Intelligent Technologies for Automated Electronic Systems -  - E-Book

Intelligent Technologies for Automated Electronic Systems E-Book

0,0
45,62 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

This volume explores a diverse range of applications for automated machine learning and predictive analytics. The content provides use cases for machine learning in different industries such as healthcare, agriculture, cybersecurity, computing and transportation.

Chapter 1 introduces an innovative device for automatically notifying and analyzing the impact of automobile accidents. Chapter 2 focuses on the detection of malaria using systematized image processing techniques. In Chapter 3, an intelligent technique based on LMEPOP and fuzzy logic for the segmentation of defocus blur is discussed. Predictive analytics is introduced in Chapter 4, providing an overview of this emerging field. Chapter 5 delves into discrete event system simulation, offering insights into its applications.

The performance analysis of different hypervisors in OS virtualization is explored in Chapter 6. Load balancing in cloud computing is the subject of investigation in Chapter 7. Chapter 8 presents a survey on a facial and fingerprint-based voting system utilizing deep learning techniques. Chapter 9 explores IoT-based automated decision-making with data analytics in agriculture. Biometric recognition through modality fusion is investigated in Chapter 10. Chapter 11 offers a new perspective on evaluating machine learning algorithms for predicting employee performance. Pre-process methods for cardiovascular diseases diagnosis using CT angiography images are discussed in Chapter 12. Chapter 13 presents the implementation of a smart wheelchair using ultrasonic sensors and LabVIEW.

Cryptography using the Internet of Things is the focus of Chapter 14. Chapter 15 explores machine learning applications for traffic sign recognition, and the book concludes with Chapter 16, which analyzes machine learning algorithms in healthcare.

The book is a resource for academics, researchers, educators and professionals in the technology sector who want to learn about current trends in intelligent technologies.

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB
MOBI

Seitenzahl: 307

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents
BENTHAM SCIENCE PUBLISHERS LTD.
End User License Agreement (for non-institutional, personal use)
Usage Rules:
Disclaimer:
Limitation of Liability:
General:
PREFACE
List of Contributors
Innovative Device for Automatically Notifying and Analyzing the Impact of Automobile Accidents
Abstract
INTRODUCTION
LITERATURE SURVEY
Prototyping an Automatic Notification Scheme for Traffic Accidents in Vehicular Networks
Emergency Services in Future Intelligent Transportation Systems Based on Vehicular Communication Networks
National Highway Traffic Safety Administration
Geometry and Motion-based Positioning Algorithms for Mobile Tracking in NLOS Environments
PROPOSED SYSTEM
Block Diagram for Vehicle Section
Block Diagram for Other Vehicle Section
ARM
Crash Sensor
MEMS Sensor
DC Motor
Circuit Diagram for Vehicle Section
Relay
MAX 232
GSM
GSM Interfacing with ARM
ZIGBEE
BUZZER
RESULTS AND DISCUSSION
CONCLUSION
ACKNOWLEDGEMENTS
REFERENCES
Detection of Malarial Using Systematized Image Processing
Abstract
INTRODUCTION
Clinical Malaria Diagnosis
Laboratorial Malaria Diagnosis: Peripheral Blood Smear
Serological Tests
Quantitative Buffy Tests
Rapid Diagnostic Tests
OBJECTIVE
Image Processing Techniques
Grey Scale Image Conversion
Image Enhancement Techniques
Image Filtering Techniques
Image Sharpening Techniques
Image Thresholding Techniques
Region Selection
Corner Detection
Gray Scale Image Conversion
Image Enhancement Techniques
Log Transformation
Image Negation
Gamma Transformation
Image Filtering Techniques
Gauss Filters
Box Filters
Min Filters
Max Filters
Image Sharpening Techniques
Image Thresholding Techniques
Edge Detection
Region Selection
Corner Detection
DESIGN OF THE SYSTEM
System Work Flow
Working of the System
Image Pre-Processing
Reading the Image
Converting the Image into a Grayscale Image
Image Transformation
Image Filtering
Image Sharpening
Image Thresholding
RBC Segmentation
Steps in Segmenting Individual RBCs
Dilation
Erosion
Opening
Closing
Severity Calculation
Edge Detection
Corner Detection
Region Selection
Severity
Stage Detection
CONCLUSION
REFERENCES
LMEPOP and Fuzzy Logic Based Intelligent Technique for Segmentation of Defocus Blur
Abstract
INTRODUCTION
LITERATURE SURVEY
Image Sharpness Assessment Based on Local Phase Coherence
Gray-scale and Rotation Invariant Texture Classification with Local Binary Patterns
An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles
PROPOSED SYSTEM
LOCAL MAXIMUM EDGE POSITION OCTAL PATTERN
BLUR SEGMENTATION ALGORITHM
FUZZY BASED MULTI SCALE INFERENCE SYSTEM
Fuzzy Set Operations
Defuzzification
RESULT AND DISCUSSION
CONCLUSION & FUTURE ENHANCEMENT
ACKNOWLEDGEMENTS
REFERENCES
Predictive Analytics - An Introduction
Abstract
INTRODUCTION
Descriptive Analytics
Diagnostic Analytics
Predictive Analytics
Prescriptive Analytics
MAIN TEXT: PREDICTIVE ANALYTICS
Benefits and Drawbacks
Advantages
Disadvantages
MODEL 1 OF PA: REGRESSION
Regression Line of X on Y [X Depending on Y]
Regression Line of Y on X [Y Depending on X]
Regression Line of X on Y [X Depending on Y]
Regression line of Y on X [Y depending on X]
PA MODEL 2: MULTIPLE REGRESSION
MLR -Method 1
MLR -Method 2
PA MODEL 3: LOGISTIC REGRESSION
PA MODEL 4: KNN
CONCLUSION
REFERENCES
Discrete Event System Simulation
Abstract
INTRODUCTION
MAIN TEXT: SIMULATION
Advantages and Disadvantages
System in a Simulation
Model of a System
Steps in a Simulation Study
CASE STUDY: A TWO SERVER QUEUING SYSTEM
Problem Description
Purpose of Queuing Models: Obtain Two Aspects of a Queueing System
Characteristics of a Queuing System
Arrival
Service
System Capacity
Size of Calling Population
Queue Discipline
Human Behavior
Measures of Queues
CONCLUSION
REFERENCES
Performance Analysis of Different Hypervisors Using Memory and Workloads in OS Virtualization
Abstract
INTRODUCTION
Hypervisors have many Benefits
Speed
Efficiency
Flexibility
Portability
CONTAINER VS HYPERVISOR
Type 1 Hypervisors (Bare Metal)
Type 2 Hypervisors (Hosted Hypervisor
HYPER-V ARCHITECTURE
VMWARE ARCHITECTURE
XEN ARCHITECTURE
MOTIVATION
PROBLEM STATEMENT
METHOD
EXPERIMENTAL SETUP
EXPERIMENT WORKLOADS AND ITS CLASSIFICATION
RESULTS AND DISCUSSION
Observation 1
Observation 2
OVERALL RESULT ANALYSIS
CONCLUSION
REFERENCES
A Study on Load Balancing in Cloud Computing
Abstract
INTRODUCTION
CLOUD COMPUTING ARCHITECTURE
LOAD BALANCING
Graphical Distribution Node
Virtual Machine Migration
Algorithm Complexity
Heterogeneousous Nodes
Single Point of Failure
Load Balancer Scalability
METRICS FOR LOAD BALANCING IN THE CLOUD
Throughput
Response Time
Makespan
Scalability
Fault Tolerance
Migration Time
Energy Consumption
Carbon Emission
LOAD BALANCING POLICIES
Selection Policy
Location Policy
Transfer Policy
Information Policy
ISSUES IN LOAD BALANCING
Data Gathering Rules
Picking Rules
Aggravating Rules
Place Rules
Migration Rules
SURVEY OF CURRENT LOAD BALANCING ALGORITHMS
CONCLUSION
REFERENCES
A Survey on Facial and Fingerprint Based Voting System Using Deep Learning Techniques
Abstract
INTRODUCTION
LITERATURE REVIEW
Smart Voting
Paper-based Voting
Handle Voting Machine
Direct Electronic Voting System
Punched Cards
Visible Voting System
Voting Machine Uses Fingerprint Identification
Wyndham, Chen, & Das, 2016
Shendage & Bhaskar, 2017
Najam, Shaikh, & Naqvi, 2018
METHODOLOGY
EVM VOTING PROCESS
NONE OF THE ABOVE (NOTA)
Advantages of Electronic Voting Machine
Disadvantages of Electronic Voting Machine
Document Recording
Avoiding Dependence on Voters
High Humidity
Participation of External Manufacturers
False Voting
False Display Units
Powerful Software
Results Confirmation
DEEP LEARNING TECHNIQUES
Recursive Neural Network
Convolutional Neural Network
FACIAL AND FINGERPRINT RECOGNITION
Fingerprint Recognition
Face Recognition
CONCLUSION
REFERENCES
IoT-Based Automated Decision Making with Data Analytics in Agriculture to Maximize Production
Abstract
INTRODUCTION
EXISTING TECHNOLOGICAL INTERVENTION IN AGRICULTURE
FARMING DATA COLLECTION WITH IOT
Cost Control and Reduced Spending
Information Control
Expanded Product Quantity and Quality
Increased Business Effectiveness
PROPOSED METHOD
AUTOMATED DECISION MAKING WITH DATA ANALYTICS
Finding Popular Pest Data, for Instance, 0x001 [African Bug]
Pest Classification
Pest Detection
CONCLUSION
REFERENCES
An Indagation of Biometric Recognition Through Modality Fusion
Abstract
INTRODUCTION
PREVIOUS STUDIES
Fingerprint and Iris Recognition System
CURRENT INDAGATION
CONCLUSION
REFERENCES
A New Perspective to Evaluate Machine Learning Algorithms for Predicting Employee Performance
Abstract
INTRODUCTION
LITERATURE SURVEY
METHOD
Tools Used
Use of Machine Learning Algorithms
Bayes' Naive Classifier
Support Vector Machine, or SMO
Choice Tree
Phases of Data
Data Collection
Data Analysis
Data Preprocessing
Model Classification
Comparison of Models
RESULTS AND DISCUSSION
Static Evaluation
Confusion Matrix
CONCLUSION
REFERENCES
Pre-process Methods for Cardio Vascular Diseases Diagnosis Using CT (Computed Tomography) Angiography Images
Abstract
INTRODUCTION
BLOCK DIAGRAM FOR PREPROCESSING IN CCTA IMAGE
Edge Detection
Edge Detection Operators:
Steps to Perform Edge Detection in Python
Introduce Python Libraries
Select an Image
Implement Edge Detection Function
Execute the Image
To Save the Result
SMOOTHING/ FILTERING OF CCTA IMAGE
IMAGE SHARPENING
Filter Images using Convolution Kernels
BLURRING AN IMAGE
Gaussian Blurring to a CCTA Image
Applying Median Blurring to CTA Image
Bilateral Filter
CONCLUSION
REFERENCES
Implementation of Smart Wheelchair using Ultrasonic Sensors and Labview
Abstract
INTRODUCTION
SYSTEM OVERVIEW
Control Unit
Wheelchair Power Motors
Motor Driver Interface
Patient Monitoring Sensors
Wheelchair Control Interface
Communication Sub-System
HARDWARE IMPLEMENTATION
MSP430 Microcontroller Series
DC Motor
Spur Gear
Motor Driver Module
Implemented Wheelchair
HARDWARE IMPLEMENTATION
Eyeball Control
Audio Control
Joystick Control
Gesture Control
SOFTWARE IMPLEMENTATION
Python
LabVIEW
CONCLUDING REMARKS
REFERENCES
Cryptography using the Internet of Things
Abstract
INTRODUCTION
CRYPTOGRAPHY AND QUANTUM COMPUTERS
WHY LATTICE-BASED CRYPTOGRAPHY?
AN INTRODUCTION TO LATTICE BASED CRYPTOGRAPHY
IMPLEMENTATIONS OF LATTICE-BASED CRYPTOGRAPHY FOR RESOURCE-CONSTRAINED DEVICES
CHALLENGES AND FUTURE RESEARCH DIRECTIONS
CONCLUSION
REFERENCES
Machine Learning For Traffic Sign Recognition
Abstract
INTRODUCTION
WHY MACHINE LEARNING IS NEEDED?
CLASSIFICATION OF MACHINE LEARNING
Supervised Instruction
Unsupervised Learning
Reinforcement Learning
MACHINE LEARNING IN TRAFFIC SIGN DETECTION
Common Factors of Road Accidents
PROPOSED SYSTEM
Detection Stage
Recognition Stage
CONCLUDING REMARKS
REFERENCES
Analysis of Machine Learning Algorithms in Healthcare
Abstract
INTRODUCTION
CLASSIFICATION OF MACHINE LEARNING
Unsupervised Learning
Supervised Learning
Machine Learning in Health Care
Drug Discovery in ML
ML in Medical Imaging
ML in Smart Health Records
Computer Science and ML
Learning From Both Humans and Machines
EXAMINING DATA, MLAND AI
SL Use of Unlabeled Data
Linking Different Ml Algorithms
Similarity-based Grouping of Algorithms
Instance-based Algorithms
Regularization Algorithm
Decision Tree Algorithms
Bayesian Algorithms
Support Vector Machine (SVM)
Clustering Algorithms
Association Rule Learning Algorithms
Artificial Neural Network (ANN) Algorithms
Ensemble Algorithms
Applications
Speech Recognition
Computer Vision
Bio-Survelliance
Control or Robot for Automation
Experiments in Empirical Science
CONCLUDING REMARKS
REFERENCES
Advanced Technologies for Science and Engineering
(Volume 1)
Intelligent Technologies for Automated Electronic Systems
Edited by
S. Kannadhasan
Department of Electronics and Communication Engineering
Study World College of Engineering
Coimbatore, Tamil Nadu
India
R. Nagarajan
Department of Electrical and Electronics Engineering
Gnanamani College of Technology
Namakkal, Tamil Nadu
India
N. Shanmugasundaram
Department of Electrical and Electronics Engineering
VELS Institute of Science Technology
and Advanced Studies (VISTAS)
Chennai, Tamil Nadu
India
Jyotir Moy Chatterjee
Scientific Research Group of Egypt (SRGE)
Lord Buddha Education Foundation
Asia Pacific University of Technology & Innovation
Kathmandu
Nepal
&
P. Ashok
Symbiosis Institute of Digital
and Telecom Management (SIDTM)
Symbiosis International (Deemed University)
Lavale, Pune, Maharashtra, India

BENTHAM SCIENCE PUBLISHERS LTD.

End User License Agreement (for non-institutional, personal use)

This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the book/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.

Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].

Usage Rules:

All rights reserved: The Work is the subject of copyright and Bentham Science Publishers either owns the Work (and the copyright in it) or is licensed to distribute the Work. You shall not copy, reproduce, modify, remove, delete, augment, add to, publish, transmit, sell, resell, create derivative works from, or in any way exploit the Work or make the Work available for others to do any of the same, in any form or by any means, in whole or in part, in each case without the prior written permission of Bentham Science Publishers, unless stated otherwise in this License Agreement.You may download a copy of the Work on one occasion to one personal computer (including tablet, laptop, desktop, or other such devices). You may make one back-up copy of the Work to avoid losing it.The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.

Disclaimer:

Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.

Limitation of Liability:

In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.

General:

Any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims) will be governed by and construed in accordance with the laws of Singapore. Each party agrees that the courts of the state of Singapore shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims).Your rights under this License Agreement will automatically terminate without notice and without the need for a court order if at any point you breach any terms of this License Agreement. In no event will any delay or failure by Bentham Science Publishers in enforcing your compliance with this License Agreement constitute a waiver of any of its rights.You acknowledge that you have read this License Agreement, and agree to be bound by its terms and conditions. To the extent that any other terms and conditions presented on any website of Bentham Science Publishers conflict with, or are inconsistent with, the terms and conditions set out in this License Agreement, you acknowledge that the terms and conditions set out in this License Agreement shall prevail.

Bentham Science Publishers Pte. Ltd. 80 Robinson Road #02-00 Singapore 068898 Singapore Email: [email protected]

PREFACE

The major objective of Smart Electronic Systems is to provide a platform where researchers from the fields of hardware and software may work together under one roof to speed up the development of smart electronic systems. Effective and secure data sensing, storage, and processing are essential in today's information age. Modern smart electronic systems meet the criteria of effective sensing, storage, and processing. Effective techniques and software that allow for a quicker analysis and retrieval of necessary data are simultaneously becoming more important. The internet world now includes big data, which comprises large, complex data collections. It is becoming harder to store and analyse the vast amount of structured and unstructured data that has to be collected. With concurrent hardware and software development, the Internet of Things (IoT) and cyber-physical systems (CPS) have been growing to include everyday consumer electronics. The effectiveness and performance of current and next generations of computing and information processing systems depend on advancements in both hardware and software. Some of the focused areas in this field include memristor and memristive systems, advanced 3D IC technologies, design methodologies, and 3D pacing. Others include molecular electronics, biosensors, bio-molecular and biologically inspired computing, nanoelectronics for energy harvesting, spintronics, domain-wall and phase-change memories, and nanoelectronics for energy harvesting. Quantum computing, communication, information processing, circuit, system, and sensor design based on nanoelectronics for critical applications, chip-to-system design, and techniques for electronic design automation (EDA) or computer-aided design (CAD) are the topics addressed in this book. At the same time, programming and efficient calculations for quicker examination and retrieval of crucial data are slowly getting out of style.

Massive amounts of both organised and unstructured data are challenging to store and manage. Post-CMOS technologies, the Internet of Things (IoT), and the cyber-physical system (CPS) have all been advancing simultaneously with synchronous hardware and software developments and have surpassed standard client devices. Future ages of figuring and data processing frameworks, as well as the present generation, will be largely influenced by advancements in both design and programming. In order to exchange information and research discoveries on all facets of electronic systems and digital electronics, it aims to bring together eminent academic scientists, researchers, and research scholars. It also acts as a premier interdisciplinary platform where researchers, practitioners, and educators may discuss and present the most recent findings, challenges, and trends in the fields of analogue and digital electronic systems, as well as their applications and solutions. The most recent developments in the study of solidification as well as the processing and analytical issues the society is facing in the twenty-first century are discussed. We would like to thank everyone who participated on behalf of the editors. First and foremost, we would like to congratulate wish success to the writers, whose wonderful work forms the basis of the book. We would like to use this opportunity to express our gratitude to our family and friends for their support and inspiration while we wrote this book. First and foremost, we give all praise and adoration to our omnipotent Lord for his abundant grace, which made it possible for me to successfully complete this book. For their contributions to this edited book, the authors deserve our sincere thanks. We also want to thank Bentham Science Publishers and its whole staff for making the work possible and giving us the chance to participate in it.

The content of this book is summarized as follows:

1. Chapter 1 presents that motorcycle accidents are a major societal concern in many countries. Due to improper riding behaviours including not wearing a helmet, driving recklessly, driving while intoxicated, riding while fatigued, etc., the issue persists despite public awareness initiatives. The risk of fatalities and impairments is relatively high as a result of delayed assistance to accident victims. Significant economic and societal repercussions are seen for those involved. As a consequence, several research institutions and significant motorcycle manufacturers have created safety devices to protect riders. A good motorbike safety system is also difficult to implement and expensive. Modern communication technologies are being incorporated into the automobile sector to improve the aid provided to those injured in traffic accidents, speed up the response time of emergency services, and provide them with more information about the incident. If the resources required for each catastrophe could be estimated with more accuracy, the number of deaths may be significantly decreased. According to the proposed plan, every vehicle must have an onboard device that can identify accident situations and report them to an outside control unit, which determines the severity of the issue and gives the necessary resources to address it. The development of a prototype using commercially available equipment shows that this technology may significantly save the amount of time it takes to deploy emergency services after an accident.

2. In Chapter 2, it is discussed that Malaria is a sickness that is brought on by the Plasmodium parasite and spread by the bite of female Anopheles mosquitoes. There are four different types of plasmodium that cause malaria. 1. Plasmodium Falciparum, 2. Vivax Plasmodium, 3. Plasmodium Ovale and 4. Plasmodium Malariae. Although there are a number of clinical and laboratory procedures for detecting the presence of malaria, the speed and precision needed to do so are insufficient. In order to assess if malaria is present in human RBCs, we have developed a method in this study that makes use of image processing techniques. The technique also establishes the malarial parasite's stage and intensity.

3. Defocus blur is a very frequent occurrence in photographs taken by optical imaging devices, as discussed in Chapter 3. It could be unwanted, but it might also be a deliberate aesthetic impact, which means it might help or hurt how we see the scenario in the photograph. A partly blurred picture could be segmented into blurred and non-blurred parts for tasks like object detection and image restoration. In this research, we present a robust segmentation technique to distinguish in- and out-of-focus picture areas and a sharpness measure based on the local Gabor maximum edge position octal pattern (LGMEPOP). The suggested sharpness measure makes use of the finding that the majority of local picture patches in fuzzy parts contain a disproportionately lower number of specific local binary patterns than those in crisp regions. In conjunction with picture matting and multiscale fuzzy inference, this measure was used to produce high-quality sharpness maps in this study. Our blur segmentation algorithm and six competing techniques were put to the test using tests on hundreds of partly blurred photos. The findings demonstrate that our method produces segmentation results comparable to those of the state-of-the-art and has a significant speed advantage over the competition.

4. In Chapter 4, analytics is discussed as one of the leading technologies today since data is amassing in all shapes, sizes, and volumes, as well as in a dynamic way. In the age of social media and social networks, predictive analytics is particularly popular as data sources expand from data banks to data rivers. This chapter provides an overview of the fundamentals of analytics as well as some of the current predictive analytical models used in the analytical community, such as multiple regression, logistic regression, and the k closest neighbor model. Having a predictive analytical tool in our toolbox is even more important now that we live in the age of machine learning and artificial intelligence.

5. In Chapter 5, it is discussed how simulation, a particularly versatile and adaptable area of computer science, is used to model and analyse systems for which an analytical solution is either unavailable or challenging to achieve. Because it is simpler than conventional approaches, which are often challenging, simulation is also chosen as a method of system analysis. Because of this, simulation is an area with extensive application and demand, making it fascinating and helpful to include a chapter for studying simulation with a case study of modelling a Queuing system.

6. Chapter 6 claims that virtualization is a cloud computing solution that only requires one CPU to operate. Through virtualization, many computers seem to be operating together. Because it saves time, virtualization focuses mostly on efficiency and performance-related activities. Virtualization of operating systems is the main topic of this essay. It is a customised version of a typical operating system that enables users to run numerous programmes that create a virtual environment to carry out different jobs on the same computer by running other platforms. Based on the amount of work they accomplish and the amount of memory they use, this virtual machine aids in comparing the performance of Type 1 and Type 2 hypervisors.

7. In Chapter 7 it is discussed that cloud computing offers a dynamic paradigm that enables consumers and organisations to acquire a variety of additional services in accordance with their needs. The cloud provides services including data storage, a platform for developing and testing applications, a way to access online services, and more. Maintaining application performance in a cloud environment is a common challenge due to Quality of Service (QoS) and Service Level Agreements (SLA) supplied by service providers to the organisation. Distributing the workload across many servers is the main duty carried out by service providers. By effectively allocating resources inside Virtual Machines, a load-balancing strategy should meet user needs. This study discusses the review of several LB strategies that affect overall performance and the research gap.

8. The existing electronic voting system may be readily hacked, according to Chapter 8. There are several strategies used to prevent malpractice. This study, allows for safe voting and forgoes human interference, resulting in a seamless and secure election process. The voter's face and biometric fingerprints are used in this study's authentication process. With the voter fingerprint information already in this database, the first step in the verification process for an electronic voting system may be simply accomplished. Voter facial recognition using data previously stored in the database is the second phase of verification. The voter may cast his or her ballot and deliver it if two-phase verification is completed. The ballot will then be encrypted. This stops false votes and guarantees accurate voting free of any corruption. We have developed a fingerprint-based voting system that eliminates the need for the voter to provide an ID with all of the required information. A person is permitted to vote if the facts match the registered fingerprints' previously recorded information. If not, a warning notice is sent and the individual is disqualified from casting a vote. The administrator will decode and count the votes during the counting phase of an election.

9. Chapter 9 presents a research that outlines a method for resolving the problem of real-time decision-making in farming that arises from rapid changes in circumstances, such as atmospheric changes, monsoons, insect assaults, etc. The future of agricultural technology is big data collection and analysis in agriculture to maximise operational performance and reduce labour expenses. The Internet of Things will, however, have an impact on a far wider range of industries than just agriculture since there are more IoT-related concepts to understand. The adaptation of IoT's capacity for data collecting on crop attributes and for automated decision-making using data analytics algorithms is the main goal of this project.

10. In Chapter 10, it is discussed that biometrics innovation is still one of the major predictions that combined biosciences and innovation, serving as a tool for criminology and security analysts to develop more accurate, robust, and certain frameworks. Biometrics, when combined with various combination techniques like feature-level, score-level, and choice-level combination procedures, remained one of the most researched technologies. Uni-modular biometrics, such as unique marks, faces, and iris, are followed by multimodal bio-metrics dependent on. By presenting a similar investigation of frequently used and referred to uni- and multimodal biometrics, such as face, iris, finger vein, face and iris multimodal, face, unique mark, and finger vein multimodal, this paper will attempt to lay the groundwork for analysts interested in biometric frameworks moving forward. This comparative research includes the development of a comparison model based on DWT and IDWT. The method towards combining the modalities also entails applying a single-level, two-dimensional wavelet (DWT) that has been solidified using a Haar wavelet to accomplish the good pre-taking care of to eliminate disruption. Each pixel in the picture is subjected to a different filtering operation in order to determine the Peak-Signal-to-Noise Ratio (PSNR). This PSNR analyzes the mean square error (MSE) to quantify the disruption to hail before the division of the largest data set to the chosen MSE. In the most recent advancement, each pixel's concept is fixed up using the opposing two-dimensional Haar wavelet (IDWT), creating a longer image that is better able to recognise approbation, affirmation, and confirmation of parts. The MATLAB GUI is used to implement the diversions for this enhanced blend investigation, and the obtained outcomes are satisfactory.

11. Chapter 11 presents that performance prediction is the estimate of future performance circumstances based on information from the past and the present. Companies, divisions, systems, procedures, and personnel may all get forecasts. This research focuses on evaluating employee performance in terms of behavior, output, and potential for development. When workers perform effectively for their employers, everyone wins. As a result, forecasting staff performance is crucial for a developing company. To this purpose, we suggest the support vector machine, the decision tree (j48), and the naive Bayes classifier as three machine learning methods. These help forecast an employee's behaviour at work. Based on parameters like accuracy, error loss, and timeliness, the Naive Bayes algorithm outperforms the other two algorithms in terms of their findings.

12. Chapter 12 discusses the idea that the discipline of artificial intelligence (AI), which trains computers to comprehend and analyse pictures using computer vision, remains in its infancy. This is particularly true in the medical industry. Coronary computed tomography angiography, or CCTA, is a well-known non-invasive technique for diagnosing cardiovascular diseases (CD). Pre-processing CT Angiography images is a crucial step in a computer vision-based medical diagnosis. Implementing image enhancement preprocess to reduce noise or blur pixels and weak edges in a picture marks the beginning of the research stages. Using Python and PyCharm(IDE) editor, we can build Edge detection routines, smoothing/filtering functions, and edge sharpening functions as the first step in the pre-processing of CCTA pictures.

13. In Chapter 13, a patient-monitoring smart wheelchair system is developed as an ambulatory assistance for persons with disabilities and for continuous monitoring of the user's vital bodily parameters. Four interfaces—eyeball control, gesture control, joystick control, and voice control—have been created for wheelchair control in order to cater to various limitations. The picture of the eyeball is captured using a camera. In order to make the appropriate decisions based on the location of the eyeball, LabVIEW is employed. The wheelchair movement may also be controlled by the other three modes. Anti-collision mechanisms are implemented using ultrasonic sensors. There is a feature in the wheelchair for measuring body temperature and heart rate. If any parameter is outside of a safe range, this system will notify the appropriate medical authorities and the wheelchair user's chosen persons. The finished product is an innovative kind of assistive technology that would simplify and reduce stress in the life of its user.

14. Chapter 14 presents that the power grid assaults serve as a reminder that although the smart Internet of Things (IoT) might help us regulate our lightbulbs, it also poses the risk of putting us in the dark if it comes under attack. Many works of literature have recently attempted to address the issues surrounding IoT security, but few of them tackle the serious dangers that the development of quantum computing poses to IoT. Lattice-based encryption, a likely contender for the next post-quantum cryptography standard, benefits from strong security and good efficiency, making it well-suited for IoT applications. In this article, we list the benefits of lattice-based cryptography and the most recent developments in IoT device implementations.

15. Due to newly developed technologies in cars, traffic signal prediction devices are made and discussed in Chapter 15. It teaches users how to maneuver a car safely and effectively. Because of the many ways that drivers are distracted nowadays, the number of accidents is rising alarmingly. This technology lowers the danger of distracted driving, which causes accidents, by helping to recognise and deliver information based on data. The concepts of supervised learning, unsupervised learning, and reinforcement learning are addressed under the classification heading and serve as a major directive as the topic of machine learning is introduced. Machine learning may produce many different types of models, including neural networks, naive Bayes, random forests, support vector machines, clustering, etc. The primary concept of machine learning model training is to divide the data into training, testing, and validation sets. In order to deliver the best machine learning project, this chapter's conclusion accesses machine learning methodologies. The suggested method describes how to recognise traffic signs using a model that combines a classic support vector machine (SVM) with a newer convolutional neural network (CNN). In essence, a CNN model was trained to create this model. Several CNN model topologies, including LeNet, AlexNet, and ResNet-50, may be used in this situation. Later CNN layers' output may be utilised to generate features. The SVM was then used to classify using these characteristics.

16. In Chapter 16, machine learning is used to alter the systems that carry out artificial intelligence-related tasks. (AI). It displays the many ML kinds and applications. It also explains the fundamental ideas behind feature selection techniques, which can be applied to a variety of machine learning (ML) methods, including artificial neural networks (ANN), Naive Bayes classifiers (probabilistic classifiers), support vector machines (SVM), K Nearest Neighbor (KNN), and the greedy algorithm-related decision trees algorithm.

S. Kannadhasan Department of Electronics and Communication Engineering Study World College of Engineering Coimbatore, Tamil Nadu IndiaR. Nagarajan Department of Electrical and Electronics Engineering Gnanamani College of Technology Namakkal, Tamil Nadu IndiaN. Shanmugasundaram Department of Electrical and Electronics Engineering VELS Institute of Science Technology and Advanced Studies (VISTAS) Chennai, Tamil Nadu IndiaJyotir Moy Chatterjee Scientific Research Group of Egypt (SRGE) Lord Buddha Education Foundation Asia Pacific University of Technology & Innovation Kathmandu Nepal&P. Ashok Symbiosis Institute of Digital and Telecom Management (SIDTM) Symbiosis International (Deemed University) Lavale, Pune, Maharashtra, India

List of Contributors

Annamalai SolayappanSri Subramaniya Swamy Government Arts College, Tirutttani, Tamil Nadu, IndiaA. Wisemin LinsVels Institute of Science, Technology and Advanced Studies, Pallavaram, Chennai, Tamil Nadu, IndiaA. FirosDepartment of Computer Science and Engineering, Rajiv Gandhi University, Rono Hills, Doimukh-791112, IndiaDhivya R.S.School of Computing Sciences, VISTAS, Thiruthangal Nadar College, Chennai, IndiaE.N. GaneshVels Institute of Science, Technology and Advanced Studies, Pallavaram, Chennai, Tamil Nadu, IndiaG. RajakumarDepartment of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, IndiaJ. Mary Ramya PoovizhiDepartment of Computer Science, Vels Institute of Science, Technology and Advanced Studies (VISTAS), (Deemed to be University), Chennai, IndiaJ. JebathagamDepartment of Computer Science, Vels Institute of Science Technology and Advanced Studies, (VISTAS), Chennai, IndiaJ. VijayarangamDepartment of Applied Mathematics, Sri Venkateswara College of Engineering, Sriperumbudur, Tamil Nadu, IndiaJ. JebathangamDepartment of Computer Science, Vels Institute of Science Technology and Advanced Studies, VISTAS, Chennai, India Department of Information Technology, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai, IndiaK. SharmilaDepartment of Computer Science, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai, IndiaM. VidhyaDepartment of Computer Science, Vels Institute of Science, Technology and Advanced Studies (VISTAS), (Deemed to be University), Chennai, IndiaM. GunasekaranDepartment of Computer Science, Government Arts College, Salem-636007, IndiaM. NishaDepartment of Computer Science, Vels Institute of Science Technology and Advanced Studies, VISTAS, Chennai, IndiaN. JanakiVels Institute of Science, Technology and Advanced Studies, Pallavaram, Chennai, Tamil Nadu, IndiaP. Bhargavi DeviDepartment of Computer Science, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai, IndiaP. GovindasamyVels Institute of Science, Technology and Advanced Studies, Pallavaram, Chennai, Tamil Nadu, IndiaR. Sebasthi PriyaDepartment of Mathematics, University College of Engineering, Tiruchirappalli, IndiaR. KabilanDepartment of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, IndiaR. RaviDepartment of CSE, Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India Department of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, IndiaR. DeviDepartment of Computer Science, Vels Institute of Science, Technology and Advanced Studies (VISTAS), (Deemed to be University), Chennai, IndiaR. Mallika PandeeswariDepartment of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, IndiaS. ShargunamDepartment of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, IndiaSeema KhanumDepartment of Computer Science and Engineering, Rajiv Gandhi University, Rono Hills, Doimukh-791112, IndiaS. KamalakannanDept of Information Technology, Vels Institute of Science, Technology and Advanced Studies, Chennai, IndiaS.V. RajigaDepartment of Computer Science, Government Arts College, Dharmapuri-636705, IndiaSujatha P.School of Computing Sciences, VISTAS, Thiruthangal Nadar College, Chennai, IndiaS.K. Piramu PreethikaSchool of Computing Sciences, VISTAS, Pallavaram, Chennai, Tamil Nadu, IndiaT. KarthikeyanDept of Mathematics, Ramakrishna Mission Vivekananda College, Chennai, IndiaT.R. PremilaVels Institute of Science, Technology and Advanced Studies, Pallavaram, Chennai, Tamil Nadu, IndiaT. Santhi PunithaSchool of Computing Sciences, VISTAS, Pallavaram, Chennai, Tamil Nadu, IndiaU. LathamaheswariDepartment of Computer Science, Vels Institute of Science Technology and Advanced Studies, (VISTAS), Chennai, IndiaV. JeevithaDepartment of Computer Science, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai, India

Innovative Device for Automatically Notifying and Analyzing the Impact of Automobile Accidents

R. Kabilan1,*,R. Ravi1,2,R. Mallika Pandeeswari1,S. Shargunam1
1 Department of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India
2 Department of CSE, Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India

Abstract

In many nations, motorcycle accidents are a big public issue. Despite public awareness campaigns, the problem continues to grow as a result of poor riding habits such as riding without a helmet, dangerous driving, drunk driving, riding without enough sleep, and so on. Because of late help to those who have been in accidents, the rate of deaths and disabilities is quite high. People who are implicated suffer significant economic and social consequences as a result of them. As a result, various research organizations and large motorcycle companies have developed safety systems to safeguard riders from harm. Furthermore, a dElectronics and Communication Engineeringnt motorcycle safety system is hard to execute and costly. The integration of modern communication technologies into the automotive industry allows for greater assistance to people wounded in traffic accidents, a reduction in the time it takes emergency services to respond, and an increase in the amount of knowledge they have about the occurrence. The number of fatalities might be greatly reduced if the resources necessary for each disaster could be determined more precisely. The developed scheme calls for every vehicle to be equipped with an on-board unit that detects and reports accident scenarios to an exterior control unit that assesses the depth of the problem and provides the needed resources to aid it. The creation of a prototype based on off-the-shelf equipment indicates that this technology can considerably reduce the time it takes to send emergency services following an accident.

Keywords: Buzzer, GSM, GPS, LCD, Tilt Sensor, Zigbee.
*Corresponding author R. Kabilan: Department of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India; E-mail: [email protected]

INTRODUCTION

An embedded server is a computer that is designed to do one or a few specific functions, frequently under time limitations. It is frequently incorporated as part system, including a PC, on the other hand, is built to be adaptable and suit a huge

of a larger device that includes hardware and mechanical components. An overall spectrum of end-user requirements. Many modern devices are controlled by embedded systems.