1 Introduction 2 Materials and Methods 2.1 Study Area 2.2 Climate and Vegetation 2.3 Soil Sampling 2.4 Method of Physico-chemical and Enzyme Activities 2.5 Statistical Analysis 2.6 SFM Model 3 Result and Discussions 3.1 Physical Parameter Evaluation of Farm Land Soil (FLS) 3.2 Physical Parameter Evaluation of Waste Land Soil (WLS) 3.3 Chemical Parameter Evaluation of Farm Land Soil (FLS) 3.4 Chemical Parameter Evaluation of Waste Land Soil (WLS) 3.5 Enzyme Activities Evaluation of Farm Land Soil (FLS) 3.6 Enzyme Activities Evaluation of Waste Land Soil (WLS) 3.7 DI Value Between FLS and WLS 3.8 Data Analysis by SFM Model 4 Conclusions References Author Index