Table of contents : Preface Acknowledgements Contents About the Editors Diode Switch-Based 17-Level Inverter with Lesser Power Electronic Elements 1 Introduction 2 Proposed Inverter Topology 3 Modes of Operation 4 Comparison with Other Topologies 5 Simulation and Experimental Results 6 Conclusion References 28 GHz 5G Receiver Design Using 65 Nm CMOS and Performance Analysis Through Simulation 1 Introduction 2 Designing of RF Components 2.1 Designing of Low Noise Amplifier and Matching Circuits 2.2 Modified LNA Circuit for Gain and Bandwidth Improvement 2.3 Designing of Image Rejection Filter 2.4 Designing of Down Converter 3 Measurements Setup 4 Results and Discussion 4.1 Performance of LNA 4.2 Performance Parameters of Down Converter 4.3 Performance Parameters of Receiver 5 Conclusion References Study and Implementation of Ladder Logic Conversion to VHDL for Field Programmable Gate Array (FPGA)-Based Programmable Logic Controllers (PLC) 1 Introduction 2 Related Works 3 Methodology 4 Results and Simulations 5 Conclusion References Automated Monitoring and Regulation of User-Friendly Greenhouse Using Arduino 1 Introduction 2 Important Features of the Proposed Automation System 3 Component Description 3.1 Arduino UNO 3.2 Soil Moisture Sensor 3.3 Temperature and Humidity Sensor 3.4 Relay Module 3.5 Light-Dependent Resistor (LDR) 3.6 Cooling Fan 3.7 A.C. Water Pump 3.8 Heat Radiator 4 System Architecture and Working 5 Conclusion References An Involution Function-Based Symmetric Stream Cipher 1 Introduction 1.1 Symmetric Key Cryptography or Secret Key Cryptography 1.2 Asymmetric Key Cryptography or Public Key Cryptography 1.3 Hash Functions 2 Proposed Work 3 Result and Discussion 4 Conclusion and Further Scopes References Multi-objective Optimization of Block Size Based on CPU Power and Network Bandwidth for Blockchain Applications 1 Introduction 2 Related Work 3 Motivation 4 Implementation and Results 5 Conclusion and Results References Alamouti Code Generator in Optical Domain Using Mach–Zehnder Interferometer 1 Introduction 2 Design of Alamouti Code Generator 3 Conclusion References A Real-Time Road Congestion-Based Hybrid Approach for Finding the Optimized Route 1 Introduction 2 Related Work 3 Proposed Work 4 Optimal Path Finding Algorithm 5 Simulation and Result Analysis 6 Conclusion References Sentiment Analysis of Audio Diary 1 Introduction 2 Historical Background 3 Methodology 4 Results and Case Studies 5 Conclusion References ISA-Based PI + FODN AGC of Multi-source System 1 Introduction 2 Modeling of System 2.1 Proposed System 2.2 Proposed Controller 3 Interactive Search Algorithm (ISA) 4 Simulation Results 5 Conclusion Appendix References Assessing Overall Software Defect-Based Risk Using Analytic Hierarchy Process 1 Introduction 2 Research Method 2.1 Developing a Model 2.2 Assigning Weights to Criteria 2.3 Consistency 3 Statistical Analysis 4 Conclusion References Reliable and Privacy Preserving Blockchain Based Medical Data Sharing Digital Ledger 1 Introduction 1.1 General Background 1.2 Introduction 1.3 Blockchain 1.4 Paper Organization 2 Related Work 2.1 Network Selection 2.2 Consensus Algorithm 3 Reliable and Privacy Preserving Medical Blockchain 3.1 Overview 3.2 Problem Definition 4 Design Principles 4.1 Ethereum Smart Contracts 4.2 Hyper-ledger Fabric 5 System Implementation and Performance Analysis 6 Conclusion 7 Future Works References Survey on Lightweight Cryptography Algorithm for Data Privacy in Internet of Things 1 Introduction 1.1 IoT Applications 1.2 IoT Architectures 1.3 IoT Attacks 1.4 Security Challenges in IoT 1.5 Cryptography Overview for IoT 1.6 Lightweight Cryptography 1.7 Organization of Paper 2 Survey on Lightweight Cryptography Algorithm Protocol for Security in IoT 3 Comparison of Different Lightweight Cryptographic Algorithm Protocol 4 Future Direction 5 Conclusion References nTunnel FET (nTFET) Reliability Study Against Positive Bias Temperature Instability (PBTI) for Different Device Architectures 1 Introduction 2 Device Structure and Simulation Framework 3 Model Calibration 4 Results and Discussion 5 Conclusion References Three-Phase Space Vector Modulated Z-Source Inverter 1 Introduction 2 Z-Source Inverter 3 Principal of Operation 4 Investigation of ZSI Circuit 5 Simulation and Result 6 Conclusion References Optimum Cavity Length of a pTFET-Based Biosensor for Successful and Accurate Sensing of a Wide Range of Biomolecules 1 Introduction 2 Device Structure and Simulation Framework 3 Model Calibration 4 Results and Discussion 5 Conclusion References Spectrum Sensing in Cognitive Radio with SNR Wall Estimation 1 Introduction 2 System Model 3 Gershgorin Test Statistics 4 Algorithm 5 Comparison of Test Statistics 5.1 Energy Detection Method 5.2 Cyclostationary Feature Detection 5.3 Matched Filter Detection 5.4 Generalized Likelihood Ratio Test (GLRT) 5.5 Hadamard Ratio Test 5.6 Volume-Based Detector 6 SNR Walls in Spectrum Sensing 7 Conclusion References Feature-Based Segmentation of Brain Tumor in MRI Images 1 Introduction 2 Proposed Method 2.1 Image Enhancement 2.2 Feature Extraction 2.3 Training Section 2.4 Feature-Based Classification 2.5 DSS Field Selection 2.6 Region Growing 2.7 Region Refinement 3 Result and Discussion 4 Conclusion References A Synthesis of Reversible Digital Circuits to Solve the Boolean Satisfiability 1 Introduction 2 Motivation 3 Synthesis of Reversible Digital Circuits 3.1 Combinational Function Representation 3.2 A Reversible Circuit Structure 3.3 Gate Transformation 3.4 Fan-Out Stem Transformation 3.5 The Controller Architecture 4 Experimental Results 5 Conclusions References An Improved Method for Detection of Laryngeal Cancer and Its Stages 1 Introduction 2 Review of Related Works 3 Proposed Innovation 4 Results 5 Conclusion References IoT-Based Secure Communication to Enhance Blockchain Model 1 Introduction 2 Related Work 2.1 Blockchain 2.2 Hash Function in Blockchain 2.3 IoT–Blockchain 2.4 Security in IoT 3 Proposed Work 3.1 Verification 4 Results 5 Conclusion References Tuberculosis Bacteria Segmentation in Acid Fast Stained Images 1 Introduction 2 Proposed Method 2.1 Contrast Enhancement 2.2 Bacteria Region Masking 2.3 Marking the Specified Bacteria 2.4 Complete Bacteria Extraction 3 Simulation Results and Discussion 3.1 Segmentation Evaluation Parameters 3.2 Dice Similarity Coefficient (DSC) 4 Conclusion References Condition Monitoring of PV-Wind System Using Stockwell Transform 1 Introduction 2 System Development 3 Theoretical Backgrounds 4 Fault Analysis in PV Array 5 Feature Extraction 6 Practical Validation 7 Conclusion References An Investigation on Photocatalytic Dye Degradation of Rhodamine 6G Dye with Fe- and Ag-Doped TiO2 Thin Films 1 Introduction 2 Experimental Details 3 Results and Discussion 3.1 Structural Characterizations 3.2 Crystallite Size 3.3 Average Strain 3.4 Dislocation Density 3.5 Morphological Characterizations 3.6 Optical Characterizations 3.7 Photocatalytic Activity Study 4 Conclusion References MMaSA—A Modified Matrix Synthesis Approach for Thermal-Aware Gate Array Placement 1 Introduction 2 Definitions Related to the Proposed Gate Array Placement 3 The Proposed Thermal Model 4 Implementation, Results and Analysis 5 Conclusion References Computation of Absorption Coefficient for Pöschl–Teller Potential in Double Quantum Well Structure for Photodetector Applications 1 Introduction 2 Mathematical Formulation 3 Results and Discussion 4 Conclusion References QoS-Based ACO Routing Protocols in MANETs: A Review 1 Introduction 2 Basic Ant Colony Algorithm 3 Taxonomy of ACO-Based MANETs Routing Protocols 4 Review of QOS-Aware ACO Routing Protocols 5 Comparative Analysis 6 Conclusion References A Novel NOR Gate-Based Dynamic Power Gating Technique in SRAM 1 Introduction 2 Operation of 6T SRAM Cell 3 Proposed Approach 4 Simulation Results 5 Conclusion References Multi-level Encryption Based on Fractional Fourier Transform, Double Random Phase Encoding Combined with Chaos, and Arnold Transform 1 Introduction 2 Preliminaries for Proposed Work 2.1 2D-Coupled Logistic Map 2.2 Double Random Phase Encoding 2.3 Fractional Fourier Transform 2.4 Arnold Transform 3 Proposed Work 4 Computational Results 4.1 Key Space Analysis 4.2 Sensitivity Analysis 4.3 Statistical Analysis 5 Conclusion References SEPIC-Boost CSCCC-Based SPWM Inverter with MPPT Technique 1 Introduction 2 Analysis and Design of the Proposed System 2.1 MPPT Algorithm 2.2 Control Mechanism 2.3 SIMO Converter 2.4 SIMO-Based SPWM Inverter 3 Simulation Results 3.1 MPPT Pulse Input 3.2 SEPIC Converter Output 3.3 Boost Converter Output 3.4 CSC Converter Output 3.5 Voltage Across Inductor L1 3.6 Voltage Across Inductor L2 3.7 Voltage Across Inverter Load 3.8 SPWM Pulse 4 Conclusion References A Fuzzy Logic Approach for Software Cost Prediction 1 Introduction 1.1 Fuzzy Logic 1.2 Fuzzy Rules 1.3 Fuzzy Logic System 2 Literature Review 3 Proposed Framework 3.1 Data Analysis 3.2 Fuzzy Rules 4 Evaluation Criteria 4.1 Magnitude of Relative Error (MRE) 4.2 Multiple Regression 5 Experimental Results 6 Conclusion References Cost-Effective Resource Provisioning in Cloud Using Cooperative Coevolutionary Genetic Algorithm 1 Introduction 1.1 Resource Provisioning Schemes 2 Related Work 2.1 Resource Provisioning Techniques 3 Research Methodology 3.1 Profit-Scaling Model 4 Conclusion References Design of 2–7 GHz Voltage-Controlled Oscillator Using Multi-stage Current Starved Configuration 1 Introduction 2 Current Starved VCO 3 Design Of VCO 4 Simulation Results 5 Conclusion References Rectenna for Wireless Power Transmission 1 Introduction 1.1 What Is Rectenna? 1.2 Power Transmission 1.3 Power Conversion Efficiency 2 Design Parameters 2.1 Antenna 2.2 Rectifier Circuit 3 Results and Discussion 4 Conclusion References An Energy-Efficient LEACH Routing Protocol for Wireless Sensor Networks 1 Introduction 2 Related Work 3 Proposed Routing Protocol 4 Simulation and Result Analysis 5 Conclusion References Power Management of Pedaling System with SPV System: An Alternate Option of Power Generation Without Emission 1 Introduction 2 Theory 2.1 GBPS 2.2 SPV System 2.3 On-Site and Off-Site Solar Power Generation 3 Experimental Investigation 3.1 Electrical Response of GBPS 3.2 Electrical Power from GBPS System 3.3 Development of Solar Plant 4 Result Analysis 4.1 SPV System Without GBPS for Load 4.2 SPV System with GBPS 4.3 Power Generation of SPV with GBPS in Off-Peak Hours 5 Conclusions References Calculating Threshold Voltage Shift for Shallow Implanted Short-Channel MOSFET in Presence of High-K Dielectric 1 Introduction 2 Mathematical Formulation 3 Results and Discussions 4 Conclusion References Healthcare Recommendation System 1 Introduction 2 Motivation 3 Problem Statement 4 Methodology 5 Proposed Model 6 Collaborative Filtering Methodology 7 Recommendation Algorithm 8 Clinical Prediction Model for Survival Analysis 9 Conclusions and Future Research References Comparative Study of Logic Performance of Hybrid CMOSFETs at Deca-Nanometer Regime 1 Introduction 2 Device Structure and Simulation Setup 3 Results and Discussion 4 Conclusion References Student Performance Prediction Using Classification Algorithms 1 Introduction 2 Background Study and Related Works 3 Proposed Methodology 3.1 Data Processing 3.2 Implementation of Classification Algorithms 4 Experiments and Results 5 Conclusion References Effect of Integrated Competency Management and Human Resource Development at the Level of Efficiency of Workforce 1 Introduction 2 Viable Integration of Development of Human Resource and Management of Competency 2.1 Management of Competency 2.2 Competency Types 2.3 Outline of Competency 3 Competent Human Resource Management 3.1 Human Resource Development as a Base for Knowledge Management 3.2 Impact of Performance Management 3.3 Personal Level Competence 4 Human Resource Development 4.1 Strategic Planning for Human Resource Development 4.2 HRD Criterion and Tendency 4.3 Developmental Activities Through HRD 5 Interrelationship Among Human Resource Development, Competence and Knowledge Management 6 Conclusion References Predicting Type 2 Diabetes Using Logistic Regression 1 Introduction 2 Methodology 3 Result and Discussion 3.1 Research Objective 3.2 Research Methodology 3.3 Discussion 4 Conclusion References FPGA Implementation of PICO Cipher 1 Introduction 2 Algorithm Overview 3 Proposed Architectures 3.1 Proposed Serial Architecture 3.2 Reduced Datapath Architecture with Memory-Based Key Scheduling 4 Hardware Evaluation 5 Discussion of Results 6 Conclusion References VLSI Implementation of ESF and QTL Lightweight Ciphers 1 Introduction 2 Algorithm Overview 2.1 ESF Cipher 2.2 QTL 3 Proposed Hardware Architecture of ESF and QTL Cipher 3.1 Eight-Sided Fortress 3.2 QTL 4 Simulation Platform 4.1 Metrics 4.2 Environments 4.3 Configurations 5 Results and Discussion 6 Conclusion References Optimal Allocation of AVR and DGs in Distribution Systems Using HSA 1 Introduction 2 Problem Formulation 2.1 Objective Function 2.2 Weighted Sum Approach 2.3 Automatic Voltage Regulator (AVR) Model 2.4 Harmony Search Algorithm 3 Proposed Approach 4 Results 5 Conclusion References ARM Microcontroller Based Safety and Surveillance System 1 Introduction 2 Literature Review 3 Proposed System 4 Proposed System Architecture 5 Advantages 6 Conclusion References Attenuation of Millimeter Wave in Storm Layers with Spherical and Non-spherical Dust Particles 1 Introduction 2 Method 3 Scattering from Dust Particles 3.1 Extinction Cross section 4 Non-spherical Particle 5 Analytical Treatment of Attenuation 6 Conclusion References VLSI Implementation of Tunable Band-Pass Notch IIR Filter for Localization of Hot spots in Proteins 1 Introduction 2 RRM Model and Filter Based Hot Spot Detection 2.1 Resonance Recognition Model 2.2 Hot spot Region Detection Using Digital Filters 2.3 Tuning of Band-Pass Notch IIR Digital Filter 3 Hardware Implementation of Band-Pass Notch Digital IIR Filter 3.1 Implementation of Band-Pass Notch IIR Filter System 3.2 Controller FSM 3.3 VLSI Realization of IIR ANF 4 Results and Discussion 4.1 Simulation Result 4.2 Synthesis Result 5 Conclusion References Smart Data Logger for Solar and Wind Power Generation 1 Introduction 2 Proposed System 3 System Algorithm 4 Results and Discussions 5 Conclusion References Deep Learning-Based Alzheimer Disease Detection 1 Introduction 2 Proposed Methodology 2.1 Data Preprocessing 2.2 Network Architecture 3 Experiments and Results Discussion 3.1 Dataset 3.2 Hyper Parameters 3.3 Experimental Setup and Evaluation 4 Conclusion References Novel Low-Complex 4 × 4 and 16 × 16 Intra-prediction Architecture for Error Concealment for H.264 1 Introduction 2 Basics of Intra-frame Coding 2.1 Detail Analysis of 4 × 4 Prediction Modes 2.2 Intra 16 × 16 Prediction Modes 2.3 Selection Criteria for Mode Selection 2.4 General Architecture for Intra-predication 3 Proposed Architecture 4 Proposed Intra-prediction Selection Method 4.1 Sum of Absolute Differences (SAD) 5 Experimental Analysis 5.1 Result Analysis of Implementation 6 Conclusion References Genetic Algorithm-Based Image Watermarking Using Multiple Location 1 Introduction 2 Background 3 Proposed Framework 3.1 Embedding of Watermark Image 3.2 Extraction of Watermark Image 3.3 Embedding at Different Multiple Location 3.4 Genetic Algorithm 4 Experimental Results 5 Conclusion References Fuzzy Supervisory Expert Tuner for PID Controller 1 Introduction 2 Proposed Fuzzy Supervised PID Tuning Scheme 3 Simulation Results 4 Conclusion References Smart Racking and Retailing Using IOT 1 Introduction 2 Methods and Material 3 Discussion 4 Conclusion References Fuzzy Rule-Based Supervisory PID Auto-Tuner for TRMS Process 1 Introduction 2 TRMS Description 3 TRMS Schematic 4 Block Diagram Analysis of MIMO process 5 Proposed Control Approach 6 Simulation Results 7 Conclusion References Utilizing Cooperative-MIMO for an Event-Based Data Transmission in a Wireless Sensor Network 1 Introduction 2 Related Work 3 Network Operation and the Energy Model of the Proposed Protocol 3.1 Network Operation 3.2 Energy Model 4 Results and Discussion 5 Conclusion and Future Work References Rapid Modeling of a Fast-Steering Mirror Assembly from Time Response Data 1 Introduction 2 Experimental Setup 2.1 Fast-Steering Mirror Assembly 2.2 Digital Drive (D-Drive) Module 2.3 Modulation Input: MOD 2.4 Monitor Output: MON 2.5 Arbitrary Waveform Generator (AWG) 2.6 Digital Storage Oscilloscope (DSO) 3 Modeling Methodology 4 System Identification 4.1 Parameter Estimation Based onTwo- or Three-Point of Step Response [13] 4.2 Parameter Estimation Based on Two- or Three-Point of Step Response [14] 5 Model Validation 6 Conclusion References RF Front-End Band-Pass Filters for GPS Receiver 1 Introduction 2 GPS Receiver 2.1 Receiver Architecture 2.2 Superheterodyne Receiver 3 RF BPF for Front-End GPS Receiver 3.1 BPF Using Coupled Lines 3.2 BPF Using Shorted Stub 4 Conclusion References Comparative Study of Parameter Estimation Methods for a Single Diode PV Module 1 Introduction 2 Problem Formulation 2.1 Analytical Method 2.2 Newton–Raphson Method 2.3 Harmony Search Algorithm 3 Results 4 Conclusion References Estimation of MMW Attenuation in Dust Storms Under Rayleigh Approximation 1 Introduction 2 Method 3 Scattering from Dust Particles 4 Absorption Cross Section 5 Scattering Cross Section 6 Extinction Cross Section 7 Scattering Cross Section Based on Dipole Radiation Concept 8 Analytical Treatment of Attenuation 9 Numerical Computation 10 Discussion of Results References Solar Power and Water Quality Monitoring Using Wireless Sensor Network with ZigBee 1 Introduction 2 WSN Technology 3 Zigbee Technology 4 Proposed Block Diagram for Domestic Applications 5 Results and Discussion 6 Conclusions References Designing and Implementing a Fully Differential Amplifier Using Current Conveyor of Third Generation 1 Introduction 2 Proposed Work 3 Current Conveyors and Its Three Generations 3.1 Advantages of Third-Generation Current Conveyors 3.2 CMOS Implementation of CCIII 3.3 Current and Voltage Mode Design 3.4 Current and Voltage Mode Design 4 Experimental Results 4.1 Parameter Description 4.2 Simulation Results 4.3 Performance Evaluation of Impedance for Current Mode Current Conveyor 4.4 Performance Evaluation of Impedance for Current Mode Current Conveyor 4.5 Voltages and Current Measurements 5 Voltages and Current Measurements References A New Adiabatic Multiplier for Low-Power Application-Specific Signal Processors and Estimation of Performance Parameters 1 Introduction 2 Adiabatic Logic 3 Adiabatic Vedic Multiplier 4 Simulation Results 5 Conclusion References Smart Public Transport Using BT5 1 Introduction 2 Literature Review 3 Methodology 3.1 Project Description 3.2 Technical Specifications 3.3 Design Approach 3.4 Codes and Standards 4 Results 5 Conclusion References GLAD Assisted In2O3 NW-TiO2 NW Heterostructure for Enhanced UV-Vis Absorption 1 Introduction 2 Experimental 3 Result and Discussion 4 Conclusion References Diabetes Diagnosis Prediction Using Ensemble Approach 1 Introduction 2 Related Works 2.1 Confusion Matrix 2.2 Cross Validation 2.3 Dataset 3 Proposed System 3.1 Generating Dataset 3.2 Data Preprocessing 3.3 Training and Classification 4 Implementation 5 Results 6 Conclusion References An 86 DB Gain 18.06 mVrms Input-Referred Noise LNA for Bio-Medical Applications 1 Introduction 2 LNA Design 2.1 Beta Multiplier Reference Circuit Gain Stage 2.2 CMOS Inverter-Based Second Gain Stage 3 OTA Design 4 Results and Discussions 5 Conclusion References Electrical Characterization of Sb2Se3 for Memory Applications 1 Introduction 2 The Experiment 3 Results and Discussions 3.1 X-Ray Diffraction 3.2 I-V Characteristics 3.3 Dynamic Response 3.4 R-T Characteristics 3.5 Temperature Stability (Resistance versus Time) 3.6 Endurance (Resistance versus No. of Cycles) 4 Conclusion References Novel Single Balancing Circuitry for Modular Cell for Electric Vehicle Applications 1 Introduction 2 Cell Balancing Strategy 3 Proposed Single Balancing Circuitry 3.1 Switched Capacitor Balancing Method 3.2 Flowchart of Balancing Algorithm 4 Simulation Results and Analysis 5 Conclusion and Future Scope References Classification of Big Data Using Spark Framework 1 Introduction 2 Related Work 3 Methodology 3.1 Spark Framework 3.2 Multinomial Logistic Algorithm 3.3 Multilayer Perceptron Model 4 Experimental Setup 5 Results 6 Concluding Remarks References Encryption and Authentication of Data Using the IPSEC Protocol 1 Introduction 2 Related Works 3 Description of the IPSEC Protocol Standard 4 Proposed DMVPN Solution 5 Conclusion References Location Privacy Protection in Mobile Wireless Networks Through Hidden Forest and Fog Computing 1 Introduction 2 Literature Review 3 Proposed Methodology (1) [Hidden Forest] 3.1 Hidden Forest 3.2 Density of Visible Lattice Points in Z2 3.3 The Traditional Method to Find Hidden Forests 3.4 The CRT Algorithm 3.5 An Algorithm to Construct a Hidden Forest Using CRT Algorithm 3.6 An Application: The N = 2 Cases 4 Proposed Methodology (2) [Fog Computing] 4.1 An Algorithm to Implement Fog Computing 4.2 Fog Computing Technology Applied into Hidden Forest 4.3 Final Coordinates Generated 5 Comparative Study 6 Results and Data sets 7 Conclusion and Future Scope References Design and Characterization of DC-to-DC Converters Using Active Inductor 1 Introduction 2 Active Inductors 3 Basic Active Inductor 4 Resistive Feedback Active Inductor 5 Regulated Cascade Active Inductor 6 Weng-Kuo Active Inductor 7 DC–DC Converters with Active Inductors 8 Result and Conclusion References Analysis of Dispersion Compensation Techniques Used in Optical Fiber Communication 1 Introduction 2 Theory 2.1 Simulation of Dispersion Compensation Techniques 3 Simulation Setup 4 Result and Discussion 4.1 Simulation Result of DCF and Their Different Schemes 4.2 Simulation Result of Dispersion Compensation Using Techniques FBG 5 Conclusion References MBFF for Power Reduction of an SoC Partition 1 Introduction 2 MBFF Implementation 3 Results and Discussion 4 Conclusion and Future Scope References Analysis and Enhancement of Biometric-Based Multi-Server Authentication Scheme Using Chebyshev Chaotic Map 1 Introduction 2 Related Works 3 Preliminaries 4 Review of Protocol [1] 5 Security Analysis of Protocol [1] 6 Modifications proposed in Protocol [1] 7 Performance comparisons 8 Conclusions References Characteristic Analysis and Pattern Recognition of Arc Sound Under Typical Penetration Status in Mig Welding 1 Introduction 2 Literature Review 3 Signal Collection 4 Wavelet de-Noising 5 Short-Time Windowing 6 Feature Extraction 7 Experimental Procedure 8 Results 9 Conclusions References A 0.48 mW High Performance 4-Bit Flash ADC for System-on-Chip Applications in 90 nm CMOS Technology 1 Introduction 2 Circuit Configuration 2.1 Threshold Inverter Quantizer (TIQ) Comparator 2.2 Wallace Tree Encoder 2.3 Multiplexer-Based Encoder 2.4 Proposed Design 3 Realization Measurement 4 Measurement Results 4.1 DNL and INL Analysis 4.2 Process Corner Analysis 5 Conclusion References Design of 4-Bit Multiplexer-Based Encoder for Analog to Digital Converter 1 Introduction 2 Multiplexer-Based Encoder 3 Simulation and Result 4 Conclusion References Design of a 4-Bit Wallace Tree Encoder for Flash ADC in 90 Nm CMOS Technology 1 Introduction 2 Wallace Tree Encoder 3 Simulation Results 4 Comparative Study 5 Conclusion References Opinion Mining of Restaurant Reviews and Comparison of Different Classifiers 1 Introduction 2 Related Work 3 System Architecture and Classification 3.1 Review Collection 3.2 Review Classification 3.3 Rating Calculation 4 Analysis and Comparison of Different Classifier Algorithms 5 Conclusion References A Novel Deployment Scheme to Enhance the Coverage in Wireless Sensor Network 1 Introduction 2 Related Work 3 Proposed Scheme 4 Simulation and Results 5 Conclusion References Fractional Frequency Reuse Scheme for Noise-Limited Cellular Networks 1 Introduction 1.1 System Model 1.2 Fractional Frequency Reuse(FFR) 2 Problem Formulation 2.1 Secrecy Outage Probability without FFR 2.2 Secrecy Outage Probability with FFR 3 Simulation and Results 4 Conclusion 5 Future Work References Real-Time Monitoring of PM2.5 with IoT 1 Introduction 2 Methodology 2.1 Flowchart 2.2 Diagram 2.3 Working 2.4 Calculation of Particulate Matter Concentration 2.5 Validation of Results 3 Comparative Study 4 Conclusion References FPGA Implementation of Digital Watermarking System for Robust Detection Using Discrete Wavelet Transform 1 Introduction 2 Literature Survey 3 DWT Mathematical Analysis 3.1 Block Diagram of Watermark Embedding Process 4 Architecture Flow of FPGA Implementation 4.1 Finite State Machine 5 Implementation of Haar Wavelet 5.1 Memory Allocation for Host and Watermark Images 5.2 First-Level DWT Decomposition of Host Image 5.3 First-Level DWT Decomposition of Watermark Image 5.4 Watermark Embedding Process 5.5 Inverse DWT for Host Image 6 Results and Discussion 6.1 Initialization of Clocking Wizard 6.2 Simulation of VGA Timing 6.3 Simulation of State Machine Timing and State Machine Transition 7 Conclusion References Smart Communication in Coal Mines 1 Introduction 2 Historical View of Communication on Coal Mines 3 Need for Voice Communication 4 Modern Means of Communication in Coal Mines 4.1 Extraction’s Method 4.2 Communication Techniques 5 Personal Emergency Device 6 Impact Tracking System and Its Core Components 6.1 Wi-Fi Access Points as a Readers 6.2 Zone Display Units 6.3 Collision Avoidance Systems 7 Conclusion References FPGA-Based Smart Irrigation System 1 Introduction 2 Significance of Irrigation 3 Methods of Irrigation 3.1 Channel System 3.2 Sprinkler System 3.3 Drip System 3.4 Smart Irrigation System 4 System Components 4.1 Soil Moisture Sensor 4.2 Temperature Sensor 4.3 Humidity Sensor 4.4 Field Module 4.5 Control Module 5 Conclusion References Smart Healthcare System Using IoT 1 Introduction 2 Related Work 3 System Overview 4 Architectural Details 4.1 Nordic nRF52832 Microcontroller 4.2 Sensor Network 4.3 Piezoelectric Buzzer 4.4 User Interface 4.5 Ambulance Tracking Device 5 Conclusion References Author Index