Emerging Research in Electronics, Computer Science and Technology -

Emerging Research in Electronics, Computer Science and Technology (eBook)

Proceedings of International Conference, ICERECT 2018
eBook Download: PDF
2019 | 1st ed. 2019
XXXV, 1482 Seiten
Springer Singapore (Verlag)
978-981-13-5802-9 (ISBN)
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book presents the proceedings of the International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT) organized by PES College of Engineering in Mandya. Featuring cutting-edge, peer-reviewed articles from the field of electronics, computer science and technology, it is a valuable resource for members of the scientific research community.

 

 



Dr. V. Sridhar received his B.E. in Electronics and Communication Engineering from the University of Mysore, M.E. (Electronics & Telecommunication Engineering) from Jadavpur University, Calcutta and Ph.D. from Indian Institute of Technology, New Delhi. He completed his postdoctoral research at the Department of Electrical and Electronics, University Tenaga Nasional, Malaysia. Dr. Sridhar has been working as a Principal of PES College of Engineering for the last 4 years and has been associated with this institute since the beginning of his career in 1980. His fields of interest include VLSI design, digital signal processing, bio-medical engineering & instrumentation and cognitive studies, computer and mobile communications. He was also the Registrar (Evaluation) at Visweswaraya Technological University, Belgaum. He has presented and published numerous papers in national and international peer-reviewed journals and conferences. He has also been a guiding force for M.Sc. and Ph.D. students. He was instrumental in establishing a CAD Center for VLSI Design as a Center of Excellence at the institution. He is a life member of IEEE (M), IETE (F), ISTE (M), and BMSI (M) and has participated in various national and international conferences.

Dr. M.C. Padma received both her B.E. in Computer Science and Engineering and M.Sc. Tech by Research from the University of Mysore, and her Ph.D. from VTU, Belgaum. She has been associated with PES College of Engineering since 1990 and is presently working as a Professor and Head of the Department of Computer Science and Engineering. Her areas of interest are image processing, pattern recognition, natural language processing, machine translation, artificial intelligence and expert systems, as well as document image analysis and recognition. She has published numerous papers in national and international journals and also guides Ph.D. researchers. She is a life member of ISTE, AKECTA, IVPR, and CSI.

Prof. K. A. Radhakrishna Rao is a Professor and Head of the Department of E&C Engineering, PES College of Engineering. He received his B.E. in Electronics and Communication from the University of Mysore, his M.Tech. from IIT Madras and his Ph.D. from the Indian Institute of Science, Bangalore. His research interests include digital processing of biomedical signals, application of nonlinear dynamics to biomedical systems, DSP in video and multimedia applications, embedded systems and PLCs, biometrics and its applications, signal processing in radar absorbers, and the Internet of Things. He has published numerous papers in national and international journals and guides Ph.D. researchers. He is a senior member of IEEE and life member of IETE, ISTE and BMSI.

 

 

 


This book presents the proceedings of the International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT) organized by PES College of Engineering in Mandya. Featuring cutting-edge, peer-reviewed articles from the field of electronics, computer science and technology, it is a valuable resource for members of the scientific research community.  

Preface 6
Acknowledgements 8
Contents 9
Editors and Contributors 19
An Approach for Estimation of Distance Information Between Two Persons from Single 2D Image 36
1 Introduction 36
2 Related Works 37
3 Proposed Methodology 38
3.1 Human Presence Detection 38
3.2 Segmentation 40
3.3 Estimating Depth Information 43
3.4 Find the Distortion Between Humans 43
4 Results 44
5 Conclusion 45
References 46
A Reliable Routing Protocol with Backup Scheme in Wired Computer Networks 47
1 Introduction and Motivation 47
1.1 Proposed Work 48
2 Related Work 48
3 Proposed Approach for Routing Protocol Implementation 49
3.1 Cost Function 49
3.2 Algorithm 50
3.3 Example 50
3.4 Flowchart for Proposed Protocol 52
4 Experiments and Results 52
5 Conclusions and Future Work 55
References 56
Anomaly-Based NIDS Using Artificial Neural Networks Optimised with Cuckoo Search Optimizer 57
1 Introduction 57
2 Literature Review 58
3 Problem Description 60
4 The Proposed Solution 60
4.1 Artificial Neural Network (ANN) 61
4.2 Cuckoo Search Algorithm 62
4.3 Construction of ANN-CSO Model 63
5 Experimental Result 64
5.1 Dataset 64
5.2 Performance of the Model 64
5.3 Analysis of Performance 66
6 Conclusion and Future Work 68
References 68
WSN-Based Electronic Livestock of Dairy Cattle and Physical Parameters Monitoring 70
1 Introduction 70
2 Background 71
3 Literature Review 72
4 System Architecture 73
4.1 Temperature Sensor (LM35) 73
4.2 Accelerometer Sensor (ADXL335) 74
4.3 Heart Rate Sensor (Pulse) 75
4.4 RL78 Microcontroller 75
4.5 Working of System 75
5 Results 76
6 Conclusion 76
7 Future Enhancement 78
References 78
A Sequence-Based Machine Comprehension Modeling Using LSTM and GRU 79
1 Introduction 79
2 Dataset 81
3 Methodology 82
3.1 Preprocessing 83
3.2 Long Short-Term Memory Network 83
3.3 Gated Recurrent Unit 83
3.4 Answer Prediction 84
4 Result 84
5 Conclusion 86
6 Future Work 86
References 86
Deep-Learning-Based Stance Detection for Indian Social Media Text 88
1 Introduction 88
1.1 Selection of Targets for Stances 89
2 Related Works 90
3 Creation and Details of Dataset 90
4 Our Approaches 91
4.1 Word Embeddings 92
4.2 Bag of Tricks 92
4.3 Bidirectional Long Short-Term Memory (Bi-LSTM) 92
4.4 Convolutional Neural Network (CNN) 94
5 Experiments and Observation 94
5.1 Unsupervised Learning of Word Vectors 95
5.2 System Experiment and Observation 95
6 Conclusions 97
References 98
Integration of Wireless Sensor Network and Cloud Computing Using Trust and Reputation Technique 99
1 Introduction 99
1.1 Wireless Sensor Network (WSN) 99
1.2 Cloud Computing (CC) 100
1.3 CC-WSN Integration 100
1.4 Cloud Security with Encryption of Data 100
1.5 Motivation 101
1.6 Research Contribution 102
1.7 Organization of This Paper 103
2 Related Work 103
2.1 Authentication and Data Security 103
2.2 CC-WSN Integration 104
2.3 Trust and Reputation Calculation 104
3 System Architecture 104
3.1 Overall Description of System Architecture 105
3.2 Factors of Trust and Reputation Calculation of CSP 105
4 Proposed Schemes 107
4.1 Entry List 107
4.2 Trust List 107
5 Algorithms 107
5.1 Choosing Desired CSPs for the Service 107
5.2 Choosing Desired SNPs for the Service 108
5.3 Securing Data in the Cloud 108
6 Performance Evaluation 109
6.1 Preliminaries 109
6.2 Simulation Setup 110
6.3 Performance Analysis 110
7 Conclusions 111
References 112
Classwise Clustering for Classification of Imbalanced Text Data 113
1 Introduction 114
2 Background and Motivation 115
3 Representation of Documents in Lower-Dimensional Space 115
4 Proposed Method 116
4.1 Clustering 116
4.2 Representation of Documents of Each Cluster 118
4.3 Creation of Knowledgebase of Interval-Valued Representatives 118
4.4 Classification 119
5 Experimentation and Results 120
5.1 Dataset and Experimental Setup 120
5.2 Results and Analysis 121
6 Conclusion 123
References 123
Limited Number of Materials Scene Reconstruct from Mojette Projections 125
1 Introduction 125
2 Binary Image Reconstructed from Line Mojette 127
2.1 Materials Line Mojette Algorithm 127
3 3 and 4 Materials Scene Reconstruction from Line Mojette Projections 129
4 Farey–Haros Series and Stern–Brocot Tree 129
5 Experiments 131
5.1 Binary Image Analysis 131
5.2 Experimental Results Comparison Between the 2, 3, and 4 Materials Line Mojette 132
6 Conclusion 135
References 135
Automatic Pattern Discovery of Neonatal Brain Tumor Segmentation and Abnormalities in MRI Sequence 137
1 Introduction 137
2 Related Work 138
3 Proposed Architecture 140
3.1 Segmentation 141
3.2 Program Code 142
4 Experimental Results 142
4.1 Detection of Brain Tumor 144
4.2 Area Calculation of Tumor Region 144
5 Conclusion 146
References 146
Theme-Based Partitioning Approach to Decision Tree: An Extended Experimental Analysis 147
1 Introduction 147
2 Literature Review 148
3 Review of Theme-Based Partitioning [8] 149
4 Results and Analysis 150
5 Conclusion 156
References 156
Feedback-Based Swarm Optimization for Optimized Decision Making in Unsecured Mobile Cloud Coordinated Service 158
1 Introduction 159
1.1 Mobile Cloud 159
1.2 Swarm Intelligence 160
2 Swarm Framework for Unsecured Mobile Cloud 160
3 Proposed Feedback-Based Swarm Optimization for Mobile Cloud [FBSO] 161
3.1 General Flock Network 162
3.2 Proposed FBSO Algorithm for Cloud 162
3.3 FBSO Algorithm for Mobile Cloud 163
4 Implementation 164
5 Conclusion 166
References 167
Development of Hybrid Algorithm for Masquerading Sink Node Location in WSN 168
1 Introduction 168
2 Literature Review 170
3 Proposed Algorithm 171
3.1 Simulation Model 173
4 Results and Discussions 174
5 Conclusions 176
References 176
A Data-Driven Model Approach for DayWise Stock Prediction 178
1 Introduction 179
2 Methodology 180
3 Results and Discussion 183
4 Conclusion 186
References 186
Automatic English to Kannada Back-Transliteration Using Combination-Based Approach 188
1 Introduction 188
2 Related Work 190
3 Analysis of English-Kannada Script 190
3.1 Complexities in Transliteration 191
4 Syllabification 193
5 Bilingual Kannada–English Corpus 194
6 Methodology 195
6.1 Knowledge Base Creation 195
6.2 Back-Transliteration 196
7 Evaluation 196
8 Conclusion and Future Work 197
References 198
A Comparison of Warnsdorff’s Rule and Backtracking for Knight’s Tour on Square Boards 200
1 Introduction 200
1.1 Knight’s Tour 200
1.2 Algorithms to Compute Knight’s Tour 201
1.3 Square Boards of Even Dimensions and Odd Dimensions 201
2 Warnsdorff’s Rule 202
2.1 Boards of Even Dimensions 203
2.2 Boards of Odd Dimensions 205
3 Backtracking 206
3.1 Boards of Even Dimensions 208
3.2 Boards of Odd Dimensions 211
4 Results 213
References 214
Performance Evaluation of Fetal ECG Extraction Algorithms 215
1 Introduction 215
2 LMS-Based Adaptive Filtering Algorithm 216
3 Adaptive Filtering Combined with Neural Network 217
3.1 Input Unit 218
3.2 Hidden Unit 218
3.3 Output Unit 218
4 Results and Discussions 219
5 Conclusion 219
References 221
Implementation of Maximum Flow Algorithm in an Undirected Network 223
1 Introduction 223
2 Maximum Flow Algorithm 224
3 Illustrative Example 225
4 Limitation 229
5 Research 230
6 Conclusion 230
References 230
A Review on Trust Models of Social Internet of Things 231
1 Introduction 231
2 Social Internet of Things Network Structure 232
3 Quantifying Trust Model 232
4 Attribute Selection 233
5 Related Work 233
6 Discussion and Comparison 235
7 Limitations and Future Work 236
8 Conclusion 236
References 237
A Deep Learning-Based Stacked Generalization Method to Design Smart Healthcare Solution 238
1 Introduction 239
2 Related Works 239
3 Methodology 240
3.1 Dataset Summary and Statistics 240
3.2 Data Preprocessing 242
3.3 Feature Extraction and Feature Selection 243
3.4 Predictive Modeling 243
3.5 Base Learners 244
3.6 Stacked Ensemble Built on Deep Learning 245
4 Results 246
4.1 Performance on Different Models 246
5 Conclusion 247
References 248
Hadoop as a Service in OpenStack 250
1 Introduction 251
2 Literature Survey 251
2.1 OpenStack 252
2.2 Hadoop 254
3 Proposed Work 255
4 Implementation 256
4.1 Deploying OpenStack Private Cloud 256
4.2 Hadoop on OpenStack 257
5 Results and Discussion 258
6 Conclusion 259
7 Limitations and Future Scope 259
References 260
Load Balancing for Software-Defined Networks 261
1 Introduction 262
2 Related Work 263
2.1 OpenFlow 263
2.2 POX Controller 264
3 Proposed Work 264
3.1 Process Flow Diagram 265
3.2 Algorithm 1: Probing the Servers 266
3.3 Algorithm 2: Balancing Load on Servers 266
3.4 Algorithm 3: Balancing Load on Servers with Segregation 266
4 Emulation Model 267
4.1 Mininet 267
4.2 Performance Metrics 267
4.3 Simulation Scenario 268
5 Results and Discussion 269
6 Conclusion and Future Work 270
References 270
Paddy Yield Predictor Using Temperature, Rainfall, Soil pH, and Nitrogen 271
1 Introduction 271
2 Literature Survey 272
3 Methodology 273
3.1 Data Collection 273
3.2 Data Preprocessing 273
3.3 Applying Association Rule Mining Algorithm 273
3.4 Analyzing Association Rules 275
4 Experimentation 275
4.1 Dataset 275
4.2 Experimental Setup 276
4.3 Result and Discussion 276
5 Conclusion and Future Enhancement 278
References 278
Reshaping the Real Estate Industry Using Blockchain 280
1 Introduction 281
1.1 Why Blockchain? 281
2 Working of Blockchain—A Technical Framework 282
3 Problems in Existing Real Estate Industry 283
4 Opportunity of Blockchain in Real Estate Industry 284
4.1 Improved Property Search Through Blockchain-Enabled Multiple Listing Service (MLS) 284
4.2 Property Visit and Inspection (Manual Phase) 286
4.3 Negotiation of Terms/Value and Signing of the Letter of Intent (Manual Phase) 286
4.4 Prepurchase/Lease Due Diligence by Using Smart Identities 286
4.5 Automated Agreement, Payments, and Cash Flow Using Smart Contracts 287
4.6 Execution of Sale and Real-Time Data Analysis 287
5 Conclusion 287
References 288
Assessment of Weld Bead Mechanical Properties During Destructive Testing Using Image Processing by Multivision Technique 289
1 Introduction 289
2 Selection of Work Material, Preparation and Description 291
3 Processing of Weld Bead Images Using Machine Vision (MV) 294
3.1 Weld Bead Features 294
4 Results and Discussions 295
5 Conclusion 298
References 298
Design of Syntax Analyzer for Kannada Sentences Using Rule-Based Approach 300
1 Introduction 300
2 Previous Work 301
3 4691281En26FigbPrint (Kaaraka) Relations 301
4 Proposed Syntax Analyzer for Kannada Sentences 302
5 System Performance and Result Analysis 304
6 Comparison of Proposed Syntax Analyzer with Existing Kannada Syntax Analyzers 305
7 Conclusion and Future Enhancement 306
References 306
An Efficient Public Auditing Method with Periodic Verification for Data Integrity in Cloud 307
1 Introduction 307
2 Literature Review 308
3 Problem Statement 309
3.1 System Model 309
3.2 Definition of Our Scheme 310
4 The Proposed Scheme 310
5 Performance Evaluation 311
6 Conclusion 312
References 312
Web Service Ranking and Selection Based on QoS 314
1 Introduction 314
2 Literature Review 316
2.1 QoS-Based Web Service Selection 316
2.2 Web Service Ranking 317
2.3 Learning Algorithm for Ranking 317
2.4 Decision Strategies 318
2.5 Issues in Literature Review 318
2.6 Inferences Drawn from Literature 318
3 Proposed Work 320
3.1 Proposed System Architecture 321
4 Implementation Strategy 321
5 Conclusion and Future Plan 324
References 324
Campus Vehicle Monitoring Through Image Processing 326
1 Introduction 326
2 Literature Survey 328
3 System Design 330
3.1 Detection of Motion Using PIR Sensor 331
3.2 Image Processing Methods 331
4 Results 332
5 Conclusion 334
References 335
CL-PKA: Key Management in Dynamic Wireless Sensor Network: A Novel Framework 337
1 Introduction 338
1.1 Overview 338
1.2 Major Features 339
2 Literature Survey 339
3 Related Work 340
3.1 System Architecture 341
3.2 Overview of Architecture 341
4 Implementation 342
4.1 Service Provider Module 343
4.2 Routing Module 343
4.3 Clustering Modules 343
4.4 Receiver Module 344
4.5 Attacker Module 344
4.6 Flow of Architecture 344
5 Results 344
5.1 Encryption 344
5.2 Initializing Mac Address 344
5.3 Initializing Energy of Each Node 345
5.4 Selecting Destination Node 345
5.5 Transfer of Data Through Nodes 348
5.6 Transfer of Data Through Nodes When Node is Affected by Virus 348
6 Conclusion 348
References 349
Convolutional Neural Network Approach for Extraction and Recognition of Digits from Bank Cheque Images 351
1 Introduction 351
2 Preliminaries 353
3 Proposed Method 355
4 Data sets 357
5 Results and Discussions 358
6 Conclusion 359
References 360
A Novel Routing Protocol for Security Over Wireless Adhoc Networks 362
1 Introduction 362
2 Related Work 363
3 Proposed Method 364
3.1 Network Topology 364
3.2 Attack Detection 365
3.3 Attack Prevention 366
4 Results and Discussions 367
4.1 Simulation Environment 367
5 Conclusion and Enhancements 371
References 372
A Study on Personalized Early Detection of Breast Cancer Using Modern Technology 373
1 Introduction 373
1.1 Breast Cancer 374
1.2 Early Detection of Breast Cancer 374
2 Wearable Device for Early Detection of Breast Cancer 375
3 Conclusion and Future Enhancement 379
References 380
Smartphone Price Prediction in Retail Industry Using Machine Learning Techniques 381
1 Introduction 381
2 Existing System 382
3 Proposed System 383
3.1 Dataset 383
3.2 Feature Selection 384
3.3 Methodology 384
3.4 Models 385
3.5 Results and Graphical Analysis 387
4 Conclusion 391
5 Future Scope 391
References 391
Weighted Round-Robin Load Balancing Algorithm for Software-Defined Network 392
1 Introduction 392
2 Literature Survey 394
2.1 Review of SDN Architecture 394
2.2 Study on Load Balancing Strategy in SDN 394
2.3 Survey on Distributed Load Balancing in SDN 395
2.4 SDN Frameworks 396
3 Proposed Work 398
3.1 Analytical Model for WRR 398
3.2 Weighed Round-Robin (WRR) Algorithm 399
4 Result Analysis 400
4.1 Simulation Scenario 400
4.2 Results and Discussion 401
5 Conclusion 403
References 403
Assessing Human Stress Through Smartphone Usage 405
1 Introduction 405
2 Related Works 406
3 Methodology 408
4 Implementation and Results 411
5 Conclusion and Future Work 414
References 415
Virtual Map-Based Approach to Optimize Storage and Perform Analytical Operation on Educational Big Data 416
1 Introduction 416
2 Related Work 417
3 Problem Description 418
4 Proposed Methodology 418
5 Algorithm Design 419
5.1 Algorithm Snapshot 419
5.2 Algorithm Description 420
6 Results Discussion 422
7 Conclusion 424
References 425
Comparison of Rainfall Forecasting Using Artificial Neural Network and Chaos Theory 428
1 Introduction 429
2 Methodology 430
2.1 Concept of Artificial Neural Network 430
2.2 Algorithms 431
2.3 Concept of Chaos Theory 431
2.4 Procedure Adapted 432
3 Results and Discussion 433
4 Conclusion 435
References 436
Analysis of Vital Signals Acquired from Wearable Device 438
1 Introduction 439
2 Methodology 440
2.1 Physiological Parameters 440
2.2 Block Diagram for Physiological Monitoring 440
2.3 PPG Signal Acquisition and Analysis 440
2.4 ECG Signal Acquisition and Analysis 441
2.5 Temperature 445
2.6 Galvanic Skin Response and Analysis 445
2.7 Accelerometer and Activity Analysis 447
2.8 Wireless Communication Setup 447
2.9 Signal Processing 447
3 Results and Discussion 449
4 Conclusion 449
References 451
Experimental Investigations on Quality of Water Used in Poultry Farm Using Sensors 452
1 Introduction 452
2 Literature Survey 453
3 Parameters Measured and Their Effect on Layers 455
3.1 pH (Power of Hydrogen) 455
3.2 Turbidity 455
3.3 Temperature 455
4 Experimental Setup 456
5 Experimental Study and Results 457
6 Conclusions and Future Work 460
References 460
Empirical Study to Evaluate the Performance of Classification Algorithms on Public Datasets 461
1 Introduction 461
2 Literature Review 462
3 Methodology 463
4 Experiments and Results 464
4.1 Datasets Information 464
4.2 Experimental Procedure 465
4.3 Results 466
5 Conclusion 468
References 469
Performance Analysis of Job Scheduling Algorithms on Hadoop Multi-cluster Environment 470
1 Introduction 471
2 Related Work 473
3 Proposed Work 474
4 Implementation 475
4.1 Master and Slave Connection Using SSH 476
4.2 YouTube Dataset Extractions 476
4.3 FIFO Scheduling Algorithm 477
4.4 FAIR Scheduling Algorithm 477
4.5 Capacity Scheduling Algorithm 477
5 Results and Discussion 478
5.1 Performance Analysis of Scheduling Algorithm Considering CPU Cycles 478
5.2 Performance Analysis of Scheduling Algorithm Considering Physical Memory 478
5.3 Performance Analysis of Scheduling Algorithm Considering Virtual Memory 479
5.4 Performance Analysis of FAIR, FIFO, and CAPACITY Schedulers 480
6 Conclusion 480
Appendix 481
References 483
A Movie Recommender System Using Modified Cuckoo Search 484
1 Introduction 484
1.1 Parts of Filtering Algorithm [2] 485
1.2 Challenges in Recommender System 486
2 Related Work 487
2.1 Clustering 487
2.2 Optimization Using Nature-Inspired Algorithm 488
3 Integrating Nature-Inspired Optimization Algorithms to K-Means Clustering 488
3.1 Cuckoo Search 490
3.2 Parameter Set for Algorithms 490
4 Experiment and Results 490
5 Conclusion and Future Work 494
References 495
Machine Learning Approaches for Potential Blood Donors Prediction 496
1 Introduction 497
2 Literature Review 498
3 Methodology 499
3.1 Online Questionnaire 499
3.2 Classification Using Machine Learning Algorithms 500
4 Experimental Results 502
5 Conclusion 503
6 Future Works 504
References 504
Analysis of Various CNN Models for Locating Keratin Pearls in Photomicrographs 505
1 Introduction 505
2 Background 506
3 Training Procedure 507
4 Models Used 507
5 Performance Comparison 508
6 Limitations 511
7 Discussion and Conclusion 511
8 Future Work 511
References 512
A New Approach for Book Recommendation Using Opinion Leader Mining 513
1 Introduction 513
2 Recommendation Process 514
2.1 Techniques of Book Recommendation 515
3 Related Work in Book Recommendation 516
3.1 Challenges Associated with Existing Work 517
4 Proposed Approach 519
4.1 Evaluation Measure of the Proposed Method 521
5 Experimental Analysis 522
6 Discussion 524
7 Conclusion 525
References 526
A Deep Learning-Based Named Entity Recognition in Biomedical Domain 528
1 Introduction 528
2 Related Works 529
3 Background 530
3.1 Data set 531
3.2 RNN 531
3.3 Long Short-Term Memory (LSTM) 532
3.4 Gated Recurrent Unit (GRU) 533
4 Experimentation and Results 533
4.1 Sequence Labelling 534
4.2 Keras 534
5 Conclusion and Future Work 534
References 536
Convolutional Neural Network with SVM for Classification of Animal Images 538
1 Introduction 539
2 Convolution Neural Network Configuration 541
3 Proposed Methodology 542
3.1 CNN with SVM-Based Classification 542
3.2 Multiclass SVM Classifier 543
4 Experimentation 543
4.1 Dataset 544
4.2 Experimental Setup 544
4.3 Results 544
5 Conclusion 545
References 548
Surface Roughness Measurement of WEDM Components Using Machine Vision System 549
1 Introduction 549
2 Experimental Work 551
3 Software Development 552
3.1 Surface Roughness Measurement 553
4 Results and Discussion 555
5 Conclusion 556
References 557
Performance Analysis of Students by Evaluating Their Examination Answer Scripts by Using Soft Computing Techniques 558
1 Introduction 559
2 Related Work 560
3 Methodology 561
3.1 Features Used for Student Performance Analysis 561
3.2 Manual Grouping: (Supervised Grouping) 568
3.3 Use of MATLAB Tool 570
3.4 Validation and Test Data 571
3.5 Final Result Analysis 572
4 Conclusion 576
References 576
Performance Analysis of IPv6 and NDN Internet Architecture in IoT Environment 578
1 Introduction 578
1.1 IPv6 for Internet of Things 579
1.2 NDN for Internet of Things 580
1.3 Key Challenges for Internet of Things 582
2 Related Work 583
3 Implementation Strategy 584
3.1 Implementation 584
3.2 Performance Metrics 585
4 Results and Discussion 586
5 Conclusion 587
5.1 Future Scope 588
References 588
Machine Learning Approach for Preterm Birth Prediction Based on Maternal Chronic Conditions 589
1 Introduction 589
2 Literature Survey 590
3 Methodology 591
4 Results and Discussions 593
5 Conclusion 595
References 595
A Review on Biometric Template Security 597
1 Introduction 597
2 Effects of Template Protection 599
3 Biometric Template Protection Issues 600
4 Open Challenges in Biometric Template Protection 601
5 Conclusion 602
References 602
CD2A: Concept Drift Detection Approach Toward Imbalanced Data Stream 605
1 Introduction 606
2 Related Work 608
3 Proposed Method 610
3.1 Imbalanced Data Stream Online Algorithm 610
3.2 Detecting and Handling Concept Drift in the Model 611
3.3 Incremental Learning of the Classifier 612
4 Experiments 613
4.1 Datasets 613
4.2 Evaluation Metrics 614
4.3 Experimental Setup 615
4.4 Results and Discussion 615
5 Conclusion 618
References 618
A Literature Review on Energy Harvesting for Internet of Things Applications 621
1 Introduction 621
2 Energy Harvesting for IoT Application 623
3 Protocol Stack 635
4 Conclusion and Future Work 637
References 637
Review on Recent Methods for Segmentation of Liver Using Computed Tomography and Magnetic Resonance Imaging Modalities 639
1 Introduction 639
2 Literature Review 640
2.1 Liver Segmentation Using Computed Tomography (CT) Images 641
2.2 Liver Segmentation Using Magnetic Resonance Imaging (MRI) Images 641
3 Methodologies 642
3.1 Liver Segmentation Methods Using Computed Tomography Images 642
3.2 Liver Segmentation Methods Using Magnetic Resonance Imaging Images 645
4 Discussion 647
5 Conclusion 647
References 654
A Survey: On Network Forensic Data Acquisition and Analysis Tools 656
1 Introduction 656
2 Literature Review 657
2.1 Digital Forensic 659
2.2 Live Forensics 660
2.3 Network Devices and Forensic Value 661
2.4 Network Forensic Tools 661
3 Investigation Strategy 662
4 Conclusion and Future Work 665
References 665
A Study on Sentiment Analysis on Social Media Data 667
1 Introduction 667
2 Importance of Social Media Data and Its Sources 668
3 Machine Learning in Sentiment Analysis 668
4 Data Collection and Storage 669
5 Ontology for Sentiment Analysis 669
6 Related Work 670
7 Existing Techniques for Sentiment Analysis 671
8 Research Challenges in the Domain of Sentimental Analysis 672
9 Conclusion 672
References 672
Character Recognition on Palm-Leaf Manuscripts—A Survey 674
1 Introduction 674
2 Related Work 675
3 Methodology 676
3.1 Document Preprocessing 676
4 Analysis 685
4.1 Binarization 685
4.2 Text Line Segmentation 686
4.3 Character Segmentation 687
5 Conclusion and Future Work 688
References 688
Sentiment Analysis of Restaurant Reviews Using Machine Learning Techniques 691
1 Introduction 691
2 Related Work 693
3 Architecture and Modeling 694
3.1 Data Preprocessing 695
3.2 Preparation of Bag of Words 695
3.3 Segregation of Training and Test Data 696
3.4 Classification 696
3.5 Performance Evaluation of Classification 697
3.6 Class Prediction 698
4 Implementation and Performance Analysis 698
5 Conclusion 699
References 699
Diabetic Retinopathy Risk Prediction for Diabetics Using Nearest Neighbour Approach 701
1 Introduction 701
2 Methodology 703
2.1 Diabetic Retinopathy Risk Prediction Using Machine Learning Model 703
2.2 Data Acquisition 703
3 Proposed Model 704
3.1 Data Collection 704
3.2 Preprocessing 704
3.3 Naïve Bayes Classification for Diabetes Detection 704
3.4 Feature Selection 705
3.5 Z-Ordering with KNN 705
4 Results and Discussion 707
5 Conclusions and Future Work 708
References 708
A Revised Auditing and Survey on Mobile Application Analytics 710
1 Introduction 710
1.1 Types of Data 711
1.2 Elements of Big Data 712
2 Big Data Analytics 713
3 Mobile Analytics 714
3.1 Comparison Between Web and Mobile Analytics 714
4 Working of Mobile Analytics 715
5 Types of Mobile Analytics 716
5.1 Advertising/Marketing Analytics 716
5.2 In-App Analytics 717
5.3 Performance Analytics 718
6 Measurements of Mobile Analytics 720
6.1 User Acquisition Metrics 720
6.2 Engagement Metrics 720
6.3 Revenue Metrics 720
7 Mobile Analytics Tools 721
8 Conclusion 722
References 722
Detection of Breast Cancer Using Digital Breast Tomosynthesis 724
1 Introduction 724
2 Literature Survey 725
2.1 Limitations 726
3 Proposed Method 726
3.1 Image Acquisition 726
3.2 Preprocessing 726
3.3 Segmentation 728
3.4 Feature Extraction 729
3.5 Classification 731
4 Conclusion 732
5 Future Enhancement 732
References 733
Cross-Spectral Periocular Recognition: A Survey 734
1 Introduction 735
2 Methodologies Used in Cross-Spectral Periocular Recognition 737
3 Cross-Spectral Periocular Databases 739
3.1 IMP Database 740
3.2 PolyU Cross-Spectral Iris Database 740
3.3 Cross-Eyed Periocular Database 741
4 Conclusion and Future Work 742
References 743
An Automated Method Using MATLAB to Identify the Adductor Sesamoid for Determining the Onset of Puberty and Assessing the Skeletal Age in Children 745
1 Introduction 746
2 Literature Review 746
3 Methodology 747
4 Experimental Results and Discussion 751
5 Conclusion 752
References 752
Anomaly Detection in Surveillance Video Using Pose Estimation 754
1 Introduction 754
2 Related Work 755
3 Methodology 756
3.1 An Overview of Open Pose 756
3.2 Proposed Method 757
3.3 Program Code 757
4 Results 760
5 Performance Evaluation 765
References 767
Design of Low-Power Square Root Carry Select Adder and Wallace Tree Multiplier Using Adiabatic Logic 768
1 Introduction 769
2 Literature Review 770
3 Design and Implementation of Adders and Multipliers 771
3.1 Square Root Carry Select Adder 771
3.2 Wallace Tree Multiplier 772
3.3 Adiabatic Logic 774
4 Results and Discussions 776
5 Conclusions and Future Scope 781
References 781
Implementation of Doppler Beam Sharpening Technique for Synthetic-Aperture Radars 783
1 Introduction 783
2 DBS Algorithm 784
2.1 Pulse Compression 785
2.2 Matched Filter 786
3 Ambiguities in DBS 787
3.1 Range Ambiguity 787
3.2 Doppler Ambiguity 787
4 Simulation Results 788
5 Conclusion 791
References 791
Capturing Discriminative Attributes Using Convolution Neural Network Over ConceptNet Numberbatch Embedding 792
1 Introduction 792
2 Dataset 794
3 Methodology 795
3.1 Representation 795
3.2 ConceptNet Numberbatch 797
3.3 Rule-Based Method 797
3.4 Hyperparameter Tuning 798
4 Conclusion and Future Scope 799
References 800
Prediction of Gold Stock Market Using Hybrid Approach 802
1 Introduction 802
2 Related Work 803
3 Proposed System 804
4 Result Analysis 809
5 Conclusion and Future Work 810
References 811
Analysis of Digit Recognition in Kannada Using Kaldi Toolkit 812
1 Introduction 812
2 Related Work 814
3 The Kaldi ASR Toolkit 814
4 Recognition Phases 816
4.1 Voice Data Preparation 816
4.2 Acoustic Data Preparation 816
4.3 Feature Extraction 816
4.4 Language Data Creation 817
4.5 Language Model Creation 817
4.6 Training 818
4.7 Decoding 818
5 Experimental Results 818
6 Conclusion 819
References 820
Real-Time Traffic Management Using RF Communication 821
1 Introduction 821
2 Proposed Scheme 822
3 Proposed Design 823
3.1 Tag 823
3.2 Reader 824
3.3 Co-ordinator 824
4 Results 827
4.1 Results Obtained from Prototype Model 827
4.2 Simulation Analysis 828
5 Conclusion and Scope for Further Improvement 832
References 833
SDN Security: Challenges and Solutions 834
1 Introduction 834
2 Software-Defined Network 835
3 Vulnerabilities in the Open Interface 837
3.1 Securing the Controller 837
3.2 Securing the Data Plane 839
3.3 Securing the Channel 840
3.4 Security in Virtual Environments 840
3.5 Security in Wireless Environment 840
4 Conclusion 843
References 843
Comparative Performance Analysis of PID and Fuzzy Logic Controllers for 150hp Three-Phase Induction Motor 846
1 Introduction 847
2 Background Information 847
3 Existing PID Controller in Cable Industry 848
4 Proposed Fuzzy Logic Controller for Three-Phase Induction Motor 851
4.1 Implementation of the Fuzzy Logic Controller 851
5 Results and Discussion 854
6 Conclusion 860
Appendix 861
References 861
A Hybrid Progressive Image Compression, Transmission, and Reconstruction Architecture 863
1 Introduction 863
1.1 Need for Progressive Compression 865
2 Implementation 865
3 Experimental Results 868
4 Conclusions 870
References 870
Design and Development of Non-volatile Multi-threshold Schmitt Trigger SRAM Cell 872
1 Introduction 872
2 Proposed Cell 873
3 Results and Analysis of the Proposed Cell 875
4 Conclusion 877
References 878
Intelligent Phase-Locked Loops for Automotive Applications 880
1 Introduction 881
2 Overview of Automotive Systems 881
3 Powertrain Sensor-Signal Processing 882
4 Implementation of Intelligent Phase-Locked Loops—IPLL 885
5 Simulation Results—IPLL VHDL Model 887
6 Summary with Conclusion 887
References 888
Design and Implementation of Logarithmic Multiplier Using FinFETs for Low Power Applications 890
1 Introduction 890
2 Background 891
2.1 Motivation 891
2.2 Mitchell Algorithm and Logarithmic Multiplier 891
2.3 FinFETs 892
3 Design and Implementation 893
4 Results and Discussion 894
5 Conclusion 895
References 897
Design of Ternary SRAM Cell Based on Level Shift Ternary Inverter 898
1 Introduction 899
2 Traditional Ternary Inverter 899
3 Traditional Ternary SRAM 900
4 Level Shift Ternary Inverter 901
5 Level Shift Ternary SRAM 904
6 Results and Discussion 905
7 Conclusion 908
References 909
Machine-Vision-Assisted Performance Monitoring in Turning Inconel 718 Material Using Image Processing 910
1 Introduction 910
2 Experimental Details 911
3 Performance Monitoring 912
3.1 Characterizations of Cutting Tool Wear Using Image Processing 912
3.2 Machined Surface Characterization Using Image Histogram 912
4 Result and Discussion 916
5 Conclusion 919
References 919
Improved WEMER Protocol for Data Aggregation in Wireless Sensor Networks 921
1 Introduction 921
2 Literature Review 922
3 Proposed Algorithm 923
3.1 Cluster Head Selection 924
3.2 Leader Node Selection 925
3.3 Gateway Node Selection 925
4 Results and Discussions 927
5 Conclusions 928
References 929
Analysis of Speckle Diminution in Ultrasound Images—A Review 930
1 Introduction 930
2 Related Work 931
3 Noise Models 932
4 Various Methods 933
5 Results 935
6 Conclusion 936
References 939
Comparative Study of gm/ID Methodology for Low-Power Applications 941
1 Introduction 941
2 gm/ID Figure of Merits 942
2.1 Transconductor Efficiency (gm/ID) 942
2.2 Transit Frequency (FT) 943
2.3 Intrinsic Gain (gm* Ro) 945
2.4 gm/ID Versus fT Trade-Off 945
3 gm/ID Design Methodology 946
4 Design of Differential Amplifier 948
5 Experiment Result 949
6 Conclusion 950
7 Future Scope 950
References 951
Vehicle Speed Warning System and Wildlife Detection Systems to Avoid Wildlife-Vehicle Collisions 952
1 Introduction 952
2 Literature Survey 953
3 Design Methodology 954
4 Flowchart 955
5 Result 956
6 Conclusion and Future Work 957
References 959
Camera Raw Image: A Study, Processing and Quality Analysis 960
1 Introduction 960
1.1 Color Filter Array (CFA) 961
2 Proposed Workflow 962
2.1 Linearization 963
2.2 White Balancing 963
2.3 Demosaicking 964
2.4 Color Space Conversion 965
2.5 Brightness and Gamma Correction 966
3 Experimental Results 967
4 Conclusion 970
References 971
An Image Processing Approach for Compression of ECG Signals Based on 2D RLE and SPIHT 972
1 Introduction 972
2 Methodology 974
2.1 Removal of Baseline Wander 975
2.2 Detecting QRS Complexes 977
2.3 Construction of 2D ECG Array 978
2.4 Run Length Encoding 980
2.5 2D Discrete Wavelet Transform 980
2.6 Thresholding of Wavelet Coefficients 981
2.7 SPIHT 981
3 Results 982
4 Conclusion 984
References 985
Classification of Service Robot Environments Using Multimodal Sequence Data 987
1 Introduction 987
2 Related Work 988
3 Proposed Method 989
3.1 Environmental Setup and Scenario Creation 989
3.2 Data Collection 990
3.3 Preprocessing 992
3.4 Classification 994
4 Results and Analysis 995
4.1 Evaluation 995
4.2 Results 995
5 Conclusion 999
References 1000
Comparative Analysis of Existing Latest Microcontroller Development Boards 1001
1 Introduction 1001
2 Case 1: Automatic Auditorium System Using Arduino Board 1005
3 CASE 2: IoT-Based LCD Gadget Using MBED LPC1768 1007
3.1 Methodology 1008
4 Case 3: Home Automation Using Intel Galileo Board 1009
4.1 Methodology 1012
5 Results 1012
6 Conclusion 1014
References 1015
Dynamic Routing in Software-Defined Networks 1016
1 Introduction 1017
2 Related Work 1018
2.1 Mininet Emulator 1018
2.2 POX Controller 1018
2.3 Drawbacks of the Conventional Network 1019
2.4 Literature Survey 1019
3 Proposed Work 1020
3.1 System Model 1020
3.2 Bellman–Ford Algorithm 1020
4 Implementation 1021
4.1 Topologies Deployed 1022
5 Results and Performance Estimation 1023
6 Conclusion 1025
7 Future Scope 1025
References 1026
Design of an Energy-Efficient Routing Protocol Using Adaptive PSO Technique in Wireless Sensor Networks 1027
1 Introduction 1028
2 Proposed Model 1029
2.1 WSN System Model 1030
2.2 Problem Formulation 1031
2.3 Cluster Head Selection 1032
2.4 PSO-Based Routing 1032
3 Results and Discussion 1036
3.1 Performance Measurement Metrics 1036
3.2 Experimental Scenario 1 1037
4 Conclusion 1040
References 1041
Detection of Retinal Disease Screening Using Local Binary Patterns 1042
1 Introduction 1042
2 Literature Survey 1043
3 Methods 1046
3.1 Local Binary Patterns 1046
3.2 Random Forest 1047
4 System Methodology 1047
4.1 Preprocessing 1049
4.2 Feature Extraction 1050
4.3 Classification 1050
5 Results and Analysis 1050
6 Conclusion 1053
References 1054
Comparative Performance Analysis of Hybrid PAPR Reduction Techniques in OFDM Systems 1055
1 Introduction 1055
2 OFDM System, PAPR, and CCDF 1056
3 Discrete Cosine Transform (DCT) and Companding-Based PAPR Reduction Technique 1057
4 Companding Technique 1058
5 Proposed Hybrid PAPR Reduction Technique 1059
6 Simulation Results 1060
7 Conclusion 1062
References 1062
A Hardware Accelerator Based on Quantized Weights for Deep Neural Networks 1064
1 Introduction 1065
2 Related Work 1065
3 System Model 1066
3.1 Architecture 1066
3.2 Algorithm Optimization 1070
4 Experiments 1072
5 Results 1074
6 Conclusion 1075
References 1076
Effective Protocols for Industrial Communication 1077
1 Introduction 1077
2 Industrial Communication 1078
2.1 Hierarchical Levels in Industrial Communication Network 1079
3 Design Principles of Industry 4.0 1080
4 Industrial Communication Technologies 1080
4.1 Traditional Fieldbus Technology 1080
4.2 Industrial Ethernet Technology 1081
4.3 Industrial IOT 1084
5 Case Study on EtherCAT 1084
6 Conclusion 1087
References 1089
Optimal Resource Allocation and Binding in High-Level Synthesis Using Nature-Inspired Computation 1090
1 Introduction 1090
2 Previous Work 1091
3 Nature-Inspired Computations Method (Genetic Algorithm (GA), Particle Swarm Optimization (PSO)) 1091
3.1 Genetic Algorithm (GA) 1092
3.2 Particle Swarm Optimization (PSO) 1092
4 Methodology 1092
4.1 Problem Formulation 1092
4.2 Benchmark Problem for Resource Allocation 1092
4.3 Integer Linear Programming (ILP) Formulation for Allocation and Binding as a Constraint Optimization 1093
5 Experimental Analysis and Data 1095
6 Results and Discussion 1096
6.1 Resource Binding Performance Analysis Using Genetic Algorithm 1096
6.2 Discussion 1097
6.3 Resource Binding Performance Analysis Using Particle Swarm Optimization 1099
6.4 Discussion 1099
7 Conclusion 1101
References 1101
Boundary Extraction and Tortuosity Calculation in Retinal Fundus Images 1102
1 Introduction 1102
2 Tortuosity Measurement as Differential Geometrical Problem 1103
2.1 Pre-processing 1104
2.2 Binary Image and Vascular Network 1105
2.3 Major Vessel Extraction 1105
3 Boundary Extraction 1107
4 Segmentation and Average Curvature Computation 1109
5 Results and Discussion 1110
6 Conclusion 1112
References 1112
Synthesis, Characterization of Hybrid Nanomaterials of Strontium, Yttrium, Copper Doped with Indole Schiff Base Derivatives Possessing Dielectric and Semiconductor Properties 1114
1 Introduction 1115
2 Experimental 1116
2.1 Synthesis of Sr-Y Nanocomposites 1116
2.2 Purification and Isolation of Sr-Y Nanocomposites 1116
2.3 Doping of Copper to Sr-Y Nanocomposites 1116
2.4 Synthesis of Substituted Derivatives of Carbohydrazide (2a–2e) 1117
2.5 Synthesis of Various Analogues of Indole Schiff Base Derivatives (4a–4e) 1117
2.6 Synthesis of Hydrochloride Salts of Indole Schiff Base Derivatives (5a–5e) 1117
2.7 Dielectric and Semiconductor Properties 1117
2.8 Synthetic Reaction Scheme 1119
3 Materials and Methods 1120
3.1 Spectral Analysis Data 1120
4 Results and Discussion 1122
5 Conclusion 1122
References 1123
Study of Clustering Approaches in Wireless Sensor Networks 1124
1 Introduction 1124
2 Clustering Technique in WSN 1125
3 Challenges for Clustering in WSN 1125
4 Standard Clustering Algorithms 1127
5 Simulation and Analysis 1129
6 Conclusion 1131
References 1131
Novel Color Image Data Hiding Technique Based on DCT and Compressed Sensing Algorithm 1133
1 Introduction 1133
2 Literature Review 1134
3 Results and Discussions 1136
4 Conclusions 1137
References 1138
GSM-Based Advanced Multi-switching DTMF Controller for Remotely Monitoring of Electrical Appliances 1140
1 Introduction 1140
2 Basic Principles of DTMF Decoder 1141
3 Proposed DTMF Controller 1142
4 Results and Discussion 1147
5 Conclusion 1147
References 1148
Design and Development of 15-Level Asymmetrical Cascaded Multilevel Inverter 1149
1 Introduction 1150
2 Proposed Model 1150
3 Multilevel Inverters 1152
4 Simulation Results 1153
4.1 15-Level H-Bridge Symmetrical Multilevel Inverter 1155
4.2 15-Level H-Bridge Asymmetrical Multilevel Inverter 1155
4.3 Equal Area Criteria Method 1156
4.4 Simulink Model of a New 15-Level Asymmetrical Multilevel Inverter Topology with DC Source 1159
5 Hardware Implementation 1159
5.1 Controller: Arduino 1161
5.2 Boost Converter Integrated with 15-Level MLI 1162
6 Conclusion 1162
Comparative Study of 31-Level Symmetrical and Asymmetrical Cascaded H-Bridge Multilevel Inverter 1164
1 Introduction 1164
2 Symmetrical Cascaded H-Bridge Inverter 1165
3 Asymmetrical Cascaded H-Bridge Inverter 1166
4 Analysis and Simulation Results 1168
4.1 Symmetrical Cascaded H-Bridge 31-Level Inverter 1168
4.2 Asymmetrical Cascaded H-Bridge 31-Level Inverter 1170
4.3 Simulation Results 1173
5 Conclusion 1175
6 Future Scope 1175
References 1175
Three-Phase Shunt Active Filter for Cuk-Sepic Fused Converter with Solar–Wind Hybrid Sources 1177
1 Introduction 1177
2 Objective 1178
3 Proposed System 1179
4 Calculation for the DQO Compensation 1182
5 Simulation Results 1183
6 Results 1186
7 THD with Various Filters 1187
8 Conclusion 1187
References 1188
Study of Different Modelling Techniques of SMA Actuator and Their Validation Through Simulation 1189
1 Introduction 1189
2 Thermodynamics of SMA 1191
3 Phase Transformation of SMA 1194
3.1 Preisach Model 1194
3.2 Duhem Hysteresis Model 1195
3.3 Fermi–Dirac Statistics 1198
3.4 Ikuta Model 1199
3.5 Liang Constitutive Model 1201
3.6 Brinson Model 1203
3.7 Kinematic Model for SMA 1204
4 Conclusion 1204
References 1205
Maximum Power Point Tracking for an Isolated Wind Energy Conversion System 1207
1 Introduction 1207
2 Wind Energy Conversion System 1208
3 Wind Turbine Modeling 1209
4 Excitation Capacitor Design for SEIG 1210
5 Hill Climbing Search MPPT Algorithm 1212
6 Simulation Results 1212
7 Conclusions 1216
References 1218
Phase Shift Control Scheme of Modular Multilevel DC/DC Converters for HVDC-Based Systems 1220
1 Introduction 1221
2 Proposed System 1222
3 System Design 1222
3.1 Operation Analysis 1223
4 Voltage Auto-Balance Mechanism 1224
5 Operation Analysis of Proposed System 1226
5.1 Switching Sequence of the Three-Stage Converter 1227
5.2 Parameters for Design 1227
5.3 Simulation Diagram of DC-to-DC Converter with Filter and Without Filter 1228
5.4 Output Waveform 1229
5.5 Output Waveforms of Switches, Voltages, Current 1229
6 Comparison Analysis of Base Converter (Three-Stage Converter) and Proposed Converter (Two-Stage Converter) 1229
7 Conclusion and Future Work 1229
References 1231
Improvement of Power Quality in an Electric Arc Furnace Using Shunt Active Filter 1232
1 Introduction 1232
2 Electric Arc Furnace 1234
3 Modeling of Electric Arc Furnace 1234
3.1 Hyperbolic Model 1235
3.2 Exponential Model 1235
3.3 Exponential-Hyperbolic Model 1236
4 Harmonic Suppression Techniques 1237
4.1 Active Power Filtering 1237
4.2 Shunt Active Power Filter 1237
5 Results and Discussion 1239
6 Harmonic Behavior of EAF System 1240
7 Conclusion 1246
References 1246
Wireless Power Transfer for LED Display System Using Class-DE Inverter 1247
1 Introduction 1247
2 Circuit Description 1248
2.1 Operating Mode During Interval 1 (0 le?le?/2) 1249
2.2 Operating Mode During Interval 2 (?/2 le?le?) 1251
2.3 Operating Mode During Interval 3 (?le?le3?/2) 1251
2.4 Operating Mode During Interval 4 (3?/2 le?le2?) 1252
3 Design Considerations 1253
3.1 Receiver-side Rectifier Specifications 1253
3.2 Transmitter-side Class-DE Inverter Design 1253
3.3 Supply-side Rectifier Design 1254
3.4 Transmitter Coil Design 1254
3.5 Receiver Coil Design 1255
4 Simulation Results 1255
5 Conclusion 1257
References 1258
Bidirectional Power Conversion by DC–AC Converter with Active Clamp Circuit 1259
1 Introduction 1259
2 Block Diagram 1260
3 Operation Principle 1261
4 Basic Operations of Converter 1262
5 Control Algorithm for the Bidirectional Converter 1264
6 Simulation Results 1265
7 Conclusion 1269
References 1270
Performance Study of DC–DC Resonant Converter Topologies for Solar PV Applications 1271
1 Introduction 1271
2 Computer Simulation Model of PV System 1272
3 Boost Converter 1273
4 Inverter 1273
5 DC–DC Resonant Converter 1275
5.1 Operating Modes of DC–DC Resonant Circuit 1275
6 Simulation, Results and Discussion 1277
6.1 DC–DC Series Resonant Circuit 1277
6.2 DC–DC Parallel Resonant Circuit 1278
6.3 DC–DC Series–Parallel Resonant Circuit 1278
6.4 DC–DC Without Resonant Circuit 1278
7 Conclusion 1282
8 Future Scope 1284
References 1286
Performance Analysis of SHEPWM Based on GA and PSO for CMLI 1287
1 Introduction 1287
1.1 Cascaded Multilevel Inverter 1288
1.2 Selective Harmonic Elimination (SHE) 1290
1.3 Genetic Algorithm 1290
1.4 Structures of PSO 1292
2 Implementation 1294
2.1 Cascaded H-Bridge Multilevel Inverter 1294
2.2 Selective Harmonic Elimination PWM 1294
2.3 Genetic Algorithm (GA) 1295
2.4 Particle Swarm Optimization 1298
2.5 Calculation of Switching 1298
2.6 Total Harmonic Distortion (THD) 1299
3 Simulation Results 1299
3.1 Cascaded Multilevel Inverter 1299
3.2 Switching Angles Obtained Using GA Rule 1302
3.3 Switching Angles Obtained Using PSO Rule 1302
3.4 Simulation Result of Genetic Algorithm 1303
3.5 Simulation Result of PSO Algorithm 1304
4 Conclusion 1305
References 1305
Induction Motor Internal and External Fault Detection 1306
1 Introduction 1306
2 External Fault Detection 1309
2.1 Multi-layer Perceptron Neural Network 1309
2.2 Random Forest 1312
3 Internal Fault Detection 1312
3.1 Fast Fourier Transformation 1312
3.2 S-Transform 1313
4 Results 1314
5 Conclusion 1317
References 1319
Comparison of Maximum Power Point Tracking—Perturb and Observe and Fuzzy Logic Controllers for Single Phase Photovoltaic Systems 1322
1 Introduction 1322
2 PV Cell Design 1323
3 Maximum Power Point Tracking 1324
3.1 Perturb and Observe 1325
3.2 Fuzzy Logic Controller 1326
4 Results 1328
5 Conclusion 1330
References 1330
Comparative Study of Different High-Gain Converter 1332
1 Introduction 1332
2 Analysis of Different Converter 1334
2.1 Buck-Boost-Flyback Converter 1335
2.2 Boost–Cuk DC–DC Converter 1335
2.3 Converter with Coupled Inductor and Diode Capacitor 1336
2.4 Modified Converter with Coupled Inductor and Diode Capacitor 1336
3 Comparison of Different Converter 1337
4 Simulations Results 1338
5 Conclusion 1339
References 1340
Evolution in Solid-State Transformer and Power Electronic Transformer for Distribution and Traction System 1341
1 Introduction 1341
2 LFT and P.E.T. Technologies in Distribution System 1345
2.1 LFT Distribution System 1345
2.2 P.E.T. Distribution System 1345
3 CLFT and P.E.T. Technologies in Traction System 1346
3.1 CLFT Traction Technology 1346
3.2 P.E.T. Traction Technology 1346
3.3 Essential Requirements for P.E.T.T. Technology 1347
4 Converter Architecture and P.E.T. Technology 1348
4.1 Two-Stage (AC/HVAC) Power Conversion Topologies 1349
4.2 Single-Stage (AC-HFAC) Power Conversion Topologies 1350
4.3 P.E.T-Formed Auxiliary Power Converters 1352
5 Advancement in P.E.T. Modules and Medium-Frequency Design Consideration 1353
6 Conclusion 1355
References 1355
Optimized Control of VAR/Voltage in the Off-grid Hybrid Power System 1358
1 Introduction 1359
2 Off-grid Hybrid Power System Configurations and Voltage–Reactive Power Equation with Composite Load 1361
2.1 Voltage–Reactive Power Equation of the OGHPS, Considering Composite Load 1361
3 PI Controller Parameter Optimization by BFA and GA 1364
3.1 Bactria Foraging Algorithm (BFA) 1365
3.2 Genetic Algorithm (GA) 1367
4 Simulation Results and Discussion 1369
5 Conclusion 1376
Appendix 1376
References 1377
Methods to Optimize the Performance of an Existing Large-Scale On-grid Solar PV Plant 1379
1 Introduction 1380
2 Method to Improve PV Panel Cleaning Efficiency for Dry Tropical Regions 1380
2.1 Mist Nozzle 1381
2.2 Cleaning System Design 1384
2.3 Cleaning Procedure Working 1385
2.4 Conclusion 1385
3 Simulink-Based Estimation of Partial Shading Loss Reduction Using Herbicides for Vegetation Management 1386
3.1 Partial Shading 1387
3.2 Site-Specific Details 1387
3.3 Simulink-Based Estimation of Partial Shading Loss in a PV String 1388
3.4 Organic Contact Herbicide and Salt Spraying System to Reduce Vegetative Growth 1395
3.5 Results 1396
3.6 Conclusion 1396
4 Procedure to Suggest New Optimum Tilt for a Seasonal 1397
4.1 Suggestion of Additional Tilts Changing Tilt Angles Monthly 1397
4.2 Conclusion 1402
5 Automated Switching and Lighting Circuit Using Two-Way Relay Switch 1402
5.1 Prototype Design 1402
5.2 Working 1403
6 Conclusion 1406
7 Future Scope 1407
References 1407
Application of Hilbert–Huang Transform and SVM Classifier to Monitor the Power Quality Disturbances 1409
1 Introduction 1409
2 Literature Review 1410
3 Methodology 1411
3.1 Generation of PQDs 1412
4 Feature Detection 1414
4.1 Empirical Mode Decomposition 1414
4.2 Ensemble Empirical Mode Decomposition 1415
4.3 Complete Ensemble Empirical Mode Decomposition with Adaptive Noise 1416
4.4 Classification of Voltage Disturbances by Cross-Correlation 1416
5 Results 1417
5.1 Classification by Support Vector Machine 1419
6 Conclusion 1422
References 1424
Voltage Stability Enhancement in Radial Distribution System by Shunt Capacitor and STATCOM 1426
1 Introduction 1426
2 Line Stability Indicator (LSI) 1427
3 Shunt Capacitor and STATCOM 1428
4 Problem Formulation 1429
5 Cuckoo Search with Levy Flight 1430
6 Proposed Methodology 1431
7 Results and Discussion 1431
8 Conclusion 1437
Appendix 1438
References 1439
Optimal Siting and Sizing of DG Employing Multi-objective Particle Swarm Optimization for Network Loss Reduction and Voltage Profile Improvement 1440
1 Introduction 1440
2 Present Study of the Work in This Area 1441
3 Problem Formulation 1441
3.1 Constraints 1442
3.2 Equations 1443
4 Particle Swarm Optimization 1444
5 Results and Discussion 1445
References 1449
Author Index 1450

Erscheint lt. Verlag 24.4.2019
Reihe/Serie Lecture Notes in Electrical Engineering
Zusatzinfo XXXV, 1482 p. 852 illus., 627 illus. in color.
Sprache englisch
Themenwelt Medizin / Pharmazie Pflege
Medizin / Pharmazie Physiotherapie / Ergotherapie Orthopädie
Technik Bauwesen
Technik Elektrotechnik / Energietechnik
Technik Medizintechnik
Technik Nachrichtentechnik
Schlagworte Biomedical Processing • Computational Intelligence • Digital Circuit Design • ICERECT 2018 • intelligent control systems • Nano-electronic Devices • Optical communication • Solid State Circuits
ISBN-10 981-13-5802-8 / 9811358028
ISBN-13 978-981-13-5802-9 / 9789811358029
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 70,9 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich