Soft Computing: Theories and Applications: Proceedings of SoCTA 2020, Volume 1
- Length: 769 pages
- Edition: 1
- Language: English
- Publisher: Springer
- Publication Date: 2021-08-31
- ISBN-10: 9811617392
- ISBN-13: 9789811617393
- Sales Rank: #0 (See Top 100 Books)
This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Conference on Soft Computing: Theories and Applications (SoCTA 2020), organized online. The book is divided into two volumes and offers valuable insights into soft computing for teachers and researchers alike; the book will inspire further research in this dynamic field.
Preface About SoCTA Series About STEM-Research Society Contents About the Editors Detection of Denial of Service Attack Using Deep Learning and Genetic Algorithm 1 Introduction 2 Literature Survey 3 Proposed Method 3.1 Multilayer Perceptron 3.2 Decision Tree 3.3 Support Vector Machine 3.4 Genetic Algorithm 3.5 Training and Testing the Model 3.6 Process to Detect DOS Attacks Using GA with Classifiers 4 Results 4.1 Experimental Dataset 4.2 Experimental Environment 4.3 Experimental Results 5 Conclusion References Fake Profile Detection and Stalking Prediction on Facebook 1 Introduction 2 Related Work 3 Proposed Work 3.1 Fake Profile Detection 3.2 Stalking Prediction 4 Results and Analysis 5 Conclusion and Future Work References Empirical Evaluation of NSGA II, NSGA III, and MOEA/D Optimization Algorithms on Multi-objective Target 1 Introduction 2 Moea 2.1 NSGA Version II 2.2 NSGA Version III 2.3 Multi-objective Evolutionary Algorithm Decomposition 3 Computational Experiment 4 Results 5 Conclusion and Future Work References Moving Skills—A Contributing Factor in Developmental Delay 1 Introduction 1.1 Literature Review 1.2 Previous Study and Limitations 1.3 Motivation and Objectives 2 Motor Milestone for a Child 2.1 Motor Delays 3 First Advisable Cure for Motor Skills Delay 4 Developmental Delays Prediction Using AI 5 Conclusion 6 Future Work References Estimation of Wind Speed Using Machine Learning Algorithms 1 Introduction 1.1 Literature Survey 1.2 Proposed Work 2 Methodology 3 Result Analysis and Discussion 4 Conclusion and Limitations 5 Future Scope References A Comparative Study of Supervised Learning Techniques for Remote Sensing Image Classification 1 Introduction 2 Pixel-Based Supervised Learning 2.1 Maximum Likelihood 2.2 Minimum Distance 2.3 Principal Component 2.4 Isocluster 2.5 Support Vector Machine 3 Future Research 4 Conclusion References Postal Service Shop Floor—Facility Layout Evaluation and Selection Using Fuzzy AHP Method 1 Introduction 2 Literature Support 3 Research Methodology 3.1 Fuzzy AHP Method 4 Application—NSH Mangalore 5 Results Analysis 5.1 Finding the Performance Weights Criteria Using FAHP Method 5.2 Calculation Method 5.3 Comparative Study 6 Conclusions References Wireless Motes Outlier Detection Taxonomy Using ML-Based Techniques 1 Introduction 2 Machine Learning Methodology 3 Detecting Outlier in WSN Using ML Based Techniques 3.1 Supervised Learning Approach 3.2 Unsupervised Learning 3.3 Reinforcement Learning 4 Literature Survey 5 Findings from Reviewed Literature and Conclusion References A Proposed IoT Security Framework and Analysis of Network Layer Attacks in IoT 1 Introduction 2 Related Work 3 Proposed Security Framework 3.1 Perception Layer 3.2 Network or Internet Layer 3.3 MiddleWare Layer 3.4 IoT Service and Application Layer 4 Security Issues at Network Layer 4.1 Reconnaissance Attacks 4.2 Access Attacks 4.3 Denial-of-Service Attacks 5 Prevention Mechanisms 5.1 End-to-End Encryption 5.2 Digital Certificate 5.3 Modified Hop Count 5.4 Secure Route Selection Process 5.5 Secure Authentication and Identification Mechanism 6 Conclusion References Cloud Data Storage Security: The Challenges and a Countermeasure 1 Introduction 1.1 A Subsection Sample 2 System Model 3 Threat Model 4 Existing System 5 Security Issues in Storage Service 6 Related Work 7 Proposed Work 8 Data Obfuscation Algorithm 9 Conclusion References Comparative Analysis of Numerous Approaches in Machine Learning to Predict Financial Fraud in Big Data Framework 1 Introduction 2 Financial Frauds and ML Techniques for Fraud Detection 2.1 Supervised Machine Learning 2.2 Unsupervised Machine Learning 2.3 Semi-Supervised Learning 2.4 Reinforcement Learning 3 Literature Review 4 Analysis and Discussion 5 Conclusion References Low-Cost Automated Navigation System for Visually Impaired People 1 Introduction 1.1 Objectives 2 Related Work and Problem Definition 3 Proposed Model 3.1 Object Detection Module 3.2 Object Recognition Module 3.3 Navigation Module 3.4 Audio Alert with Speech Module 3.5 Signboard Recognition Module 4 Experiment Evaluation 4.1 Result Analysis 5 Conclusion References Blockchain Platforms and Interpreting the Effects of Bitcoin Pricing on Cryptocurrencies 1 Introduction 1.1 Ethereum: A Next Generation Smart Contract and Decentralized Application Platform 1.2 Neo: A Distributed Network for the Smart Economy 1.3 Cardano-Ada 1.4 EOS 1.5 TRON 2 Literature Review 3 Methodology 4 Result and Discussion 4.1 Ethereum 4.2 Neo 4.3 Cardano-Ada 4.4 EOS 4.5 TRON 5 Conclusion References A Design of a Secured E-voting System Framework for Poll-Site Voting in Ghana 1 Introduction 2 Related Works 2.1 Introduction 2.2 Evaluation of Existing E-voting System Designs 3 The Current Architecture of Voting System in Ghana 3.1 Paper Ballot 3.2 Challenges in the Current System 4 Proposed E-voting System Architecture 4.1 Introduction 4.2 Requirements of the Proposed System 4.3 Overview of Blockchain Technologies 4.4 Proposed Poll-Site E-voting System 4.5 E-voting Process 5 Discussion 5.1 Introduction 5.2 Authentication 5.3 Accuracy 5.4 Security and Integrity 5.5 Transparency 6 Conclusion References Pattern Matching Using Face Recognition System 1 Introduction 2 Literature Survey 3 Related Work 4 Proposed Methodology 5 Experiment and Result 6 Conclusion References A Fuzzy-Based Support Vector Regression Framework for Crop Yield Prediction 1 Introduction 2 Related Literature 3 Research Methodology 3.1 Original Dataset Analysis 3.2 Parameter Value Estimation with IT2-FL Algorithm 3.3 PCA Dimensionality Reduction (Feature Selection) 3.4 SVR Model Training and Prediction for Crop Yield 4 Results and Discussion 5 Conclusion References A Mathematical Study of Hepatitis C Virus Model During Drug Therapy Treatment 1 Introduction 2 Mathematical Model 3 Properties of the Model 3.1 Non-negativity of the Solution 3.2 Boundedness of the Solution 4 Analysis of the Model 4.1 Equilibrium Points 4.2 Reproduction Number 4.3 Local Stability at Disease-Free Equilibrium Point 5 Numerical Results and Discussion 6 Conclusion References Transformation of Medical Imaging Using Artificial Intelligence: Its Impact and Challenges with Future Opportunities 1 Introduction 2 AI Methods in Medical Image Processing 2.1 Artificial Intelligence 2.2 Medical Imaging 3 Literature Review 4 Analysis and Discussion 4.1 Limitation and Challenges 4.2 Future Work 5 Conclusion References A Keyword-Based Multi-label Text Categorization in the Indian Legal Domain Using Bi-LSTM 1 Introduction 2 Literature Survey 3 Proposed Approach 3.1 Dataset 3.2 Preprocessing 3.3 Bi-LSTM Algorithm 4 Experiments and Results 4.1 Comparative Analysis 5 Discussion 5.1 Finding 5.2 Limitations 6 Conclusion References Application of Deep Learning Techniques in Cyber-Attack Detection 1 Introduction 2 Basic Steps of Attack Detection Model 3 Techniques of Deep Learning 4 Performance Evaluation Learning 5 Attack Detection Based on Deep Learning Techniques 6 Conclusion References Rederiving the Upper Bound for Halving Edges Using Cardano’s Formula 1 Introduction 2 Preliminaries 2.1 Lovász Local Lemma and Antipodality 2.2 Convex Chains and Dey’s Original Proof 2.3 Main Identity 3 Obtaining Dey’s Bound Using Cardano’s Formula 3.1 Cardano’s Formula 4 Discussion on the Bound of M 5 Bootstrapping the Identity Analogous to Crossing Number Lemma 6 Conclusion and Future Work References Online Teaching During COVID-19: Empirical Evidence During Indian Lockdown 1 Introduction 2 Literature Review 3 Research Methodology 4 Data Analysis 5 Discussions 6 Conclusion 7 Limitations and Scope for Future Studies References An Ensemble-Based Method for Predicting Facebook Check-ins 1 Introduction 2 Related Work 3 Proposed System Model 3.1 Data Collection Phase 4 Experimental Results 4.1 Results and Discussion 5 Comparative Analysis 6 Conclusions References Modelling and Structural Analysis for Prosthesis Hip Design Using ANSYS with Finite Element Method 1 Introduction 2 Finite Element Analysis (FEA) 2.1 Material Properties 2.2 Loading and Boundary Conditions 3 Results and Discussion 3.1 Numerical Analysis of Ti-6Al-4V for 200 kg at 0° 3.2 Analysis of Ti-6Al-4V for 200 kg at 40° 3.3 Analysis of Ti-6Al-4V for 200 kg at 90° 3.4 Analysis of Structural Steel for 200 kg at 0° 3.5 Analysis of Structural Steel for 200 kg at 40° 3.6 Analysis of Structural Steel for 200 kg at 90° 4 Conclusions References Indian Sign Language Recognition Using a Novel Feature Extraction Technique 1 Introduction 2 Objective 3 Literature on Recent Research Related to the Problem 4 The Proposed ISL Recognition System 4.1 Proposed Flow Chart 4.2 Feature Extraction 4.3 Classifier 5 Results and Analysis 6 Conclusion 7 Future Scope References A Formal Study of Shot Boundary Detection Approaches—Comparative Analysis 1 Introduction 1.1 Video Structure Analysis 2 Shot Boundary Detection 3 Detection of Cut and Gradual Transitions 4 Comparative Analysis 5 Conclusion and Future Work References Predicting Hospital Bed Requirements for COVID-19 Patients in Mumbai City and Mumbai Suburban Region 1 Introduction 2 Materials and Methods 2.1 Initial Data Analysis 2.2 Prediction of Active Cases 2.3 Prediction of Hospital Resources Enhancement and Requirement 3 Results and Discussion 4 Conclusions 4.1 Policy Recommendations 4.2 Challenges and Limitations of the Research References Job Scheduling on Computational Grids Using Multi-objective Fuzzy Particle Swarm Optimization 1 Introduction 2 Problem Formulation 2.1 Scheduling Problem 2.2 Grid Nodes 2.3 Jobs 2.4 Makespan 2.5 Flowtime 2.6 Multi-objective Optimization 3 Fuzzy PSO 3.1 Fuzziness 3.2 Particle Swarm Optimization (PSO) 3.3 Proposed Algorithm 4 Experiment 4.1 Optimal Schedule with Trapezoidal Fuzzy Number 4.2 Optimal Schedule with Pentagonal Fuzzy Number 4.3 Optimal Schedule with Trapezoidal Fuzzy Number 4.4 Optimal Schedule with Pentagonal Fuzzy Number 5 Limitation 6 Conclusion References Analysis of Network Performance for Background Data Transfer Using Congestion Control Protocol 1 Introduction 2 Methodology 2.1 Red Algorithm Process 2.2 Backpropagation 2.3 Tools Used 2.4 Workflow 3 Results 3.1 Old Network Topology 3.2 New Network Topology 4 Conclusion and Future Work References Validation and Analysis of Metabolic Pathways Using Petri Nets 1 Introduction 2 Biological Background of Polyhydroxyalkanoates (PHAs) 2.1 Metabolic Pathway of PHAs 3 Methodology 3.1 Petri Nets (PNs) 3.2 Structural and Behavioural Analysis 3.3 Invariant Analysis 4 Results and Discussion 4.1 Petri Net Representation of Metabolic Pathway of Polyhydroxyalkanoates 4.2 Model Validation 4.3 Analysis of the PN Model 5 Conclusions and Scope References Approach of Machine Learning Algorithms to Deal with Challenges in Wireless Sensor Network 1 Introduction 2 Machine Learning Algorithms 2.1 Supervised Learning 2.2 Unsupervised Learning 2.3 Semi-Supervised 2.4 Reinforcement Learning (RL) 2.5 Evolutionary Computation 3 Machine Learning Algorithms for WSN 3.1 Routing 3.2 Localization 3.3 Medium Access Control Layer (MAC Layer) Protocol 3.4 Event Detection and Query Processing 3.5 Node Clustering and Data Aggregation 3.6 Quality of Service (QOS) 3.7 Mobile Sink 3.8 Energy Harvesting 4 Conclusion References Cross-Domain Recommendation Approach Based on Topic Modeling and Ontology 1 Introduction 2 Related Work 3 Problem Formulation 3.1 Dataset 3.2 Data Preprocessing 3.3 Experimental Setup 3.4 Proposed Approach 3.5 Data Preprocessing 3.6 Topic Modeling on Reviews 3.7 Ontology for Genre Generation 3.8 User-Novel/Movie Generation 3.9 Cross-Domain Recommendation 4 Result Evaluation 4.1 Precision 4.2 Recall 4.3 F-Measure 5 Conclusion References The Study of Linear and Nonlinear Fractional ODEs by Homotopy Analysis 1 Introduction 2 Preliminaries 3 Introduction to Fractional HAM 4 Applications of Fractional HAM 5 Concluding Remarks References The Comparative Study of Time Fractional Linear and Nonlinear Newell–Whitehead–Segel Equation 1 Introduction 2 Basic Definitions 3 Methodologies 3.1 Fractional Reduced Differential Transform Method 3.2 Homotopy Analysis Method 4 Applications of Methodologies 4.1 Application of HAM 5 Conclusions References Parallel and Distributed Computing Approaches for Evolutionary Algorithms—A Review 1 Introduction 2 Evolutionary Algorithms 3 Parallel and Distributed EAs 4 Parallel and Distributed Approaches for EAs 4.1 Agent-Based Approach 4.2 Hybridization-Based Approach 4.3 Asynchronous Master–Slave Approach 4.4 Multi-core and Cluster Approach 4.5 Single Program Multiple Data Approach 4.6 Multi-objective Problem Approaches 4.7 Heterogeneous EA Approach 4.8 GPU-Based Parallel Approach 4.9 Co-evolutionary Approach 4.10 Convergence and Diversity-Based Approach 4.11 Competition-Based Approach 4.12 Divide-and-Conquer Approach 5 Summary of Survey 6 Conclusions References Motion/Force Control for the Constrained Electrically Driven Mobile Manipulators Based on Hybrid Backstepping Control Approach 1 Introduction 2 System Description 2.1 Properties and Assumptions of the Equation of Motion 3 Controller Design 4 Stability Analysis 5 Numerical Simulation Studies 6 Conclusion References Mathematical Interpretation of Fuzzy Information Model 1 Introduction 2 Fuzzy Generalized Information Measure 2.1 Sharpness 2.2 Maximality 2.3 Resolution 2.4 Symmetry 3 Mathematical Illustration 3.1 Sharpness 3.2 Maximality 3.3 Resolution 3.4 Symmetry 4 Conclusion 5 Future Endeavors References Methodological Development for Time-Dependent AHP Using Probability Distribution 1 Introduction 1.1 Research Gap and Focus of the Paper 1.2 Article Organization 2 Preliminaries 2.1 The Pairwise Comparison 2.2 Consistency 2.3 Preference Vector (PV) Using Geometric Mean Method (GMM) 3 Methodology 4 Numerical Example 5 Conclusion References Implementation of Speculate Modules and Performance Evaluation of Data Mining Clustering Techniques on Air Quality Index and Health Index to Predict High-Risk Air Polluted Stations of a Metropolitan City Using R Programming 1 Introduction 2 Related Work 3 Case Study 4 Findings of Previous Work 5 Methodology 5.1 Module 1: K-Means Cluster Analysis to Predict Clusters of Assorted Stations Based on Health Impacts 5.2 Module 2: Hierarchical Clustering to Predict Clusters of Assorted Stations Based on Health Impacts. 6 Results and Discussion of Module 1 and Module 6.1 Results of Module 6.2 Results of Module 7 Performances of K-means and Hierarchical Clustering 8 Conclusions 9 Future Work References Automated Gait Classification Using Spatio-Temporal and Statistical Gait Features 1 Introduction 2 Methods and Materials 2.1 Research Data and Study Protocol 2.2 Feature Extraction 2.3 Classification 3 Results 4 Discussion and Conclusion References Real-Life Applications of Soft Computing in Cyber-Physical System: A Compressive Review 1 Introduction 1.1 Characteristics of CPS 2 Soft Computing Techniques 2.1 Evolutionary Algorithms (EA) 2.2 Swarm Intelligence Algorithms (SI) 2.3 Fuzzy Logic 2.4 Learning Systems 3 Literature Review 4 Soft Computing Techniques in CPS Application Domains 4.1 Waste Management System 4.2 Smart Logistic System 4.3 Cyber-Physical Vehicle System (CPVS) 4.4 Smart Industries 4.5 Smart Homes and Buildings 4.6 Medical CPS 5 Soft Computing for Enhancing CPS Operations 5.1 Computation Off Loading for CPS and IoT Environment 5.2 Distributed Task Scheduling for CPS 5.3 QOS Improvement in CPS 6 Conclusion and Future Work References A Study on Stock Market Forecasting and Machine Learning Models: 1970–2020 1 Introduction 2 Literature Review 3 Analysis and Discussion 3.1 Based on Year-Wise Publication 3.2 Based on the Prediction Techniques 4 Major Findings 5 Research Gap 6 Conclusion and Future Directions References Discussion on the Optimization of Finite Buffer Markovian Queue with Differentiated Vacations 1 Introduction 2 The System Description 3 Steady State Analysis 4 Optimization Analysis 4.1 Algorithm 5 Numerical Analysis 6 Conclusion References Stability Analysis of HJB-Based Optimal Control for Hybrid Motion/Force Control of Robot Manipulators Using RBF Neural Network 1 Introduction 2 Robot Manipulator Dynamics 3 Control Scheme Design 3.1 RBF Neural Networks and Adaptive Bound 3.2 NN-Based Optimal Controller Design 4 Stability Analysis 5 Numerical Simulation 6 Conclusion References RBF Neural Network-Based Terminal Sliding Mode Control for Robot Manipulators 1 Introduction 2 Dynamic Model of Robot Manipulator 3 Controller Design 3.1 Terminal Sliding Mode Design 3.2 RBF Neural Network-Based Controller Design 3.3 Adaptive Bound 4 Stability Analysis 5 Simulation Results 6 Conclusion References An In-Memory Physics Environment as a World Model for Robot Motion Planning 1 Introduction 2 Related Work 3 Design Decisions 3.1 Robot and Environment 3.2 Storage and Algorithms 4 Trials 4.1 Trials with g=4, p=5 4.2 Trials with g=30, p=5 4.3 Trials with g=2, p=30 4.4 Trials with g=30, p=30 5 Inferences 5.1 Uniform Randomness Is Effective 5.2 Physics Simulations Are a Viable Alternative 6 Conclusion References Motion Model and Filtering Techniques for Scaled Vehicle Localization with Fiducial Marker Detection 1 Introduction 2 Related Work 3 Theoretical Background 3.1 Kinematic Bicycle Motion Model 3.2 Fiducial Detection 3.3 Filtering Techniques 4 Methodology 4.1 Kinematic Bicycle Motion Model 4.2 Filtering Techniques 5 Experimental Implementation 5.1 Experimental Structure 5.2 SVEA Description 5.3 Pose Filters 5.4 Covariance Values 6 Experimental Results 6.1 Extended Kalman Filter 6.2 Motion Model and Particle Filter 6.3 Interesting Filter Failures 6.4 Two Vehicle (Mobile Camera) 7 Experimental Conclusions 8 Further Scope References Analysis of Liver Disorder by Machine Learning Techniques 1 Introduction 2 Motivation 3 Related Work 4 Dataset Descriptions 5 Proposed Methodology 5.1 Random Forest 5.2 Support Vector Machine 5.3 AdaBoost Classifier 6 Experimental Results and Discussion 7 Conclusion and Future Work References Various Techniques of Image Segmentation 1 Introduction 1.1 Thresholding 1.2 Clustering Methods 1.3 Edge Detection 1.4 Dual Clustering Method 2 Literature Survey 3 Proposed Work 4 Results 5 Conclusion and Future Scope References Fog–Cloud-Assisted Internet of Things: A Review of Workload Allocation and Latency Management Techniques 1 Introduction 1.1 Workload Allocation in Combined Fog–Cloud Environment 1.2 Latency Management in Combined Fog–Cloud Environment 2 Problems with the Cloud Computing Infrastructure 2.1 Distance Between Users and Cloud Data Centre 2.2 Problem of Scalability 2.3 Real-Time Analytics and Decision Making 2.4 Big Data Management 2.5 Load Balancing 3 Characteristics that Define the Fog Computing Infrastructure 3.1 Intelligence at the Edge 3.2 Highly Scalable 3.3 Fault Tolerant 3.4 Sensors and Actuators 3.5 Support for Multi-tenancy with Multiple Applications 4 The Need for the Existence of Cloud at the Core 5 Challenges in Adopting Fog Computing 5.1 Configuring Core and Edge Nodes to Fog Nodes 5.2 Deployment of Distributed Applications 5.3 SLA Management 5.4 Designing New Policies 5.5 Security Aspects 6 Conclusion References Artificial Neural Network, Convolutional Neural Network Visualization, and Image Security 1 Introduction 1.1 Encryption 1.2 Steganography 1.3 Watermarking 1.4 Artificial Neural Network (ANN) 1.5 Convolution Neural Network (CNN) 2 Related Work 2.1 CNN in Encryption 2.2 CNN in Steganography 2.3 CNN in Watermarking 3 Proposed Model 4 Algorithm 5 Flowchart 6 Result Analysis 7 Conclusion and Future Work 8 Limitation References A Study on RPL Protocol with Respect to DODAG Formation Using Objective Function 1 Introduction 2 Literature Work 2.1 Related Work 3 DODAG Approaches and Comparative Analysis 3.1 Standard DODAGOF Approaches 3.2 Some Proposed DODAGOF Approaches 3.3 Comparative Analysis 4 Classification of Metrics 5 Challenges 6 Results and Discussions 7 Conclusion References An Ensemble Learning Approach for Brain Tumor Classification Using MRI 1 Introduction 2 Related Work 3 Ensemble Learning Approach 4 Proposed Methodology 4.1 Image Acquisition 4.2 Image Segmentation 4.3 Feature Extraction 4.4 Classification 4.5 Stacking Model 5 Results and Discussion 6 Conclusion References Multimodal Emotion Recognition System Using Machine Learning and Psychological Signals: A Review 1 Introduction 2 Motivation 3 Literature Review 4 Methodology 4.1 Extraction of Features 4.2 Classification 4.3 Performance Parameters 5 Conclusion References Drowsiness Image Detection Using Computer Vision 1 Introduction 1.1 Drowsiness Detection Techniques 2 Background 3 Validation of the Regression Model 3.1 Fitting of Line Plot 4 Related Work 5 Experimental Setup 5.1 Microsoft Excel 5.2 Python 5.3 OpenCV 5.4 Dependencies Library 6 Methodology 6.1 Video Capture 6.2 Face Detection 6.3 Region of Eyes Extraction 6.4 Blink of Eyes Calculation 7 Result and Discussion 8 Conclusion References Implementing Deep Learning Algorithm on Physicochemical Properties of Proteins 1 Introduction 2 Background 2.1 Related Work of Physicochemical Properties 2.2 Deep Learning in Proteins Domain 3 Materials and Methods 3.1 Dataset Description 3.2 Applied Methodology 4 Experimental Results 5 Conclusion References Locking Paradigm in Hierarchical Structure Environment 1 Introduction 2 Literature Review 3 Analysis on Design Cases of Improved Locking Compatibility for the Proposed Work 3.1 Results and Discussions 4 Conclusion References Ensemble Maximum Likelihood Estimation Based Logistic MinMaxScaler Binary PSO for Feature Selection 1 Introduction to Particle Swarm Optimization 2 Particle Swarm Optimization 3 Proposed Method 3.1 Analysis and Time Complexity of Algorithm 3.2 Experimental Design 3.3 Result and Discussion 3.4 Summary 4 Conclusion References Automatic Identification of Medicinal Plants Using Morphological Features and Active Compounds 1 Introduction 2 Related Work 3 Classification 3.1 Morphological Features 3.2 Active Compounds 4 Block Diagram 5 Mapping of Morphological Features with Chemical Compounds 6 Relationship Between Physical Structure and Chemical Compounds 7 Conclusion and Limitations References A Prototype IoT Management System to Control Grid-Parallel Distribution of Localised Renewable Energy for Housing Complexes in New-Normal Era 1 Introduction 2 Genesis of the Prototype IoT Management System 2.1 Post Cyclonic Situation Amid Covid-19 2.2 Existing Electricity Distribution Structure 2.3 Proposed Grid-Parallel Distribution Structure 3 Prototype IoT Management System 3.1 IoT Integrated Base Device 3.2 Signal Device Working as Bluetooth Module 3.3 Android Application Named as ‘MiniGridManagementSytemSandipDas’ 4 Operating Principle 5 Timing Diagrams for Different Output Conditions 6 Conclusion References Author Index
Donate to keep this site alive
To access the Link, solve the captcha.
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.