𝔖 Scriptorium
✦   LIBER   ✦

📁

International Conference on Communication, Computing and Electronics Systems: Proceedings of ICCCES 2020 (Lecture Notes in Electrical Engineering, 733)

✍ Scribed by V. Bindhu (editor), João Manuel R. S. Tavares (editor), Alexandros-Apostolos A. Boulogeorgos (editor), Chandrasekar Vuppalapati (editor)


Publisher
Springer
Year
2021
Tongue
English
Leaves
821
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book includes high-quality papers presented at the International Conference on Communication, Computing and Electronics Systems 2020, held at the PPG Institute of Technology, Coimbatore, India, on 21–22 October 2020. The book covers topics such as automation, VLSI, embedded systems, integrated device technology, satellite communication, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, Internet of Things, precision models, bioinformatics, and healthcare informatics.

✦ Table of Contents


Preface
Contents
About the Editors
Security System for Big Data Cloud Computing Using Secure Dynamic Bit Standard
1 Introduction
2 Security in BD-CC
3 Security Attacks
3.1 Space Name System (DNS)
3.2 Space Hijacking
3.3 IP Spoofing Attack
3.4 Disavowal of Service (DoS) Attacks
3.5 Transmission Control Protocol Synchronize (TCP SYN) Flooding Attack
4 Methodology
5 Results
6 Conclusion
References
Distributed DBSCAN Protocol for Energy Saving in IoT Networks
1 Introduction
2 Related Work
3 The DBSCAN Algorithm
4 Energy-Efficient Distributed DBSCAN Protocol
5 Performance Evaluation, Analysis, and Discussion
6 Conclusion
References
Hardware Implementation of Automatic Power Source Controller Cum Power Optimizer
1 Introduction
2 Methodology
2.1 AT Mega 2560 Microcontroller
2.2 Relay Controller Module
2.3 AC to DC Converter
2.4 Battery Bank
2.5 Chargıng Controller and Battery Protector
2.6 Current Sensor
2.7 Display Module
2.8 Thermal Protection to the System
2.9 Voltage Transformer
2.10 Data Access Port
2.11 Fuse
2.12 Slave Module
3 Results and Discussion
4 Conclusion and Future Scope
References
Texture-Based Face Recognition Using Grasshopper Optimization Algorithm and Deep Convolutional Neural Network
1 Introduction
2 Literature Survey
3 Methods
3.1 Dataset Description
3.2 Image Pre-processing
3.3 Feature Extraction
3.4 Feature Optimization
3.5 Classification
4 Experimental Investigation
4.1 Quantitative Investigation on FEI Face Dataset
4.2 Quantitative Investigation on ORL Dataset
4.3 Comparative Study
5 Conclusion
References
An Interactive Framework to Compare Multi-criteria Optimization Algorithms: Preliminary Results on NSGA-II and MOPSO
1 Introduction
2 Multi-criteria Optimization
2.1 Metaheuristics
3 Comparison Methodology
3.1 Error Ratio (E)
3.2 Generational Distance (DG)
3.3 Spacing (S)
4 Experimental Setup
4.1 ZDT1 Function
4.2 ZDT2 Function
4.3 ZDT3 Function
4.4 ZDT4 Function
4.5 ZDT6 Function
4.6 Parameters
5 Results and Discussion
5.1 ZDT1 Results
6 Conclusion and Future Scope
References
A Dynamic Programming Approach for Power Curtailment Decision Making on PV Systems
1 Introduction
2 Background and Problem Statement
3 Formulation of the Proposed Mathematical Model
4 Results and Discussion
5 Conclusion and Future Scope
References
Arabic Braille Numeral Recognition Using Convolutional Neural Networks
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Description
3.2 Preprocessing
3.3 Deep Residual Learning
4 Results and Discussion
5 Conclusion
References
In-Silico Modeling of Sleep Stage Classification System Using Covariance Normalization
1 Introduction
2 Methodology
2.1 Dataset
2.2 Feature Extraction and Feature Fusion
2.3 Baseline System
2.4 Covariance Normalization
3 Results and Discussion
3.1 Support Vector Machines (SVMs)
4 Conclusion
References
Comparative Analysis of LSTM, One-Class SVM, and PCA to Monitor Real-Time Malware Threats Using System Call Sequences and Virtual Machine Introspection
1 Introduction
2 Related Work
3 System Call Traces with VMI
3.1 Feature Engineering for System Call Sequences
3.2 Feature Selection
4 Detection Algorithms
4.1 Long Short-Term Memory (LSTM) Sequence to Sequence (Seq-Seq)
4.2 One-Class Support Vector Machine (OCSVM)
5 Experimental Setup
6 Experimental Results and Discussion
6.1 LSTM Seq-Seq Model Results
6.2 OCSVM Model Results
7 Conclusion
8 Future Scope
References
SBP: Preparation of Schema Elements to Schema Matching
1 Introduction
2 Related Work
3 Problem Statement
4 SBP: The Sense-Based Pre-matching
4.1 Words Sets Generator
4.2 Words Qualifier
5 Experimental Results
5.1 Experimental Settings
5.2 Results and Discussions
6 Conclusions and Future Work
References
Acceptance of Biometric Authentication Security Technology on Mobile Devices
1 Introduction
2 Literature Review
3 Significance of This Study
4 Methodology
4.1 Participants of the Study
4.2 Research Instruments
5 Results
5.1 Demographic Characteristics
5.2 Statistical Analysis
5.3 Regression Analysis
6 Discussion
7 Limitations and Suggestions for Further Research
8 Conclusion
References
Impact of Agile Methodology Use on Project Success in South African Banking Sector
1 Introduction
1.1 Problem Statement
2 Related Work
2.1 Agile Project Success
3 Proposed Work
3.1 Sample Size and Profile Participants
3.2 Data Collection
3.3 Data Analysis
4 Results Analysis
4.1 Correlation
4.2 Regression
5 Discussions of Key Findings
6 Conclusion
References
Automated Industrial Sound Power Alert System
1 Introduction
2 Design and Working
2.1 Software Used
3 Results and Discussion
4 Conclusion
References
Predicting Early Readmission of Diabetic Patients: Toward Interpretable Models
1 Introduction
2 Related Works
3 Methodology
3.1 Dataset
3.2 Data Preparation and Feature Selection
3.3 Data Sampling
3.4 Classifiers
3.5 Rule-Based Classifiers
4 Results
4.1 Evaluation Metrics
4.2 Results Analysis
5 Discussion
6 Conclusion
References
Design and Analysis of Mobile-Based Tourism Security Application: Concepts, Artifacts and Challenges
1 Introduction
2 Literature Review
3 Research Framework
4 System Analysis and Design (Concepts and Artifacts)
4.1 User Requirements and Functional Description
4.2 Conceptual Design
4.3 Use Case Model
4.4 The Radius R-algorithm
4.5 User Interface Design
5 System Design Verification and Validation
6 System Security and Testing
7 Challenges and Limitations of the System
8 Conclusion
References
An Efficient Approach to Software Fault Prediction
1 Introduction
2 Related Work
3 Dataset Overview
4 Proposed Model for Fault Detection
4.1 Data Cleaning
4.2 Data Balancing
4.3 Feature Selection Techniques
4.4 Classification Algorithms
5 Results and Analysis
5.1 Comparison With no Balancing
5.2 Comparison with no Feature Selection
5.3 Comparison with Other Feature Selection Methods
6 Conclusion and Future Scope
References
Indoor Navigation Assistant for Visually Impaired (INAVI)
1 Introduction
2 Related Work
3 Proposed Work
4 Result Analysis
5 Novelty
6 Conclusion and Future Scope
References
On the Evaluation of Effectiveness of eLearning and Blended Learning
1 Introduction
2 Methods
3 Effectiveness of eLearning
4 Effectiveness of the Process of Teaching
5 Findings
6 Conclusion
References
Design and Performance Analysis of GaAs-Based P-i-N Photovoltaic Using AlGaAs as Window Layer
1 Introduction
2 Structure Analysis
2.1 Proposed Structure
2.2 AlGaAs Seeing that Window Coating
3 Computational Methodology
3.1 P-i-N Solar Cell
4 Numerical Results and Discussion
4.1 The Window Layer’s Consequence of Thickness
4.2 P+ Coating’s Consequences of Thickness
4.3 P-Coating’s Consequences of Thickness
4.4 Intrinsic Coating’s Consequences of Thickness
4.5 N-Coating’s Consequences of Thickness
4.6 n+ Coating’s Consequences of Thickness
5 Conclusion
References
Impact Analysis of Anti-Reflection Coating on P-i-N Solar Device
1 Introduction
2 Device Structure
3 Simulation Results
3.1 SCAPS-1D as the Simulation Tool
4 Results and Discussion
5 Conclusion
6 Limitation and Future Scope of This Study
References
Microstrip Antenna with SVASTU Slot for UWB Applications
1 Introduction
2 Microstrip Antenna
3 Antenna Design
4 Simulation Result
5 Conclusion
References
Design and Implementation of a Smart Helmet System for Underground Miner’s Safety
1 Introduction
2 Literature Review
3 Hardware Block Diagram of Helmet
3.1 Block Diagram of Transmitter
4 Hardware Desıgn
4.1 System Result
5 Result Analysis
6 Conclusion and Future Scope
References
A Brief Review on Instance Selection Based on Condensed Nearest Neighbors for Data Classification Tasks
1 Introduction
1.1 Vector Quantization
1.2 Condensed Methods
1.3 Machine Learning and Feature Selection
2 Theoretical Background and Overview
2.1 Problem Definition
2.2 Prototype-Based Approach on Unsupervised Learning
2.3 The Condensed Nearest Neighbor Rule (CNN Rule)
3 Results and Discussion
3.1 Metric Considerations and Visual Scheme for the CNN
4 Conclusion
References
Virtual Group Movie Recommendation System Using Social Network Information
1 Introduction
2 Background
3 Methodology
4 Result Evaluation of the Prototype
5 Conclusion
References
Hindi to English: Transformer-Based Neural Machine Translation
1 Introduction
2 Motivation
3 NMT Model Architecture
3.1 Structure
3.2 Working
4 Experimental Setup
4.1 Dataset
4.2 Data Preprocessing
4.3 Back-Translation
4.4 Training Details
5 Results
6 Conclusion
References
CNN-Based Alphabet Identification and Sorting Robotic Arm
1 Introduction
2 Background
3 Proposed System Design
3.1 New Alphabets Dataset
3.2 Alphabets Image Processing
3.3 Alphabets Recognition Through CNN
3.4 Hardware Design and Implementation
4 Experimental Results
5 Conclusions
References
Lung Cancer Detection from LDCT Images Using Deep Convolutional Neural Networks
1 Introduction
2 Literature Review
3 Methodology
3.1 Classification Through Deep CNN
3.2 Experimental Data
4 Experimental Results
5 Conclusion
References
Global Integration and Distribution of Data Through Machine Learning for COVID-19
1 Introduction
2 Literature Survey
3 Methodology
3.1 Alleviate the Workload of Medical Experts Through Machine Learning
3.2 Essential Data Integrity
3.3 SIR Model with Machine Learning Regressions
3.4 Procedure for Standard Logistic Regression Model
4 Results
5 Conclusion
References
Role of Internet of Things and Machine Learning in Finding the Optimal Path for an Autonomous Mobile Robot
1 Introduction
2 Related Work
2.1 Blend Search
2.2 Grid-Based Method
2.3 Divide and Conquer Method
2.4 Cbappa
2.5 D and A Algorithms
2.6 Ant Colony Optimization
2.7 Bee Colony Optimization
2.8 Gray Wolf Optimization
3 Proposed Approach
3.1 Obstacle Size Prediction
3.2 Deep Neural Network Model
4 Result Analysis
5 Conclusion
References
Overview of Blockchain Technology: Applications and Use Cases
1 Introduction
2 Blockchain Use Cases—Payments and Securities Trading in Financial Services
2.1 Cross-Border Payments—Stellar Open Network
2.2 Permissioned Network for Payments
2.3 Ripple Protocol and Network—Financial Services
3 Compliance and Mortgage
3.1 Compliance (KYC and AML)
3.2 Trade Finance Network
4 Blockchain for Global Trade Logistics
4.1 IBM Blockchain for Trade Logistics
4.2 Tradelens
5 Blockchain: Healthcare
5.1 GuardTime
5.2 Loyyal
6 Blockchain in Energy Markets: Gridchain
6.1 Bloomberg New Energy Finance (BNEF)
7 Blockchain in Government
7.1 Blockchain Use Cases in Government—Worldwide
8 Conclusion
References
Tuberculosis Detection from CXR: An Approach Using Transfer Learning with Various CNN Architectures
1 Introduction
2 Methods
2.1 Dataset
2.2 Methodology
3 Results
4 Discussion
5 Conclusion
References
E-commerce Logistic Route Optimization Deciphered Through Meta-Heuristic Algorithms by Solving TSP
1 Introduction
1.1 Traveling Salesman Problem
2 Related Work
2.1 Differential Evolution (DE)
2.2 Genetic Algorithm (GA)
2.3 Particle Swarm Optimization Algorithm (PSO)
2.4 Simulated Annealing (SA)
2.5 Ant Colony Optimization Algorithm (ACO)
2.6 Artificial Fish Swarm Algorithm (AFSA)
3 Proposed Work Along with Its Experimental Results
4 Conclusion
References
A Comparative Study on the Performance of Deep Learning Algorithms for Detecting the Sentiments Expressed in Modern Slangs
1 Introduction
2 Related Works
3 Proposed Method
4 Result and Discussion
5 Conclusion and Future Scope
References
Exploration of Varied Feature Descriptors for Diabetic Retinopathy Through Image Classification
1 Introduction
2 Related Work
3 Proposed Work
3.1 Preprocessing
3.2 Feature Extraction
3.3 Local Binary Pattern (LBP)
3.4 Local Directional Pattern (LDP)
3.5 Histogram-Oriented Gradients (HOG)
3.6 Classification Methods
4 Result Analysis
4.1 Data Set and Implementation
4.2 Discussions
5 Conclusion
References
News Topic Classification Using Machine Learning Techniques
1 Introduction
2 Literature Survey
3 Implementation Details
3.1 Pre-processing
3.2 Dataset Used
4 Evaluation Metrics
5 Results
5.1 Dataset Used
5.2 Confusion Matrix
5.3 Receiver Operating Characteristic (ROC)
6 Conclusion
References
Blockchain for Management of Natural Resources Using Energy Trading as a Platform
1 Introduction
2 Renewable and Non-renewable Resources
3 Blockchain Technology in Rainwater Management
3.1 Water Transparency
3.2 Cooperation for Smart Water Management
4 Smart Grid in Rainwater Management
4.1 User Feasting Outline Demonstrating a Leak
4.2 Need for Smart Grid in Water Utilities
5 Major Problems of Water
5.1 Water Conflict
5.2 Water Monopolies
5.3 Prediction
6 Proposed Model
7 Conclusion
References
Machine Learning Model for Anomaly Detection in Big Data for Health Care Applications
1 Introduction
2 Methods and Background Studies
3 Challenges of Anomaly Detection System (ADS)
3.1 Fuzzy-Based Detection Factors
3.2 Dataset
3.3 Model Classification SVM
3.4 Genetic Operators
3.5 Selection Operator
4 Role of Mutation
5 Result and Discussion
6 Conclusion
References
Pilot Decontamination Algorithm with Iterative Weighted Graph Coloring Scheme for Multi-cell MIMO System in 5G Applications
1 Introduction
2 Literature Survey
3 Proposed Pilot Decontamination Algorithm
4 Proposed WGC-Based Pilot Contamination Scheme
4.1 Problem Formulation for Optimization
4.2 Modified EWIG Construction
4.3 Modified EWIG and WGC-Based Pilot Contamination Scheme
5 Simulated Results and Discussion
5.1 CDF Comparison
5.2 SNR Comparison
6 Conclusion
References
Synthesis Approach for Emotion Recognition from Cepstral and Pitch Coefficients Using Machine Learning
1 Introduction
1.1 Outline of the Work
2 Prior Research
3 Feature Extraction
3.1 Mel-Frequency Cepstral Coefficients (MFCC)
3.2 Pitch
4 Machine Learning Algorithms
4.1 K-Nearest Neighbors Algorithm
4.2 Decision Tree
5 Ryerson Audio-Visual Database of Emotional Speech and Song (RAVDESS)
6 Experimental Results
6.1 Results on K-NN Classifier
7 Comparative Study
8 Conclusion
References
Performance Analysis of Deep CNN Assisted Optimized HIV-I Protease Cleavage Site Prediction with Hybridized Technique
1 Introduction
2 Literature Survey
3 Material and Methods
4 Results and Discussion
5 Conclusion
6 Future Scope
References
Artificial Neural Network for Identification and Classification of Natural Body Marks
1 Introduction
2 Literature Review
3 Problem Statement
4 Methodology
4.1 Image Acquisition and Preprocessing
4.2 Segmentation (Active Contour)
4.3 Feature Extraction
4.4 Artificial Neural Network
5 Results and Discussions
5.1 Experimental Results of the Work
5.2 Comparative Analysis
6 Conclusion and Future Scope
References
Improvised Distributed Data Streaming Scheduler in Storm
1 Introduction
2 Background
3 Related Work
4 Proposed Algorithm
5 Results
6 Conclusions and Future Work
References
Efficient Mining of Rare Itemsets
1 Introduction
2 Literature Survey
3 Research Methodology
3.1 HLRPM Algorithm
3.2 Proposed Algorithm
4 Illustration of the Proposed Algorithm
5 Results and Analysis
6 Conclusion and Future Enhancement
References
EDoS-BARRICADE: A Cloud-Centric Approach to Detect, Segregate and Mitigate EDoS Attacks
1 Introduction
1.1 Methodology
1.2 Organization
2 Literature Survey
3 Experimental EDoS Attack
4 Experimental Results of EDoS Attack and Observation
5 Proposed EDoS-Barricade
5.1 Auto-Scaling-Based EDoS Detection
5.2 Support Vector Machine (SVM)
5.3 Behavior Heuristics-Based EDoS Segregation
6 EDoS-Barricade Result Observation and Verification
7 Conclusion and Future Scope
References
User Query-Based Automatic Text Summarization of Web Documents Using Ontology
1 Introduction
2 Current Practice and Research
3 Ontology Approach in Text Summarization
4 Results and Discussions
5 Conclusion and Future Work
References
Quantum Chaos-Based Encryption Technique for Transmission of Medical Images
1 Introduction
2 Related Work
3 Background Work
3.1 Logistic Maps
4 Proposed Encryption Process
4.1 Network-Centric Logistic Chaotic Maps
4.2 Quantum Permutations
4.3 Chaotıc Diffusion
4.4 Complete Encryption Process
5 Experimental Setup
6 Various Analysis
6.1 Key Sensitivity Analysis
6.2 Statistical Performance Analysis
6.3 Adjacent Pixel Point Correlation Analysis
6.4 Information Entropy Analysis
6.5 Computational Complexity Analysis
7 Conclusion and Future Scope
References
Secure Voting for Democratic Elections: A Blockchain-Based Approach
1 Introduction
2 Background and Motivation
3 Proposed Methodology
3.1 Roles and Responsibilities
3.2 Overall Working of the Proposed Voting System
4 Implementation Details
5 Results
5.1 Comparison with Existing Solution
6 Conclusion
References
Convergence Analysis of Self-Adaptive Equalizers Using Evolutionary Programming (EP) and Least Mean Square (LMS)
1 Introduction
2 Concept of Inter-Symbol Interference
3 Process of Equalization
3.1 Channel Equalization
3.2 Adaptive Channel Equalizer
4 Problem Formulation
5 Formulation of LMS Algorithm
6 Evolutionary Programming
6.1 Basic Steps in Evolutionary Programming
6.2 Tournament Selection
7 Working of EP-Based LMS Algorithms
8 Simulation Results
9 Conclusion
References
Modified E-Shaped Resonator-Based Microstrip Dual-Mode Bandpass Filter
1 Introduction
2 Modified E-Shaped Dual-Mode Resonator
2.1 Filter I
2.2 Filter II
3 Conclusion
References
An Analysis of Air Quality by Vehicular Exhausts
1 Introduction
1.1 Major Types of Air Pollution Control
2 Literature Survey
3 Proposed System
3.1 Vehicle
3.2 Sensors
3.3 Communication Module with Cloud
3.4 Processing Module
4 Result and Analysis
5 Conclusion
References
Secured Data Encryption and Decryption for Transmission in Device Independent Systems
1 Introduction
2 Proposed System
3 System Design
4 Input Design
5 Output Design
6 Implementation
7 Conclusion
References
Electrical Performance of Single Gate and Double Gate MOSFET to Optimize the Gate Length
1 Introduction
2 Configuration of DG MOSFET
3 Results and Discussion
4 Conclusion
References
Prediction of Diabetes Disease Using Machine Learning Model
1 Introduction
2 Supervised Learning Algorithms
2.1 Decision Tree
2.2 Artificial Neural Network (ANN)
2.3 Naive Bayes
2.4 Logistic Regression (LR)
3 Predictive Model Construction for Diabetic Detection
4 Results and Discussion
5 Conclusion
References
Infrared Small Target Detection Based on Phase Fourier Spectrum Transform
1 Introduction
2 Methodology: Method Based on Human Visual System
2.1 Brief Description of a Human Visual System
2.2 Theory of Phase Fourier Transform
2.3 Steps of the Detection Method for Small Object
3 Experimental Result and Analysis
3.1 Suppression Result of Image Sequences for Background
3.2 Evaluation Indicators
3.3 Experimental Result Comparison with the Other Methods
4 Conclusion
References
Knowledge Based Analytical Tool for Identifying Children with Dyscalculia
1 Introduction
2 Related Work
3 Proposed Knowledge-Based Tool
4 Decision Tree Classification Methodology
5 Results
6 Conclusion and Future Enhancement
References
RSA Algorithm Using Performance Analysis of Steganography Techniques in Network Security
1 Introduction
2 Literature Review
3 Performance Analysis of Steganography Using RSA Algorithm
3.1 RSA Algorithm
4 Result Analysis of Network Security
5 Conclusion
References
Performance of Two-Link Robotic Manipulator Estimated Through the Implementation of Self-Tuned Fuzzy PID Controller
1 Introduction
2 Dynamic Model for Manipulator
2.1 Various Controller Structure
3 Genetic Algorithm for Optimization
3.1 PID Optimized Controller Structure
3.2 Fuzzy PD Controller Optimized Structure
3.3 Fuzzy PI Optimized Structured
3.4 Optimized Self-Tuned Fuzzy PID (STFPID) structure
4 Results and Discussions
5 Conclusion
References
Rule Based Part of Speech Tagger for Arabic Question Answering System
1 Introduction
1.1 Arabic Natural Language Processing
2 Related Work
3 Proposed System
3.1 Data Collection
3.2 Pre-processing Component
3.3 Stemming
3.4 Morphological Analyzer
3.5 Tag Generation
3.6 Rule Based POS Tagger
4 Conclusion and Future Scope
References
Change Detection in Land Use-Land Cover Using Convolutional Neural Network
1 Introduction
2 Dataset Description and Normalization
3 Algorithm
4 Methodology
5 Results
6 Conclusion and Future scope
References
An Efficient Ant Colony-Based Self-adaptive Routing Strategy for IoT Network Model
1 Introduction
2 Related Works
3 Methodology
4 Numerical Results
5 Conclusion
References
Optimizing Node Coverage and Lifespan of Wireless Body Area Network Using Hybrid Particle Swarm Optimization
1 Introduction
2 Review Literature
3 Methods and Materials
3.1 Genetic Algorithm
3.2 Discrete PSO
3.3 Simulated Annealing
4 HPSO-Based Energy Model for Extended WBAN Lifespan
4.1 Fitness Function
5 Results and Discussions
5.1 Packet Delivery Ratio
5.2 Throughput
5.3 End-To-End Delay
6 Conclusion and Future Scope
References
Collective Examinations of Documents on COVID-19 Peril Factors Through NLP
1 Introduction
2 Literature Survey
3 Methodology
4 Result Analysis
5 Conclusion
References
Design and Development of Topic Identification Using Latent Dirichlet Allocation
1 Introduction
2 LDA Criterion
3 Topic
3.1 Topic Models
3.2 Topic Modeling Using LDA
4 Procedure of LDA
5 Notations of LDA Algorithm
6 Conclusion
References
Hand Gesture Controlled Robot
1 Introduction
1.1 Proposed Work
1.2 Block Diagram
2 Literature Survey
2.1 Proposed Methodology
2.2 Components
3 Conclusion
4 Future Enhancements
References
Interdependence in Artificial Intelligence to Empower Worldwide COVID-19 Sensitivity
1 Introduction
2 Literature Survey
3 Methodology
3.1 Communicating Medical Information as Well as a Framework
3.2 Digital Collaboration and Regional Priorities
4 Result Analysis
5 Conclusion
References
Design VLSI Architecture for 2D DWT Using NEDA and KSA Technique
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Example of Multiplier-Less HPS
4 Simulation Result
5 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Proceedings of Third International Confe
✍ V. Bindhu (editor), João Manuel R. S. Tavares (editor), Ke-Lin Du (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book includes high quality research papers presented at the International Conference on Communication, Computing and Electronics Systems 2021, held at the PPG Institute of Technology, Coimbatore, India, on 28-29 October 2021. The volume focuses mainly on the research trends in cloud compu

International Conference on Communicatio
✍ V. Bindhu (editor), Joy Chen (editor), João Manuel R. S. Tavares (editor) 📂 Library 📅 2020 🏛 Springer 🌐 English

<p><span>This book includes high impact papers presented at the International Conference on Communication, Computing and Electronics Systems 2019, held at the PPG Institute of Technology, Coimbatore, India, on 15-16 November, 2019. Discussing recent trends in cloud computing, mobile computing, and a

Proceedings of the 4th International Con
✍ Dilip Kumar Sarkar (editor), Pradip Kumar Sadhu (editor), Sunandan Bhunia (edito 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>The book is a collection of best selected research papers presented at the Fourth International Conference on Communication, Devices and Computing (ICCDC 2023). The book covers new ideas, applications and experiences of research engineers, scientists, industrialists, scholars and students from

Proceedings of the 3rd International Con
✍ Biplab Sikdar (editor), Santi Prasad Maity (editor), Jagannath Samanta (editor), 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book provides insights into the 3rd International Conference on Communication, Devices and Computing (ICCDC 2021), which was held in Haldia, India, on August 16–18, 2021. It covers new ideas, applications, and the experiences of research engineers, scientists, industrialists, scholars, an

Proceeding of Fifth International Confer
✍ Vijay Nath (editor), J. K. Mandal (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book presents high-quality papers from the Fifth International Conference on Microelectronics, Computing &amp; Communication Systems (MCCS 2020). It discusses the latest technological trends and advances in MEMS and nanoelectronics, wireless communication, optical communication, instrumen

ICCCE 2021: Proceedings of the 4th Inter
✍ Amit Kumar (editor), Stefan Mozar (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book is a collection of research articles presented at the 4th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2021), held on April 9 and 10, 2021, at CMR Engineering College, Hyderabad, India. ICCCE is one of the most prestigious conferences conceptualize