<p><span>This book presents high-quality research papers presented at the International Conference on Soft Computing for Intelligent Systems (SCIS 2020), held during 18–20 December 2020 at University Institute of Engineering and Technology, Kurukshetra University, Kurukshetra, Haryana, India. The bo
Proceedings of Integrated Intelligence Enable Networks and Computing: IIENC 2020 (Algorithms for Intelligent Systems)
✍ Scribed by Krishan Kant Singh Mer (editor), Vijay Bhaskar Semwal (editor), Vishwanath Bijalwan (editor), Rubén González Crespo (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 975
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book presents best selected research papers presented at the First International Conference on Integrated Intelligence Enable Networks and Computing (IIENC 2020), held from May 25 to May 27, 2020, at the Institute of Technology, Gopeshwar, India (Government Institute of Uttarakhand Government and affiliated to Uttarakhand Technical University). The book includes papers in the field of intelligent computing. The book covers the areas of machine learning and robotics, signal processing and Internet of things, big data and renewable energy sources.
✦ Table of Contents
Preface
Contents
About the Editors
Self-optimization and Resource-Utilization SDN Framework for QoS based HetNets
1 Introduction
2 State of the Art
3 Network Slicing
4 System Model
5 Performance Evaluation
6 Conclusion
References
Brain Tumor Detection Using Machine Learning in GUI
1 Introduction
2 Literature Survey
3 Methodology
3.1 Image Acquisition
3.2 Preprocessing
3.3 Segmentation
3.4 Feature Extraction
3.5 Classification
4 Conclusion
References
Modeling of Solar Emergency System in Power Station to Mitigate Blackout
1 Introduction
2 Case Study
3 Block Diagram of Solar Emergency System
4 Circuit Diagram
4.1 Generating Unit
4.2 Distribution Subsystem
4.3 Emergency Unit
5 Results
5.1 6.6 kV System
5.2 132 kV System
5.3 400 V System
6 Conclusion
7 Future Scope
References
Modelling and Simulation of Permanent Magnet Synchronous Motor for Performance Enhancement Using ANSYS Maxwell
1 Introduction
2 RMxpert Design
2.1 Stator
2.2 Rotor
2.3 Stator Winding
3 Experimental Results
4 Conclusion
References
Assessment on the Adequacy of Dual Current Supply in CMOS Dual Differential Amplifier
1 Introduction
2 Implementation
2.1 Basic Current Mirror (BCM)
2.2 Differential Amplifier (DA)
2.3 Buffer Amplifier (BA)
3 Testing Methods
3.1 Quiescent Bridge Faults and Open Faults
3.2 Transient Bridge and Open Faults
3.3 Struck at 0 and Struck at 1 Fault
4 Experimental Results
5 Conclusion and Future Scope
References
File Authentication Ownership Using Blockchain
1 Introduction
2 Related Works
2.1 Decentralized Applications
2.2 Ethereum
2.3 Smart Contract
2.4 Blockchain-Based Identities
2.5 Decentralized Autonomous Organization
2.6 Proof of Existence, Integrity and Ownership
3 Research Methodology
3.1 SHA-1 (Secure Hash Algorithm-1)
4 Proposed Implementation
4.1 Usage and Import of Web3.Js
5 Conclusion
References
Image Retrieval Based on Texture Using Local Binary Pattern and Local Phase Quantization
1 Introduction
2 Theoretical Background
2.1 Local Binary Patterns (LBPs)
2.2 Linear Phase Quantization
3 Experimental Results
3.1 Steps for Comparative Analysis:
3.2 Evaluation Measurements
4 Conclusion
References
Comparative Study of Human Activity Recognition on Sensory Data Using Machine Learning and Deep Learning
1 Introduction
2 Conclusion and Future Work
References
Segmentation of Retinal Blood Vessel Using an Algorithm-Based Gamma Distribution of Matched Filter
1 Introduction
2 Proposed Method and Model
2.1 Algorithm
2.2 Preprocessing
2.3 Gamma PDF-Based Matched Filter
2.4 An Optimal Thresholding Technique Based on Entropy
2.5 Removal of Outer Artifact Using Length Filtering
3 Results and Performance Analysis
4 Conclusion
References
Phishing Prevention Techniques: Past, Present and Future
1 Introduction
2 Background
2.1 Why and How Phishing Occur?
2.2 What Tempts Attackers Toward Phishing?
2.3 Classification of Phishing Attack
2.4 Reason Why Phishing Attack Work
3 Statistics
3.1 How an Attack Carries Out?
4 Classification of Prevention Methods
4.1 User Education
4.2 Protection from Phishing e-mail
4.3 Protection from Phishing Websites
5 Conclusion and Future Work
References
Spatial Analysis of COVID-19 Spread in India
1 Introduction
2 Literature Review
3 Research Methodology
3.1 Data Sources and Parameter Selection
3.2 Spatial Regression Modelling
4 Interpretation of Result
5 Limitations
6 Conclusion and Future Works
References
Cedrus Deodara Needle Oil and Bark Extract as Potential Therapeutic Candidate for Glaucoma
1 Introduction
2 Materials and Methods
3 Results and Discussions
4 Conclusion
References
Design of Hardware for Detection of System Corruption
1 Introduction
2 Literature Review
3 Impact of Malware in History
4 Conventional Antivirus
5 Methodology
5.1 Distance Metrics
6 Results
6.1 Illustration of the Structure of Prototype Design
7 Discussion
8 Conclusion
References
Implementation of Ethernet Data Transfer on FPGA
1 Introduction
2 OSI Model
3 Literature Review
4 Methodology
4.1 Hardware Design
4.2 Software Design
4.3 Ethernet Communication
5 Implementation
6 Results
7 Conclusion
References
Machine Learning and Deep Learning: A Comparative Review
1 Introduction
2 Basic Concepts: An Overview
2.1 Machine Learning
3 Deep Learning
4 Main Approaches and Techniques
5 Machine Learning
6 Deep Learning
7 Main Applications
8 Machine Learning
9 Deep Learning
10 Conclusion
References
Design of Graphene-Based Nano-patch Antenna for Terahertz Wave Propagation
1 Introduction
2 Graphene
3 Design of Graphene Nano-patch Antenna
4 Comparison of Graphene Antenna with Copper Antenna in THz Range
5 Conclusion
References
Power Transformer Condition Assessment Through Insulating Oil Testing
1 Introduction
2 Moisture
3 Interfacial Tension (IFT)
4 Breakdown Voltage (BDV)
5 Neutralization Number (NN)
6 Dielectric Dissipation Factor (Tan δ)
7 Resistivity
8 Conclusion
9 Flash Point
References
Chatbot Implementation for Enhancement of Student Understanding—A Natural Language Processing Approach
1 Introduction
2 Background Study
2.1 Problem
2.2 Literature Survey
2.3 Comparative Study
3 Proposed Model
3.1 Data
3.2 Proposed Architecture
3.3 Implementation Details
4 Understanding and Results
5 Conclusion
References
Realization of Higher-Order Hyperchaotic Jerk System
1 Introduction
1.1 A Subsection Sample
2 Circuit Description
2.1 Invariance
2.2 Equilibrium Points and Stability
2.3 Dissipativity
3 Physical Realization of Higher-Order Hyperchaotic Oscillator
4 Simulation Results
5 Conclusion
References
Metamaterial-Based Triple Band Rectangular Patch Antenna
1 Introduction
2 Antenna Design
3 Results and Discussion
4 Conclusions
References
A Quad-Band CPW-Fed Antenna with Koch-Shaped Slot for Wireless Applications
1 Introduction
2 Antenna Design
3 Simulation Results
4 Conclusion
References
Stock Exchange Prediction Using Financial News and Sentiment Analysis
1 Introduction
2 Related Work
3 Sentiment Analysis and Its Application in Stock Market
4 Sentiment Analysis Approaches
4.1 Machine Learning
4.2 Lexicon-Based Approach
5 Methodology and Implementation
5.1 Data Acquisition
5.2 Preprocessing
5.3 Features, Feature Selection, and Vectorization
6 Results and Analysis
7 Conclusion and Future Scope
References
USEIR Machine Learning Model: Preventing the Spread of Coronavirus Outbreak
1 Introduction
2 USEIR Machine Learning Model
3 Susceptible-Infectious Model
4 Susceptible–Infectious–Recovered Model
5 Susceptible–Exposed–Infectious–Recovered Model
6 Conclusion
References
Leaky Wave Antenna: Past and Present
1 Introduction
2 History
3 Classification of LWA
4 Conclusion
References
An Aviation Delay Prediction and Recommendation System Using Machine Learning Techniques
1 Introduction
1.1 Content-Based ARDP System
2 Recent Works
3 Proposed ARDP System Approach
4 Experimental Setup and Results Discussion
5 Conclusion and Future Work
References
Structural Strength Monitoring System Practices Using Machine Learning
1 Introduction
2 Related works in the Structural Strength Monitoring System (SSMS)
3 Proposed SHMS Design
4 Experimental Setup and Results
5 Conclusion and Future Research
References
An Overview on Security Issues, Attacks, Challenges and Protocols in WSN
1 Introduction
2 Security Demands in WSN
3 Hurdles and Constraints
4 Different Attacks in WSNs
5 Attacks in Different Layers in WSNs
6 Security Protocols in Sensor Networks
7 Conclusion
References
BEENISH: Balanced Energy-Efficient Network-Integrated Super Heterogeneous Protocol for Wireless Sensor Networks
1 Introduction
1.1 Radio Dissipation Model
1.2 BEENISH
1.3 BEENISH Protocol
2 Simulation and Result
3 Conclusion
References
A Comprehensive Review on Ontology and Semantic Web
1 Introduction
2 Ontology and Semantic Web
2.1 Ontology
2.2 Semantic Web
3 Semantic Web Mining
4 Knowledge Discovery Process
5 Examples of Ontology-Based Web Mining
6 Conclusion
References
A Review on Ontology-Based Semantic Web Information Retrieval: Techniques, Weight Functions
1 Introduction
2 Information Retrieval: Ontology Based
3 Information Retrieval Techniques: Ontology Based
3.1 Query Expansion Techniques
3.2 Semantic Annotation Technique
3.3 Semantic Annotation classification [15]
3.4 Weight Functions
3.5 TF.IDF-Based Term Weighting Methods
3.6 Language Model-based Term Weighting Methods
4 Discussions
5 Conclusions
References
Salesforce IoT Cloud Platform
1 Introduction
2 Literature Survey
3 Salesforce IoT
4 Planning Salesforce IoT Workflows
4.1 Salesforce IoT Is a State Machine
4.2 Basic Workflow for Working in Salesforce IoT (Fig. 2)
5 Innovative Challenges Owed to IoT Salesforce Integration
6 Conclusion
References
RGB Image Watermarking Using DCT
1 Introduction
2 Description of DCT
3 Proposed Method
3.1 Watermarking Using DCT
3.2 De-Watermarking
4 Results
5 Results
References
Comparative Analysis of SVM and DNN for Multiple Terrain Classification Using Hybrid Sensor
1 Introduction
2 Materials and Methods
3 Results and Discussions
4 Conclusion
References
RNA Secondary Structure Prediction Parallel Algorithm on Shared Memory Multicore Architecture
1 Introduction
2 Gafold Algorithm
3 Empirical Studies
4 Conclusion
References
Distributed Education System for Deaf and Dumb Children and Educator: A Today’s Need
1 Introduction
2 Effect of Online Learning on Children’s Health
3 Challenges in Deaf and Dumb Online Education
3.1 Applications for Sign Language Recognition
4 Online Education System for Deaf and Dumb
4.1 System Implementation
4.2 Sign Recognition and Interpretation System
5 Result and Discussion
6 Conclusion
References
Secure Information Migration Using Mignotte Sequence with Integral Transform
1 Introduction
1.1 What Is Security Attacks?
1.2 Chinese Reminder Theorem
1.3 Laplace Integral Transform
1.4 Inverse Laplace Integral Transform
2 Related Work
3 Proposed Framework
3.1 Msit Algorithm
4 Implementation and Result
5 Conclusion
References
Simulation and Analysis of Everyday Use Electric Vehicle
1 Introduction
2 Electricity Sources
3 Types of Electric Vehicles
4 Design and Modeling of Electric Vehicles
5 Batteries Used in Electric Vehicle (Li-Ion)
5.1 Charging of the Li-Ion Battery
5.2 Discharging of the Li-Ion Battery
6 Simulation-Based Analysis of Electric Vehicle
7 Output Waveform of the Electric Vehicle
8 Benefits and Disadvantages of Electric Vehicle
9 Conclusion
References
umFold: An Algorithm to Predict RNA Tertiary
1 Introduction
2 Analysis of Algorithms for Prediction of RNA Tertiary Structure
3 umFold: New RNA Tertiary Structure Prediction Algorithm
4 Parallel Computing
5 Result
6 Conclusion
References
Role of Machine Learning and Deep Learning Approaches in Designing Network Intrusion Detection System
1 Introduction
2 Current Scenario
3 Methodology
3.1 Machine Learning and Deep Learning Approach Towards Network IDS
3.2 Training Data Set Limitations
4 Results and Discussion
5 Conclusion
References
Amazon Product Brand Analysis Framework Using Apache Spark on Real-Time Consumer’s Perception
1 Introduction
2 Methodology
3 Tools and Techniques for Data Analytics
3.1 Apache Spark 2.2.2
3.2 Python
3.3 PyCharm IDE
3.4 Scala
3.5 Apache Hadoop (Version2.6.0)
3.6 VMware
4 Implementation and Result
5 Conclusion
References
88-dB Gain with Improved Phase Margin Telescopic Cascode OTA for RF-IoT Applications
1 Introduction
2 Design of Telescopic Cascode OTA
3 Design of Telescopic CASCODE OTA with Defined Specification
4 Simulation Results
5 Analysis of the Simulation Results
6 Conclusion
References
Impact Analysis of Hypervisors on the Performance of Virtualized Resources
1 Introduction and Related Work
2 Experimental Setup and Methodology
3 Results and Performance Analysis
3.1 Analysis of Virtualized CPU Performance
3.2 Analysis of Virtualized Memory Performance
3.3 Analysis of Virtualized Disk I/O Performance
3.4 Analysis of Network Performance
4 Conclusion and Future Scope
References
A New Seven-Level Asymmetrical Inverter for Reduced Component with Lesser Number of Power Electronics Devices
1 Introduction
2 Limitations of Fundamental Inverters
3 7-Level Multilevel Inverter
4 Switching Table
4.1 Modes of Operation of Seven-Level Asymmetrical Multilevel Inverter
5 Simulation Results
6 Conclusion
References
Smart Belt for Women Security
1 Introduction
2 GOAL and Objective
3 Design
4 Hardware Required
4.1 Arduino UNO (ATMEGA 328P)
4.2 LCD Display (16x2)
4.3 GSM Module (SIM 900A)
4.4 GPS Module (SIM 28ML)
4.5 Power Supply
4.6 Push Key
5 Software Requirements
6 System Software Cost Estimation
7 Result
8 Advantages and Applications
8.1 Advantages
8.2 Applications
9 Conclusion
10 Future Scope
References
Survey on Image Processing and Its Techniques
1 Introduction
2 Literature Review
3 Methodology
3.1 Segmentation
3.2 Edge Detection
4 Discussion
5 Conclusion and Future Scope
References
Automatic Face Tagging Using Image Processing
1 Introduction
2 Literature Review
3 Methodology
3.1 Facial Recognition Algorithms
3.2 Linear Regression for Face Recognition
3.3 Eigenface Based Approach
4 Discussion
5 Conclusion
References
An Adaptive Deep Learning Model to Forecast Crimes
1 Introduction
2 Related Work
3 Adaptive Deep Learning Based Predictive Model
4 Results and Discussion
5 Conclusions
References
Modern Approach of Sentiment Analysis Using Naïve Bayes Machine Classifier
1 Introduction
1.1 Corpus
1.2 Natural Language Toolkit (NLTK)
1.3 Sentiment Analysis
2 Analysing Text
3 Naïve Bayes Model
4 Proposed Model Implementation
5 Result and Discussion
6 Conclusion
7 Future Works
References
A Study on Challenges of Big Data and Their Approaches in Present Environment
1 Introduction
2 The 5V’s of Big Data
3 Growth of Unstructured Data
4 Big Data Challenges
4.1 Big Data Cleaning
4.2 Big Data Aggregation
4.3 Big Data Management
4.4 Imbalance Big Data
4.5 Security and Privacy
5 Big Data Approaches
6 Conclusion
References
Secure and Lightweight User Authentication Technique for IoT Devices
1 Introduction
1.1 Security Issues in IoT
2 Literary Reviews
2.1 Motivation and Our Contribution
3 Basic IoT Modeling and Heuristics
4 Lightweight IoT Based User Authentication Technique
4.1 IoT Device Registration Phase
4.2 Performance Analysis
4.3 SR2: Strong Obscurity
4.4 SR3: Availability
4.5 SR4: High Protection
5 Simulation of Official Security Checks Using the AVISPA Tool
6 Results and Discussion
7 Conclusion and Future Work
7.1 Future Research Scopes
References
Design Optimization and Fault Tolerance in Network-On-Chips
1 Introduction
2 Networks-On-Chip (NoC)
3 NoC Architecture
4 Design and Optimization of Networks-On-Chip
4.1 Characteristics of Networks-On-Chip
4.2 NoC Router Architecture
5 Algorithms of NoC
5.1 Shortest Path Routing Algorithm
5.2 Distance Vector Routing Algorithm
5.3 Flooding Algorithm
5.4 Flow-Based Routing Algorithm
6 Fault Tolerance in NoC
6.1 Fault-Tolerant NoC Routing
7 Conclusion
References
ECG Classification Using DNN and GA Optimized Algorithm
1 Introduction
2 Method and Material
3 Preprocessing
4 Feature Extraction
5 Feature Optimization
6 DNN Classifier
7 Result
8 Conclusion
References
Implementation of Graph Isomorphism Algorithm on Shared Memory Architecture
1 Introduction
2 Literature Survey and Mathematical Expression
2.1 Literature Review
2.2 Mathematical Expression
3 Parallel Graph Isomorphism Algorithm A2 Using Euclidean Vector
4 Performance Evaluation and Results
5 Conclusion
References
Amazon EC2: (Elastic Compute Cloud) Overview
1 Introduction
2 EC2 Instances Types
2.1 EC2-General Purpose Instance
2.2 Compute Optimized Instances
2.3 Memory Optimized
2.4 Storage Optimized
2.5 Accelerated Computing Instances
2.6 High Memory Instance and Previous Generation Instances
2.7 Previous Generation Instances
3 Ec2 Purchasing Option
3.1 On-Demand
3.2 Dedicated Host
3.3 Spot Instance [3]
3.4 Dedicated Instance
3.5 Reserved Instance [2]
3.6 Schedule Instance [4]
4 EC2 Access
5 EC2 Status Check
6 EC2 Stop and Termination
7 Challenges
8 Conclusions
References
The Relevance of Preprocessing in Text Classification
1 Introduction
2 Literature Survey
3 Data Preprocessing
4 Experimental Results and Analysis
4.1 Without Applying Stemming and Lemmatization in the TF-IDF Vectorizer
4.2 Applying Only Stemming in the TF-IDF Vectorizer
4.3 Applying Only Lemmatization in the TF-IDF Vectorizer
4.4 Summarized Results
5 Conclusion
References
A Review of Various Digital Modulation Schemes Used in Wireless Communications
1 Introduction
2 Digital Modulation Schemes
3 Comparison and Applications
4 Conclusion
References
Annealing Temperature-Dependent Optical Properties of (Ta2O5)0.965—(TiO2)0.035 Thin Films
1 Introduction
2 Experimental
3 Results and Discussion
4 Conclusions
References
Multiple Clustering Method for Real-Time Distributed Denial-of-Service Attack Detection
1 Introduction
2 Related Work
3 Cluster-Based Real-Time DDoS Attack Detection
3.1 Hierarchical Clustering
3.2 PCA with K-Means Clustering
3.3 Voting
3.4 Classification of Attacks
4 Results and Discussion
5 Conclusions
References
Simulation and Analysis of Graded-Channel Dual-Insulator Double-Gate Junction-Less FET
1 Introduction
2 Device Schematic and Simulation Setup
3 Results and Discussion
4 Conclusions
References
IoT Implementation for CO2 Level Monitoring System Using CISCO Packet Tracer
1 Introduction
2 System Simulation
3 CISCO Packet Tracer Software
4 Conclusion
References
Software Defined Network: Comprehensive Study
1 Introduction
1.1 Terminologies of SDN
1.2 Scenario Before SDN
2 Literature Review
3 How SDN Works?
4 SDN Operation
5 SDN Performance Metrics, Challenges and Opportunities
6 Conclusion
References
An Enhanced Extreme Learning Machine Model for Improving Accuracy
1 Background
2 Introduction
3 Literature Survey
4 Proposed Approach to Improve Accuracy
5 Implementation Details
6 Conclusion
References
Dual-Cavity SIW MIMO Antenna
1 Introduction
1.1 Dimensions of Antenna
2 Result
3 Conclusions
References
Maxima-Based Defuzzification Methods Proposed for Fuzzy Systems
1 Introduction
2 Working of Fuzzy Inference System
3 Defuzzification
3.1 Notations
3.2 Properties
4 Review of Existing Defuzzification Methods
4.1 Maxima Methods
4.2 Distribution Methods
4.3 Area Methods
5 Proposed Defuzzification Methods
5.1 Method-1: BEST of MAXIMA (BOM)
5.2 Method-2: PROPORTIONATE MAXIMA (PM)
6 Results
7 Discussion and Conclusion
References
Deep Learning for Health Care in Disease Identification: A Review
1 Introduction
1.1 Machine Learning and Deep Learning
2 Deep Learning Approaches
2.1 Deep Autoencoder
2.2 Recurrent Neural Networks
2.3 Restricted Boltzmann Machine
2.4 Convolutional Neural Network
3 Application in Health Care
3.1 Bioinformatics
3.2 Medical Image Processing
3.3 Electronic Health Records
3.4 Genomics
3.5 Mobile Sensors
4 Conclusion
References
Comparative Analysis of Machine Learning Techniques for Plant Disease Identification
1 Introduction
2 Literature Review
3 Methodology
3.1 Convolutional Neural Network
3.2 Image Classifiers Based on Deep Learning
4 Experimentation
5 Results
6 Conclusion
References
Role of Smart Grid in Power Quality: Issues and Evaluation Methods
1 Introduction
2 Power Quality Importance and Issues in Smart Grid
3 Power Quality Evaluation Methods
4 Conclusion
References
A Study of Inverse Kinematics from Machine Vision Methods
1 Introduction
2 Previously Used Techniques
3 Flowchart
4 Efficiency of the Proposed System
5 Methods Used for Image Formation
5.1 Camera Geometry
5.2 Camera Optics
5.3 Frame Grabber
6 Feature Detection
7 Conclusion
References
Deepfake Detection by Exposing AI-Generated Fake Face Video
1 Background
2 Introduction
3 Literature Survey
4 Proposed Methodology
4.1 Pre-processing
4.2 Long-Term Recurrent Convolutional Network (LRCN)
4.3 Model Training
5 Conclusion
References
An Improvement in Key Domain Maximization Technique by Entropy Maximization
1 Introduction
2 Vigenére Ciphers and related work
3 Proposed Method
4 Validation of the Method
5 Discussion and Analysis
6 Conclusion
References
Compact Penta-Band Rectangular Ring Monopole Antenna Loaded with Split Ring Resonator and L-Shaped Slots
1 Introduction
2 Related Work
3 Antenna Design and Implementation
3.1 Configuration 1: RRM with Ground Plane
3.2 Configuration 2: RRM with Ground Plane and SRR
3.3 Configuration 3: RRM with L-Shaped Slot in Ground Plane and SRR
3.4 Configuration 4: RRM with Double L-Shaped Slot in Ground Plane and SRR
4 Results
5 Conclusions
References
Role of Deep Learning in Disaster Prediction
1 Introduction
1.1 Relationship Between AI, ML and DL
1.2 Introduction to DL
2 Related Work
3 Proposed Approaches
3.1 Time Series and Regression Methods with DL Network
3.2 DL Algorithm with Hierarchical Time Series
3.3 Use of Hybrid DL Algorithms
4 Challenges in Predicting Disaster Using Deep Learning
4.1 Huge Amount of Data Sets
4.2 Hyperparameter Optimization
4.3 High-Performance Hardware Requirement
4.4 Blackbox nature of Neural Network
4.5 Unable to Perform Multitasking and Lack of Flexibility
5 Conclusion and Future Scope
References
Machine Learning Approaches in Power System Protection: A Review
1 Introduction
2 Fault Classification
3 Machine Learning Model
4 Machine Learning Applications in Power System Protection
4.1 Feedforward Neural Network (FNN)
4.2 Fuzzy Interface System (FIS)
4.3 Support Vector Machine (SVM)
5 Conclusion
References
A Compact Wideband DGS-Based Mm-Wave Antenna for 5G Applications
1 Introduction
2 Antenna Geometry
3 Results and Discussion
3.1 Return Loss
3.2 VSWR
3.3 Radiation Pattern
3.4 Gain and Directivity
3.5 Co-polarization and Cross-Polarization
3.6 Current Distribution
4 Comparative Analysis
5 Conclusion
References
Full-Wave Analysis of Graphene-Based Circular Patch Antenna
1 Introduction
2 Electronic Model of Graphene
3 Graphene-Based Circular Patch Antenna
4 Conclusion
References
Multi-kernel SVM Approach for Arrhythmias Classification
1 Introduction
2 Proposed Approach
2.1 Preprocessing
2.2 Feature Extraction
2.3 Classification
3 Results and Discussion
4 Conclusion
References
Comparison of Threshold Methods Useful in Handwritten Marathi Character Recognition
1 Introduction
1.1 Problem Using Threshold of Image
2 Related Work
3 Research Methodology
3.1 Global Thresholding by Iterative Partition
3.2 Multilevel Thresholding Using Otsu as Fitness Function
4 Experimental Results
5 Conclusion
6 Future Scope
References
A Review of Strategies to Increase PV Penetration Level and Impact of PV Penetration on Grid
1 Introduction
2 Implementation of MPPT Using a Boost Converter
3 Multiple Location Distributed Generator (MLDG)
4 PV Penetration and Their Impact on Grid
5 Power Quality of MLDG Hybrid System
6 Future Research
References
A Note on Vorticity of Hydromagnetic Two-Phase Flow Through Two Parallel Plates in a Rotating System
1 Introduction
2 Mathematical Formulations
2.1 Solution of the Problem
2.2 Self-superposability
3 Numerical Results
4 Conclusions
References
Techno-economic Design and Evaluation of a Small Community-Based Microgrid
1 Introduction
2 HRES and Its Description
2.1 Study Site and Load
2.2 Solar Photovoltaic System
2.3 Wind Turbine
2.4 Battery Energy Storage System
2.5 Power Converter
3 Economic Parameters
4 Simulation and Result
5 Conclusion
References
An Improved Clustering Approach for VANETs Inter-vehicular Communication
1 Introduction
2 Proposed Methodology
3 Result
4 Conclusion
References
Study of Human and Robot Social Interaction Using Artificial Cognition Methods
1 Overview of HRI
1.1 Various Challenges
2 The Architecture
2.1 Deliberative Layer
2.2 Knowledge Model
2.3 Symbol Grounding
3 Cognitive Skills
3.1 Acquiring and Anchoring Knowledge in the Physical World
3.2 Building a Model of Agents
3.3 Primitive Action Recognition
3.4 Multi-modal Communication with Natural Language Grounding
3.5 Dialog and Modality
3.6 Human-Aware Task Planning
3.7 Action-Social Principles
4 Interactive Grounding
4.1 Multi-modal Interactive Grounding
4.2 Task Planning
5 Embodied Cognition
5.1 The W-Questions of Joint Action
5.2 Putting the Humans into Equations
5.3 Explicit Knowledge for Social Robotics
6 Conclusion and Future Work
References
Optimal Cognitive Channel Selection Using Deep Learning in CR-VANET
1 Introduction
2 Related Works
3 System Model
4 Optimal Cognitive Channel Selection Using Deep Learning
5 Performance Evaluation
6 Conclusion
7 Future Work
References
High-Speed SET D Flip-Flop Design for Portable Applications
1 Introduction
2 Flip-Flop Designs
2.1 Existing 10T D Flip-Flop Design
2.2 Proposed 9T D Flip-Flop Design
3 Simulation and Comparative Analysis
4 Conclusion
References
Analysis of Feature Extraction Methods Used for Handwritten Marathi Compound Character Recognition
1 Introduction
2 Related Work
3 Features Extraction Methods
4 Research Methodology
5 Results and Discussion
5.1 Convolutional Neural Networks
6 Conclusion
References
An Overview of Constraints of Operating Systems Used in IoT Devices
1 Introduction
2 Related Work
2.1 Process Management
2.2 Energy Management
2.3 Memory Management
2.4 File Management
3 Key Issues in IoT OS Design
3.1 Architecture
3.2 Scheduling Capabilities
3.3 Programming Model
3.4 Memory Footprint
3.5 Power Management
3.6 Network Connectivity
3.7 Real-Time Capabilities
4 Widely Used IoT Operating Systems
4.1 Contiki
4.2 Riot
4.3 TinyOS
5 Conclusion
References
Design of Solar Hybrid Power System for Remote Area—A Review of Current Practice and Future Developments
1 Introduction
2 Literature Review
3 Modeling of Solar Energy Generation
3.1 Three-Phase Voltage Source Inverter
3.2 120 Degree Conduction Mode
3.3 180 Degree Conduction Mode
4 Conclusion
References
Design and Implementation of High Speed and Large Bandwidth Voltage Follower Using CMOS Technology
1 Literature Survey
2 Introduction
3 Implementation
4 Experimental Results Comparison
5 Conclusion and Future Scope
References
RBCHS: Region-Based Cluster Head Selection Protocol in Wireless Sensor Network
1 Introduction
2 Related Work
3 Proposed Work
3.1 The Network Architecture for RBCHS Protocol
3.2 Algorithm for RBCHS Protocol
4 Simulation Results and Analysis
5 Conclusion
References
Blockchain and the Digital Credentialing for Education System
1 Introduction
2 Problems with the Current System
3 New Demands
4 Enter the Blockchain Satoshi's Legacy
5 Smart Contracts and Qualifications
6 Looking Ahead Innovators
7 Smart Contracts and Professional Enhancement
8 Conclusion
References
Fuzzy Logic-Based Clustering in Wireless Sensor Network
1 Introduction
2 Literature Survey
3 Objectives
4 Proposed Methodology, Design and Implementation
5 Results and Conclusion
6 Conclusion and Future Work
References
Change in Propagation Constant with Molar Fraction and Other Performance Analysis the Sensitivity of Optical Fiber Sensor in COMSOL Multiphysics
1 Introduction
2 Power Fraction in Sensing Arm
3 Methodology
4 Result
5 Conclusion
References
Using Modal Test Results and Other Performance Analysis to Compare the Sensitivity of Optical Fiber Sensor in COMSOL Multiphysics
1 Introduction
2 Modal Analysis of Silicon and InAs Nanowire
3 Methodology
4 Result
5 Conclusion
References
Image Web Crawler Towards Machine Learning
1 Introduction
2 Architecture of Web Crawler Existing System
3 Types of Web Crawler
3.1 Incremental Web Crawler
3.2 Focused Crawler
3.3 Hidden Web Crawler
3.4 Form Focused Web Crawler
4 Working of Form-Based Crawler
5 Crawling Algorithm
6 Significance
7 Image Web Crawler
8 Conclusion
References
Image Attack Prediction of Watermarked Images Based on Statatistical Features
1 Introduction
2 Proposed Work
2.1 Watermark Insertion Algorithm
2.2 Attack Identification-Based Extraction of Watermark
3 Experimental Works
3.1 Experimentation, Results and Discussion
4 Conclusion
References
Temporary Cost of Cheating Different Plagiarism Detection Algorithms by Students
1 Introduction
2 Designed Tool and Algorithm Comparison
3 Evaluation and Results
4 Conclusions
References
Modelling and Simulation of Matrix Converter Using Space Vector Modulation Techniques
1 Introduction
2 Direct Space Vector Modulation
3 Indirect Space Vector Modulation
4 Simulation and Results
5 Conclusion
References
Student Attendance System Using Face Recognition
1 Introduction
2 Related Work
3 Proposed Model
3.1 Characteristics of the Proposed Model
4 Experiment
4.1 Data
4.2 Evaluation Method
4.3 Result
4.4 Building the Student Attendance Application
5 Conclusion
References
Violent Video Detection by Pre-trained Model and CNN-LSTM Approach
1 Introduction
2 Related Works
3 Methodology
3.1 The Proposed Model
3.2 Darknet19
3.3 Convolutional Neural Network (CNN)
3.4 Long Short-Term Memory (LSTM)
3.5 Darknet19-CNN-LSTM Model
4 Experiments
4.1 Dataset
4.2 Experiment Result
5 Conclusion
References
Hybrid Deep Learning Approach for Aspect Detection on Reviews
1 Introduction
2 Proposed Model
2.1 CNN
2.2 LSTM
2.3 Hybrid Deep Learning Approach
2.4 The Aspect Detection
3 Experiments
4 Conclusion
References
Author Index
📜 SIMILAR VOLUMES
This book presents the outcome of two-day 2nd International e-Conference on Sustainable and Innovative Solutions for Current Challenges in Engineering and Technology (ICSISCET 2020) held at Madhav Institute of Technology & Science (MITS), Gwalior, India, from December 18–19, 2020. The book extensive
<span>This book includes the original, peer-reviewed research articles from the International Conference on Computational Intelligence and Computing (ICCIC 2020), held in September 2020 on a virtual platform jointly organized by SR Group of Institutions, Jhansi, India, IETE, Kolkata Centre, India, a
<p>This book discusses a number of intelligent algorithms which are being developed and explored for the next-generation communication systems. These include algorithms enabled with artificial intelligence, machine learning, artificial neural networks, reinforcement learning, fuzzy logic, swarm inte
<p>This book discusses a number of intelligent algorithms which are being developed and explored for the next-generation communication systems. These include algorithms enabled with artificial intelligence, machine learning, artificial neural networks, reinforcement learning, fuzzy logic, swarm inte
<span>The book presents high quality research papers presented at International Conference on Computational Intelligence (ICCI 2020) held at Indian Institute of Information Technology, Pune, India during 12–13 December, 2020. The topics covered are artificial intelligence, neural network, deep learn