Pattern Recognition and Data Analysis with Applications

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book covers latest advancements in the areas of machine learning, computer vision, pattern recognition, computational learning theory, big data analytics, network intelligence, signal processing and their applications in real world. The topics covered in machine learning involves feature extraction, variants of support vector machine (SVM), extreme learning machine (ELM), artificial neural network (ANN) and other areas in machine learning. The mathematical analysis of computer vision and pattern recognition involves the use of geometric techniques, scene understanding and modelling from video, 3D object recognition, localization and tracking, medical image analysis and so on. Computational learning theory involves different kinds of learning like incremental, online, reinforcement, manifold, multi-task, semi-supervised, etc. Further, it covers the real-time challenges involved while processing big data analytics and stream processing with the integration of smart data computing services and interconnectivity. Additionally, it covers the recent developments to network intelligence for analyzing the network information and thereby adapting the algorithms dynamically to improve the efficiency. In the last, it includes the progress in signal processing to process the normal and abnormal categories of real-world signals, for instance signals generated from IoT devices, smart systems, speech, videos, etc., and involves biomedical signal processing: electrocardiogram (ECG), electroencephalogram (EEG), magnetoencephalography (MEG) and electromyogram (EMG).

 

Author(s): Deepak Gupta, Rajat Subhra Goswami, Subhasish Banerjee, M. Tanveer, Ram Bilas Pachori
Series: Lecture Notes in Electrical Engineering, 888
Publisher: Springer
Year: 2022

Language: English
Pages: 814
City: Singapore

Preface
Contents
About the Editors
Revolutions in Infant Fingerprint Recognition—A Survey
1 Introduction
2 Fingerprint Recognition System
3 Fingerprint Sensor Module
3.1 Optical Sensors
3.2 Solid-state Sensors
3.3 Ultrasound Sensors
4 Feature Extraction Module
4.1 Local Ridge Orientation and Frequency
4.2 Segmentation
4.3 Singularity Detection
4.4 Enhancement
4.5 Minutiae Extraction
5 Matching and Decision-Making Module
6 Infant Fingerprint Age-Progression
7 Infant Database Module
8 Discussion and Challenges
8.1 Fingerprint Matching
8.2 Growth Model for Infant Fingerprint
8.3 Database Collection
9 Conclusion
References
A Review of High Utility Itemset Mining for Transactional Database
1 Introduction
2 Literature Review
2.1 Apriori-Based Algorithm
2.2 Tree-Based Algorithm
2.3 Utility List-Based Algorithm
2.4 Hybrid-Based Algorithm
2.5 Other Variations
2.6 Interestingness Measures
2.7 Overall Observations and Analytical Key Findings
3 Conclusion
References
A Cross-Sectional Study on Distributed Mutual Exclusion Algorithms for Ad Hoc Networks
1 Introduction
2 Ad Hoc Network
3 Literature Survey
4 Comparative Study
5 Open Challenges and Future Research Directions
5.1 Challenges
5.2 Group Mutual Exclusion and Self-stabilizing Algorithms
5.3 Machine Learning/Blockchain Approach
6 Conclusion
Appendix 1
References
Estimation of Electromagnetic Pollution Index of Macrocell
1 Introduction First Section
2 Literature Review
3 EMP and EPI in Mobile Communications
3.1 Estimate of EPI for Free Space Model
4 Algorithm
5 Illustration
6 Conclusion
Appendix
References
Prediction of Train Delay System in Indian Railways Using Machine Learning Techniques: Survey
1 Introduction
2 Empirical Study
2.1 Models for Train Delay Prediction System
2.2 Big Data Analytics
2.3 Support Vector Regression
2.4 Train Delay Prediction Based on Machine Learning Techniques
3 Conclusion and Future
References
Valence of Emotion Recognition Using EEG
1 Introduction
2 Related Literature
3 Methods
4 Model Formation
5 Machine Learning Classifier
6 Model Performance
7 Discussions and Implications
8 Future Work
9 Conclusion
References
A Deep Learning-Based Approach for an Automated Brain Tumor Segmentation in MR Images
1 Introduction
2 Background and Related Work
2.1 Background
2.2 Related Work
3 Methodology
3.1 Preprocessing
3.2 Convolution Neural Network
3.3 Pooling
3.4 Post-processing
3.5 Rectified Linear Unit
3.6 Loss Function
4 Results and Discussion
5 Conclusion
References
MZI-Based Electro-optic Reversible XNOR/XOR Derived from Modified Fredkin Gate
1 Introduction
2 Overview of Modified Fredkin Gate
3 XNOR/XOR BPM Layout
4 Simulation Results and Mathematical Modeling
5 Study of Performance Metrics
5.1 Insertion Loss
5.2 Excess Loss
5.3 System-level Analysis
6 Conclusion
References
Secured Remote Access of Cloud-Based Learning Management System (LMS) Using VPN
1 Introduction
2 Secured Remote Access
2.1 Virtual Private Network (VPN)
2.2 SSL VPN
2.3 Citrix Access Gateway/NetScaler Gateway
2.4 Security Aspect
2.5 Optimal Usability
3 Related Work
4 Proposed Works and Methodology
4.1 Installing the Access Gateway
4.2 Creating a Signed Certificate
4.3 Installing License on the Access Gateway
4.4 Creating Virtual Server
4.5 Creating Local Users and Groups
4.6 Creating Name Server for Access Gateway
4.7 Configuring Name Resolution
4.8 Browser Plugin
4.9 Assembling of Both Access Gateway Appliances in High Availability (HA) Mode
5 Result Analyses
6 Conclusions and Future Scope
References
Surface EMG Signal Classification for Hand Gesture Recognition
1 Introduction
2 Dataset
3 Methodology
4 Numerical Results
5 Conclusions
References
Improved Energy Efficiency in Street Lighting: A Coverage-Based Approach
1 Introduction
2 Related Work
3 Preliminaries and System Model
3.1 Network Model
3.2 Target Area Layout
3.3 Coverage Used
4 Problem Statement
5 Proposed Methodology
6 Result and Performance Comparison
7 Conclusion
References
Cognitive IoT for Future City: Architecture, Security and Challenges
1 Introduction
2 Integrated Technologies
2.1 IoT and AI
2.2 Cognitive AI and Cognitive IoT
3 CIoT Potential Application for Future City
3.1 Intelligent Living
3.2 Intelligent Health Care
3.3 Home Appliances
3.4 Autonomous Vehicles
3.5 Social Surveillance
3.6 Climate Prediction
3.7 Real-Time Monitoring
4 Cognitive IoT Architecture for Future City
4.1 Future City Application Platform
4.2 Data Knowledge Layer
4.3 Cognitive Service Layer
5 Overview of Security Issue and Discussion
6 Future Direction
7 Conclusions
References
A Heuristic Model for Friend Selection in Social Internet of Things
1 Introduction
1.1 Social Network
1.2 Social Internet of Things
2 Related Work
3 Problem Definition
4 The Proposed Model
4.1 Flow Chart
4.2 Algorithm
4.3 Parameters
5 An Illustrative Example
6 Performance Analysis
6.1 Experiment 1
6.2 Experiment 2
7 Conclusion
References
14 A Fuzzy String Matching-Based Reduplication with Morphological Attributes
Abstract
1 Introduction
1.1 Types of Reduplication
2 Previous Study on Reduplication
3 Problem in Existing System and Proposed Solution
3.1 Fuzzy-Based String Matching
4 Results and Discussion
4.1 Error Analysis
5 Conclusion
References
Accelerating LOF Outlier Detection Approach
1 Introduction
2 Related Work
3 Proposed Methodology
4 Experimental Results
4.1 Dataset Description
4.2 Result Analysis
References
Evaluating Quality of Machine Translation System for Digaru-English with Automatic Metrics
1 Introduction
2 Related Works
3 Automatic Evaluation
3.1 The BLEU Metric
3.2 The NIST Metric
3.3 The METEOR
3.4 TER Metric
4 Human Evaluation
5 Corpus Description
6 Result and Analysis
6.1 BLEU Score With and Without Tuning
6.2 NIST Score With and Without Tuning
6.3 Automatic Evaluation on Digaru-English Corpus
6.4 Human Evaluation for Digaru-English
7 Summary/Conclusion
References
PREP: Prerequisite Relationship Extraction Using Position-Biased Burst Analysis
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Burst Extraction
3.2 Pattern Identification
3.3 Determining Prerequisite Relationship
4 Evaluation
4.1 Dataset
4.2 Evaluation Metrics
4.3 Experimentation
5 Results and Discussion
5.1 Chapter-Wise Division
5.2 Part-Wise Division
5.3 Sliding Window
5.4 Hypothesis Testing
5.5 Observations
6 Conclusion and Future Work
References
Enhancing the Security and Performance of Cloud-Based Distance Education System
1 Introduction
1.1 Cloud Computing
1.2 Challenges and Issues in Distance Education Cloud Computing
2 Related Work
2.1 Researches in Area of Cloud Computing in Education System
2.2 Researches in Cryptographic Security
2.3 Researches Data Compression
3 Problem Statement
4 Methodology Used in Proposed Work
4.1 Internal Working of Proposed Work
4.2 Data Compression Using Replacement Mechanism
4.3 XOR-Based Encryption
5 Implementation
5.1 Simulation for Time/Error/Packet Size
5.2 Matlab Simulation for Comparative Analysis of Security
6 Conclusion and Scope of Research
7 Future Work
References
Hate-Speech Detection in News Articles: In the Context of West Bengal Assembly Election 2021
1 Introduction
2 Related Work
3 Hate Speech in Other Domain
4 Contribution of This Work
5 Data Preparation and Methodology
5.1 Data Preparation
5.2 Methodology
6 Experiment and Result
7 Error Analysis
8 Conclusion
References
A Structural Equation Modeling Approach for Adoption of Big Data Analytics by SMEs in India
1 Introduction
2 Literature Review
2.1 Big Data Analytics in Small and Medium Enterprises
2.2 TOE Framework and Hypothesis Development
3 Research Methodology
3.1 Sampling
3.2 Demographics of the Respondents
4 Data Analysis
4.1 Reliability and Validity
4.2 Exploratory Factor Analysis (EFA)
4.3 Construct Validity (CV)
4.4 Structural Equation Modeling (SEM)
5 Discussion
6 Conclusion
References
Optimized Distributed Job Shop Scheduling Using Balanced Job Allocation and Modified Ant Colony Optimization
1 Introduction
1.1 Contribution
2 Literature Survey
3 Methodology
3.1 Problem Statement and Constraints
3.2 Graphical Representation of the DJSP
3.3 Job Assignment Phase
3.4 Ant Colony Algorithm
3.5 Modified Ant Colony Optimisation
4 Results and Analysis
5 Conclusion
References
Detection of Copy–Move Image Forgery Applying Robust Matching with K-D Tree Sorting
1 Introduction
2 Literature Review
3 Methodology
3.1 Taking Input Image
3.2 Divide Image into Overlapping Block
3.3 DCT Calculation
3.4 K-D Tree Sorting Calculation
3.5 Common Shift Sector Analysis
3.6 Forgery Detection Using Pixels
3.7 Color the Pixels in Duplicated Region
3.8 Exact and Robust Match
4 Experimental Details
5 Discussion
6 Conclusion
References
Recognize Meaningful Words and Idioms from the Images Based on OCR Tesseract Engine and NLTK
1 Introduction
2 Related Work
3 Methodology
3.1 Word and Line Finding
3.2 Recognized Words
3.3 Classification of Static Character
3.4 Linguistic Analysis
3.5 Adaptive Classifier
4 Experimental Details
5 Result
5.1 Performance Analysis of Tesseract OCR
6 Conclusions
References
Identification of Four Major Dialects of Assamese Language Using GMM with UBM
1 Introduction
2 Literature Survey
3 Speech Database
4 Experiment Setup
5 Results and Discussion
6 Conclusion
References
Digitization Through SNS: Issues, Challenges, and Recommendations—A Case Study
1 Introduction
2 Literature Review
3 Proposed Model
4 Issues and Challenges in Existing Techniques
4.1 Issues with SNS
4.2 Challenges with SNS
5 Recommendations
6 Conclusion
References
FPGA Implementation of Optimized Code Converters with Reversible Logic Gates
1 Introduction
2 Overview
2.1 Reversible Logic Gates
3 Proposed Design of Reversible Code Converters
3.1 Gray–Binary (GTB) and Binary–Gray (BTG) Reversible Code Converter
3.2 Ex-3-BCD Code (E3TB) and BCD-Ex-3 (BTE3) Reversible Code Converter
4 Results and Discussion
5 Conclusion
References
A Security Provocation in Cloud-Based Computing
1 Introduction
2 Literature Review
3 Cloud Organization
3.1 Cloud End User
3.2 Cloud Service Contributor
3.3 Cloud Checker
3.4 Cloud Assent
3.5 Cloud Dealer
3.6 Cloud Carrier
4 Cloud Security Service
4.1 Data Confidentiality
4.2 Data Integrity
4.3 Availability
4.4 Data Authentication
4.5 Non-repudiation
5 Security Attacks and Threads in Cloud Computing
5.1 Threat Model
5.2 Spoofing Attack
5.3 Tampering Attack
5.4 Repudiation Attack
5.5 Backdoors Attack
5.6 Direct-Access Attack
5.7 Pretexting Attack
5.8 Watering Hole Attack
6 Current Movement in Cloud Computing
6.1 Virtual Web Allocation
6.2 Forensic Recovery of Cloud Evidence
6.3 Cloud Databases Under Multiple Keys
6.4 Cloud Systems Data Mobility
6.5 Cryptographic for Secure Information Transmission
7 Conclusion
References
Ocean Current Rigid Localization for Seabed WSN
1 Introduction
2 Literature Review
3 Proposed Model: Ocean Current Rigid Localization (OCR)
3.1 Backtracking of Anchor-Nodes
3.2 Localization of Unknown-Nodes
4 Complexity Comparison of OCR
5 Simulation Result and Analysis
5.1 Trial 1: To Observe the Impact of Communication Range
5.2 Trial 2: To Observe the Impact of Total Number of Sensor-Nodes
5.3 Trial 3: To Observe the Impact of Density of Anchor-Nodes
5.4 Trial 4: To Observe the Impact of Communication Noise
6 Conclusion
References
Detection of Motor Activity in Visual Cognitive Task Using Autoregressive Modelling and Deep Recurrent Network
1 Introduction
2 Material and Methods
3 Methodology
3.1 Autoregressive Modelling
3.2 Classification
4 Results and Discussions
5 Conclusion
References
An Approach for Secure Data Sharing in Cloud and Fog-Based IoT Network
1 Introduction
2 Related Work
3 Comparison Factors
4 Proposed Approach
4.1 System Architecture
4.2 Step-by-Step Procedure
5 Security Analysis
6 Conclusion and Future Work
References
Privacy Protection of Edge Computing Using Homomorphic Encryption
1 Introduction
2 Related Works
3 Proposed Model
4 Edge Computing
4.1 Defining Edge Computing
4.2 Functions of Edge Computing
4.3 Edge Computing Three Tier Model and Architecture
4.4 Edge Computing Security and Privacy
5 Homomorphic Encryption
5.1 HE Definition
5.2 HE Properties
5.3 Homomorphic Encryption in Edge Computing
6 Test and Analysis
7 Conclusion
References
Cybercrime Detection Using Live Sentiment Analysis
1 Introduction
2 Literature Review
3 Limitation of Existing System
4 Methodology
4.1 Proposed Work
4.2 Classifier Implementation
4.3 LSTM Networks
5 Data Description and Data Cleaning
6 Experimental Design
6.1 Result and Analysis
6.2 Precision and Recall
7 Conclusion and Future Work
References
Analysis of Power Quality for TOSA-PID Controller-Based Hybrid Power Generation System
1 Introduction
2 Related Work
3 Power Quality Analysis of Hybrid Renewable Energy System
3.1 PV Array Modelling
3.2 WECS Modelling
3.3 Diesel Generator Modelling
3.4 Battery Modelling
3.5 Converter
3.6 Controller
4 Result and Discussion
4.1 Performance Analysis
5 Conclusion
References
Investigation of Sensing Ability of Double-Slot Hybrid Plasmonic Waveguide for Liquid Analyte
1 Introduction
2 Device Structure and Theoretical Formulation
3 Results and Discussion
4 Conclusion
References
Prediction of the Final Rank of the Players in PUBG with the Optimal Number of Features
1 Introduction
2 Data Cleaning
3 Features Engineering and Selection
4 Result and Discussion
5 Conclusion
References
Cryptanalysis of a Security Scheme for Smart Traffic Lighting System Based on Fog Computing
1 Introduction
2 Literature Review
3 Review of Khalid et al. Authentication Scheme
3.1 Installation
3.2 Registration
3.3 Communication
4 Cryptanalysis of Khalid et al. Authentication Scheme
4.1 Side-Channel Attack
4.2 Code Injection Attacks
5 Conclusion
References
Gaining Actionable Insights in COVID-19 Dataset Using Word Embeddings
1 Introduction
2 Related Work
3 Data Specifications
4 Methodology
4.1 Word2Vec Architecture
4.2 GloVe Architecture
5 Results
6 Conclusion and Future Work
References
Phrase-Based English–Nyishi Machine Translation
1 Introduction
2 Related Works
2.1 SMT for Low-Resource Language
2.2 Moses in PBSMT
3 System Descriptions
3.1 Corpus Preparations
3.2 Language Model
3.3 Translation Model
3.4 Decoding
3.5 PBSMT Experimental Design for English–Nyishi
4 Results and Analysis
4.1 About BLEU and NIST Score
4.2 Human Evaluation
5 Analysis of Translation
6 Conclusion and Future Work
References
Capacitated Vehicle Routing Problem Using Genetic Algorithm and Particle Swarm Optimization
1 Introduction
2 Related Work
3 Problem Formulation
4 Proposed Algorithms
4.1 Genetic Algorithm
4.2 VRP Using GA
4.3 Particle Swarm Optimization
4.4 VRP Using PSO
5 Experimental Study
5.1 Simulation Study
6 Conclusion
References
A Secure Health Management Framework with Anti-fraud Healthcare Insurance Using Blockchain
1 Introduction
2 Related Works
3 Preliminaries
4 Proposed Model
4.1 System Model
4.2 Workflow of the Model
5 Key Analysis and Distribution
6 Performance Analysis
6.1 Different Attacks
6.2 Computational Performance
7 Conclusion
References
An Energy-Aware Fog-Enabled Optimized VM Consolidation Scheme for Real-Time Applications
1 Introduction
2 Related Works
3 Optimized VM Consolidation Model
3.1 Fog Layer Architectural Design
3.2 Power Model
3.3 GA-Based VM Consolidation
4 Simulation Setup and Result Discussion
4.1 Simulation Details
4.2 Result Discussion
5 Conclusion
References
Spatio-temporal Analysis of Flood Hazard Zonation in Assam
1 Introduction
2 Study Area and Data Used
3 Methodology
3.1 Flood Hazard Zonation Schema
3.2 Flood Hazard Index
3.3 Computation of Intra-Year Flood Frequency
3.4 Generation of Flood Hazard Zonation
4 Results and Discussion
5 Conclusions
References
A Pilot Study on Human Pose Estimation for Sports Analysis
1 Introduction
2 Recent Work
3 Methodology
3.1 Dataset
3.2 MobileNet Model
3.3 Human Pose Estimation
3.4 Calculations
4 Results
4.1 Video Input
4.2 Calculation of Data from the Frames
4.3 Graphical Representation
4.4 Analysis
5 Conclusion
6 Limitations
7 Future Work
References
Optimal Sizing of a Hybrid System for Litan, Manipur
1 Introduction
2 Methodology and Numerical Formulation
2.1 Mathematical Modeling of the Required Components
2.2 Strategy of Energy Management
2.3 Optimal Sizing Methodology
2.4 Required Constraints
2.5 Total Cost
2.6 Objective Function
3 Site Selection and Load Estimation
4 Resources and Elements
4.1 The Resources and Elements that Are Viewed for the Optimization Procedure Are Listed in the Table Below
4.2 Solar Energy and Wind Energy Resources
5 Results and Discussion
6 Conclusion
References
An Intrusion Detection Approach Based on Decision Tree-Principal Component Analysis Over CICIDS2017
1 Introduction
2 Literature Review
3  Proposed Framework
3.1 CICIDS 2017 Datasets
3.2 Data-Initialization and Pre-processing
3.3 Principle Component Analysis
3.4 Decision Tree Algorithms
3.5 Prediction and Evaluation
4  Experiment and Results
5  Conclusion
References
Detection of Epilepsy Using Graph Signal Processing of EEG Signals with Three Features
1 Introduction
2 Review of Related Work
3 Methodology
4 Results and Discussion
4.1 Database
4.2 Performance Assessment
5 Conclusion and Future Work
References
Hybrid Approach for Fake Profile Identification on Social Media
1 Introduction
2 Related Work
3 Dataset
4 Proposed Method
5 Implementation
5.1 Principal Component Analysis
5.2 Classification Model
6 Results and Discussion
6.1 Evaluation Criteria
6.2 Results
7 Conclusion and Future Work
References
Electroencephalogram-Based Emotion Recognition Using Random Forest
1 Introduction
2 Dataset Preparation
3 Methodology
3.1 Preprocessing
3.2 Feature Extraction
3.3 Random Forest
3.4 Grid Search Random Forest Algorithm (GSRF)
4 Results
4.1 Confusion Matrix
4.2 Region of Convergence (ROC)
5 Comparative Analysis
6 Conclusion
References
Controlled Active Rectifier Circuit-Based Extreme Fast Charging System for Electric Vehicles
1 Introduction
2 Model of XFC System
2.1 Controlled Active Rectifier Circuit
2.2 Solid State Transformer (SST)
2.3 Partial Power Charging Unit (PPCU)
2.4 Battery Current Controller
3 Simulation Results
4 Conclusion
References
Ambient Fine Particulate Matter and COVID-19 in India
1 First Section
2 Materials and Methods
3 Materials and Methods
4 Discussion
4.1 Limitations
5 Conclusion
References
Artificial Neural Network Based Synthesis of 12-Lead ECG Signal from Three Predictor Leads
1 Introduction
2 Method
2.1 Preprocessing
2.2 DWT of ECG Signal
2.3 Artificial Neural Network Architecture Design
3 Results and Discussion
4 Conclusion
References
Understanding Quantum Computing Through Drunken Walks
1 Introduction
2 Quantum Walks Using Coins
3 A Quantum Drunk
4 Get Started Programming with Quantum Computers
5 Result Analysis
6 Conclusion
References
Survey on Recent Malware Detection Techniques for IoT
1 Introduction
2 Related Works
3 IoT Mobile Malware
4 Malware Detection Methods for IoT
4.1 Using Machine Learning Classifier
4.2 Using Blockchain Technology
4.3 Using Convolutional Neural Network
5 Conclusion
References
Enhancing Accuracy of Symptom-Based Disease Prediction Using Ensemble Techniques and Feature Selection
1 Introduction
2 Literature Review
3 Proposed Methodology
4 Materials and Methods
4.1 Dataset Description
4.2 Classification Algorithms
4.3 Ensemble Techniques
5 Experimentation and Results
5.1 Ensemble Techniques
5.2 Feature Selection
6 Conclusion
References
Pruning for Compression of Visual Pattern Recognition Networks: A Survey from Deep Neural Networks Perspective
1 Introduction
2 Background
3 Pruning Techniques
3.1 Categories of Pruning
4 Comparison of Pruning Techniques
5 Discussion and Conclusion
References
Performance Comparison of Classification Models for Identification of Breast Lesions in Ultrasound Images
1 Introduction
2 Proposed Methodology
2.1 Data Collection
2.2 Selection of Regions of Interest (ROIs)
2.3 Feature Extraction
3 Results
4 Conclusion
References
Analysis of Randomization-Based Approaches for Autism Spectrum Disorder
1 Introduction
2 Randomization-Based Approaches
2.1 Extreme Learning Machine (ELM)
2.2 Random Vector Functional Link Network (RVFL)
3 Autism Spectrum Disorder Datasets Description
4 Numerical Results
5 Conclusion and Future Work
References
A Twin Kernel Ridge Regression Classifier for Binary Classification
1 Introduction
1.1 A Subsection Sample
2 Related Works
2.1 The SVM Model
2.2 The TWSVM Model
2.3 The KRR Model
3 The Proposed TKRR Model
4 Numerical Experiments
4.1 Simulation on an Artificial Dataset
4.2 Simulation on a Few Real-World Datasets
4.3 Statistical Analysis
5 Conclusion and Future Direction
References
Performance Evaluation of CMOS Voltage-Controlled Oscillator for High-Frequency Communication System
1 Introduction
2 Overview of Voltage-Controlled Oscillator
2.1 Ring Oscillator
2.2 Current Starved Oscillator
2.3 VCO Using Operational Amplifier
3 Schematic Design and Implementation
3.1 Schematic Design of Ring Oscillator
3.2 Schematic Design of Current Starved Oscillator
3.3 Schematic Design of Op-amp Based VCO
4 Simulation Results and Analysis
4.1 Schematic Simulations of Five-Stage Ring Oscillator
4.2 Schematic Simulation of Current Starved Oscillator
4.3 Schematic Simulation of Op-amp VCO
5 Conclusion
References
Kernelized Random Vector Functional-Link Network
1 Introduction
2 RVFL Networks
3 Kernelized Random Vector Functional-Link Network (RVFLker)
4 Experimental Study
5 Conclusion
References
Data Analytics Research in Nonprofit Organisations: A Bibliometric Analysis
1 Introduction
2 Materials and Methods
2.1 Data Collection and Pre-Processing
2.2 Co-term Analysis
2.3 Scientific Evolutionary Pathways
3 Results
3.1 Co-term Analysis
3.2 Evolutionary Relationship Identification
4 Limitations of This Study
5 Conclusions
Appendix 1
References
Analyzing Donors Behaviors in Nonprofit Organizations: A Design Science Research Framework
1 Introduction
2 Literature Review
2.1 Decision Support System
2.2 Donors Behaviors
2.3 DSS in NPOs
3 Design Science Research
3.1 Research Framework
4 Data Collection and Analysis
5 Research Contribution and Expected Results
6 Conclusion
References
Intelligent Health Care System Using Modified Feature Selection Algorithm
1 Introduction
2 Related Works
3 Proposed System
4 Experimental Results
4.1 Comparison of Features Chosen
4.2 Comparison of Dimensionality Reduction Ratio
4.3 Comparison of Accuracy
4.4 Comparison of Root Mean Square Error
5 Conclusion
References
Design of High Step-up Interleaved Boost Converter-fed Fuel Cell-Based Electric Vehicle System with Neural Network Controller
1 Introduction
2 Design and Analysis of PEM Fuel Cell
3 Design of Perceptron Neural Network MPPT Controller
4 Design of an Interleaved High Step-up Boost Converter
5 Simulation Results
5.1 Static Temperature Condition of Fuel Cell Stack (335 K)
5.2 Dynamic Temperature Condition of Fuel Cell Stack (335 K, 315 K, and 355 K)
6 Conclusion
References
Design of Adaptive VSS-P&O-Based PSO Controller for PV-Based Electric Vehicle Application with Step-up Boost Converter
1 Introduction
2 Modeling of Three-diode-based SPV Cell
3 Design of an Adaptive VSS-P&O-based PSO Controller
4 Design of High Step-up Boost Converter
5 Analysis of Simulation Results
5.1 First Shading Condition of Solar PV (1000 W/m2, 900 W/m2, 700 W/m2)
5.2 Second Shading Condition of Solar PV (1000 W/m2, 800 W/m2, 700 W/m2)
6 Conclusion
References
Spatiotemporal Data Compression on IoT Devices in Smart Irrigation System
1 Introduction
2 CORDIC-Based Compression in Smart Irrigation System
2.1 Energy-Efficient CORDIC for Data Compression
2.2 Data Compression Algorithm in IoT Device for Smart Irrigation
3 Experimental Analysis
4 Conclusion and Future Scope
References
Author Index