𝔖 Scriptorium
✦   LIBER   ✦

📁

Soft Computing and Signal Processing: Proceedings of 4th ICSCSP 2021 (Advances in Intelligent Systems and Computing, 1413)

✍ Scribed by V. Sivakumar Reddy (editor), V. Kamakshi Prasad (editor), Jiacun Wang (editor), K.T.V. Reddy (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
793
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Fourth International Conference on Soft Computing and Signal Processing (ICSCSP 2021). The book covers topics such as soft sets, rough sets, fuzzy logic, neural networks, genetic algorithms and machine learning and discusses various aspects of these topics, e.g., technological considerations, product implementation and application issues.

✦ Table of Contents


Conference Committee
Preface
Contents
About the Editors
Data Preprocessing and Finding Optimal Value of K for KNN Model
1 Introduction
2 Literature Review
3 Methodology
3.1 Preprocessing
3.2 Feature Selection Method
3.3 Choosing Suitable Value of K
4 Results and Analysis
5 Conclusion and Future Scope
References
Prediction of Cardiac Diseases Using Machine Learning Algorithms
1 Introduction
2 Existing System
3 Proposed Work
3.1 Decision Tree
3.2 Logistic Regression
3.3 Multilayer Perceptron
4 Results and Discussions
5 Conclusion
References
A Comprehensive Approach to Misinformation Analysis and Detection of Low-Credibility News
1 Introduction
2 Review of Related Work
2.1 Overview of Misinformation Analysis Techniques
2.2 Methods for Neural Bot Detection
2.3 Natural Language Processing and Text Analysis Based Approaches
2.4 Large Language Models
2.5 Fake News Classifiers
3 Proposed System Architecture
4 Implementation and Methodology
4.1 Twitter Bot Detection Model
4.2 Tweet Classification Model
4.3 Fake News Article Classifier
4.4 Web Application
5 Results
6 Conclusion
References
Evaluation of Machine Learning Algorithms for Electroencephalography-Based Epileptic Seizure State Recognition
1 Introduction
1.1 Need of the Research
2 Machine Learning for Epileptic Seizure State Recognition
3 Feature Extraction
3.1 Description of Handcrafted Features
4 Dataset Description
5 System Design
5.1 Experimentation
5.2 Performance Evaluation Parameters
6 Results
7 Conclusion and Future Work
References
Lung Disease Detection and Classification from Chest X-Ray Images Using Adaptive Segmentation and Deep Learning
1 Introduction
2 Related Works
3 Proposed Methodology
3.1 Image Preprocessing
3.2 Adaptive Segmentation
3.3 Feature Extraction, Fusion, and Normalization
3.4 Classification Using RNN-LSTM
4 Results and Discussions
5 Conclusions
References
A Quantitative Analysis for Breast Cancer Prediction Using Artificial Neural Network and Support Vector Machine
1 Introduction
2 Computer-Aided Diagnostics (CAD)
3 Medical Images
3.1 Ultrasound (US)
3.2 Computed Tomography (CT) Images
3.3 Magnetic Resonance Images (MRI)
3.4 X-Rays
4 Noises in Medical Images
4.1 Speckle Noise
4.2 Gaussian Noise
4.3 Salt and Pepper Noises
4.4 Poisson Noise
5 Machine Learning Algorithms
5.1 Support Vector Machine (SVM)
5.2 Artificial Neural Network (ANN)
6 Literature Survey
7 Gaps in Literature
8 Case Study
8.1 Dataset Description
8.2 Data Preprocessing
8.3 Training and Testing Phase—SVM
8.4 Experimental Setup and Implementation
9 Results and Discussion
10 Conclusion
References
Heart Disease Prediction Using Deep Learning Algorithm
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Objectives
4 Methodology
5 Implementation
6 Experimental Analysis
7 Results
8 Conclusion and Future Scope
References
Tracking Misleading News of COVID-19 Within Social Media
1 Introduction
2 Related Works
3 Research Questions
3.1 Search Process
3.2 Results
4 Discussion
5 Conclusion and Future Works
References
Energy aware Multi-chain PEGASIS in WSN: A Q-Learning Approach
1 Introduction
2 Related Works
2.1 Q-learning
3 System Model
4 Proposed Approach
5 Simulation Studies
6 Conclusion
References
Textlytic: Automatic Project Report Summarization Using NLP Techniques
1 Introduction
2 Literature Review
2.1 Recurrent Neural Network (RNN)
2.2 TF-IDF
2.3 Cross-entropy Method
2.4 LSA
2.5 TextRank
2.6 K-Means and Word2vec
3 Proposed Approach
3.1 Data Input
3.2 Document Splitting
3.3 Preprocessing of Text
3.4 Methodologies Applied
3.5 Final Report Generation
3.6 Development of Web Application
4 Implementation
4.1 Preprocessing
4.2 Methodology Employed
4.3 Generating the Final Output
4.4 Evaluation Metrics
5 Results and Discussion
6 Conclusion and Future Work
References
Management of Digital Evidence for Cybercrime Investigation—A Review
1 Introduction
1.1 Evidence
1.2 Digital Evidence and Its Features
1.3 Cybercrime Investigation Process
1.4 Chain of Custody
2 Literature Review
3 Analysis of Review
4 Challenges in Digital Evidence Management
5 Conclusion
References
Real-Time Human Pose Detection and Recognition Using MediaPipe
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Pipeline Design and Detection
3.2 Structure
4 Results and Discussion
4.1 Dataset
4.2 Implementation
5 Conclusion
References
Charge the Missing Data with Synthesized Data by Using SN-Sync Technique
1 Introduction
2 Synthetic Data and Its Computations
2.1 Synthetic Data Introduction
2.2 Use Cases
2.3 Computations on Synthetic Data
3 Proposed System
4 Results
5 Conclusion
References
Discovery of Popular Languages from GitHub Repository: A Data Mining Approach
1 Problem Statement
2 Related Works
3 Research Methodology
4 Results and Analysis
5 Inferences and Future Directions
References
Performance Analysis of Flower Pollination Algorithms Using Statistical Methods: An Overview
1 Introduction
2 An Overview of Some of the Work Done in the Context of Flower Pollination Algorithm/Its Variants
3 Importance of Statistics in Performance Analysis of Flower Pollination Algorithm and Its Off-Shoots
4 Future Work and Conclusion
References
Counterfactual Causal Analysis on Structured Data
1 Introduction
2 Related Work
3 Counterfactual Causal Analysis
3.1 Generating Counterfactual Examples
3.2 Generating Causal Explanations
3.3 Generating Evidence for Explanations
4 Experimental Results
4.1 Evaluating Counterfactual Generation Algorithm
4.2 Case Study on Generating Causal Explanations
5 Conclusion
References
Crime Analysis Using Machine Learning
1 Introduction
2 Methodology
2.1 Classification
2.2 Regression
3 Proposed Model and Results
4 Conclusion
References
Multi-model Neural Style Transfer (MMNST) for Audio and Image
1 Introduction
2 Literature Survey
3 Proposed Work
3.1 Image Style Transfer
3.2 Audio Style Transfer
4 Results
5 Conclusion
References
Forecasting of COVID-19 Using Supervised Machine Learning Models
1 Introduction
1.1 Machine Learning
1.2 COVID-19
2 Materials and Methods
2.1 Dataset
2.2 Supervised Machine Learning Models
2.3 Evolution Parameters
3 Methodology
3.1 Day Wise Total Confirm Cases
3.2 Day Wise Total Death Cases
3.3 Day Wise Total Recovery Cases
4 Proposed Work Flow
5 Results
5.1 Confirm Cases Forecasting Shown in Figs. 8, 9, 10, 11, 12, 13, and 14
5.2 Death Cases Forecasting Shown in Figs. 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, and 29
5.3 Recovery Cases Forecasting
6 Conclusion
References
Feature Extraction from Radiographic Skin Cancer Data Using LRCS
1 Introduction
2 Associated Mechanisms
3 Proposed System
3.1 About Dataset
3.2 System Architecture and Algorithms
3.3 LRCS Algorithm
4 Results and Discussion
5 Conclusions
References
Shared Filtering-Based Advice of Online Group Voting
1 Introduction
2 Problem Statement
3 Proposed Methodologies
4 Enhanced System
5 Conclusion
References
Mining Challenger from Bulk Preprocessing Datasets
1 Introduction
2 Problem Statement
3 Proposed Methodologies
4 Enhanced System
5 Conclusion
References
Prioritized Load Balancer for Minimization of VM and Data Transfer Cost in Cloud Computing
1 Introduction
2 Related Works
3 Proposed Prioritized Load Balancer
4 Simulation and Results
4.1 Load Balancing by Using Prioritized Load Balancer
4.2 Response Time Using Prioritized Load Balancer
4.3 VM Cost and Data Transfer Cost Using Prioritized Load Balancer
5 Conclusion and Future Work
References
Smart Underground Drainage Management System Using Internet of Things
1 Introduction
2 Proposed Work for Underground Drainage Monitoring System
2.1 Alphanumeric LCD Display 16 × 2
2.2 Flow Sensor
2.3 Temperature Sensor
2.4 Gas Sensor
2.5 GPS
2.6 GSM
3 Algorithm
4 Working of ARM7
5 Results
6 Conclusion
References
IoT-based System for Health Monitoring of Arrhythmia Patients Using Machine Learning Classification Techniques
1 Introduction
2 IoT and ML in Healthcare
2.1 IoT in Healthcare
2.2 Machine Learning in Healthcare
3 IoT-based Arrhythmia Patient’s Health Monitoring Using ML
3.1 Data Sensing
3.2 Data Transmission and Cloud Storage
3.3 Classification and Prediction
4 Results
5 Conclusion
References
EHR-Sec: A Blockchain Based Security System for Electronic Health
1 Introduction
2 Background
3 System Design Model of EHR-Sec
4 Component Specifications
4.1 On-Chain Data Storage
4.2 EHR Data Encryption
5 Conclusion
References
End-to-End Speaker Verification for Short Utterances
1 Introduction
2 Related Work
3 Proposed System
3.1 Raw Waveforms
3.2 Sinc-Convolution Layer
3.3 RawNet CNN-GRU Architecture
3.4 Speaker Embeddings
4 Experimental Setup and Implementation
4.1 Dataset Collection and Preprocessing
4.2 Training the Model
5 Results and Performance Analysis
5.1 Testing with Short Utterance Dataset
6 Conclusion
References
A Comprehensive Analysis on Multi-class Imbalanced Big Data Classification
1 Introduction
2 Literature Review
2.1 Imbalanced Data
2.2 Data Level Approaches
2.3 Algorithm-Level Approaches
2.4 Ensemble Techniques
2.5 Inferences from the Review Work
2.6 Solutions
3 Conclusion and Future Work
References
Efficient Recommender System for Kid’s Hobby Using Machine Learning
1 Introduction
1.1 Recommendation System
1.2 Challenges in Recommendation Systems
2 Machine Learning
3 Support Vector Machine
4 Related Work
5 Problem Formulation
6 Proposed System
7 Results
8 Conclusion
References
Efficient Route Planning Supports Road Cache
1 Introduction
2 Problem Statement
3 Proposed Methodologies
4 Enhanced System
5 Conclusions
References
Programming Associative Memories
1 Introduction
2 Review of Relevant Research Literature
3 Programming Hopfield Associative Memory 4 ...Linear Separability
4 Numerical Results
5 Conclusions
References
Novel Associative Memories Based on Spherical Separability
1 Introduction
2 Review of Related Research Literature
3 Spherical Separability: Novel Associative Memory
4 Simulation Results: H4, H8
5 Hybrid Associative Memories Based on Linear Separability
5.1 Simultaneous Retrieval of Multiple Memory States
6 Conclusions
References
An Intelligent Fog-IoT-Based Disease Diagnosis Healthcare System
1 Introduction
2 Related Work
3 Materials and Methods
4 Results and Discussion
5 Summary/Conclusion
References
Pre-processing of Linguistic Divergence in English-Marathi Language Pair in Machine Translation
1 Introduction
2 Related Work
3 Methodology of Pre-processing
3.1 Database
3.2 Tokenize Words
3.3 Stopwords Removal
4 Parts of Speech Tagging
5 Parsing
6 Conclusion
References
Futuristic View of Internet of Things and Applications with Prospective Scope
1 Introduction
1.1 History
2 IoT Use
2.1 Health
2.2 Transport and Liaison Area
3 Trouble of IoT
3.1 Thought of Substance for Security
3.2 Computerized Contraption in Genuine Combination
3.3 Identification in IoT Environment
3.4 Approval of Contraptions
3.5 Information Mix
3.6 Contrasts in IoT
3.7 Safe Setup and Configuration
3.8 CI and IoT
3.9 Controversial Market Debate
3.10 Thinking of IoT in the Growing Internet
3.11 Relationship of the Human IoT Trust
3.12 Data on Board
4 The Future of IoT
5 Conclusions
References
Identifying and Eliminating the Misbehavior Nodes in the Wireless Sensor Network
1 Introduction
2 Related Works
3 Proposed Method
3.1 Algorithm for Security
3.2 Algorithm to Identify Selfish Nodes
4 Simulation and Results
5 Conclusion
References
Deep Learning Approach for Image-Based Plant Species Classification
1 Introduction
2 Proposed Algorithm
3 Methodology
3.1 Collecting Dataset
3.2 Image Pre-processing
3.3 Attribute Identification
3.4 Classification
4 Results and Discussion
5 Conclusion
References
Inventory, Storage and Routing Optimization with Homogenous Fleet in the Secondary Distribution Network Using a Hybrid VRP, Clustering and MIP Approach
1 Introduction
2 Literature
3 Problem Description
4 Optimization Framework
4.1 Input Parameters and Data Pre-processing
4.2 Vehicle Routing Problem (VRP) Model
4.3 Graph Partitioning Clustering
5 Problem Formulation
6 Results
7 Conclusion
Appendix
References
Evaluation and Comparison of Various Static and Dynamic Load Balancing Strategies Used in Cloud Computing
1 Introduction
2 Load Balancing
2.1 Its Requirement in Environment
2.2 Purposes
2.3 Types of Load Balancing
3 Techniques
3.1 Round Robin
3.2 Randomized
3.3 Threshold
3.4 Active Clustering
3.5 Honeybee Foraging Behavior
3.6 Join-Idle-Queue
4 Cloud Simulator
5 Parameters for Load Balancing
6 Simulation and Results
7 Comparison
8 Conclusion
References
Dielectric Resonator Antenna with Hollow Cylinder for Wide Bandwidth
1 Introduction
2 Antenna Design
3 Result and Discussions
4 Conclusion
References
Recent Techniques in Image Retrieval: A Comprehensive Survey
1 Introduction
2 Different Types of Image Retrieval
2.1 Text-Based Retrieval of Images
2.2 Content-Based Retrieval of Images
2.3 Multimodal Fusion Retrieval of Images
2.4 Semantic-Based Retrieval of Images
2.5 Retrieval-Based on Relevance Feedback of Images
3 Different Features of Image
3.1 Color Features
3.2 Shape Feature
3.3 Texture Feature
4 CBIR Benchmark Dataset
5 Techniques of Evaluation
6 Literature Survey
7 Conclusion
References
Medical Image Fusion Based on Energy Attribute and PA-PCNN in NSST Domain
1 Introduction
2 Preliminaries
2.1 NSST Decomposition
2.2 Energy Attribute (EA)
3 Proposed Method
4 Experimental Results
5 Conclusion
References
Electrical Shift and Linear Trend Artifacts Removal from Single Channel EEG Using SWT-GSTV Model
1 Introduction
2 Methods and Data for Experimentation
2.1 SWT
2.2 GSTV
2.3 Proposed Model
2.4 Database Used
2.5 Performance Measures
3 Results
3.1 Simulated Data Results
3.2 Real-Time Data Results
4 Conclusion
References
Forecasting Hourly Electrical Energy Output of a Power Plant Using Parametric Models
1 Introduction
2 Parametric Models
2.1 Linear Regression
2.2 Polynomial Regression
2.3 Support Vector Machine (SVM)
2.4 Metrics
3 Dataset and Visualizations
3.1 Understanding Dataset
3.2 Visualization
3.3 Overview
4 Implementation
4.1 Dataset Partition
4.2 Linear Regression
4.3 Polynomial Regression
4.4 Linear Support Vector Machine (SVM)
5 Result Analysis
6 Conclusion
References
SOI FinFET-Based 6T SRAM Design
1 Introduction
2 Device Model
3 Inverter Design
3.1 LUT-Based H-SPICE Design Flow
3.2 VTC Curve
4 SRAM Design
4.1 Device Constraints
4.2 Read/Write Operation of SRAM Cell
5 Results
6 Conclusion
References
Cataract Detection Using Deep Convolutional Neural Networks
1 Introduction
1.1 Causes and Effects of Cataract
2 GoogLeNet Architecture
3 Training Methodology
3.1 Importing Necessary Libraries
3.2 Performing Image Augmentation
3.3 Performing Image to Array Preprocessing
3.4 Using Deeper GoogLeNet Architecture
3.5 Convolution Module or Convolution Layer
3.6 Activation Layer
3.7 Max Pooling Layer
3.8 Fully Connected Layer and SoftMax Layer
3.9 Inception Module
3.10 Global Average Pooling
3.11 Training Classifiers
3.12 Label Binarizer
3.13 Training the Model Using Transfer Learning
4 Related Works
5 Implementation Methodology
6 Proposed Methodology
6.1 Accuracy
6.2 Macro Average
6.3 Weighted Average (or) Micro Average
6.4 Precision
6.5 Recall
6.6 F1 Score
6.7 Support
7 Result
8 Conclusion
References
Comparative Analysis of Body Biasing Techniques for Digital Integrated Circuits
1 Introduction
2 Literature Survey
2.1 Multiplexer
2.2 Body Biasing
2.3 Standard Biasing
2.4 VDD/2 Biasing
2.5 3VDD/4 and VDD/4 Biasing Technique
2.6 GLBB
3 Biasing Shift Register
3.1 4-Bit Register
3.2 8-Bit Register
4 Results and Discussion
5 Conclusions
References
Optical Mark Recognition with Facial Recognition System
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Facial Recognition System
3.2 Optical Mark Recognition
4 Implementation and Results
5 Conclusion
References
Evaluation of Antenna Control System for Tracking Remote Sensing Satellites
1 Introduction
2 Description
3 Evaluation Procedure
4 Results
5 Conclusions
References
Face Recognition Using Cascading of HOG and LBP Feature Extraction
1 Introduction
2 Recognition System
2.1 Preprocessing
2.2 Approach to Facial Feature Extraction
2.3 Proposed Algorithm Using Cascading of LBP and HOG Features
3 Experimental Results of Variant Classifiers
3.1 Classifier Results Based on HOG Feature Extraction
3.2 Classifier Results Based on LBP Feature Extraction
3.3 Classifier Results Based on Cascading of HOG and LBP Feature Extraction
4 Conclusion
References
Design of Wideband Metamaterial and Dielectric Resonator-Inspired Patch Antenna
1 Introduction
1.1 Antenna Structure
1.2 Results and Discussions
1.3 Unit Cell Analysis
2 Conclusion
References
Basic Framework of Different Steganography Techniques for Security Applications
1 Introduction
2 Basic Frameworks for Steganography
3 Literature Survey
3.1 Text Steganography
3.2 Image Steganography
3.3 Speech Steganography
3.4 Video Steganography
4 Conclusion
References
Call Admission Control for Interactive Multimedia Applications in 4G Networks
1 Introduction
2 Existing Work
3 Call Admission Control Issues in 4G Networks
4 Proposed Scheme
5 Analytical Model of Bandwidth Allocation and Monitoring
6 Simulation Environment
7 Results
8 Conclusion
9 Future Works
References
AI-Based Pro Mode in Smartphone Photography
1 Introduction
2 Existing Methodologies/Closest Technologies
2.1 Sequential Attention GAN for Interactive Image Editing
2.2 Sequential Attention GAN for Interactive Image Editing
3 Methodology Used
3.1 Abbreviations and Acronyms
3.2 Modules
3.3 Steps
4 Results
5 Future Scope
References
A ML-Based Model to Quantify Ambient Air Pollutants
1 Introduction
2 Proposed Model
2.1 Algorithm
3 Experiment
3.1 Technical Details
3.2 Results
3.3 Screenshot
3.4 Accuracy
3.5 Loss
4 Traditional System Versus Proposed Model
5 Conclusion
6 Future Work
References
Multimodal Biometric System Using Undecimated Dual-Tree Complex Wavelet Transform
1 Introduction
2 Methodology
2.1 UDTCWT
3 Feature Descriptor Computation
3.1 Extracting Orientation-dependent Edge Information
3.2 Computation of LUPP Coefficient Image
3.3 Computation of GUPP Coefficient Image
4 Experimental Results
4.1 Experimental Results on MEPCO Dataset
4.2 Experimental Results on PolyU Palmprint and CASIA Face Dataset
5 Conclusion
References
Design of Modified Dual-Coupled Linear Congruential Generator Method Architecture for Pseudorandom Bit Generation
1 Introduction
2 Related Study
3 Existing System
3.1 Existing Pseudo Random Bit Generator
3.2 Existing Dual CLCG Method Architecture Drawbacks
4 Proposed Pseudo Random Bit Generator
4.1 Modified Dual CLCG Method Architecture
4.2 Modified Dual CLCG Method Algorithm
4.3 Applications of Pseudo Random Bit Generators
5 Simulation Results
5.1 Existing Dual CLCG Result
5.2 Modified Dual CLCG Results
5.3 Measured Parameters for Existing and Proposed Architectures
6 Conclusion
References
Performance Analysis of PAPR and BER in FBMC-OQAM with Low-complexity Using Modified Fast Convolution
1 Introduction
2 Related Work
3 Material and Methods
4 Results and Discussion
5 Conclusions
References
Sign Language Recognition Using Convolution Neural Network
1 Introduction
2 Related Work
3 Methodology
4 Implementation
4.1 Image Acquisition
4.2 Image Pre-processing
4.3 Feature Extraction and Classification
5 Results and Discussions
6 Conclusion and Future Work
References
Key-based Obfuscation of Digital Design for Hardware Security
1 Introduction
2 Related Work
3 Fixed, Time-Varying, and Dynamic Key-based Obfuscation
3.1 Fixed Obfuscation
3.2 Time-Varying Obfuscation
3.3 Dynamic Obfuscation
4 Implementation of Obfuscation on Digital Design
4.1 Fixed Obfuscation of FFT
4.2 Dynamic Obfuscation of FFT
5 Results
5.1 Fixed Obfuscated FFT
5.2 Dynamic Obfuscation of FFT
5.3 Power and Delay Values
5.4 Device Utilization
6 Conclusion
References
Internet of Things-based Cardless Banking System with Fingerprint Authentication Using Raspberry Pi
1 Introduction
2 Existing System
3 Proposed System
4 System Design
5 Results
6 Future Scope
7 Conclusions
References
Cluster Adaptive Stationary Wavelet Diffusion
1 Introduction
2 Region-based Wavelet Diffusion
2.1 Nonlinear Diffusion
2.2 Stationary Wavelet Transform and Wavelet Diffusion
2.3 Clustering
2.4 Cluster-based Wavelet Diffusion (CWD) Algorithm
3 Experiment
4 Conclusion
References
Low Complexity and High Speed Montgomery Multiplication Based on FFT
1 Introduction
2 FFT-based McLaughlin’s Montgomery Modular Multiplication (FMLM3)
2.1 Multiply Adder Unit (MAU)
2.2 Time Domain Operation (TDO) Units
3 Modified Montgomery Multiplication
4 Results and Discussion
5 Conclusion
References
An Efficient Group Key Establishment for Secure Communication to Multicast Groups for WSN-IoT Nodes
1 Introduction
2 Related Work
3 Material Methods
4 Results and Discussions
5 Conclusion
References
Design of Sub-volt High Impedance Wide Bandwidth Current Mirror for High Performance Analog Circuit
1 Introduction
2 Proposed Current Mirror
2.1 Small Signal Analysis
3 Simulation Results
4 Conclusion
References
Low-Voltage Low-Power Design of Operational Transconductance Amplifier
1 Introduction
2 Low-Power Technique
3 Proposed OTA
4 Simulation Results
5 Conclusion
References
Automatic Detection of Cerebral Microbleed Using Deep Bounding Box Based Watershed Segmentation from Magnetic Resonance Images
1 Introduction
2 Proposed Methodology
2.1 Preprocessing: Gray Scale Conversion and Noise Removal
2.2 Deep Bounding Box and Watershed Transformation
3 Results
4 Discussion and Conclusion
References
New Efficient Tunable Window Function for Designing Finite Impulse Response Digital Filter
1 Introduction
2 Proposed Window
2.1 Description of Window
2.2 Proposed Window
3 Performance Evaluation
3.1 Hamming Window
3.2 Modified Hamming Window
3.3 Kaiser Window
4 Application Example
5 Conclusion
References
Brain Tumour Detection Using Convolutional Neural Networks in MRI Images
1 Introduction
1.1 Literature Review
2 Proposed Techniques
3 Convolutional Neural Network
4 Proposed Methodology
5 Experimental Results
6 Conclusion
References
Design of Circular Patch Antenna with Square Slot for Wearable Ultra-Wide Band Applications
1 Introduction
2 Antenna Design
3 Results and Discussions
3.1 Reflection Coefficient and Gain
3.2 Specific Absorption Rate (SAR)
4 Conclusion
References
Design of Baugh-Wooley Multiplier Using Full Swing GDI Technique
1 Introduction
2 Gate Diffusion Input (GDI) Technique
2.1 Basic GDI Functions
2.2 Analysis of GDI Technique
2.3 Modified GDI Technique
3 Full Adder
3.1 XOR and XNOR Gate
4 Multiplier
5 Results and Comparison
6 Conclusion
References
VLSI Implementation of the Low Power Neuromorphic Spiking Neural Network with Machine Learning Approach
1 Introduction
2 Literature Survey
3 Background Methodology
3.1 Neuromorphic System Architecture
4 Investigation and Experimental Results
4.1 Implementation of the Neurocomputing Hardware Unit (NCHU) in SNN
4.2 Implementation of the SRAM in SNN
4.3 Implementation of the Spiking Neural Network
5 Conclusion
References
IoT-Based Energy Saving Recommendations by Classification of Energy Consumption Using Machine Learning Techniques
1 Introduction
1.1 Concepts
1.2 Motivation
2 Internet of Things
3 Implementing Technologies
3.1 Sensor Devices
3.2 Actuators
3.3 Data Transmission System
3.4 Data and Evaluation
4 IoT in the Field of Power Industry
4.1 Smart Meters
5 Results
6 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Soft Computing and Signal Processing: Pr
✍ V. Sivakumar Reddy (editor), V. Kamakshi Prasad (editor), Jiacun Wang (editor), 📂 Library 📅 2020 🏛 Springer 🌐 English

<p></p><p><span>This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Second International Conference on Soft Computing and Signal Processing (ICSCSP 2019). The respective contributions address topics such as soft sets, rou

Soft Computing and Signal Processing: Pr
✍ V. Sivakumar Reddy (editor), V. Kamakshi Prasad (editor), Jiacun Wang (editor), 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Third International Conference on Soft Computing and Signal Processing (ICSCSP 2020). The book covers topics such as soft sets, rough sets, fuzzy logic, neural net

Soft Computing and Signal Processing: Pr
✍ V. Sivakumar Reddy, V. Kamakshi Prasad, Jiacun Wang, K. T. V. Reddy 📂 Library 📅 2023 🏛 Springer-KES International 🌐 English

<span>This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Fifth International Conference on Soft Computing and Signal Processing (ICSCSP 2022). The book covers topics such as soft sets, rough sets, fuzzy logic, neural net

Soft Computing and Signal Processing: Pr
✍ V. Sivakumar Reddy (editor), V. Kamakshi Prasad (editor), Jiacun Wang (editor), 📂 Library 📅 2021 🏛 Springer 🌐 English

<p>This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Third International Conference on Soft Computing and Signal Processing (ICSCSP 2020). The book covers topics such as soft sets, rough sets, fuzzy logic, neural networ

Soft Computing and Signal Processing: Pr
✍ V. Sivakumar Reddy (editor), V. Kamakshi Prasad (editor), Jiacun Wang (editor), 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Third International Conference on Soft Computing and Signal Processing (ICSCSP 2020). The book covers topics such as soft sets, rough sets, fuzzy logic, neural

Machine Intelligence and Soft Computing:
✍ Debnath Bhattacharyya (editor), Sanjoy Kumar Saha (editor), Philippe Fournier-Vi 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book gathers selected papers presented at the International Conference on Machine Intelligence and Soft Computing (ICMISC 2021), organized by Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India during 22 – 24 September 2021. The topics covered in the book include the