SlideShare a Scribd company logo
Soft Computing Theories And Applications
Proceedings Of Socta 2019 Advances In
Intelligent Systems And Computing 1st Ed 2020
Millie Pant Editor download
https://ebookbell.com/product/soft-computing-theories-and-
applications-proceedings-of-socta-2019-advances-in-intelligent-
systems-and-computing-1st-ed-2020-millie-pant-editor-11247046
Explore and download more ebooks at ebookbell.com
Here are some recommended products that we believe you will be
interested in. You can click the link to download.
Soft Computing Theories And Applications Proceedings Of Socta 2017 1st
Ed Kanad Ray
https://ebookbell.com/product/soft-computing-theories-and-
applications-proceedings-of-socta-2017-1st-ed-kanad-ray-7328090
Soft Computing Theories And Applications Proceedings Of Socta 2016
Volume 1 1st Edition Millie Pant
https://ebookbell.com/product/soft-computing-theories-and-
applications-proceedings-of-socta-2016-volume-1-1st-edition-millie-
pant-6844314
Soft Computing Theories And Applications Proceedings Of Socta 2016
Volume 2 1st Edition Millie Pant
https://ebookbell.com/product/soft-computing-theories-and-
applications-proceedings-of-socta-2016-volume-2-1st-edition-millie-
pant-6844318
Soft Computing Theories And Applications Proceedings Of Socta 2022
Rajesh Kumar
https://ebookbell.com/product/soft-computing-theories-and-
applications-proceedings-of-socta-2022-rajesh-kumar-49843498
Soft Computing Theories And Applications Proceedings Of Socta 2020
Volume 2 Tarun K Sharma
https://ebookbell.com/product/soft-computing-theories-and-
applications-proceedings-of-socta-2020-volume-2-tarun-k-
sharma-33449334
Soft Computing Theories And Applications Proceedings Of Socta 2020
Volume 1 Tarun K Sharma Chang Wook Ahn Om Prakash Verma Bijaya Ketan
Panigrahi
https://ebookbell.com/product/soft-computing-theories-and-
applications-proceedings-of-socta-2020-volume-1-tarun-k-sharma-chang-
wook-ahn-om-prakash-verma-bijaya-ketan-panigrahi-33941248
Fuzzy Approaches For Soft Computing And Approximate Reasoning Theories
And Applications Mariejeanne Lesot
https://ebookbell.com/product/fuzzy-approaches-for-soft-computing-and-
approximate-reasoning-theories-and-applications-mariejeanne-
lesot-13776312
Soft Computing In Materials Development And Its Sustainability In The
Manufacturing Sector Amar Patnaik
https://ebookbell.com/product/soft-computing-in-materials-development-
and-its-sustainability-in-the-manufacturing-sector-amar-
patnaik-47301994
Soft Computing Applications And Techniques In Healthcare Ashish Mishra
https://ebookbell.com/product/soft-computing-applications-and-
techniques-in-healthcare-ashish-mishra-48248378
Soft Computing Theories And Applications Proceedings Of Socta 2019 Advances In Intelligent Systems And Computing 1st Ed 2020 Millie Pant Editor
Advances in Intelligent Systems and Computing 1154
Millie Pant · Tarun Kumar Sharma ·
Rajeev Arya · B. C. Sahana ·
Hossein Zolfagharinia Editors
Soft Computing:
Theories and
Applications
Proceedings of SoCTA 2019
Advances in Intelligent Systems and Computing
Volume 1154
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **
More information about this series at http://www.springer.com/series/11156
Millie Pant • Tarun Kumar Sharma •
Rajeev Arya • B. C. Sahana •
Hossein Zolfagharinia
Editors
Soft Computing: Theories
and Applications
Proceedings of SoCTA 2019
123
Editors
Millie Pant
Department of Paper Technology
IIT Roorkee
Roorkee, India
Tarun Kumar Sharma
Graphic Era Hill University
Dehradun, Uttarakhand, India
Rajeev Arya
NIT Patna
Patna, India
B. C. Sahana
NIT Patna
Patna, India
Hossein Zolfagharinia
Ryerson University
Toronto, ON, Canada
ISSN 2194-5357 ISSN 2194-5365 (electronic)
Advances in Intelligent Systems and Computing
ISBN 978-981-15-4031-8 ISBN 978-981-15-4032-5 (eBook)
https://doi.org/10.1007/978-981-15-4032-5
© Springer Nature Singapore Pte Ltd. 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
This book focusses on the strides made in the domain of soft computing and its
applications to address the key issues plaguing the domains of image and signal
processing, supply chain management, computational Biology and Bioinformatics,
human resource management, finance and economics. It includes the immaculate
works presented during the 4th International Conference on Soft Computing:
Theories and Applications (SoCTA 2019), organized by the Department of
Electronics and Communication Engineering, National Institute of Patna, Bihar,
India from 27th–29th December, 2019. This book stands true to its motive of
encouraging young minds and fresh ideas in the field of soft computing.
Roorkee, India Millie Pant
Dehradun, India Tarun Kumar Sharma
Patna, India Rajeev Arya
Patna, India B. C. Sahana
Toronto, Canada Hossein Zolfagharinia
v
Contents
Performance Optimization by MANET AODV-DTN
Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Deepak Choudhary and Roop Pahuja
Effectiveness of Whale Optimization Based I+PD Controller for LFC
of Plug-in Electric Vehicle Included Multi-area System . . . . . . . . . . . . 11
Utkarsh Raj and Ravi Shankar
Dual Band Printed Rectangular Ring-Shaped Monopole Antenna
for Wireless Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Chandrakant Jatav and Sudhanshu Verma
Printed U-Shaped Monopole Dual Band Antenna for Wireless
Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Vikash Chandra Sharma and Sudhanshu Verma
IoT-Enabled Early Prediction System for Epileptic Seizure
in Human Being . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Sayali Shinde and Brijesh Iyer
Effective Author Ranking Using Average of Different
h-Index Variants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Prabhat Kumar Chandra, Vivekanand Jha, and Kumar Abhishek
A Survey Report on Recent Progresses in Nearest Neighbor
Realization of Quantum Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Anirban Bhattacharjee, Chandan Bandyopadhyay, Bappaditya Mondal,
and Hafizur Rahaman
Annual Rainfall Prediction Using Time Series Forecasting . . . . . . . . . 69
Asmita Mahajan, Akanksha Rastogi, and Nonita Sharma
A Novel Approach for Design 7:3 and 5:3 Compressors . . . . . . . . . . . 81
Ajay Kumar Kushwaha and Vikas Kumar
vii
High-Accurate, Area-Efficient Approximate Multiplier
for Error-Tolerant Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
M. Parvathi
Hoax and Faux of Information Credibility in Social Networks:
Explored, Exemplified and Experimented . . . . . . . . . . . . . . . . . . . . . . 103
Ram Chatterjee, Hardeo Kumar Thakur, Ridhi Sethi, and Abhishek Pandey
Minimize Power Ratio (PR) in OFDM Using Tone Reservation
Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Yogendra Kumar Upadhyaya and Ajay Kumar Kushwaha
A Single-Phase Multi-level Inverter Using a Lesser Number
of Switching Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Ashutosh Kumar Singh, Ravi Raushan, and Pratyush Gauri
Symmetric Key Generation and Distribution Using Diffie-Hellman
Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Kaustubh Purohit, Avanish Kumar, Mayank Upadhyay,
and Krishan Kumar
Design of Controllers Using PSO Technique for Second-Order Stable
Process with Time Delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Satyendra Kumar and Moina Ajmeri
A Green Dynamic Internet of Things (IoT)-Battery Powered Things
Aspect-Survey. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Nitin B. Raut and N. M. Dhanya
An Efficient Layout of Single-Layer Full Adder Using QCA . . . . . . . . 165
Nilesh Patidar and Namit Gupta
A Review of mm-Wave Power Amplifiers for Next-Generation
5G Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Pradeep Gorre, R. Vignesh, Rajeev Arya, and Sandeep Kumar
Vision-Based Automated Traffic Signaling . . . . . . . . . . . . . . . . . . . . . . 185
H. Mallika, Y. S. Vishruth, T. Venkat Sai Krishna, and Sujay Biradar
Performance Comparison of SVM and ANN for Reversible ECG
Data Hiding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Siddharth Bhalerao, Irshad Ahmad Ansari, and Anil Kumar
Application of Multi-criteria Decision-Making Method
for the Evaluation of Tamilnadu Private Bus Companies . . . . . . . . . . 209
S. M. Vadivel, A. H. Sequeira, Sunil Kumar Jauhar, R. Baskaran,
and S. Robert Rajkumar
viii Contents
CNC Machine Shop Floor Facility Layout Design Using Genetic
Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
S. M. Vadivel, A. H. Sequeira, Sunil Kumar Jauhar,
K. S. Amirthagadeswarn, and T. Aravind Krishna
Source of Treatment Selection for Different States of India
and Performance Analysis Using Machine Learning Algorithms
for Classification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Nitima Malsa, Pooja Singh, Jyoti Gautam, Arpita Srivastava,
and Santar Pal Singh
Ant Lion Optimization Technique for Minimization
of Voltage Deviation Through Optimal Placement
of Static VAR Compensator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Stita Pragnya Dash, K. R. Subhashini, and J. K. Satapathy
On Vector Variational Inequalities and Vector Optimization
Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
B. B. Upadhyay and Priyanka Mishra
Characterizations of the Solution Sets for Constrained Pseudolinear
Semi-infinite Programming Problems . . . . . . . . . . . . . . . . . . . . . . . . . . 269
B. B. Upadhyay and Akriti Srivastava
Novel Chaotic Elephant Herding Optimization for Multilevel
Thresholding of Color Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Falguni Chakraborty, Provas Kumar Roy, and Debashis Nandi
Forecasting Groundwater Fluctuation from GRACE Data
Using GRNN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Dilip Kumar and Rajib Kumar Bhattacharjya
Android Application for Recognition of Indian Origin Agricultural
Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Snehal P. Tarale and Veena Desai
A Fuzzy Logic Based Approach for Prediction of Squamous Cell
Carcinoma . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Saurabh Jha, Ashok Kumar Mehta, and Chandrashekhar Azad
Investigating Multilevel Hesitated Patterns Using Vague
Set Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Abhishek Dixit, Akhilesh Tiwari, and Rajendra Kumar Gupta
Six Switch Three Phase Five-Level Inverter with Sinusoidal Pulse
Width Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Rajesh Kumar Mahto and Ambarisha Mishra
AI-Enabled Real-Time Sign Language Translator . . . . . . . . . . . . . . . . 357
Yash Patil, Sahil Krishnadas, Adya Kastwar, and Sujata Kulkarni
Contents ix
A Comparative Performance of Sorting Algorithms: Statistical
Investigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Priyadarshini and Anchala Kumari
Evolutionary Computing for Designing Cryptographic Primitives
for Block Cipher: Challenges and Opportunities . . . . . . . . . . . . . . . . . 381
Pratap Kumar Behera and Sugata Gangopadhyay
A True Event-Based Metaheuristic Algorithm Optimized AGC
Mechanism for a Multi-area Power System . . . . . . . . . . . . . . . . . . . . . 391
Sariki Murali and Ravi Shankar
Wireless Emanation of Braille to Text/Voice and Vice Versa . . . . . . . . 403
Aishwarya Korde, Omkar Gaikar, Sonam Nikam, and Smita Rukhande
An Exploratory Analysis Pertaining to Stress Detection
in Adolescents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
Mrinal Pandey, Bharti Jha, and Rahul Thakur
Load Frequency Control of an Interconnected Multi-source Power
System Using Quasi-oppositional Harmony Search Algorithm . . . . . . . 423
Abhishek Saxena and Ravi Shankar
An Extensive Investigation of Wavelet-based Denoising Techniques
for Various ECG Signals Utilizing Thresholding Function . . . . . . . . . . 433
V. Supraja, P. Nageswara Rao, and M. N. Giriprasad
Effect of Noise on Segmentation Evaluation Parameters . . . . . . . . . . . 443
V. Vijaya Kishore and V. Kalpana
A Review Paper on Feature Selection Techniques and Artificial
Neural Networks Architectures Used in Thermography for Early
Stage Detection of Breast Cancer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Kumod Kumar Gupta, Ritu Vijay, and Pallavi Pahadiya
An Artificial Neural Network Model for Estimating the Flood
in Tehri Region of Uttarakhand Using Rainfall Data . . . . . . . . . . . . . . 467
B. G. Rajeev Gandhi, Dilip Kumar, and Hira Lal Yadav
Advanced Virtual Apparel Try Using Augmented Reality
(AVATAR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Sourav Shaw, Swapnali Kadam, Shreya Joshi, and Dhanashree Hadsul
A Novel Fault-Detection Scheme for Nearest-Neighbor-Based
Reversible Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Anirban Bhattacharjee, Chandan Bandyopadhyay, Bappaditya Mondal,
and Hafizur Rahaman
Automated Railway Gate Control Using Internet of Things . . . . . . . . . 501
B. Arunjyothi and B. Harikrishna
x Contents
Simulated Annealing Based Algorithm for Tuning LDA Hyper
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515
Nikhlesh Pathik and Pragya Shukla
A Better Group Consensus Ranking via a Min-transitive Fuzzy
Linear Ordering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523
Sukhamay Kundu
A Novel Metaheuristic Approach for Resource Constrained Project
Scheduling Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
Bidisha Roy and Asim Kumar Sen
A Novel Approach to Handle Huge Data for Refreshment Anomalies
in Near Real-Time ETL Applications . . . . . . . . . . . . . . . . . . . . . . . . . . 545
N. Mohammed Muddasir and K. Raghuveer
Comparison of Photodetection Capability of Spin Coated TiO2 Thin
Film and In2O3 Thin Film Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
Rahul Raman, Amitabha Nath, and Mitra Barun Sarkar
Development of IDS Using Supervised Machine Learning . . . . . . . . . . 565
Indrajeet Kumar, Noor Mohd, Chandradeep Bhatt,
and Shashi Kumar Sharma
Automated Traffic Light Signal Violation Detection System Using
Convolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Bhavya Bordia, N. Nishanth, Shaswat Patel, M. Anand Kumar,
and Bhawana Rudra
An Enhanced Butterfly Optimization Algorithm for Function
Optimization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
Sushmita Sharma, Apu Kumar Saha, and Sukanta Nama
Dynamic Analysis of Wind Turbine Drivetrain Under Constant
Torque . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
Rishi Kumar and Sankar Kumar Roy
To Build Scalable and Portable Blockchain Application Using
Docker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
Priyanka Kumar and Maharshi Shah
Text Summarization: An Extractive Approach . . . . . . . . . . . . . . . . . . 629
Vishal Soni, Lokesh Kumar, Aman Kumar Singh, and Mukesh Kumar
Clifford+T-based Fault-Tolerant Quantum Implementation of Code
Converter Circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
Laxmidhar Biswal, Chandan Bandyopadhyay, and Hafizur Rahaman
Contents xi
Applying Deep Learning for Discovery and Analysis of Software
Vulnerabilities: A Brief Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
Shashank Kumar Singh and Amrita Chaturvedi
Fuzzy Decision Making System for Better Staff Performance
Appraisal in Institutional Organization . . . . . . . . . . . . . . . . . . . . . . . . 659
Soni Sweta and Ajit Kumar Pandey
A Graph-Theoretic Approach for Sustainable New Product
Development (SNPD) in Supply Chain Environment . . . . . . . . . . . . . . 671
Amit Kumar Sinha and Ankush Anand
Generalization Performance Comparison of Machine Learners for
the Detection of Computer Worms Using Behavioral Features . . . . . . 677
Nelson Ochieng, Waweru Mwangi, and Ismail Ateya
Fully Annotated Indian Traffic Signs Database for Recognition . . . . . . 695
Banhi Sanyal, R. K. Mohapatra, and Ratnakar Dash
Streamlining Choice of CNNs and Structure Framing of Convolution
Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
Sonika Dahiya, Rohit Tyagi, and Nishchal Gaba
SNAP N’ COOK—IoT-Based Recipe Suggestion and Health Care
Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
Diksha Mukherjee, Albin Paulson, Shajo Varghese, and Mukta Nivelkar
Accuracy-Based Performance Analysis of Alzheimer’s Disease
Classification Using Deep Convolution Neural Network . . . . . . . . . . . . 731
Ketki C. Pathak and Swathi S. Kundaram
Multiple Information Fusion and Encryption Using DWT
and Yang-Gu Mixture Amplitude-Phase Retrieval Algorithm
in Fractional Fourier Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
Muhammad Rafiq Abuturab
Development of Intrusion Detection System Using Deep Learning
for Classifying Attacks in Power Systems. . . . . . . . . . . . . . . . . . . . . . . 755
Ankitdeshpandey and R. Karthi
An Improved Adaptive Transfer Function for Explosion Spark
Generation in Fireworks Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
Tapas Si and Amit Mukhopadhyay
NSE Stock Prediction: The Deep Learning Way . . . . . . . . . . . . . . . . . 783
Ankit K. Barai, Pooja Jain, and Tapan Kumar
Recent Development of AI and IoT in the field of Agriculture
Industries: A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793
Amith A. Kulkarni, P. Dhanush, B. S. Chethan, C. S. Thammegowda,
and Prashant Kumar Shrivastava
xii Contents
Optimized Fuzzy Rule-Based System to Measure Uncertainty
in Human Decision Making System . . . . . . . . . . . . . . . . . . . . . . . . . . . 799
Soni Sweta and Kanhaiya Lal
A Review on Detection of Breast Cancer Cells by Using Various
Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813
Vanaja Kandubothula, Rajyalakshmi Uppada, and Durgesh Nandan
Analysis of Security Issues and Possible Solutions in the Internet
of Things for Home Automation System . . . . . . . . . . . . . . . . . . . . . . . 825
P. Sai Ramya and Durgesh Nandan
Utilization of the Internet of Things in Agriculture: Possibilities
and Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 837
P. Mani Sai Jyothi and Durgesh Nandan
Study on Real-Time Face Recognition and Tracking for Criminal
Revealing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849
A. Krishna Chaitanya, C. H. Kartheek, and Durgesh Nandan
Analysis of Precision Agriculture Technique by Using Machine
Learning and IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859
Y. Sasi Supritha Devi, T. Kesava Durga Prasad, Krishna Saladi,
and Durgesh Nandan
Dispersive Nature of the FEL Amplifiers in the Whistler Mode . . . . . . 869
Ram Gopal, M. Sunder Rajan, Priti Sharma, and Abhinav K. Gautam
An Improved Energy-Efficient Faulty Information Extraction
Scheme Using PFDIAES and PFDIF Algorithms . . . . . . . . . . . . . . . . . 883
P. T. Kalaivaani and Raja Krishnamoorthy
Cyber Attacks and Security—A Critical Survey . . . . . . . . . . . . . . . . . 895
Nithin Kashyap, Hari Raksha K. Malali, and H. L. Gururaj
A Comparative Study on Different Techniques of Sentimental
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905
K. S. Peeyusha, G. Pooja, S. Shreyas, and S. P. Pavankumar
An Approach to Select the Proper Combination within Positional
and Non-positional Average Values of Features in Protein
Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 913
Suprativ Saha and Tanmay Bhattacharya
Areca Nut Disease Detection Using Image Processing . . . . . . . . . . . . . 925
A. B. Rajendra, N. Rajkumar, and P. D. Shetty
Simulink Simulation for Predicting Thermodynamic Properties
of Water–Lithium Bromide Solution Using ANN . . . . . . . . . . . . . . . . . 933
Dheerendra Vikram Singh and Tikendra Nath Verma
Contents xiii
A New Bit Plane Specific Longest Repeating Pattern Test
for Statistical Analysis of Bit Sequences . . . . . . . . . . . . . . . . . . . . . . . . 943
Bharat Lal Jangid and Ram Ratan
Intelligent Interference Minimization Algorithm for Optimal
Placement of Sensors using BBO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 955
Chandra Naik and D. Pushparaj Shetty
Classification of SOA-Based Cloud Services Using Data Mining
Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971
Zeenat Parween and R. B. S. Yadav
A Novel Clustering-Based Gene Expression Pattern Analysis
for Human Diabetes Patients Using Intuitionistic Fuzzy Set
and Multigranulation Rough Set Model . . . . . . . . . . . . . . . . . . . . . . . . 979
Swarup Kr Ghosh and Anupam Ghosh
Investigation on HRV Signal Dynamics for Meditative
Intervention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993
Dipen Deka and Bhabesh Deka
A Review on Deep Learning-Based Channel Estimation Scheme . . . . . 1007
Amish Ranjan, Abhinav Kumar Singh, and B. C. Sahana
Patient Diabetes Forecasting Based on Machine Learning
Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1017
Arvind Kumar Shukla
Pose Invariant Face Recognition Using Principal Component
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029
Akash Krishna Srivastava, H. Sneha, Diksha,
and Koushlendra Kumar Singh
An Autonomic Resource Allocation Framework for Service-Based
Cloud Applications: A Proactive Approach . . . . . . . . . . . . . . . . . . . . . 1045
Tushar Bhardwaj, Himanshu Upadhyay, and Subhash Chander Sharma
Index Point Detection and Semantic Indexing of Videos—A
Comparative Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1059
Mehul Mahrishi and Sudha Morwal
Classification of Neuromuscular Disorders Using Machine Learning
Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1071
Anuj Singh, Arun Vikram, M. P. Singh, and Sudhakar Tripathi
Comparative Study of the Ultrasonic and Infrared Person
Counter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1081
Ankit Saxena, Swapnesh Taterh, and Nishant Saxena
xiv Contents
Fuzzy Logic Based Improved Control Design Strategy for MPPT of
Solar PV Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1093
Rahul Bisht, Newton Kumar, and Afzal Sikander
Evaluation of Soil Physical, Chemical Parameter and Enzyme
Activities as Indicator of Soil Fertility with SFM Model in IA–AW
Zone of Rajasthan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1107
Jyoti Sihag, Divya Prakash, and Parul Yadav
Author Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1123
Contents xv
About the Editors
Dr. Millie Pant is an Associate Professor, Department of Applied Science and
Engineering, IIT Roorkee, India. She has supervised 16 Ph.D.s in the area of
numerical optimization, operations research, soft computing and swarm intelligence
techniques with applications to various engineering design problems, image pro-
cessing, computer vision, supply chain management. She has 181 research publi-
cations to her credit. She is PI and Co-PI in 2 DST and MHRD sponsored projects.
She has edited 7 volumes of Conference Proceedings AISC series of Springer of
SoCPros Conference series since 2017 and 2 volumes of Conference Proceedings
AISC series of Springer of SoCTA Conference series. She is an Associate Editor in
International Journal of Swarm Intelligence, Inderscience, and Guest Editor in
several international journals like International Journal of Memetic Computing,
Springer, International Journal of Collaborative Engineering, Inderscience. She is a
reviewer in IEEE Transactions on Evolutionary Computation, Applied Soft
Computing, Applied Mathematics and Computation, Neural Network Works,
Information science. She has acted as General Chair, Program Chair, Session and
Track Chair in many national and international conferences. She has delivered Guest
Lectures in the field of swarm intelligence, nature inspired computing, computa-
tional intelligence in institution of national and international repute like National
University of Singapore, Singapore, Liverpool Hope University, Liverpool, UK,
Brisbane, Australia, Zakopane, Poland, Graphic Era University, Dehradun, Meerut
Institute of Engineering and Technology, ABV-IIITM Gwalior, MANIT, Bhopal,
National Institute of Hydrology, Roorkee, NIT, Assam. She has international col-
laboration with MIRS Lab, USA, Liverpool Hope University, UK, and Université
Paris-Est Créteil Val-de-Marne, Paris, France. She is a founder member of SoCPros,
SoCTA, and RAACE Conference series.
Dr. Tarun Kumar Sharma is Professor at Graphic Era Hill University, Dehradun.
He worked at Amity School of Engineering and Technology, Amity University
Rajasthan, India. He holds Ph.D. in Soft Computing from India Institute of
Technology, Roorkee. He has supervised 2 Ph.D.s. He has 77 research publications
to his credit. He is one of the founding member of SoCTA series. He acted as
xvii
General Chair of RAACE 2017, Program Chair in SoCTA 2016, Organizing
Secretary in SoCPros 2015, and PC member in SoCPros 2014 and SoCPRos 2013.
He has edited 3 volumes of Conference Proceedings published by AISC series of
Springer Publication and 2 edited books in Asset Analytics, Springer. He is Guest
Editor in several international journals like IJACI, IJAIP, IJSIR, IJAMC, IJAEC,
IJISDC, and IJPD. He is a member in the editorial board of national and international
journals. He has acted as session and track chair in many national and international
conferences. He has delivered Guest Lectures in the field of swarm intelligence,
nature inspired computing, and computational intelligence in the institution of
national and international repute. He is a founder member of SoCTA and RAACE
Conference series. He is a member of IET, IANEG, CSTA, and MIRS Lab.
Dr. Rajeev Arya received the Engineering Degree in Electronics & Communication
Engineering from Government Engineering College, Ujjain, (RGPV University,
Bhopal) India, and the Master of Technology in Electronics & Communication
Engineering from Indian Institute of Technology (ISM), Dhanbad, India. He received
the Ph.D. degree in Communication Engineering from Indian Institute of Technology,
Roorkee, India. He is currently an Assistant Professor with the Department of
Electronics & Communication Engineering at National Institute of Technology,
Patna, India. His current research interests are in wireless communication, ant colony
optimization & soft computing techniques, cognitive radio, signal processing, com-
munication systems & circuits design. He has published many articles in international
journals and conferences. He is a member of the ISRD and the IAENG. He is an active
reviewer in many reputed international journals.
Dr. B. C. Sahana is an Assistant Professor, Department of Electronics and
Communication Engineering, NIT Patna, India. He has supervised 10 M.Tech. and
32 B.Tech. students in the area of signal processing, optimization, soft computing
and swarm intelligence techniques with applications to various engineering design
problems, image processing and compression, computer vision, geophysical signal
processing, filter design. He has 21 research publications in journals and confer-
ences. He is a reviewer in IEEE access. He has delivered Guest Lectures in the field
of geophysical signal processing, nature inspired computing, computational intel-
ligence in the institution of national and international repute.
Dr. Hossein Zolfagharinia is an award-winning Assistant Professor of Operations
Management in the Global Management Studies department at the Ted Rogers
School of Management, Ryerson University. He received his Undergraduate and
Master’s Degrees in Industrial Engineering. Following this, he earned his Ph.D. in
Operations and Supply Chain Management from the Lazaridis School of Business
and Economics at Wilfrid Laurier University. In addition to his academic back-
ground, he has more than four years of professional work experience as a business
method analyst in the oil and drilling industry. Furthermore, he gained experience in
the area of Supply Chain Management through managing several projects in
trucking and maritime transportation companies in the past (e.g., Logikor Inc.,
xviii About the Editors
Global Spatial Technology Solutions (GSTS) Inc.). Dr. Zolfagharinia’s two main
research interests are in: (1) investigating the benefits of collaboration in supply
chain management with a focus on logistics and transportation, (2) applying oper-
ations management techniques in a healthcare context. He is the author of a book
chapter and several top-tier refereed journal articles. These journals include:
European Journal of Operational Research, Transportation Research: Part B and
Part E, International Journal of Production Economics, and Operations Research for
Health Care. He frequently presents his work at scholarly/professional conferences
at both the national and international levels (e.g., Institute for Operations Research
and Management Sciences (INFORMS), Annual meeting of Canadian Operational
Research Society (CORS), and Decision Sciences Institute (DSI)). He is the recipient
of the 2017-2018 Dean’s Scholarly, Research, and Creative Activity Award. He has
received over $250,000 in the form of research grants, scholarships, and fellowships.
These include Natural Sciences and Engineering Research Council of Canada
(NSERC), Social Sciences and Humanities Research Council-Institutional Grant
(SSHRC-SIG), Ontario Centers of Excellence (OCE), Ontario Graduate Scholarship
(OGS), the Best OGS Research Proposal, and the Ontario Institute of the Purchasing
Management Association of Canada (OIPMAC) Achievement Excellence, and he is
the provisional winner of Supply Chain & Logistics Association of Canada Paper
Competition.
About the Editors xix
Performance Optimization by MANET
AODV-DTN Communication
Deepak Choudhary and Roop Pahuja
Abstract Mobile Ad Hoc Network (MANET) has the ability to self-configure and
establish a mobile wireless mesh that can be used in extreme conditions, such as in
areas affected by disasters. One of the routings in MANET is AODV routing. AODV
is one of the reactive routing needed to send data. However, in the implementation
of disaster conditions, AODV has weaknesses that are vulnerable to extreme envi-
ronmental conditions. In this study, communication will be modeled that leads to
disruption due to disaster. MANET AODV-DTN is used to improve network per-
formance. With this system, the Probability Delivery Ratio (PDR) parameter value
can be increased as evidenced by the variable modification of the number of nodes
to be 0.431%, reducing the average delay by 63.525%, and producing the energy
consumption increased by 0.170%. Simulation with the variable modification of
speed obtained by PDR 0.482%, reducing the average delay by 78.710% and energy
consumption increased by 0.167%. Modification of buffer size variables obtained
0.729% PDR results, reducing the average delay of 71.603% and energy consump-
tion increased by 0.161%. From these data, MANET AODV-DTN is better than
MANET AODV.
Keywords MANET · AODV · DTN · PDR · Average delay
1 Introduction
Condition in the disaster area will affect the rescue process, therefore communication
networks are needed that can survive in these conditions. The design and use of
communication network systems for disaster areas must have good Quality of Service
values to ensure that data transmission can reach the destination quickly under limited
energy. This causes the system performance to be optimal in these conditions.
D. Choudhary (B) · R. Pahuja
Instrumentation and Control Department, Dr. B.R Ambedkar National Institute of
Engineering–Jalandhar, Jalandhar, Punjab, India
e-mail: engg_deepak@yahoo.com
© Springer Nature Singapore Pte Ltd. 2020
M. Pant et al. (eds.), Soft Computing: Theories and Applications,
Advances in Intelligent Systems and Computing 1154,
https://doi.org/10.1007/978-981-15-4032-5_1
1
2 D. Choudhary and R. Pahuja
Based on [1, 2], the requirement to design a communication network for use
in an emergency is higher redundancy when data sent from source to destination.
This high redundancy causes data to be rearranged if the message is damage before
reaching the destination, data access is sent quickly, has the capacity to work in emer-
gency conditions and normal conditions. Therefore, in this study, MANET network
communication will be designed using AODV-DTN and comparing with MANET
AODV.
This paper aims to find out and compare the performance of MANET AODV and
MANET AODV-DTN so it can be used in disaster conditions. In this study, three
parameters will be tested are Probability Delivery Ratio (PDR), average delay, and
energy consumption through three variable modifications, which are speed, number
of nodes, and buffer size.
2 Background and Related Network
2.1 Mobile Ad Hoc Networks (MANETs)
Mobile Ad hoc Networks (MANETs) is a network that allows the exchange of infor-
mation without using infrastructure networks. MANET has a complex distributed
system and consists of wireless mobile nodes that can be connected freely and
dynamic to the network topology. MANET has a traditional network that can reduce
infrastructure costs and easy to implement.
MANET has several networks for different scenarios, a limited structure on
MANET means that each node must be a router and responsible for carrying routing
packet tasks. Because it uses one or more routing protocols in MANET, it requires a
large amount of message storage media and energy where mobile devices in MANET
have limited memory as a message storage medium [3, 4].
2.2 Ad Hoc on Demand Distance Vector (AODV) [5]
AODV is a reactive routing protocol that starts working when requests from the
source node and find the path will be used to send messages to the destination node.
To find the best route, AODV will find Route (Fig. 1) distributing Route Request
(RREQ) to all nodes adjacent to source node. At the same time, the broadcast ID and
sequence number are sent to avoid sending the same message to a node.
The neighbor node will send RREQ to the next neighbor node until it ends at the
destination node. After RREQ reaches the destination node, the node will reply to
the RREQ message with Route Reply (RREP). Selected the path is the shortest route
with the lowest cost compared to other routes.
Performance Optimization by MANET AODV-DTN Communication 3
Fig. 1 Example of a figure
caption [6]
To avoid changing network topology, AODV will send HELLO messages con-
tinuously. If during the sending process there is a change in the topology from the
source node to the destination node, the node will send the Error Route (RRER) to
its neighboring node to the source node. Each node will get the RRER message and
the source node will route again to find the route to the destination.
2.3 Delay Tolerant Networks (DTN)
Delay Tolerant Networks (DTN) are not always available end-to-end networks that
cause message delays. Even though the network has delays in the network, the DTN
can still function then it can work in extreme areas. DTN works using store and
forward methods, it means the data packets passing through intermediate nodes will
be stored first before being forwarded. This will be anticipated if the next node cannot
be reached or die or in other limitations [6].
In DTN, system store and forward processes are performed on an additional layer
called a bundle layer. The layer bundle is an additional layer to modify the data
package with the facilities provided by DTN, the bundle layer is located below the
application layer. In the bundle layer, the data from the application layer will be
broken into bundles, the bundle function is to store temporary data (Fig. 2).
3 Simulation Design
Scenarios communication design for disaster area, have no connecting with the inter-
net. All devices designed in this study are mobile nodes with the traffic of all nodes
sending and receiving messages. The design is used to compare MANET using
AODV and MANET AODV-DTN. The comparison is done by testing two systems
based on the simulation results using Network Simulator 2 which takes into account
4 D. Choudhary and R. Pahuja
Fig. 2 Bundle layer in DTN
[7]
Quality of Service in the form of PDR, average delay and energy consumption with
changing several variables, namely the number of nodes, speed and buffer size.
In this study, the parameters of the simulation were fixed and used with the same
values in different simulations. These parameters can be seen in Table 1.
In Table 2 There are three simulation scenarios that will be used in this study.
Scenario 1 modification of variable speed changes is done to test changes in the
speed at each node that is used to determine the duration of contacts that occur at
each node. Scenario 2 is modified to change the number of node variables to test
the effect on the probability of sending to the mobility of each node. Scenario 3 is
Table 1 Design simulation
parameters
Parameter Value
Packet size 512 byte
Dimension 750 m × 750 m
Total number of nodes 50
Speed (m/s) 2
Radio trans range (m) 180
Simulation time (s) 150
Antenna model Omnidirectional
Propagation model Free space
Pause time (s) 0
Initial energy 1000
Sleep energy 0.05
Transmit power 1
Receive power 1
Transition power 0.2
Transition time 0.001
Performance Optimization by MANET AODV-DTN Communication 5
Table 2 Design simulation
parameters
Parameter Scenario 1 Scenario 2 Scenario 3
Num of node 50 20, 30, 40,
50, 60, 70, 80
20, 30, 40,
50, 60, 70
Speed (m/s) 2, 4, 6, 8, 10 2 2
Buffer size 50 50 50
modified to change the buffer size to test the effect of the number of queues dropped
in the buffer.
4 Result and Analysis
The results of the research based on the design have been done in Sect. 3, this section
will discuss the results of the simulation and performance analysis of the two systems
MANET AODV and MANET AODV-DTN.
4.1 1st Scenario
In the 1st Scenario, the simulation is designed based on changes in the speed variables
of the MANET AODV route and the MANET AODV-DTN system routing. The
variable speed is changed by the number of node variables and buffer size which are
the same values as the initial specifications.
From Fig. 3, it illustrates the probability of success of the two systems designed.
MANET AODV-DTN has an average probability of 0.98 while MANET AODV
has an average probability of 0.97. MANET AODV-DTN can increase the success
of 0.48% delivery compared to MANET AODV. The routing strategy in MANET
AODV-DTN sends more data packets than the MANET AODV package delivery
strategy. The MANET AODV-DTN system makes copies of each packet when the
Fig. 3 Graph of simulation
results changes in speed
variables to PDR
6 D. Choudhary and R. Pahuja
Fig. 4 Simulation results
graph variable speed changes
to average delay
Fig. 5 Simulation results
graph variable speed changes
to consumption energy
node speed increases, the packet is not easily lost or damaged so it can reach the
destination. If the probability of successful package delivery is greater than reduces
delay. In MANET AODV-DTN each transmission node will cause increased energy
consumption to network while sending, receiving and storing messages (Figs. 4 and
5).
4.2 2nd Scenario
In the 2nd Scenario, the simulation is designed based on changes in speed variables
from the MANET routing AODV and MANET AODV-DTN routing systems. Vari-
able node speed is changed with variable speed and buffer size are equal in value to
the initial specifications.
The probability of successful delivery (Fig. 6) of MANET AODV-DTN is 0.98
and MANET AODV has an average probability of 0.98 as well. Because of increased
traffic on the network to the number of nodes that meet each other, messages will
be exchanged between nodes. However, the average delay (Fig. 7) time of MANET
AODV is 23.2 ms bigger than MANET AODV-DTN is 8.48 ms. MANET AODV-
DTN has a storage capacity of 100,000, while MANET AODV does not. Then the
message can make contact between nodes more often until there is no queue and the
delay time can be reduced. While the energy consumption used is smaller MANET
AODV on average at 980.90 J compared to MANET AODV-DTN at 982.49 J because
it requires more energy to send data to the message (Fig. 8).
Performance Optimization by MANET AODV-DTN Communication 7
Fig. 6 Graph of simulation
results changes in Num of
nodes variables to PDR
Fig. 7 Graph of simulation
results changes in Num of
nodes variables to Avg delay
Fig. 8 Graph of simulation
results changes in Num of
nodes variables to energy
consumption
4.3 3rd Scenario
In the 3rd scenario, the simulation is designed based on changes in the buffer size
variables of the MANET AODV and MANET AODV-DTN. The variable buffer size
is changed by the variable speed and the number of nodes that are the same as the
initial specifications.
In the 3rd scenario, simulation MANET AODV has a successful packet delivery
probability of an average of 0.96 and MANET AODV-DTN averaging 0.97. To
increase holding time, a large buffer capacity is needed, MANET AODV-DTN has
sufficient buffer capacity compared to MANET AODV so that the average delay
time is better MANET AODV-DTN 7.62 ms while MANET AODV has an average
of 25.23 ms. Energy consumption produced, MANET AODV-DTN increased by
0.161% from MANET AODV (Figs. 9, 10, and 11).
8 D. Choudhary and R. Pahuja
Fig. 9 Graph of simulation
results changes in buffer size
variables to PDR
Fig. 10 Graph of simulation
results changes in buffer size
variables to Avg delay
Fig. 11 Graph of simulation
results changes in buffer size
variables to Avg delay
5 Conclusion
The following can be concluded from the simulation results:
1. The higher number of nodes, the higher the PDR value for MANET AODV and
MANET AODV-DTN. In the same condition, MANET AODV-DTN can increase
PDR 0.43% compared to MANET AODV. The more messages received by the
destination node, the smaller average delay MANET AODV-DTN. MANET
AODV-DTNcanreducetheaveragedelayof63.5%comparedtoMANETAODV.
However, the energy consumption of MANET AODV-DTN increased by 0.17%
from MANET AODV.
2. The higher the node speed, the higher the PDR value for MANET AODV-DTN
and MANET AODV. In the same conditions, MANET AODV-DTN can increase
the PDR of 0.48% compared to MANET AODV. The more messages received
by the destination node, the smaller average delay value, MANET AODV-DTN
Performance Optimization by MANET AODV-DTN Communication 9
reduces the average delay of 78.71% compared to MANET AODV. However, the
energy consumption of MANET AODV-DTN increased by 0.16% compared to
MANET AODV.
3. The larger the buffer size, the higher the PDR value for MANET AODV-DTN
and MANET AODV. In the same conditions, MANET AODV-DTN can increase
the PDR of 0.72% compared to MANET AODV. The more messages the node
receives, the smaller average delay value, MANET AODV-DTN can reduce the
average delay by 71.6% compared to MANET AODV. However, the energy
consumption of MANETAODV-DTN Increased by 0.16% from MANET AODV.
4. From three scenarios designed, MANET AODV-DTN is more suitable for com-
munication for disaster areas because it has a good PDR value and reduces the
average delay value even though energy consumption is very limited.
References
1. Premkumar, R.: Wireless networks for disaster relief (2014)
2. Kishorbhai, V., Vasantbhai, N.: AON: a survey on emergency communication systems during a
catastrophic disaster (2014)
3. https://www.divaportal.org/smash/get/diva2:833565/FULLTEXT01.pdf
4. Awerbuch, D., Mishra, D.: Ad hoc On Demand Distance Vector (AODV) routing protocol.
Cs.jhu.edu (2017) [Online]. http://www.cs.jhu.edu/~cs647/aodv.pdf. Accessed 11 Nov 2017
Waktu 7:08
5. Performance analysis Aodv (Ad Hoc On Demand Distance Vector) and Dsr (Dynamic Source
Routing) protocol to active attack I Manet (Mobile Ad Hoc Network) in term of network Qos
(Quality Of Service). Eproc, 1(1). ISSN: 2355-9365.2014
6. Silaban, R.M., Cahyani, N.D., Suryan, V.: Analisis Perbandingan Performansi Ad Hoc On-
Demand Distance Vector (Aodv) Dan Zone Routing Protocol (Zrp) Pada Ad-Hoc Hybrid
Jaringan Wireless. Teknik Informatika, Fakultas Teknik Informatika, Universitas Telkom
7. Kharisma, B.: Pengenalan internet berbasis Delay Tolerant Network (DTN) [Blog] (2014)
Effectiveness of Whale Optimization
Based I+PD Controller for LFC
of Plug-in Electric Vehicle Included
Multi-area System
Utkarsh Raj and Ravi Shankar
Abstract This study deals with the load frequency control of multi-area, multi-
source system. A re-heat thermal generating unit, a gas unit and a plug-in electric
vehicle unit is considered in each area. Some physical constraints like Governor dead
band and generation rate constraint non-linearity are examined for the thermal unit.
Whale optimization algorithm optimized I+PD controller is employed for the load
frequency control of the proposed system. Load disturbance of 1% is considered for
studying the system dynamics. To show the superiority of the proposed scheme, its
performance is compared with the performance of the system under PIDN controller.
Also, the system is tested against variable load to check the robustness of the system.
Keywords AGC · EV · I+PD · LFC · PIDN · WOA
1 Introduction
Modern power systems are subdivided into various areas for control purpose which
are themselves interconnected by tie lines. These control areas share power with each
other according to the demand on the power system. Due to this, there is fluctuation
in the frequency from the nominal value. Also, since the power transfer between the
areas is done through the tie lines, hence there is an oscillation in the tie-line power
value from the scheduled nominal value. The major purpose of load frequency control
(LFC) is: (i) To maintain the area frequency fluctuations within the scheduled nom-
inal values, (ii) To keep tie-line power flow between the areas within the scheduled
nominal values [1].
For the better implementation of LFC, extensive research work has been done.
Various conventional controllers like Integral (I), proportional-integral (PI), and
U. Raj (B)
Motihari College of Engineering, Motihari, India
e-mail: utkarshraj18@gmail.com
R. Shankar
National Institute of Technology, Patna, India
e-mail: ravi@nitp.ac.in
© Springer Nature Singapore Pte Ltd. 2020
M. Pant et al. (eds.), Soft Computing: Theories and Applications,
Advances in Intelligent Systems and Computing 1154,
https://doi.org/10.1007/978-981-15-4032-5_2
11
12 U. Raj and R. Shankar
proportional-integral-derivative (PID) are employed for LFC [2, 3]. Though vari-
ous intelligent control techniques like fuzzy logic control, state feedback control,
artificial neural network, etc. Upalanchiwar and Sakhare [4], Pal et al. [5] have pro-
posed in recent times, but conventional controllers still remain popular due to their
practical utilities. To minimize the drawbacks of conventional controller I+PD is
been used for the LFC of the system.
To achieve the best performance from a conventional controller, its settings need
to be properly optimized [6]. Various optimization techniques have been proposed
in the literature. Genetic algorithm (GA) is being used for controller optimization
by Shankar et al. [7]. Other optimization techniques used in the literature are FOA
[8], DE [9], PSO [10], O-SFLA [11] and QOHS [12]. Whale optimization algorithm
(WOA) is a novel modern optimization technique from the family of population-
based evolutionary algorithms. It simulates the bubble-hunting strategy of humpback
whales.
Rest of the article has been subdivided into the following sections: Sect. 2 inves-
tigates the proposed system and Sect. 3 briefly discusses the WOA. Section 4 shows
the simulation results while Sect. 4 culminates the present research work.
2 System Modeling
2.1 Proposed System
The linearized model of the two-area, multi-source system is considered in this study.
A thermal generating unit and gas generating unit has been considered in each control
area. Physical constraints like G.D.B. and G.R.C. non-linearity are considered for
the thermal generating units. The value of GDB is taken as 0.05% and that of GRC
as 3% per minute. A linearized model of plug-in electric vehicle (PEV) has also been
considered in each area. The power demand between the grid and the load is balanced
using PEV, consisting of a battery charger. In this study, the discharging/charging
capacity of PEV is considered as ±5 kW. The transfer function system model of
the PEV is taken from Saha and Saikia [13]. The proposed system transfer function
model is presented in Fig. 1.
2.2 Proposed Controller
In spite of various drawbacks like slower response speed and poor noise rejec-
tion capability, conventional controllers still remain popular due to their practical
amenities. The proposed control scheme consists of a sum of integral controller and
proportional-derivative controller (I+PD). Based on practical experience, various
constraints have been applied to the controller parameters.
Effectiveness of Whale Optimization Based I+PD Controller … 13
EV
EV
Thermal Governor Reheat Turbine
Compressor
Discharge System
Fuel System
Gas Governor
Valve Position
Power System
Power System
Reheat Turbine
Thermal Governor
Compressor
Discharge System
Fuel System
Gas Governor
Valve Position
-
+
+
+
-
-
-
-
-
-
+
+
+
+
+
+
+
+
-
-
-
+
+
+
+
+
-
-
+
Dead Band
Dead Band
+
-
GRC
+
-
GRC
+
Controll
er
Controll
er
Fig. 1 Transfer function model of proposed power system
0 ≤ K pi , Kii , Kdi ≤ 1 (1)
where i = 1, 2. The block diagram model for the previously discussed proposed
controller is shown in Fig. 2.
ACE
Controller
Input
Ki 1/s
1/s
N
Kd
Kp
Controller
Output
Fig. 2 Block diagram model of the proposed controller
14 U. Raj and R. Shankar
3 Whale Optimization Algorithm
WOA, a new member of population-based evolutionary algorithm technique, has
been presented by Mirjalili et al. [14]. In WOA, the unique foraging behavior
of humpback whales called ‘bubble-net feeding’ is being reproduced. Humpback
whales use this strategy to hunt for their preys like krills or a school of fish [15]. This
strategy is formulated in the form of WOA optimization technique whose flowchart
is shown in Fig. 3.
Fig. 3 Flowchart of WOA
optimisation technique Start
Initialize of Parameters in
search space
Calculate Objective Function
Update Whale Position
Is Termination
Criteria Met?
Check Boundary
Condition
Stop
No
Yes
Effectiveness of Whale Optimization Based I+PD Controller … 15
4 Simulation Results
4.1 Comparison with PIDN Controller
The system proposed in this article has been simulated in the MATLAB® environ-
ment. A 1% constant load disturbance is applied to the system initially. The proposed
controllerparametersareoptimizedusingtheWOAtechnique.Toshowtheadvantage
of the proposed control technique, the system dynamics with the proposed control
scheme is compared with that of PIDN controller. The PIDN controller parameters
are also optimized using the WOA technique. The comparison of system dynamics
for both the control schemes is shown from Figs. 4, 5 and 6 and tabulated in Table 1.
Tables 2 and 3 give the optimized parameter values of proposed controller and PIDN
controller, respectively.
Fig. 4 Frequency
fluctuation profile in first
area
Fig. 5 Frequency
fluctuation profile in second
area
16 U. Raj and R. Shankar
Fig. 6 Fluctuation profile
for tie-line power flow
Table 1 Comparison of
performance between
presented controller and
PIDN
Proposed controller PIDN controller
f 1max −0.02172 −0.03215
f 2max −0.02769 −0.03054
Ptie,max −0.00397 −0.00819
Table 2 Optimized
parameters of proposed
controller
Parameter Optimized value
Kp1, Kp2 0.2706, 0.3162
Ki1, Ki2 0.2771, 0.3362
Kd1, Kd2 0.4378, 0.6671
N1, N2 18.9447, 10.8676
Table 3 Optimized
parameters of PIDN
controller
Parameter Optimized Value
Kp1, Kp2 0.0814, 0.7165
Ki1, Ki2 0.9414, 0.1790
Kd1, Kd2 0.8205, 0.9651
N1, N2 22.8673, 45.9474
4.2 Effectiveness of Proposed Control Scheme Under
Variable Load Disturbance
Effectiveness of control schemes are generally tested for constant step load per-
turbation in the literature. But in practical situations, load disturbances are rarely
constant. Hence the proposed control scheme has also been tested under variable
load disturbance condition. The graph of load disturbance versus time is shown in
Effectiveness of Whale Optimization Based I+PD Controller … 17
Fig. 7 Graph of load
disturbance versus time
Fig. 8 Frequency
fluctuation profile in first
area
Fig. 7. The WOA-optimized proposed controller is considered for the secondary LFC
of the proposed system. The dynamics of the presented system under the variable
load condition are shown from Figs. 8, 9 and 10. The WOA-optimized controller
parameter values are given in Table 4.
5 Conclusion
In the current research work, a binary-area multi-source system has been consid-
ered for LFC study. WOA-optimized I+PD controller has been used for frequency
stabilization study. The supremacy of proposed controller has been shown by con-
trasting it with WOA-based PIDN controller for the same proposed system. Further,
the efficacy of the presented control scheme has been shown under variable load
conditions.
18 U. Raj and R. Shankar
Fig. 9 Frequency
fluctuation profile in second
area
Fig. 10 Fluctuation profile
for tie-line power flow
Table 4 Optimized
parameters of proposed
controller
Parameter Optimized value
Kp1, Kp2 0.2847, 0.5972
Ki1, Ki2 0.2343, 0.5598
Kd1, Kd2 0.2459, 0.5312
N1, N2 27.2613, 23.2915
Appendix
Thermal generating unit: Kr = 0.3, Tt = 0.3 s, Rth = 2.4 Hz/pu, Tr = 10 s, Tg =
0.08 s, GRC = 0.0017pu/MW/s;
Gas generating unit: X = 0.6 s, Y = 1.0 s, TF = 0.23 s, b = 0.05 s, c = 1, TCR =
0.01 s, TCD = 0.2 s, RG = 2.4 Hz/pu MW, Rth = 2.4 Hz/pu;
Power system: Kps = 120 Hz/pu, Tps = 20 s;
EV: KEV = 1 and TEV = 1.
Effectiveness of Whale Optimization Based I+PD Controller … 19
References
1. Shiva, C.K., Mukherjee, V.: A novel quasi-oppositional harmony search algorithm for AGC
optimization of three-area multi-unit power system after deregulation. Eng. Sci. Technol. Int.
J. 19(1), 395–420 (2016)
2. Parmar, K.P.S., Majhi, S., Kothari, D.P.: Load frequency control of a realistic power system
with multi-source power generation. Int. J. Electr. Power Energy Syst. 42(1), 426–433 (2012)
3. Shankar, R., Pradhan, S.R., Chatterjee, K., Mandal, R.: A comprehensive state of the art lit-
erature survey on LFC mechanism for power system. Renew. Sustain. Energy Rev. 76(2015),
1185–1207 (2017)
4. Upalanchiwar, T., Sakhare, P.A.V.: Design and implementation of the fuzzy PID controller
using MATLAB/SIMULINK model. 3(3), 369–372 (2014)
5. Pal, A.K., Bera, P., Chakraborty, K.: AGC in Two-area deregulated power system using
reinforced learning neural network controller (2014)
6. Bhasin, H., Gupta, N.: Critical path problem for scheduling using genetic algorithm. Soft
Comput.: Theor. Appl. Adv. Intell. Syst. Comput. 15–24 (2018)
7. Shankar, R., Chatterjee, K., Bhushan, R.: Impact of energy storage system on load frequency
control for diverse sources of interconnected power system in deregulated power environment.
Int. J. Electr. Power Energy Syst. 79, 11–26 (2016)
8. Shankar, R., Kumar, A., Raj, U., Chatterjee, K.: Fruit fly algorithm-based automatic generation
control of multiarea interconnected power system with FACTS and AC/DC links in deregulated
power environment. Int. Trans. Electr. Energy Syst. e2690 (2018)
9. Mohanty, B., Panda, S., Hota, P.K.: Differential evolution algorithm based automatic generation
control for interconnected power systems with non-linearity. Alexandria Eng. J. 53(3), 537–552
(2014)
10. Mohanty, B., Hota, P.K.: A hybrid chemical reaction-particle swarm optimisation technique
for automatic generation control. J. Electr. Syst. Inf. Technol. 1–16 (2017)
11. Sharma, T.K., Pant, M.: Opposition-based learning embedded shuffled frog-leaping algorithm.
Soft Comput.: Theor. Appl. Adv. Intell. Syst. Comput. 853–861 (2018)
12. Mukherjee, V., Shiva, C.K.: Automatic generation control of multi-unit multi-area deregulated
power system using a novel quasi-oppositional harmony search algorithm. IET Gener. Transm.
Distrib. 9(15), 2398–2408 (2015)
13. Saha, A., Saikia, L.C.: Performance analysis of combination of ultra-capacitor and super-
conducting magnetic energy storage in a thermal-gas AGC system with utilization of whale
optimization algorithm optimized cascade controller. J. Renew. Sustain. Energy. 10(1) (2018)
14. Mirjalili, S., Lewis, A.: Advances in engineering software the whale optimization algorithm.
95, 51–67 (2016)
15. Guha, D., Kumar, P., Subrata, R.: Whale optimization algorithm applied to load frequency
control of a mixed power system considering nonlinearities and PLL dynamics. Energy Syst.
(0123456789) (2019)
Dual Band Printed Rectangular
Ring-Shaped Monopole Antenna
for Wireless Communication
Chandrakant Jatav and Sudhanshu Verma
Abstract In the present work, printed rectangular ring-shaped antenna with inverted
L-shaped strip for dual band wireless communication. Structure of antenna is simple
and the size is 34 × 18 mm2
. This modified inverted L-shape will give the required
bandwidth with good return loss. The simulated results show the dual band from (2.5–
3.2 GHz) and (5.09–5.83 GHz) with the center operating frequency at around 2.9 and
5.48 GHz having reflection coefficient less than −10 dB for wireless applications.
Keywords Trident shaped antenna · Rectangular ring · Slot antenna
1 Introduction
In the present year, improvement of communication system with wireless services
calls for much more frequency band which boosts wideband antenna design. More-
over, the antenna should only have to provide wideband but also it is necessary to have
small dimensions. The monopole antenna has the characteristics of low, lightweight,
low profile, and easy fabrication. Many structures of dual band or multiband antenna
[1–8] proposed to the application of WIMAX and WLAN. Number of structures
such as H-shaped, E-shaped, G-shaped, S-shaped, cover only WLAN band [1–3].
Antenna in [4–8] is designed and it satisfies the WLAN and WIMAX application,
these designs have drawbacks and these antennas have a relatively larger size. In this
letter, a newly rectangular ring-shaped patch antenna introduced for WLAN applica-
tion. And the proposed antenna size is smallest compared to mentioned above. With
introducing rectangular shaped and adding trident shaped inverted L-shaped and
defected ground obtained dual band for WLAN applications. The simulated results
of the proposed model are discussed in the present work.
C. Jatav (B) · S. Verma
Department of Electronics and Communication Engineering, Madan Mohan Malaviya University
of Technology, Gorakhpur, India
e-mail: chandrakantjatav@gmail.com
S. Verma
e-mail: svermaeced@gmail.com
© Springer Nature Singapore Pte Ltd. 2020
M. Pant et al. (eds.), Soft Computing: Theories and Applications,
Advances in Intelligent Systems and Computing 1154,
https://doi.org/10.1007/978-981-15-4032-5_3
21
22 C. Jatav and S. Verma
2 Antenna Design
The plan development system for making the proposed antenna is represented in
Fig. 2. This simulated on the 1.6 mm thickness of FR4 substrate has permittivity 4.4
and loss tangent is 0.02. The compact radiator is connected with 50  microstrip
which composed of a modified rectangular ring and signal stripe has width 3 mm.
This proposed model consists of defected ground and dielectric substrate of FR4
length L1 = 34 mm, width W1 = 18 mm. The antenna is designed on the simulation
tool ANSYS HFSS 16.2.
All dimensions introduce in Table 1. On the basis of dimensions antenna design
fabricated and measured. The design of the proposed antenna step by step is shown
in Fig. 1. Simple antenna structures antenna1, antenna2 and antenna3 are not given
the good result shown in comparing graph. By introducing an inverted L-shape on
the above trident shape gives better results at 5.48 resonating frequency Optimized
Table 1 Design parameters
of proposed antenna
Parameters Optimized value (mm)
L1 34
L2 13.4
L3 3
L4 17
L5 9
L6 4.4
L7 2
L8 1.2
L9 11.2
Ls 8.7
Ld 6.3
W1 18
W2 3
W3 4
W4 15.5
W5 1.4
W6 1.8
W7 1
W8 8.2
W9 1.15
H 1.6
a 1
Dual Band Printed Rectangular Ring-Shaped Monopole … 23
Fig. 1 Structure of design
antenna
proposed antenna produce dual band (2.57–3.21 GHz) and (5.09–5.83 GHz) appli-
cable for WIMAX and WLAN applications. Optimized dimensions for our proposed
model shown below in Table 1 and Fig. 2.
3 Result Discussion
Due to the given dimensions shown in Table 1, a rule for our proposed model antenna
was designed and tested. The antenna with the variation in its design is shown in Fig. 1
and the comparison in the outcomes of these designs in terms of refection coefficient
are presented in Fig. 3. Simulated results show the required bandwidth with good
|S11| of the proposed antenna. Notching at the trident shape and fit two inverted
L-shape on the trident shape with the proper selection of the dimensions resonant
peak of the proposed antenna4 achieved at 5.48 GHz lower cutoff frequency (f L) is
5.07 GHz and upper cutoff frequency (f H) is 5.80 GHz, so calculated bandwidth by
a formula with the center operating frequency (f C). The counterfeit and measured
return losses against frequency seen in Figs. 4 and 5.
The surface current density of the proposed model is shown in Fig. 6a, b at
2.9 GHz frequency and 5.80 GHz frequency. The current density is high on the
middle radiating element so it observed that the middle radiating element is the
most active part of the proposed antenna4. The current density is shown in Fig. 3
24 C. Jatav and S. Verma
(a) Antenna1 (b) Antenna2
(c) Antenna3 (d) Antenna4
Fig. 2 The proposed antenna design with different shape
at the lower and higher band on the rectangular ring and strip under it that means
rectangular ring and strip is very important role generation of two resonant modes
lower and higher band.
In dual band operation mechanism, the trident with L-inverted shape monopole
antenna is a counterfeit surface at resonant frequency of 2.9 and 5.48 GHz, shown
in Fig. 6. Figure 5 shows the gain of dual band modified inverted L-shape antenna is
about 4.8 dB.
Proposed antenna4 provided omnidirectional characteristics in Fig. 7, which is
shown that simulated radiation patterns at resonant frequencies 2.9 and 5.48 GHz.
4 Conclusion
A dual band rectangular ring-shaped monopole antenna with an inverted L-shape
and truncate rectangular slot on the ground plane, have been design successfully to
Dual Band Printed Rectangular Ring-Shaped Monopole … 25
Fig. 3 a Current density of proposed antenna at 2.9 GHz. b Current density of proposed antenna
at 5.4 GHz
Fig. 4 Comparison results |S11| of different antennas
obtained WLAN and WIMAX applications. Simulated results show that enhance-
ment of bandwidth and gains with introducing inverted L-shapes with trident shape
on the patch. The percentage bandwidth of dual band is achieved 24.56 and 13.55%
with peak gain 4.8 dB. With the suitable radiation pattern and good gain of the
simulated dual band antenna are used for WLAN and WIMAX application.
26 C. Jatav and S. Verma
Fig. 5 |S11| result of proposed antenna
Fig. 6 Gain of proposed
antenna
Dual Band Printed Rectangular Ring-Shaped Monopole … 27
Fig. 7 Radiation pattern at 2.9 GHz (a) E-field  (b) H-field and Radiation pattern at 5.48 GHz
(a) E-field  (b) H-field
References
1. Keno, Y.L., Wang, K.L.: Printed double-T monopole antenna for 2.4/5.2 GHz dual-band WLAN
operations. IEEE Trans. Antennas Propagate 51(9), 2187–2192 (2013)
2. Yon, J.H.: Fabrication and measurement of rectangular ring with open-ended CPW-fed monopole
antenna for 2.4/5.2 GHz WLAN operations. Microw. Opt. Technol. Lett. 48(8), 1480–1483
(2016)
3. Guy, J.-H., Zhen, S.-S., Xue, L.-L., Sun, Z.: Dual-band monopole antenna with L-shaped strips
for 2.4/5 GHz WLAN applications. Microw. Opt. Technol. Lett. 50(11), 2830–2833 (2008)
4. Koon, T.W., Kim, D., Rye, J.I., Kim, G.C., Yolk, J.-G.: A coupled dual-U-shaped monopole
antenna for WiMAX dual-band operation. Microw. Opt. Technol. Lett. 53(4), 745–748 (2011)
5. Lau, H.W., Kou, C.H., Yang, C.F.: Novel CPW-fed planar monopole antenna for W
IMAX/WLAN application. IEEE Antenna Wirel. Propagate. Lett. 9, 240–243 (2010)
6. Chu, Q.X., Yom, LuH: Design of compact dual-wideband antenna with assembled monopoles.
IEEE Trans. Antennas Propagate 58(12), 4063–4066 (2010)
28 C. Jatav and S. Verma
7. Chon, H.D., Chen, H.T.: A CPW-fed dual-frequency monopole antenna. IEEE Trans. Antennas
Propagate 52(4), 978–982 (2014)
8. Fun, S.T., Yin, Y.Z., Hue, W., Song, K., Li, B.: CPW-fed printed monopole antenna with an
n-shaped slot for dual-band operations. Microw. Opt. Technol. Lett. 54(1), 240–242 (2012)
Printed U-Shaped Monopole Dual Band
Antenna for Wireless Application
Vikash Chandra Sharma and Sudhanshu Verma
Abstract In this paper, coplanar wave guide (CPW) fed printed U-shaped monopole
dual band antenna is introduced. U-shaped monopole antenna presented CPW fed
with symmetrical circular and triangular slot on ground plane which is applicable
for wide band and wireless application. The simulated result shows that the design
of U-shaped symmetrical circular and triangular slot antenna covers with wide band
application from 3.76–4.56 to 6.16–9.15 GHz with resonating frequency 4.42 and
8.04 GHz. The second band of the antenna offers the 39.05% bandwidth with less than
−10 dB reflection coefficient which is applicable for UWB and wireless application.
The overall dimension of the ground plane is 80 × 101 × 1.5 mm3
with substrate
material having dielectric constant 2.2 along with loss tangent 0.002 is used. The
results of the proposed antenna with inverted L-strip along with radiation patterns,
reflection coefficient |S11| in dB and surface current density of antenna is presented
and discussed. The distinctive of the proposed antenna has been investigated using
software HFSS.
Keywords Slot antenna · Printed antenna · Wide band antenna
1 Introduction
Due to the need for wireless applications, high gain antenna is required on large
scale. Here this antenna introduces U-shaped slot comprise with broad main slot.
In the last decade mobile and wireless communication system has increased dra-
matically [1]. This cellular network has required a high data rate. The criteria for
(ITMA) international mobile telecommunication, 4G wireless communication sys-
tems are designed [2]. In the wireless communication system, the data rate is up
V. C. Sharma (B) · S. Verma
Department of Electronics and Communication Engineering, Madan Mohan Malaviya University
of Technology, Gorakhpur, India
e-mail: vikashchandrasharma94@gmail.com
S. Verma
e-mail: svermaeced@gmail.com
© Springer Nature Singapore Pte Ltd. 2020
M. Pant et al. (eds.), Soft Computing: Theories and Applications,
Advances in Intelligent Systems and Computing 1154,
https://doi.org/10.1007/978-981-15-4032-5_4
29
30 V. C. Sharma and S. Verma
to (1 GB/S) for less mobility and even up to (100 Mb/S) for high mobility for
mobile access. In the sequence of solving the problem and satisfaction, high data
rate requirement wireless system 5G will develop immediately [3]. In the field of
engineering Manufacturing, 5G offers a high quality of services such as electronic
transactions, transportation industry, etc. In 5G wireless communication network has
been future used by millimeter-wave frequencies. The frequency range of millimeter-
wave ranges from 30 to 300 GHz in the electromagnetic spectrum [4]. Ultra-wide
bandwidth (UWB) systems have got a large number of engrossment repayable to
less power feeding and high data rate ability. In the view, this phenomenon the UWB
antennas is the main part and important part of these systems, which promotes and
indicated the frequency band by ‘Federal Communication Commission’ (FCC), i.e.
3.1–10.6 GHz have received attention by researchers. Present time the role of copla-
nar waveguide (CPW) is very important for wireless communication. These days
CPW transmission line is used at high level as a feeding network and slot antenna
[4]. Coplanar wave guide CPW has a lot of useful design advantages which is like
a less dispersion, low radiation leakage, small characteristic impedance on substrate
height and uni-planar configuration [4, 5]. Now in Advanced ‘modern wireless sys-
tems’ it offers many types of radiofrequency technology such as WiFi, WiMAX
and basically Zigbee, 3G, and LTE comes in this category. Last few years ago, in
the research field, it has been performed to make many types of design and goals.
Many types of ‘wideband low-profile antennas’ have been constructed by utilizing
a slot antenna [6, 7] a ‘loop antenna’ [10] and a ‘spiral antenna’ [11, 12]. In the
literature, a lot of ‘slot antenna’ element is capable of CPW coplanar wave guide
configuration. In the field of research, the main motive of researchers has been to
work on the enhancement of bandwidth of microstrip antenna [6–9]. In this paper,
the parasitic [11, 12] technique is used for bandwidth enhancement. According to
the view, thickness of substrate is increased. When the thickness is increased about
0.05λ0, the inductance of fed is decreased by 50  impedance matching.
2 Antenna Design
For achieving the wide band, here, U-shaped is introduced with two symmetrical
triangular and circular slots of radius R1 and R2 which is shown in Fig. 2. According
to base paper, along with circular slot, an inverted L-strip is introduced which is
shown in Fig. 2. U-shaped and symmetric circular and triangular slots are removed
from the overall ground plane dimension. For comparison of antenna design, first of
all, symmetrical triangular slot is introduced which is shown in Fig. 1a. After that, in
the design of antenna2 symmetrical circular slot is introduced which is lower side of
U-shaped which is shown in Fig. 1b. In the design of antenna3, both slot triangular
and circular slot are introduced together which is shown in Fig. 1c and finally the
fourth design of the antenna is introduced, U-shaped inverted L-strip triangular and
circular slot which is shown in Fig. 1d because of poor |S11| result of antenna1,
antenna2, antenna3 which is present in Fig. 3.
Printed U-Shaped Monopole Dual Band Antenna … 31
(a) Antenna1 (b) Antenna2
(c) Antenna3 (d) Antenna4
Fig. 1 The proposed antenna design with different shapes
Among these antennas, the good |S11| in dB result and effective bandwidth is
achieved by symmetric triangular and circular slot with an inverted L-strip which
is applicable for ultra wideband and wireless application. The design model of the
antenna is present in Fig. 2 with all dimensions. Design parameters of the proposed
antenna and their values are shown in Table 1.
The area of the ground plane is L × W × H mm3
with substrate material having
a dielectric constant which is 2.2 and loss tangent is 0.002 is used which is corre-
sponding to the ground plane. The fed line is connected with coplanar wave guide
CPW which is excites to the ground plan.
3 Result Discussion
The variation in different shapes of proposed antennas is shown in Fig. 1 and the
comparison of these designs in the term of reflection coefficient are shown in Fig. 3.
Triangular and Circular slot loaded U-shaped inverted L-strip Printed Microstrip
‘patch antenna’ are present in Fig. 2 and the simulated result of these designs in the
term of reflection coefficient |S11| are present in Fig. 5. The radius comparison of
32 V. C. Sharma and S. Verma
Fig. 2 Structure of design antenna
Table 1 Design parameters
of proposed antenna
Parameters Optimized value (mm)
L 80
L1 32
W 101
W1 8
a 28
b 14
c 2
d 11.75
E 34.5
R1 14
R2 14
f 2.4
f 1 0.5
h 15
H 1.5
Printed U-Shaped Monopole Dual Band Antenna … 33
Fig. 3 Comparison results
|S11| of different antennas
symmetrical circle of this design in the term of reflection coefficient is presented in
Fig. 4. Among these comparisons, the good |S11| result achieved by symmetrical
circle radius at 14 mm is applicable for wireless applications.
The proposed antenna gives dual band. The first band range of this antenna 3.76–
4.56 GHz with resonating frequency 4.42 GHz which is applicable for WiMAX
application and second band range covers from 6.16–9.15 GHz with resonating
frequency 8.04 GHz. The total bandwidth is achieved 39.05% which is less than
−10 dB reflection coefficient with good return loss −31.51 GHz at centre frequency
6.14 GHz. The current distribution of proposed antenna is achieved at 4.42 GHz
frequency and 8.04 GHz frequency which is shown below in Fig. 6.
Fig. 4 Comparison results
|S11| of different radius
34 V. C. Sharma and S. Verma
Fig. 5 |S11| result of
proposed antenna
Fig. 6 a Current density of proposed antenna at 4.42 GHz. b Current density of proposed antenna
at 8.04 GHz
Other documents randomly have
different content
Bewußtseinskraft so wenig durch alle Wege und Wandlungen
verfolgen, als die lebendige Körperkraft.
Sorgst du aber, das menschliche Bewußtsein werde, weil aus dem
Allgemeinbewußtsein herausgeboren, auch wieder in ihm verfließen,
so sieh den Baum an. Es hat lange Jahre gedauert, ehe die Zweige
aus dem Stamme kamen; einmal gekommen, gehen sie nicht wieder
in ihm unter. Wie wollte der Baum wachsen und sich entwickeln,
wenn es geschähe; auch der Lebensbaum der Welt aber will
wachsen und sich entwickeln.
Nach allem ist das die große Kunst des Schlusses vom Diesseits
auf das Jenseits, nicht von Gründen, die wir nicht kennen, noch von
Voraussetzungen, die wir machen, sondern von Tatsachen, die wir
kennen, auf die größern und höhern Tatsachen des Jenseits zu
schließen, und dadurch den praktisch geforderten, an höheren
Gesichtspunkten hängenden Glauben von untenher zu festigen, zu
stützen und mit dem Leben in lebendigen Bezug zu setzen. Ja,
brauchten wir den Glauben nicht, wozu ihn stützen; doch wie ihn
brauchen, hätte er keine Stütze.
Zehntes Kapitel
Des Menschen Seele ist durch seinen ganzen Leib ergossen,
alsbald zerfällt er, wenn sie von ihm weicht; doch ihr
Bewußtseinslicht ist bald hier bald da.[9] Nur eben sahen wirs im
engen Leibe hin und wider wandern, wechselnd dem Aug, dem Ohr,
dem innern und dem äußern Sinn zu leuchten, um endlich im Tode
ganz darüber hinaus zu wandern, wie der, dessen kleines Haus
zerstört wird, worin er lange hin und her gegangen, auf immer in die
Weite zieht und eine neue Wanderung beginnt. Der Tod setzt keine
andere Scheide zwischen beiden Leben, als daß er den engen
Schauplatz der Wanderung mit dem weiteren vertauschen läßt. Und
so wenig in dem jetzigen Leben das Bewußtseinslicht immer und
überall zugleich ist, wo es nacheinander sein und wohin es sich
zerstreuen kann, wird es im künftigen Leben sein. Der Schauplatz
der Wanderung ist nur unsäglich größer, die mögliche Verbreitung
weiter, die Wege freier und die Aussichtspunkte höher, alle niederen
des Diesseits unter sich begreifend.
Selbst schon im jetzigen Leben aber sehen wir ausnahmsweise, in
seltenen Fällen, das Bewußtseinslicht aus dem engeren Leibe in den
weiteren wandern und wieder heimkehren, Nachricht bringend von
dem, was in fernem Raume oder, in dessen weiten
Zusammenhängen wurzelnd, in ferner Zeit geschieht; denn die
Länge der Zukunft fußt auf der Breite der Gegenwart. Plötzlich öffnet
sich eine Spalte in der sonst immer verschlossenen Tür zwischen
Diesseits und Jenseits, um schnell sich wieder zu schließen, der Tür,
die im Tode sich ganz öffnen wird, und erst da sich öffnen soll, um
nie mehr sich zu schließen. Auch frommts nicht, vorher durch die
Spalte nur zu schauen. Doch die Ausnahme von der diesseitigen
Lebensregel ist nur ein Fall der größeren Lebensregel, welche
Diesseits und Jenseits zugleich umfaßt.
Es kommt vor, daß der engere Leib nach einer Seite tief genug
einschläft, um nach anderer über seine Grenzen hinaus in
ungewohnter Weise zu erwachen, und doch nicht so ganz und tief,
um nie mehr zu erwachen. Oder im weiteren Leibe wird ein Punkt so
ungewöhnlich stark erregt, um in den engeren hinein eine die
Schwelle übersteigende Wirkung aus einer sonst unzugänglichen
Ferne zu erstrecken. Damit beginnen die Wunder des Hellgesichts,
der Ahnungen, der vorbedeutenden Träume; lauter Fabeln, wenn der
jenseitige Leib und das jenseitige Leben Fabeln sind; sonst Zeichen
des einen und Vorzeichen des andern; was aber Zeichen hat, ist da,
und was Vorzeichen hat, wird kommen.
Doch sind es keine Zeichen diesseitigen gesunden Lebens. Das
Diesseits hat den Leib des Jenseits nur für das Jenseits zu bauen,
nicht schon mit dessen Auge und Ohr zu sehen und zu hören. Die
Blüte gedeiht nicht, die man vor der Zeit aufbricht. Und ob man den
Glauben an das Jenseits durch den Glauben an diese Spuren seines
Hineinleuchtens in das Diesseits u n t e r s t ü t z e n kann, so soll man
ihn doch nicht darauf b a u e n Der gesunde Glaube baut sich auf
Gründen und schließt sich ab in höchsten Gesichtspunkten des
gesunden Lebens, indem er selbst zu seiner Gesundheit und zum
Abschluß seiner höchsten Gesichtspunkte gehört.
Du hattest seither gemeint, die leichte Gestalt, in der ein
Verstorbener dir in der Erinnerung erscheint, sei bloß dein innerer
Schein. Du irrst; er selbst leibhaftig ists, der in bewußtem Gange
damit nicht bloß zu dir, sondern in dich eintritt. Die frühere Gestalt
ist noch sein Seelenkleid; nur nicht mehr beschwert mit seinem
frühern festen Leibe und träge mit ihm wandelnd, sondern
durchsichtig, leicht, der irdischen Last entkleidet, im Momente jetzt
hier jetzt da, dem Rufe jedes folgend, der den Toten ruft oder von
selber sich dir stellend, dann mußt du des Toten denken. Auch hat
man sich ja immer die jenseitige Erscheinung der Seelen so leicht, so
körperlos, so unabhängig von des Raumes Schranken gedacht, und
damit, das Rechte zwar nicht meinend, das Rechte doch getroffen.
Auch hörtest du wohl von Geistererscheinungen sprechen. Den
Ärzten heißen sie Phantasmen, Halluzinationen. Sie sind es auch für
die Lebenden, doch zugleich wirkliche Erscheinungen der Toten, die
wir so nennen. Denn wenn schon die schwächern
Erinnerungsgestalten in uns es sind, wie sollten es die soviel
stärkeren entsprechenden Erscheinungen nicht sein. Warum also
noch streiten, ob sie das eine oder andere sind, wenn sie zugleich
das eine und das andere sind. Und warum dich künftig noch vor
Geistererscheinungen fürchten, wenn du dich vor den
Erinnerungsgestalten in dir, die es schon sind, nicht fürchtest.
Doch ganz fehlt nicht der Grund dazu. Ungleich den von dir selbst
gerufenen, oder in den Zusammenhang deines innern Lebens von
selbst leise und friedlich eintretenden, hilfreich daran mit
fortspinnenden Gestalten kommen sie ungerufen, überkommen dich
mit nicht abwehrbarer Stärke, scheinbar vor dich, wirklich in dich
tretend, am Gewebe deines innern Lebens vielmehr zausend als
fortspinnend. Ein krankhaft Wesen zugleich des Diesseits und des
Jenseits. So sollen Tote mit Lebenden nicht verkehren. Es ist schon
halber Tod des Lebenden, die Toten annähernd so deutlich, so
objektiv zu schauen, wie sie sich untereinander schauen mögen;
darum das Grausen der Lebendigen vor solcher Erscheinung der
Toten; es ist zugleich ein halbes Zurückversinken der Toten aus dem
Reiche über dem Tode in das Reich unter dem Tode; daher die Sage
—und ob nicht mehr als Sage? —daß nur Geister umgehen, die nicht
ganz erlöst sind, die noch mit einer schweren Kette an dem Diesseits
hängen. Den Unseligen zu scheuchen, ruf' einen besseren und
stärkeren Geist zu Hilfe; der beste und stärkste aber ist der Geist ob
allen Geistern. Wer hat in seinem Schutz dir etwas an! Auch dazu
stimmt die Sage, daß vor dem Anruf Gottes jeder böse Geist weicht.
Inzwischen droht in diesem Gebiete geistiger Krankheit, der
Glaube selbst zum Aberglauben zu erkranken. Am einfachsten, sich
vor dem Kommen von Gespenstern zu bewahren, bleibts immer, an
ihr Kommen nicht zu glauben; denn glauben, daß sie kommen, heißt
schon, ihnen auf halbem Wege entgegenkommen.
Wie sie einander selbst erscheinen mögen, sagt ich. Denn dieselbe
Erscheinung, die wider die Ordnung des Diesseits ist, ist nur
vorweggenommen aus der Ordnung des Jenseits. Licht, voll, klar
und objektiv werden die Bewohner des Jenseits einander in der
Gestalt erscheinen, wovon wir nur einen schwachen Abklang, eine
dämmernde Umrißzeichnung in der Erinnerung an sie haben, weil sie
einander mit dem ganzen vollen Wesen durchdringen, wovon nur ein
kleiner Teil in jeden von uns bei der Erinnerung an sie eindringt. Nur
daß es jenseits wie diesseits der auf die Erscheinung gerichteten
Aufmerksamkeit bedürfen wird, um sie zu haben.
Nun mag man immer fragen: wie ist es möglich, daß, die sich so
durchdringen, sich doch so gegenständlich und begrenzt erscheinen.
Aber frage erst, wie ist es möglich, daß, was als Erscheinung eines
Lebenden in dich eingeht und in der Erinnerung an einen Toten dein
Gehirn durchdringt — und anders nichts liegt deiner Seele vor,
darauf zu fußen —, dir als Anschauung doch objektiv, als Erinnerung
noch begrenzt erscheint. Die selbst nicht mehr begrenzte Wirkung,
die der Erinnerung unterliegt, spiegelt dir doch noch die Begrenzung
der Gestalt, wovon sie anfangs ausgegangen, vor. Du weißt vom
Diesseits nicht, warum; wie kannst du es vom Jenseits wissen
wollen.
Und so sage ich wieder: schließe nicht von Gründen des Diesseits,
die du nicht kennst, noch von Voraussetzungen, die du machst,
sondern von Tatsachen des Diesseits, die du kennst, auf die
größeren und höheren Tatsachen des Jenseits. Der einzelne Schluß
kann irren; auch der, den wir nur eben machten; also hefte dich an
keine Einzelheit der Zusammenschluß der Schlüsse in Richtung
dessen, was wir vor allem Schluß und über allem Schluß zu fordern
haben, wird unsers Glaubens beste Stütze von unten und Führung
nach oben sein.
Faßtest du aber den Glauben gleich recht von oben, leicht fiele dir
der ganze Glaubensweg herunter, den wir herauf genommen.
Elftes Kapitel
Ja wie leicht wäre alles für den Glauben, könnte der Mensch sich
nur gewöhnen, in dem Wort, womit er seit mehr als tausend Jahren
spielt, daß er in Gott lebt und webt und ist, mehr als ein Wort zu
sehen. Dann ist der Glaube an Gottes und sein eigenes ewiges
Leben nur e i n e r er sieht sein eigenes ewiges Leben zum ewigen
Leben Gottes selbst gehörig, und in der Höhe seines künftigen über
seinen jetzigen Leben nur einen höhern Aufbau über einem niedern
in Gott, wie er selbst schon solchen in sich hat; er faßt am kleinen
Beispiel das Höhere und im Zusammenhange beider das Ganze,
wovon er nur der Teil.
Die Anschauung in dir zerrinnt, und die Erinnerung steigt daraus in
dir auf; dein ganzes diesseitiges Anschauungsleben in Gott zerrinnt,
und ein höheres Erinnerungsleben steigt daraus in Gott auf; und wie
die Erinnerungen in deinem Haupte, verkehren die Geister des
Jenseits im göttlichen Haupte. Nur eine Stufe über der Stufe
derselben Treppe, die nicht zu Gott, sondern in Gott aufwärts führt,
der in sich zugleich den Grund und Gipfel hat. Wie leer war Gott mit
jenem leer gedachten Worte, wie reich ist Gott mit seinem vollen
Sinne.
Weißt du denn, wie das Jenseits der Anschauungen in deinem
Geiste möglich ist? Du weißt nur, daß es wirklich ist; doch nur in
einem Geiste ist es möglich. Also kannst du auch leicht, unwissend
wie es möglich ist, an die Wirklichkeit eines Jenseits deines ganzen
Geistes in einem höhern Geiste glauben; du mußt nur glauben, daß
ein höherer Geist ist und daß du in ihm bist.
Und wieder: wie leicht wäre alles für den Glauben, wenn der
Mensch sich gewöhnen könnte, eine Wahrheit in dem zweiten Worte
zu sehen, daß Gott in allem lebt und webt und ist. Dann ist es nicht
eine tote, sondern eine durch Gott lebendige Welt, aus welcher der
Mensch sich seinen künftigen Leib erbaut und damit ein neues Haus
in Gottes Haus hineinbaut.
Wenn aber wird dieser lebendig machende Glaube lebendig
werden?
Daß er lebendig macht, wird ihn lebendig machen.
Zwölftes Kapitel
Du fragest nach dem Ob; ich antwortete mit dem Wie. Der
Glaube erspart die Frage des Ob; doch wird sie getan, so gibt es nur
die eine Antwort darauf durch das Wie; und solange das Wie nicht
fest steht, wird das Ob nicht aufhören zu gehen und zu kommen.
Hier steht der Baum; manch einzeln Blatt davon mag fallen; doch
sein Grund und sein Zusammenhang ist fest und gut. Er wird immer
neue Zweige treiben, und immer neue Blätter werden fallen; er
selbst wird nicht mehr fallen; wird Blüten der Schönheit treiben, und
statt im Glauben zu wurzeln, Früchte des Glaubens tragen.
Nachschrift
Die erste Anregung zu der in dieser Schrift ausgeführten Idee,
daß die Geister der Gestorbenen als Individuen in den Lebenden
fortexistieren, ward mir durch eine Unterredung mit meinem, damals
in Leipzig, jetzt in Halle lebenden Freunde, Professor Billroth. Indem
diese Idee in eine Reihe verwandter Vorstellungen bei mir teils
eingriff, teils solche erweckte, hat sich dieselbe auf vorstehende
Weise gestaltet und durch eine Art notwendigen Fortschritts zur Idee
eines höhern Lebens der Geister in Gott erweitert. Inzwischen hat
der Urheber derselben, wie in der Religionsphilosophie überhaupt, so
namentlich in der Unsterblichkeitslehre, eine von der hier verfolgten
ganz verschiedene und sich direkter an das kirchliche Dogma
anschließende Richtung genommen, welche ihn sogar von jener
Grundidee großenteils oder ganz wieder abgeführt hat, daher ich,
indem ich ihn als Schöpfer derselben glaubte bezeichnen zu müssen,
doch nicht mehr als ihren Vertreter zu nennen wage. Die eigenen
Ansichten dieses Philosophen über den betreffenden Gegenstand
wird man in einem, demnächst von demselben zu erwartenden,
Werke entwickelt finden.
Druck der Spamerschen Buchdruckerei in Leipzig
FUSSNOTEN
[1] Dem Physiologen läßt sich bezeichnender sagen: das
schaffende Prinzip des Kindes liegt vor der Geburt nicht in dem,
was nach der Geburt von ihm fortleben wird, was ja jetzt erst das
Abhängige ist, das Geschaffene, sondern in dem, was vom Kinde
bei der Geburt in Rückstand bleiben und verderben wird, wie der
Leib des Menschen im Tode (placenta cum funiculo umbilicali,
velamentis ovi eorumque liquoribus); aus seiner Tätigkeit, als
seine Fortsetzung wächst der junge Mensch hervor.
[2] Viele biblische Parallelstellen hierzu sind zusammengestellt in
„Zendavesta“ III, S. 363 ff. und den „Drei Motiven und Gründen
des Glaubens“, S. 178.
[3] Mag man das Nervenspiel auf chemische oder elektrische
Prozesse zurückführen, immer wird man, wenn nicht selbst ein
Spiel von Schwingungen letzter Teilchen darin zu sehen, doch
solches wesentlich dadurch erweckt oder davon mitgeführt zu
halten haben, wobei das Unwägbare eine wichtigere Rolle als das
Wägbare spielen mag. Schwingungen aber können nur scheinbar
erlöschen, indem sie sich in die Umgebung ausbreiten, oder, wenn
ja durch Übergang ihrer lebendigen Kraft in sogenannte
Spannkraft zeitweise erlöschend, doch nach dem Gesetze der
Erhaltung der Kraft einer Wiederbelebung in irgendwelcher Form
harren.
[4] Schon bei Annäherungen an den Tod im Diesseits (durch
Narkose, oder im Moment des eben drohenden Ertrinkens, oder
im Schlafwachen) kommen Annäherungen an diese den geistigen
Inhalt auf einmal durchleuchtende Klarheit vor, wovon Beispiel in
„Zendavesta“ III, S. 27 und (Fälle bei drohendem Ertrinken) in
Fechners Zentralbl. für Naturwiss. u. Anthropologie 1853, S. 43 u.
623 verzeichnet sind.
[5] Dies erfahrungsmäßige Gesetz der Beziehung zwischen Leib
und Seele besteht darin, daß das Bewußtsein überall erlischt,
wenn die leibliche Tätigkeit, woran es hängt, unter einen
gewissen Grad der Stärke, den man die Schwelle nennt, sinkt.
Nach Maßgabe nun, als sie sich mehr ausbreitet, kann sie auch
leichter durch die damit eintretende Schwächung darunter sinken.
Wie das ganze Bewußtsein seine Schwelle hat, welche die Scheide
zwischen Schlaf und Wachen des ganzen Menschen bildet, so
auch alles Besondere im Bewußtsein, worauf es beruht, daß
während des Wachens bald dies bald das im Bewußtsein
auftaucht oder erlischt, je nachdem die besondere Tätigkeit,
woran es hängt, die Sonderschwelle übersteigt oder darunter
sinkt. Vergl. Elemente der Psychophysik Kap. 10. 38. 39 und 42.
[6] Vergl. hierüber Elemente der Psychophysik, Kap. 37, und
Atomenlehre Kap. 26.
[7] Um nicht einen scheinbaren Widerspruch der obigen
Betrachtung mit der psychophysischen Lehre von der
Mischungsschwelle (worüber das Erläuterndste in Wundts Philos.
Stud. IV, S. 204 und 211) bestehen zu lassen, folgende
Bemerkung: wenn die aus Komponenten mannigfachster Art
zusammengesetzte psychophysische Lebenswelle des Menschen,
um diesen kurzen Ausdruck fortzubrauchen, sich in eine Welt
hineinverbreitete, die nur andersartige Komponenten enthielte, so
würde freilich anzunehmen sein, daß sie durch ihre Ausbreitung
unter die, hier in Betracht kommende, Mischungsschwelle fiele.
Da aber das psychophysische Wellenmeer der Welt unter seinen
übrigen Komponenten auch solche enthält, welche mit denen der
Lebenswelle des Menschen gleichartig sind, und zwar von
verschiedenster Höhe oder Intensität, also auch solche, welche
die Mischungsschwelle schon übersteigen oder derselben nahe
sind, und durch die zutretenden gleichartigen nur um so mehr
gesteigert werden, so stellt sich das Resultat der obigen
Betrachtung nur auf etwas gründlicherem Wege wieder her.
[8] Unstreitig hängt dies, dem sog. Gesetz der Erhaltung der Kraft
im Körpergebiete analoge, Gesetz auch mit demselben durch die
Grundbeziehung des Geistigen zum Körperlichen irgendwie
zusammen, ohne daß dieser Zusammenhang schon klargestellt
ist, oder das Gesetz der Erhaltung der Bewußtseinskraft schon
psychophysisch aus dem Gesetz der Erhaltung der Körperkraft
ableitbar wäre, solange das Grundwesen der psychophysischen
Tätigkeit selbst nicht klargestellt ist. Das Gesetz muß also für sich
aus Tatsachen, wie sie oben folgen, gefolgert werden; und
gewinnt, ohne e x a k t in voller Allgemeinheit bewiesen zu sein,
doch eine Wahrscheinlichkeit dadurch, die es geeignet macht,
Aperçus, wie die, um die es sich hier handelt, zugrunde gelegt zu
werden.
[9] Mit wissenschaftlichem Ausdrucke wird man sagen können:
das Bewußtsein ist überall da und wach, wenn und wo die der
geistigen unterliegende leibliche, sogenannte psychophysische
Tätigkeit jenen Grad der Stärke, den man die Schwelle nennt,
übersteigt. (Vgl. S. 44 Anmerk.) Hiernach kann das Bewußtsein in
Zeit und Raum lokalisiert werden. Der Gipfel der Welle unserer
psychophysischen Tätigkeit schwankt gleichsam von einem Orte
zum anderen, womit das Bewußtseinslicht seine Stelle wechselt,
nur daß er während des diesseitigen Lebens immer bloß innerhalb
unseres Leibes, ja eines beschränkten Teils dieses Leibes, hin und
wider schwankt und im Schlafe ganz unter die Schwelle sinkt,
über die er im Wachen wieder aufsteigt. Hierüber vgl. Elemente
der Psychophysik II, Kap. 40 und 41.
*** END OF THE PROJECT GUTENBERG EBOOK DAS BÜCHLEIN
VOM LEBEN NACH DEM TODE ***
Updated editions will replace the previous one—the old editions will
be renamed.
Creating the works from print editions not protected by U.S.
copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying
copyright royalties. Special rules, set forth in the General Terms of
Use part of this license, apply to copying and distributing Project
Gutenberg™ electronic works to protect the PROJECT GUTENBERG™
concept and trademark. Project Gutenberg is a registered trademark,
and may not be used if you charge for an eBook, except by following
the terms of the trademark license, including paying royalties for use
of the Project Gutenberg trademark. If you do not charge anything
for copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.
START: FULL LICENSE
THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK
To protect the Project Gutenberg™ mission of promoting the free
distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.
Section 1. General Terms of Use and
Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund
from the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.
1.B. “Project Gutenberg” is a registered trademark. It may only be
used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law
in the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name associated
with the work. You can easily comply with the terms of this
agreement by keeping this work in the same format with its attached
full Project Gutenberg™ License when you share it without charge
with others.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
1.E. Unless you have removed all references to Project Gutenberg:
1.E.1. The following sentence, with active links to, or other
immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears,
or with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.
1.E.2. If an individual Project Gutenberg™ electronic work is derived
from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.
1.E.3. If an individual Project Gutenberg™ electronic work is posted
with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning
of this work.
1.E.4. Do not unlink or detach or remove the full Project
Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute this
electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or providing
access to or distributing Project Gutenberg™ electronic works
provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™
electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for
the “Right of Replacement or Refund” described in paragraph 1.F.3,
the Project Gutenberg Literary Archive Foundation, the owner of the
Project Gutenberg™ trademark, and any other party distributing a
Project Gutenberg™ electronic work under this agreement, disclaim
all liability to you for damages, costs and expenses, including legal
fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR
NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR
BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK
OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL
NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF
YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of receiving
it, you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or
entity that provided you with the defective work may elect to provide
a replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,
the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.
Section 2. Information about the Mission
of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.
The Foundation’s business office is located at 809 North 1500 West,
Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws regulating
charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.
While we cannot and do not solicit contributions from states where
we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot make
any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Section 5. General Information About
Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
This website includes information about Project Gutenberg™,
including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
ebookbell.com

More Related Content

PDF
Soft Computing for Problem Solving Proceedings of SocProS 2020 Volume 2 Advan...
PDF
Soft Computing for Problem Solving Proceedings of SocProS 2020 Volume 2 Advan...
PDF
Proceedings Of International Conference On Recent Trends In Machine Learning ...
PDF
10th International Conference on Soft Computing Models in Industrial and Envi...
PDF
Soft Computing Theories And Applications Proceedings Of Socta 2016 Volume 1 1...
PDF
10th International Conference on Soft Computing Models in Industrial and Envi...
PDF
Intelligent Engineering Informatics David Jc Mackay
PDF
Advances In Intelligent Systems Research And Innovation Vassil Sgurev
Soft Computing for Problem Solving Proceedings of SocProS 2020 Volume 2 Advan...
Soft Computing for Problem Solving Proceedings of SocProS 2020 Volume 2 Advan...
Proceedings Of International Conference On Recent Trends In Machine Learning ...
10th International Conference on Soft Computing Models in Industrial and Envi...
Soft Computing Theories And Applications Proceedings Of Socta 2016 Volume 1 1...
10th International Conference on Soft Computing Models in Industrial and Envi...
Intelligent Engineering Informatics David Jc Mackay
Advances In Intelligent Systems Research And Innovation Vassil Sgurev

Similar to Soft Computing Theories And Applications Proceedings Of Socta 2019 Advances In Intelligent Systems And Computing 1st Ed 2020 Millie Pant Editor (20)

PDF
Intelligent Computing Proceedings of the 2020 Computing Conference Volume 3 K...
PDF
Proceedings Of International Conference On Frontiers In Computing And Systems...
PDF
Enabling Technologies For Smart Fog Computing Kuldeep Singh Kaswan
PDF
Intelligent Multimedia Processing And Computer Vision Techniques And Applicat...
PDF
Intelligent Computing Proceedings Of The 2020 Computing Conference Volume 3 1...
PDF
Advances in Smart System Technologies Select Proceedings of ICFSST 2019 P. Su...
PDF
Proceedings of the Second International Conference on Computer and Communicat...
PDF
Proceedings of the International Conference on Data Engineering and Communica...
PDF
Springer paper
PDF
Advances In Computer Communication And Computational Sciences Proceedings Of ...
PDF
Progress in Advanced Computing and Intelligent Engineering Proceedings of ICA...
PDF
Intelligent Computing Proceedings of the 2020 Computing Conference Volume 1 K...
PDF
Intelligent Computing And Communication Proceedings Of 6th Icicc 2022 M Seetha
PDF
Computer Science And Engineeringtheory And Applications 1st Coll
PDF
Advances In Computer Science And Engineering Matthias Schmidt
PDF
Ict Systems And Sustainability Proceedings Of Ict4sd 2020 Volume 1 1st Ed Mil...
PDF
Proceedings of the International Conference on Data Engineering and Communica...
PDF
Innovations In Information And Communication Technologies Proceedings Of Icii...
PDF
Proceedings of the Second International Conference on Computer and Communicat...
PDF
Intelligence Enabled Research Dosier 2020 1st Ed Siddhartha Bhattacharyya
Intelligent Computing Proceedings of the 2020 Computing Conference Volume 3 K...
Proceedings Of International Conference On Frontiers In Computing And Systems...
Enabling Technologies For Smart Fog Computing Kuldeep Singh Kaswan
Intelligent Multimedia Processing And Computer Vision Techniques And Applicat...
Intelligent Computing Proceedings Of The 2020 Computing Conference Volume 3 1...
Advances in Smart System Technologies Select Proceedings of ICFSST 2019 P. Su...
Proceedings of the Second International Conference on Computer and Communicat...
Proceedings of the International Conference on Data Engineering and Communica...
Springer paper
Advances In Computer Communication And Computational Sciences Proceedings Of ...
Progress in Advanced Computing and Intelligent Engineering Proceedings of ICA...
Intelligent Computing Proceedings of the 2020 Computing Conference Volume 1 K...
Intelligent Computing And Communication Proceedings Of 6th Icicc 2022 M Seetha
Computer Science And Engineeringtheory And Applications 1st Coll
Advances In Computer Science And Engineering Matthias Schmidt
Ict Systems And Sustainability Proceedings Of Ict4sd 2020 Volume 1 1st Ed Mil...
Proceedings of the International Conference on Data Engineering and Communica...
Innovations In Information And Communication Technologies Proceedings Of Icii...
Proceedings of the Second International Conference on Computer and Communicat...
Intelligence Enabled Research Dosier 2020 1st Ed Siddhartha Bhattacharyya

Recently uploaded (20)

PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Lesson notes of climatology university.
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Computing-Curriculum for Schools in Ghana
PDF
Classroom Observation Tools for Teachers
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
A systematic review of self-coping strategies used by university students to ...
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
History, Philosophy and sociology of education (1).pptx
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Lesson notes of climatology university.
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
LDMMIA Reiki Yoga Finals Review Spring Summer
Orientation - ARALprogram of Deped to the Parents.pptx
Computing-Curriculum for Schools in Ghana
Classroom Observation Tools for Teachers
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Chinmaya Tiranga quiz Grand Finale.pdf

Soft Computing Theories And Applications Proceedings Of Socta 2019 Advances In Intelligent Systems And Computing 1st Ed 2020 Millie Pant Editor

  • 1. Soft Computing Theories And Applications Proceedings Of Socta 2019 Advances In Intelligent Systems And Computing 1st Ed 2020 Millie Pant Editor download https://ebookbell.com/product/soft-computing-theories-and- applications-proceedings-of-socta-2019-advances-in-intelligent- systems-and-computing-1st-ed-2020-millie-pant-editor-11247046 Explore and download more ebooks at ebookbell.com
  • 2. Here are some recommended products that we believe you will be interested in. You can click the link to download. Soft Computing Theories And Applications Proceedings Of Socta 2017 1st Ed Kanad Ray https://ebookbell.com/product/soft-computing-theories-and- applications-proceedings-of-socta-2017-1st-ed-kanad-ray-7328090 Soft Computing Theories And Applications Proceedings Of Socta 2016 Volume 1 1st Edition Millie Pant https://ebookbell.com/product/soft-computing-theories-and- applications-proceedings-of-socta-2016-volume-1-1st-edition-millie- pant-6844314 Soft Computing Theories And Applications Proceedings Of Socta 2016 Volume 2 1st Edition Millie Pant https://ebookbell.com/product/soft-computing-theories-and- applications-proceedings-of-socta-2016-volume-2-1st-edition-millie- pant-6844318 Soft Computing Theories And Applications Proceedings Of Socta 2022 Rajesh Kumar https://ebookbell.com/product/soft-computing-theories-and- applications-proceedings-of-socta-2022-rajesh-kumar-49843498
  • 3. Soft Computing Theories And Applications Proceedings Of Socta 2020 Volume 2 Tarun K Sharma https://ebookbell.com/product/soft-computing-theories-and- applications-proceedings-of-socta-2020-volume-2-tarun-k- sharma-33449334 Soft Computing Theories And Applications Proceedings Of Socta 2020 Volume 1 Tarun K Sharma Chang Wook Ahn Om Prakash Verma Bijaya Ketan Panigrahi https://ebookbell.com/product/soft-computing-theories-and- applications-proceedings-of-socta-2020-volume-1-tarun-k-sharma-chang- wook-ahn-om-prakash-verma-bijaya-ketan-panigrahi-33941248 Fuzzy Approaches For Soft Computing And Approximate Reasoning Theories And Applications Mariejeanne Lesot https://ebookbell.com/product/fuzzy-approaches-for-soft-computing-and- approximate-reasoning-theories-and-applications-mariejeanne- lesot-13776312 Soft Computing In Materials Development And Its Sustainability In The Manufacturing Sector Amar Patnaik https://ebookbell.com/product/soft-computing-in-materials-development- and-its-sustainability-in-the-manufacturing-sector-amar- patnaik-47301994 Soft Computing Applications And Techniques In Healthcare Ashish Mishra https://ebookbell.com/product/soft-computing-applications-and- techniques-in-healthcare-ashish-mishra-48248378
  • 5. Advances in Intelligent Systems and Computing 1154 Millie Pant · Tarun Kumar Sharma · Rajeev Arya · B. C. Sahana · Hossein Zolfagharinia Editors Soft Computing: Theories and Applications Proceedings of SoCTA 2019
  • 6. Advances in Intelligent Systems and Computing Volume 1154 Series Editor Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Advisory Editors Nikhil R. Pal, Indian Statistical Institute, Kolkata, India Rafael Bello Perez, Faculty of Mathematics, Physics and Computing, Universidad Central de Las Villas, Santa Clara, Cuba Emilio S. Corchado, University of Salamanca, Salamanca, Spain Hani Hagras, School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK László T. Kóczy, Department of Automation, Széchenyi István University, Gyor, Hungary Vladik Kreinovich, Department of Computer Science, University of Texas at El Paso, El Paso, TX, USA Chin-Teng Lin, Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan Jie Lu, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, NSW, Australia Patricia Melin, Graduate Program of Computer Science, Tijuana Institute of Technology, Tijuana, Mexico Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro, Rio de Janeiro, Brazil Ngoc Thanh Nguyen , Faculty of Computer Science and Management, Wrocław University of Technology, Wrocław, Poland Jun Wang, Department of Mechanical and Automation Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong
  • 7. The series “Advances in Intelligent Systems and Computing” contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing such as: computational intelligence, soft comput- ing including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms, social intelligence, ambient intelligence, computational neuro- science, artificial life, virtual worlds and society, cognitive science and systems, Perception and Vision, DNA and immune based systems, self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric computing, recommender systems, intelligent control, robotics and mechatronics including human-machine teaming, knowledge-based paradigms, learning para- digms, machine ethics, intelligent data analysis, knowledge management, intelligent agents, intelligent decision making and support, intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia. The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. This permits a rapid and broad dissemination of research results. ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink ** More information about this series at http://www.springer.com/series/11156
  • 8. Millie Pant • Tarun Kumar Sharma • Rajeev Arya • B. C. Sahana • Hossein Zolfagharinia Editors Soft Computing: Theories and Applications Proceedings of SoCTA 2019 123
  • 9. Editors Millie Pant Department of Paper Technology IIT Roorkee Roorkee, India Tarun Kumar Sharma Graphic Era Hill University Dehradun, Uttarakhand, India Rajeev Arya NIT Patna Patna, India B. C. Sahana NIT Patna Patna, India Hossein Zolfagharinia Ryerson University Toronto, ON, Canada ISSN 2194-5357 ISSN 2194-5365 (electronic) Advances in Intelligent Systems and Computing ISBN 978-981-15-4031-8 ISBN 978-981-15-4032-5 (eBook) https://doi.org/10.1007/978-981-15-4032-5 © Springer Nature Singapore Pte Ltd. 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore
  • 10. Preface This book focusses on the strides made in the domain of soft computing and its applications to address the key issues plaguing the domains of image and signal processing, supply chain management, computational Biology and Bioinformatics, human resource management, finance and economics. It includes the immaculate works presented during the 4th International Conference on Soft Computing: Theories and Applications (SoCTA 2019), organized by the Department of Electronics and Communication Engineering, National Institute of Patna, Bihar, India from 27th–29th December, 2019. This book stands true to its motive of encouraging young minds and fresh ideas in the field of soft computing. Roorkee, India Millie Pant Dehradun, India Tarun Kumar Sharma Patna, India Rajeev Arya Patna, India B. C. Sahana Toronto, Canada Hossein Zolfagharinia v
  • 11. Contents Performance Optimization by MANET AODV-DTN Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Deepak Choudhary and Roop Pahuja Effectiveness of Whale Optimization Based I+PD Controller for LFC of Plug-in Electric Vehicle Included Multi-area System . . . . . . . . . . . . 11 Utkarsh Raj and Ravi Shankar Dual Band Printed Rectangular Ring-Shaped Monopole Antenna for Wireless Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Chandrakant Jatav and Sudhanshu Verma Printed U-Shaped Monopole Dual Band Antenna for Wireless Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Vikash Chandra Sharma and Sudhanshu Verma IoT-Enabled Early Prediction System for Epileptic Seizure in Human Being . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Sayali Shinde and Brijesh Iyer Effective Author Ranking Using Average of Different h-Index Variants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Prabhat Kumar Chandra, Vivekanand Jha, and Kumar Abhishek A Survey Report on Recent Progresses in Nearest Neighbor Realization of Quantum Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Anirban Bhattacharjee, Chandan Bandyopadhyay, Bappaditya Mondal, and Hafizur Rahaman Annual Rainfall Prediction Using Time Series Forecasting . . . . . . . . . 69 Asmita Mahajan, Akanksha Rastogi, and Nonita Sharma A Novel Approach for Design 7:3 and 5:3 Compressors . . . . . . . . . . . 81 Ajay Kumar Kushwaha and Vikas Kumar vii
  • 12. High-Accurate, Area-Efficient Approximate Multiplier for Error-Tolerant Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 M. Parvathi Hoax and Faux of Information Credibility in Social Networks: Explored, Exemplified and Experimented . . . . . . . . . . . . . . . . . . . . . . 103 Ram Chatterjee, Hardeo Kumar Thakur, Ridhi Sethi, and Abhishek Pandey Minimize Power Ratio (PR) in OFDM Using Tone Reservation Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Yogendra Kumar Upadhyaya and Ajay Kumar Kushwaha A Single-Phase Multi-level Inverter Using a Lesser Number of Switching Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Ashutosh Kumar Singh, Ravi Raushan, and Pratyush Gauri Symmetric Key Generation and Distribution Using Diffie-Hellman Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Kaustubh Purohit, Avanish Kumar, Mayank Upadhyay, and Krishan Kumar Design of Controllers Using PSO Technique for Second-Order Stable Process with Time Delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Satyendra Kumar and Moina Ajmeri A Green Dynamic Internet of Things (IoT)-Battery Powered Things Aspect-Survey. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 Nitin B. Raut and N. M. Dhanya An Efficient Layout of Single-Layer Full Adder Using QCA . . . . . . . . 165 Nilesh Patidar and Namit Gupta A Review of mm-Wave Power Amplifiers for Next-Generation 5G Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Pradeep Gorre, R. Vignesh, Rajeev Arya, and Sandeep Kumar Vision-Based Automated Traffic Signaling . . . . . . . . . . . . . . . . . . . . . . 185 H. Mallika, Y. S. Vishruth, T. Venkat Sai Krishna, and Sujay Biradar Performance Comparison of SVM and ANN for Reversible ECG Data Hiding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 Siddharth Bhalerao, Irshad Ahmad Ansari, and Anil Kumar Application of Multi-criteria Decision-Making Method for the Evaluation of Tamilnadu Private Bus Companies . . . . . . . . . . 209 S. M. Vadivel, A. H. Sequeira, Sunil Kumar Jauhar, R. Baskaran, and S. Robert Rajkumar viii Contents
  • 13. CNC Machine Shop Floor Facility Layout Design Using Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 S. M. Vadivel, A. H. Sequeira, Sunil Kumar Jauhar, K. S. Amirthagadeswarn, and T. Aravind Krishna Source of Treatment Selection for Different States of India and Performance Analysis Using Machine Learning Algorithms for Classification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Nitima Malsa, Pooja Singh, Jyoti Gautam, Arpita Srivastava, and Santar Pal Singh Ant Lion Optimization Technique for Minimization of Voltage Deviation Through Optimal Placement of Static VAR Compensator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Stita Pragnya Dash, K. R. Subhashini, and J. K. Satapathy On Vector Variational Inequalities and Vector Optimization Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 B. B. Upadhyay and Priyanka Mishra Characterizations of the Solution Sets for Constrained Pseudolinear Semi-infinite Programming Problems . . . . . . . . . . . . . . . . . . . . . . . . . . 269 B. B. Upadhyay and Akriti Srivastava Novel Chaotic Elephant Herding Optimization for Multilevel Thresholding of Color Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 Falguni Chakraborty, Provas Kumar Roy, and Debashis Nandi Forecasting Groundwater Fluctuation from GRACE Data Using GRNN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Dilip Kumar and Rajib Kumar Bhattacharjya Android Application for Recognition of Indian Origin Agricultural Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309 Snehal P. Tarale and Veena Desai A Fuzzy Logic Based Approach for Prediction of Squamous Cell Carcinoma . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325 Saurabh Jha, Ashok Kumar Mehta, and Chandrashekhar Azad Investigating Multilevel Hesitated Patterns Using Vague Set Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 Abhishek Dixit, Akhilesh Tiwari, and Rajendra Kumar Gupta Six Switch Three Phase Five-Level Inverter with Sinusoidal Pulse Width Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 Rajesh Kumar Mahto and Ambarisha Mishra AI-Enabled Real-Time Sign Language Translator . . . . . . . . . . . . . . . . 357 Yash Patil, Sahil Krishnadas, Adya Kastwar, and Sujata Kulkarni Contents ix
  • 14. A Comparative Performance of Sorting Algorithms: Statistical Investigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 Priyadarshini and Anchala Kumari Evolutionary Computing for Designing Cryptographic Primitives for Block Cipher: Challenges and Opportunities . . . . . . . . . . . . . . . . . 381 Pratap Kumar Behera and Sugata Gangopadhyay A True Event-Based Metaheuristic Algorithm Optimized AGC Mechanism for a Multi-area Power System . . . . . . . . . . . . . . . . . . . . . 391 Sariki Murali and Ravi Shankar Wireless Emanation of Braille to Text/Voice and Vice Versa . . . . . . . . 403 Aishwarya Korde, Omkar Gaikar, Sonam Nikam, and Smita Rukhande An Exploratory Analysis Pertaining to Stress Detection in Adolescents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413 Mrinal Pandey, Bharti Jha, and Rahul Thakur Load Frequency Control of an Interconnected Multi-source Power System Using Quasi-oppositional Harmony Search Algorithm . . . . . . . 423 Abhishek Saxena and Ravi Shankar An Extensive Investigation of Wavelet-based Denoising Techniques for Various ECG Signals Utilizing Thresholding Function . . . . . . . . . . 433 V. Supraja, P. Nageswara Rao, and M. N. Giriprasad Effect of Noise on Segmentation Evaluation Parameters . . . . . . . . . . . 443 V. Vijaya Kishore and V. Kalpana A Review Paper on Feature Selection Techniques and Artificial Neural Networks Architectures Used in Thermography for Early Stage Detection of Breast Cancer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455 Kumod Kumar Gupta, Ritu Vijay, and Pallavi Pahadiya An Artificial Neural Network Model for Estimating the Flood in Tehri Region of Uttarakhand Using Rainfall Data . . . . . . . . . . . . . . 467 B. G. Rajeev Gandhi, Dilip Kumar, and Hira Lal Yadav Advanced Virtual Apparel Try Using Augmented Reality (AVATAR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479 Sourav Shaw, Swapnali Kadam, Shreya Joshi, and Dhanashree Hadsul A Novel Fault-Detection Scheme for Nearest-Neighbor-Based Reversible Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489 Anirban Bhattacharjee, Chandan Bandyopadhyay, Bappaditya Mondal, and Hafizur Rahaman Automated Railway Gate Control Using Internet of Things . . . . . . . . . 501 B. Arunjyothi and B. Harikrishna x Contents
  • 15. Simulated Annealing Based Algorithm for Tuning LDA Hyper Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515 Nikhlesh Pathik and Pragya Shukla A Better Group Consensus Ranking via a Min-transitive Fuzzy Linear Ordering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523 Sukhamay Kundu A Novel Metaheuristic Approach for Resource Constrained Project Scheduling Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535 Bidisha Roy and Asim Kumar Sen A Novel Approach to Handle Huge Data for Refreshment Anomalies in Near Real-Time ETL Applications . . . . . . . . . . . . . . . . . . . . . . . . . . 545 N. Mohammed Muddasir and K. Raghuveer Comparison of Photodetection Capability of Spin Coated TiO2 Thin Film and In2O3 Thin Film Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555 Rahul Raman, Amitabha Nath, and Mitra Barun Sarkar Development of IDS Using Supervised Machine Learning . . . . . . . . . . 565 Indrajeet Kumar, Noor Mohd, Chandradeep Bhatt, and Shashi Kumar Sharma Automated Traffic Light Signal Violation Detection System Using Convolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579 Bhavya Bordia, N. Nishanth, Shaswat Patel, M. Anand Kumar, and Bhawana Rudra An Enhanced Butterfly Optimization Algorithm for Function Optimization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593 Sushmita Sharma, Apu Kumar Saha, and Sukanta Nama Dynamic Analysis of Wind Turbine Drivetrain Under Constant Torque . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605 Rishi Kumar and Sankar Kumar Roy To Build Scalable and Portable Blockchain Application Using Docker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619 Priyanka Kumar and Maharshi Shah Text Summarization: An Extractive Approach . . . . . . . . . . . . . . . . . . 629 Vishal Soni, Lokesh Kumar, Aman Kumar Singh, and Mukesh Kumar Clifford+T-based Fault-Tolerant Quantum Implementation of Code Converter Circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639 Laxmidhar Biswal, Chandan Bandyopadhyay, and Hafizur Rahaman Contents xi
  • 16. Applying Deep Learning for Discovery and Analysis of Software Vulnerabilities: A Brief Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649 Shashank Kumar Singh and Amrita Chaturvedi Fuzzy Decision Making System for Better Staff Performance Appraisal in Institutional Organization . . . . . . . . . . . . . . . . . . . . . . . . 659 Soni Sweta and Ajit Kumar Pandey A Graph-Theoretic Approach for Sustainable New Product Development (SNPD) in Supply Chain Environment . . . . . . . . . . . . . . 671 Amit Kumar Sinha and Ankush Anand Generalization Performance Comparison of Machine Learners for the Detection of Computer Worms Using Behavioral Features . . . . . . 677 Nelson Ochieng, Waweru Mwangi, and Ismail Ateya Fully Annotated Indian Traffic Signs Database for Recognition . . . . . . 695 Banhi Sanyal, R. K. Mohapatra, and Ratnakar Dash Streamlining Choice of CNNs and Structure Framing of Convolution Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705 Sonika Dahiya, Rohit Tyagi, and Nishchal Gaba SNAP N’ COOK—IoT-Based Recipe Suggestion and Health Care Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719 Diksha Mukherjee, Albin Paulson, Shajo Varghese, and Mukta Nivelkar Accuracy-Based Performance Analysis of Alzheimer’s Disease Classification Using Deep Convolution Neural Network . . . . . . . . . . . . 731 Ketki C. Pathak and Swathi S. Kundaram Multiple Information Fusion and Encryption Using DWT and Yang-Gu Mixture Amplitude-Phase Retrieval Algorithm in Fractional Fourier Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745 Muhammad Rafiq Abuturab Development of Intrusion Detection System Using Deep Learning for Classifying Attacks in Power Systems. . . . . . . . . . . . . . . . . . . . . . . 755 Ankitdeshpandey and R. Karthi An Improved Adaptive Transfer Function for Explosion Spark Generation in Fireworks Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 767 Tapas Si and Amit Mukhopadhyay NSE Stock Prediction: The Deep Learning Way . . . . . . . . . . . . . . . . . 783 Ankit K. Barai, Pooja Jain, and Tapan Kumar Recent Development of AI and IoT in the field of Agriculture Industries: A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793 Amith A. Kulkarni, P. Dhanush, B. S. Chethan, C. S. Thammegowda, and Prashant Kumar Shrivastava xii Contents
  • 17. Optimized Fuzzy Rule-Based System to Measure Uncertainty in Human Decision Making System . . . . . . . . . . . . . . . . . . . . . . . . . . . 799 Soni Sweta and Kanhaiya Lal A Review on Detection of Breast Cancer Cells by Using Various Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813 Vanaja Kandubothula, Rajyalakshmi Uppada, and Durgesh Nandan Analysis of Security Issues and Possible Solutions in the Internet of Things for Home Automation System . . . . . . . . . . . . . . . . . . . . . . . 825 P. Sai Ramya and Durgesh Nandan Utilization of the Internet of Things in Agriculture: Possibilities and Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 837 P. Mani Sai Jyothi and Durgesh Nandan Study on Real-Time Face Recognition and Tracking for Criminal Revealing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849 A. Krishna Chaitanya, C. H. Kartheek, and Durgesh Nandan Analysis of Precision Agriculture Technique by Using Machine Learning and IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859 Y. Sasi Supritha Devi, T. Kesava Durga Prasad, Krishna Saladi, and Durgesh Nandan Dispersive Nature of the FEL Amplifiers in the Whistler Mode . . . . . . 869 Ram Gopal, M. Sunder Rajan, Priti Sharma, and Abhinav K. Gautam An Improved Energy-Efficient Faulty Information Extraction Scheme Using PFDIAES and PFDIF Algorithms . . . . . . . . . . . . . . . . . 883 P. T. Kalaivaani and Raja Krishnamoorthy Cyber Attacks and Security—A Critical Survey . . . . . . . . . . . . . . . . . 895 Nithin Kashyap, Hari Raksha K. Malali, and H. L. Gururaj A Comparative Study on Different Techniques of Sentimental Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905 K. S. Peeyusha, G. Pooja, S. Shreyas, and S. P. Pavankumar An Approach to Select the Proper Combination within Positional and Non-positional Average Values of Features in Protein Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 913 Suprativ Saha and Tanmay Bhattacharya Areca Nut Disease Detection Using Image Processing . . . . . . . . . . . . . 925 A. B. Rajendra, N. Rajkumar, and P. D. Shetty Simulink Simulation for Predicting Thermodynamic Properties of Water–Lithium Bromide Solution Using ANN . . . . . . . . . . . . . . . . . 933 Dheerendra Vikram Singh and Tikendra Nath Verma Contents xiii
  • 18. A New Bit Plane Specific Longest Repeating Pattern Test for Statistical Analysis of Bit Sequences . . . . . . . . . . . . . . . . . . . . . . . . 943 Bharat Lal Jangid and Ram Ratan Intelligent Interference Minimization Algorithm for Optimal Placement of Sensors using BBO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 955 Chandra Naik and D. Pushparaj Shetty Classification of SOA-Based Cloud Services Using Data Mining Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971 Zeenat Parween and R. B. S. Yadav A Novel Clustering-Based Gene Expression Pattern Analysis for Human Diabetes Patients Using Intuitionistic Fuzzy Set and Multigranulation Rough Set Model . . . . . . . . . . . . . . . . . . . . . . . . 979 Swarup Kr Ghosh and Anupam Ghosh Investigation on HRV Signal Dynamics for Meditative Intervention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993 Dipen Deka and Bhabesh Deka A Review on Deep Learning-Based Channel Estimation Scheme . . . . . 1007 Amish Ranjan, Abhinav Kumar Singh, and B. C. Sahana Patient Diabetes Forecasting Based on Machine Learning Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1017 Arvind Kumar Shukla Pose Invariant Face Recognition Using Principal Component Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029 Akash Krishna Srivastava, H. Sneha, Diksha, and Koushlendra Kumar Singh An Autonomic Resource Allocation Framework for Service-Based Cloud Applications: A Proactive Approach . . . . . . . . . . . . . . . . . . . . . 1045 Tushar Bhardwaj, Himanshu Upadhyay, and Subhash Chander Sharma Index Point Detection and Semantic Indexing of Videos—A Comparative Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1059 Mehul Mahrishi and Sudha Morwal Classification of Neuromuscular Disorders Using Machine Learning Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1071 Anuj Singh, Arun Vikram, M. P. Singh, and Sudhakar Tripathi Comparative Study of the Ultrasonic and Infrared Person Counter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1081 Ankit Saxena, Swapnesh Taterh, and Nishant Saxena xiv Contents
  • 19. Fuzzy Logic Based Improved Control Design Strategy for MPPT of Solar PV Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1093 Rahul Bisht, Newton Kumar, and Afzal Sikander Evaluation of Soil Physical, Chemical Parameter and Enzyme Activities as Indicator of Soil Fertility with SFM Model in IA–AW Zone of Rajasthan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1107 Jyoti Sihag, Divya Prakash, and Parul Yadav Author Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1123 Contents xv
  • 20. About the Editors Dr. Millie Pant is an Associate Professor, Department of Applied Science and Engineering, IIT Roorkee, India. She has supervised 16 Ph.D.s in the area of numerical optimization, operations research, soft computing and swarm intelligence techniques with applications to various engineering design problems, image pro- cessing, computer vision, supply chain management. She has 181 research publi- cations to her credit. She is PI and Co-PI in 2 DST and MHRD sponsored projects. She has edited 7 volumes of Conference Proceedings AISC series of Springer of SoCPros Conference series since 2017 and 2 volumes of Conference Proceedings AISC series of Springer of SoCTA Conference series. She is an Associate Editor in International Journal of Swarm Intelligence, Inderscience, and Guest Editor in several international journals like International Journal of Memetic Computing, Springer, International Journal of Collaborative Engineering, Inderscience. She is a reviewer in IEEE Transactions on Evolutionary Computation, Applied Soft Computing, Applied Mathematics and Computation, Neural Network Works, Information science. She has acted as General Chair, Program Chair, Session and Track Chair in many national and international conferences. She has delivered Guest Lectures in the field of swarm intelligence, nature inspired computing, computa- tional intelligence in institution of national and international repute like National University of Singapore, Singapore, Liverpool Hope University, Liverpool, UK, Brisbane, Australia, Zakopane, Poland, Graphic Era University, Dehradun, Meerut Institute of Engineering and Technology, ABV-IIITM Gwalior, MANIT, Bhopal, National Institute of Hydrology, Roorkee, NIT, Assam. She has international col- laboration with MIRS Lab, USA, Liverpool Hope University, UK, and Université Paris-Est Créteil Val-de-Marne, Paris, France. She is a founder member of SoCPros, SoCTA, and RAACE Conference series. Dr. Tarun Kumar Sharma is Professor at Graphic Era Hill University, Dehradun. He worked at Amity School of Engineering and Technology, Amity University Rajasthan, India. He holds Ph.D. in Soft Computing from India Institute of Technology, Roorkee. He has supervised 2 Ph.D.s. He has 77 research publications to his credit. He is one of the founding member of SoCTA series. He acted as xvii
  • 21. General Chair of RAACE 2017, Program Chair in SoCTA 2016, Organizing Secretary in SoCPros 2015, and PC member in SoCPros 2014 and SoCPRos 2013. He has edited 3 volumes of Conference Proceedings published by AISC series of Springer Publication and 2 edited books in Asset Analytics, Springer. He is Guest Editor in several international journals like IJACI, IJAIP, IJSIR, IJAMC, IJAEC, IJISDC, and IJPD. He is a member in the editorial board of national and international journals. He has acted as session and track chair in many national and international conferences. He has delivered Guest Lectures in the field of swarm intelligence, nature inspired computing, and computational intelligence in the institution of national and international repute. He is a founder member of SoCTA and RAACE Conference series. He is a member of IET, IANEG, CSTA, and MIRS Lab. Dr. Rajeev Arya received the Engineering Degree in Electronics & Communication Engineering from Government Engineering College, Ujjain, (RGPV University, Bhopal) India, and the Master of Technology in Electronics & Communication Engineering from Indian Institute of Technology (ISM), Dhanbad, India. He received the Ph.D. degree in Communication Engineering from Indian Institute of Technology, Roorkee, India. He is currently an Assistant Professor with the Department of Electronics & Communication Engineering at National Institute of Technology, Patna, India. His current research interests are in wireless communication, ant colony optimization & soft computing techniques, cognitive radio, signal processing, com- munication systems & circuits design. He has published many articles in international journals and conferences. He is a member of the ISRD and the IAENG. He is an active reviewer in many reputed international journals. Dr. B. C. Sahana is an Assistant Professor, Department of Electronics and Communication Engineering, NIT Patna, India. He has supervised 10 M.Tech. and 32 B.Tech. students in the area of signal processing, optimization, soft computing and swarm intelligence techniques with applications to various engineering design problems, image processing and compression, computer vision, geophysical signal processing, filter design. He has 21 research publications in journals and confer- ences. He is a reviewer in IEEE access. He has delivered Guest Lectures in the field of geophysical signal processing, nature inspired computing, computational intel- ligence in the institution of national and international repute. Dr. Hossein Zolfagharinia is an award-winning Assistant Professor of Operations Management in the Global Management Studies department at the Ted Rogers School of Management, Ryerson University. He received his Undergraduate and Master’s Degrees in Industrial Engineering. Following this, he earned his Ph.D. in Operations and Supply Chain Management from the Lazaridis School of Business and Economics at Wilfrid Laurier University. In addition to his academic back- ground, he has more than four years of professional work experience as a business method analyst in the oil and drilling industry. Furthermore, he gained experience in the area of Supply Chain Management through managing several projects in trucking and maritime transportation companies in the past (e.g., Logikor Inc., xviii About the Editors
  • 22. Global Spatial Technology Solutions (GSTS) Inc.). Dr. Zolfagharinia’s two main research interests are in: (1) investigating the benefits of collaboration in supply chain management with a focus on logistics and transportation, (2) applying oper- ations management techniques in a healthcare context. He is the author of a book chapter and several top-tier refereed journal articles. These journals include: European Journal of Operational Research, Transportation Research: Part B and Part E, International Journal of Production Economics, and Operations Research for Health Care. He frequently presents his work at scholarly/professional conferences at both the national and international levels (e.g., Institute for Operations Research and Management Sciences (INFORMS), Annual meeting of Canadian Operational Research Society (CORS), and Decision Sciences Institute (DSI)). He is the recipient of the 2017-2018 Dean’s Scholarly, Research, and Creative Activity Award. He has received over $250,000 in the form of research grants, scholarships, and fellowships. These include Natural Sciences and Engineering Research Council of Canada (NSERC), Social Sciences and Humanities Research Council-Institutional Grant (SSHRC-SIG), Ontario Centers of Excellence (OCE), Ontario Graduate Scholarship (OGS), the Best OGS Research Proposal, and the Ontario Institute of the Purchasing Management Association of Canada (OIPMAC) Achievement Excellence, and he is the provisional winner of Supply Chain & Logistics Association of Canada Paper Competition. About the Editors xix
  • 23. Performance Optimization by MANET AODV-DTN Communication Deepak Choudhary and Roop Pahuja Abstract Mobile Ad Hoc Network (MANET) has the ability to self-configure and establish a mobile wireless mesh that can be used in extreme conditions, such as in areas affected by disasters. One of the routings in MANET is AODV routing. AODV is one of the reactive routing needed to send data. However, in the implementation of disaster conditions, AODV has weaknesses that are vulnerable to extreme envi- ronmental conditions. In this study, communication will be modeled that leads to disruption due to disaster. MANET AODV-DTN is used to improve network per- formance. With this system, the Probability Delivery Ratio (PDR) parameter value can be increased as evidenced by the variable modification of the number of nodes to be 0.431%, reducing the average delay by 63.525%, and producing the energy consumption increased by 0.170%. Simulation with the variable modification of speed obtained by PDR 0.482%, reducing the average delay by 78.710% and energy consumption increased by 0.167%. Modification of buffer size variables obtained 0.729% PDR results, reducing the average delay of 71.603% and energy consump- tion increased by 0.161%. From these data, MANET AODV-DTN is better than MANET AODV. Keywords MANET · AODV · DTN · PDR · Average delay 1 Introduction Condition in the disaster area will affect the rescue process, therefore communication networks are needed that can survive in these conditions. The design and use of communication network systems for disaster areas must have good Quality of Service values to ensure that data transmission can reach the destination quickly under limited energy. This causes the system performance to be optimal in these conditions. D. Choudhary (B) · R. Pahuja Instrumentation and Control Department, Dr. B.R Ambedkar National Institute of Engineering–Jalandhar, Jalandhar, Punjab, India e-mail: engg_deepak@yahoo.com © Springer Nature Singapore Pte Ltd. 2020 M. Pant et al. (eds.), Soft Computing: Theories and Applications, Advances in Intelligent Systems and Computing 1154, https://doi.org/10.1007/978-981-15-4032-5_1 1
  • 24. 2 D. Choudhary and R. Pahuja Based on [1, 2], the requirement to design a communication network for use in an emergency is higher redundancy when data sent from source to destination. This high redundancy causes data to be rearranged if the message is damage before reaching the destination, data access is sent quickly, has the capacity to work in emer- gency conditions and normal conditions. Therefore, in this study, MANET network communication will be designed using AODV-DTN and comparing with MANET AODV. This paper aims to find out and compare the performance of MANET AODV and MANET AODV-DTN so it can be used in disaster conditions. In this study, three parameters will be tested are Probability Delivery Ratio (PDR), average delay, and energy consumption through three variable modifications, which are speed, number of nodes, and buffer size. 2 Background and Related Network 2.1 Mobile Ad Hoc Networks (MANETs) Mobile Ad hoc Networks (MANETs) is a network that allows the exchange of infor- mation without using infrastructure networks. MANET has a complex distributed system and consists of wireless mobile nodes that can be connected freely and dynamic to the network topology. MANET has a traditional network that can reduce infrastructure costs and easy to implement. MANET has several networks for different scenarios, a limited structure on MANET means that each node must be a router and responsible for carrying routing packet tasks. Because it uses one or more routing protocols in MANET, it requires a large amount of message storage media and energy where mobile devices in MANET have limited memory as a message storage medium [3, 4]. 2.2 Ad Hoc on Demand Distance Vector (AODV) [5] AODV is a reactive routing protocol that starts working when requests from the source node and find the path will be used to send messages to the destination node. To find the best route, AODV will find Route (Fig. 1) distributing Route Request (RREQ) to all nodes adjacent to source node. At the same time, the broadcast ID and sequence number are sent to avoid sending the same message to a node. The neighbor node will send RREQ to the next neighbor node until it ends at the destination node. After RREQ reaches the destination node, the node will reply to the RREQ message with Route Reply (RREP). Selected the path is the shortest route with the lowest cost compared to other routes.
  • 25. Performance Optimization by MANET AODV-DTN Communication 3 Fig. 1 Example of a figure caption [6] To avoid changing network topology, AODV will send HELLO messages con- tinuously. If during the sending process there is a change in the topology from the source node to the destination node, the node will send the Error Route (RRER) to its neighboring node to the source node. Each node will get the RRER message and the source node will route again to find the route to the destination. 2.3 Delay Tolerant Networks (DTN) Delay Tolerant Networks (DTN) are not always available end-to-end networks that cause message delays. Even though the network has delays in the network, the DTN can still function then it can work in extreme areas. DTN works using store and forward methods, it means the data packets passing through intermediate nodes will be stored first before being forwarded. This will be anticipated if the next node cannot be reached or die or in other limitations [6]. In DTN, system store and forward processes are performed on an additional layer called a bundle layer. The layer bundle is an additional layer to modify the data package with the facilities provided by DTN, the bundle layer is located below the application layer. In the bundle layer, the data from the application layer will be broken into bundles, the bundle function is to store temporary data (Fig. 2). 3 Simulation Design Scenarios communication design for disaster area, have no connecting with the inter- net. All devices designed in this study are mobile nodes with the traffic of all nodes sending and receiving messages. The design is used to compare MANET using AODV and MANET AODV-DTN. The comparison is done by testing two systems based on the simulation results using Network Simulator 2 which takes into account
  • 26. 4 D. Choudhary and R. Pahuja Fig. 2 Bundle layer in DTN [7] Quality of Service in the form of PDR, average delay and energy consumption with changing several variables, namely the number of nodes, speed and buffer size. In this study, the parameters of the simulation were fixed and used with the same values in different simulations. These parameters can be seen in Table 1. In Table 2 There are three simulation scenarios that will be used in this study. Scenario 1 modification of variable speed changes is done to test changes in the speed at each node that is used to determine the duration of contacts that occur at each node. Scenario 2 is modified to change the number of node variables to test the effect on the probability of sending to the mobility of each node. Scenario 3 is Table 1 Design simulation parameters Parameter Value Packet size 512 byte Dimension 750 m × 750 m Total number of nodes 50 Speed (m/s) 2 Radio trans range (m) 180 Simulation time (s) 150 Antenna model Omnidirectional Propagation model Free space Pause time (s) 0 Initial energy 1000 Sleep energy 0.05 Transmit power 1 Receive power 1 Transition power 0.2 Transition time 0.001
  • 27. Performance Optimization by MANET AODV-DTN Communication 5 Table 2 Design simulation parameters Parameter Scenario 1 Scenario 2 Scenario 3 Num of node 50 20, 30, 40, 50, 60, 70, 80 20, 30, 40, 50, 60, 70 Speed (m/s) 2, 4, 6, 8, 10 2 2 Buffer size 50 50 50 modified to change the buffer size to test the effect of the number of queues dropped in the buffer. 4 Result and Analysis The results of the research based on the design have been done in Sect. 3, this section will discuss the results of the simulation and performance analysis of the two systems MANET AODV and MANET AODV-DTN. 4.1 1st Scenario In the 1st Scenario, the simulation is designed based on changes in the speed variables of the MANET AODV route and the MANET AODV-DTN system routing. The variable speed is changed by the number of node variables and buffer size which are the same values as the initial specifications. From Fig. 3, it illustrates the probability of success of the two systems designed. MANET AODV-DTN has an average probability of 0.98 while MANET AODV has an average probability of 0.97. MANET AODV-DTN can increase the success of 0.48% delivery compared to MANET AODV. The routing strategy in MANET AODV-DTN sends more data packets than the MANET AODV package delivery strategy. The MANET AODV-DTN system makes copies of each packet when the Fig. 3 Graph of simulation results changes in speed variables to PDR
  • 28. 6 D. Choudhary and R. Pahuja Fig. 4 Simulation results graph variable speed changes to average delay Fig. 5 Simulation results graph variable speed changes to consumption energy node speed increases, the packet is not easily lost or damaged so it can reach the destination. If the probability of successful package delivery is greater than reduces delay. In MANET AODV-DTN each transmission node will cause increased energy consumption to network while sending, receiving and storing messages (Figs. 4 and 5). 4.2 2nd Scenario In the 2nd Scenario, the simulation is designed based on changes in speed variables from the MANET routing AODV and MANET AODV-DTN routing systems. Vari- able node speed is changed with variable speed and buffer size are equal in value to the initial specifications. The probability of successful delivery (Fig. 6) of MANET AODV-DTN is 0.98 and MANET AODV has an average probability of 0.98 as well. Because of increased traffic on the network to the number of nodes that meet each other, messages will be exchanged between nodes. However, the average delay (Fig. 7) time of MANET AODV is 23.2 ms bigger than MANET AODV-DTN is 8.48 ms. MANET AODV- DTN has a storage capacity of 100,000, while MANET AODV does not. Then the message can make contact between nodes more often until there is no queue and the delay time can be reduced. While the energy consumption used is smaller MANET AODV on average at 980.90 J compared to MANET AODV-DTN at 982.49 J because it requires more energy to send data to the message (Fig. 8).
  • 29. Performance Optimization by MANET AODV-DTN Communication 7 Fig. 6 Graph of simulation results changes in Num of nodes variables to PDR Fig. 7 Graph of simulation results changes in Num of nodes variables to Avg delay Fig. 8 Graph of simulation results changes in Num of nodes variables to energy consumption 4.3 3rd Scenario In the 3rd scenario, the simulation is designed based on changes in the buffer size variables of the MANET AODV and MANET AODV-DTN. The variable buffer size is changed by the variable speed and the number of nodes that are the same as the initial specifications. In the 3rd scenario, simulation MANET AODV has a successful packet delivery probability of an average of 0.96 and MANET AODV-DTN averaging 0.97. To increase holding time, a large buffer capacity is needed, MANET AODV-DTN has sufficient buffer capacity compared to MANET AODV so that the average delay time is better MANET AODV-DTN 7.62 ms while MANET AODV has an average of 25.23 ms. Energy consumption produced, MANET AODV-DTN increased by 0.161% from MANET AODV (Figs. 9, 10, and 11).
  • 30. 8 D. Choudhary and R. Pahuja Fig. 9 Graph of simulation results changes in buffer size variables to PDR Fig. 10 Graph of simulation results changes in buffer size variables to Avg delay Fig. 11 Graph of simulation results changes in buffer size variables to Avg delay 5 Conclusion The following can be concluded from the simulation results: 1. The higher number of nodes, the higher the PDR value for MANET AODV and MANET AODV-DTN. In the same condition, MANET AODV-DTN can increase PDR 0.43% compared to MANET AODV. The more messages received by the destination node, the smaller average delay MANET AODV-DTN. MANET AODV-DTNcanreducetheaveragedelayof63.5%comparedtoMANETAODV. However, the energy consumption of MANET AODV-DTN increased by 0.17% from MANET AODV. 2. The higher the node speed, the higher the PDR value for MANET AODV-DTN and MANET AODV. In the same conditions, MANET AODV-DTN can increase the PDR of 0.48% compared to MANET AODV. The more messages received by the destination node, the smaller average delay value, MANET AODV-DTN
  • 31. Performance Optimization by MANET AODV-DTN Communication 9 reduces the average delay of 78.71% compared to MANET AODV. However, the energy consumption of MANET AODV-DTN increased by 0.16% compared to MANET AODV. 3. The larger the buffer size, the higher the PDR value for MANET AODV-DTN and MANET AODV. In the same conditions, MANET AODV-DTN can increase the PDR of 0.72% compared to MANET AODV. The more messages the node receives, the smaller average delay value, MANET AODV-DTN can reduce the average delay by 71.6% compared to MANET AODV. However, the energy consumption of MANETAODV-DTN Increased by 0.16% from MANET AODV. 4. From three scenarios designed, MANET AODV-DTN is more suitable for com- munication for disaster areas because it has a good PDR value and reduces the average delay value even though energy consumption is very limited. References 1. Premkumar, R.: Wireless networks for disaster relief (2014) 2. Kishorbhai, V., Vasantbhai, N.: AON: a survey on emergency communication systems during a catastrophic disaster (2014) 3. https://www.divaportal.org/smash/get/diva2:833565/FULLTEXT01.pdf 4. Awerbuch, D., Mishra, D.: Ad hoc On Demand Distance Vector (AODV) routing protocol. Cs.jhu.edu (2017) [Online]. http://www.cs.jhu.edu/~cs647/aodv.pdf. Accessed 11 Nov 2017 Waktu 7:08 5. Performance analysis Aodv (Ad Hoc On Demand Distance Vector) and Dsr (Dynamic Source Routing) protocol to active attack I Manet (Mobile Ad Hoc Network) in term of network Qos (Quality Of Service). Eproc, 1(1). ISSN: 2355-9365.2014 6. Silaban, R.M., Cahyani, N.D., Suryan, V.: Analisis Perbandingan Performansi Ad Hoc On- Demand Distance Vector (Aodv) Dan Zone Routing Protocol (Zrp) Pada Ad-Hoc Hybrid Jaringan Wireless. Teknik Informatika, Fakultas Teknik Informatika, Universitas Telkom 7. Kharisma, B.: Pengenalan internet berbasis Delay Tolerant Network (DTN) [Blog] (2014)
  • 32. Effectiveness of Whale Optimization Based I+PD Controller for LFC of Plug-in Electric Vehicle Included Multi-area System Utkarsh Raj and Ravi Shankar Abstract This study deals with the load frequency control of multi-area, multi- source system. A re-heat thermal generating unit, a gas unit and a plug-in electric vehicle unit is considered in each area. Some physical constraints like Governor dead band and generation rate constraint non-linearity are examined for the thermal unit. Whale optimization algorithm optimized I+PD controller is employed for the load frequency control of the proposed system. Load disturbance of 1% is considered for studying the system dynamics. To show the superiority of the proposed scheme, its performance is compared with the performance of the system under PIDN controller. Also, the system is tested against variable load to check the robustness of the system. Keywords AGC · EV · I+PD · LFC · PIDN · WOA 1 Introduction Modern power systems are subdivided into various areas for control purpose which are themselves interconnected by tie lines. These control areas share power with each other according to the demand on the power system. Due to this, there is fluctuation in the frequency from the nominal value. Also, since the power transfer between the areas is done through the tie lines, hence there is an oscillation in the tie-line power value from the scheduled nominal value. The major purpose of load frequency control (LFC) is: (i) To maintain the area frequency fluctuations within the scheduled nom- inal values, (ii) To keep tie-line power flow between the areas within the scheduled nominal values [1]. For the better implementation of LFC, extensive research work has been done. Various conventional controllers like Integral (I), proportional-integral (PI), and U. Raj (B) Motihari College of Engineering, Motihari, India e-mail: utkarshraj18@gmail.com R. Shankar National Institute of Technology, Patna, India e-mail: ravi@nitp.ac.in © Springer Nature Singapore Pte Ltd. 2020 M. Pant et al. (eds.), Soft Computing: Theories and Applications, Advances in Intelligent Systems and Computing 1154, https://doi.org/10.1007/978-981-15-4032-5_2 11
  • 33. 12 U. Raj and R. Shankar proportional-integral-derivative (PID) are employed for LFC [2, 3]. Though vari- ous intelligent control techniques like fuzzy logic control, state feedback control, artificial neural network, etc. Upalanchiwar and Sakhare [4], Pal et al. [5] have pro- posed in recent times, but conventional controllers still remain popular due to their practical utilities. To minimize the drawbacks of conventional controller I+PD is been used for the LFC of the system. To achieve the best performance from a conventional controller, its settings need to be properly optimized [6]. Various optimization techniques have been proposed in the literature. Genetic algorithm (GA) is being used for controller optimization by Shankar et al. [7]. Other optimization techniques used in the literature are FOA [8], DE [9], PSO [10], O-SFLA [11] and QOHS [12]. Whale optimization algorithm (WOA) is a novel modern optimization technique from the family of population- based evolutionary algorithms. It simulates the bubble-hunting strategy of humpback whales. Rest of the article has been subdivided into the following sections: Sect. 2 inves- tigates the proposed system and Sect. 3 briefly discusses the WOA. Section 4 shows the simulation results while Sect. 4 culminates the present research work. 2 System Modeling 2.1 Proposed System The linearized model of the two-area, multi-source system is considered in this study. A thermal generating unit and gas generating unit has been considered in each control area. Physical constraints like G.D.B. and G.R.C. non-linearity are considered for the thermal generating units. The value of GDB is taken as 0.05% and that of GRC as 3% per minute. A linearized model of plug-in electric vehicle (PEV) has also been considered in each area. The power demand between the grid and the load is balanced using PEV, consisting of a battery charger. In this study, the discharging/charging capacity of PEV is considered as ±5 kW. The transfer function system model of the PEV is taken from Saha and Saikia [13]. The proposed system transfer function model is presented in Fig. 1. 2.2 Proposed Controller In spite of various drawbacks like slower response speed and poor noise rejec- tion capability, conventional controllers still remain popular due to their practical amenities. The proposed control scheme consists of a sum of integral controller and proportional-derivative controller (I+PD). Based on practical experience, various constraints have been applied to the controller parameters.
  • 34. Effectiveness of Whale Optimization Based I+PD Controller … 13 EV EV Thermal Governor Reheat Turbine Compressor Discharge System Fuel System Gas Governor Valve Position Power System Power System Reheat Turbine Thermal Governor Compressor Discharge System Fuel System Gas Governor Valve Position - + + + - - - - - - + + + + + + + + - - - + + + + + - - + Dead Band Dead Band + - GRC + - GRC + Controll er Controll er Fig. 1 Transfer function model of proposed power system 0 ≤ K pi , Kii , Kdi ≤ 1 (1) where i = 1, 2. The block diagram model for the previously discussed proposed controller is shown in Fig. 2. ACE Controller Input Ki 1/s 1/s N Kd Kp Controller Output Fig. 2 Block diagram model of the proposed controller
  • 35. 14 U. Raj and R. Shankar 3 Whale Optimization Algorithm WOA, a new member of population-based evolutionary algorithm technique, has been presented by Mirjalili et al. [14]. In WOA, the unique foraging behavior of humpback whales called ‘bubble-net feeding’ is being reproduced. Humpback whales use this strategy to hunt for their preys like krills or a school of fish [15]. This strategy is formulated in the form of WOA optimization technique whose flowchart is shown in Fig. 3. Fig. 3 Flowchart of WOA optimisation technique Start Initialize of Parameters in search space Calculate Objective Function Update Whale Position Is Termination Criteria Met? Check Boundary Condition Stop No Yes
  • 36. Effectiveness of Whale Optimization Based I+PD Controller … 15 4 Simulation Results 4.1 Comparison with PIDN Controller The system proposed in this article has been simulated in the MATLAB® environ- ment. A 1% constant load disturbance is applied to the system initially. The proposed controllerparametersareoptimizedusingtheWOAtechnique.Toshowtheadvantage of the proposed control technique, the system dynamics with the proposed control scheme is compared with that of PIDN controller. The PIDN controller parameters are also optimized using the WOA technique. The comparison of system dynamics for both the control schemes is shown from Figs. 4, 5 and 6 and tabulated in Table 1. Tables 2 and 3 give the optimized parameter values of proposed controller and PIDN controller, respectively. Fig. 4 Frequency fluctuation profile in first area Fig. 5 Frequency fluctuation profile in second area
  • 37. 16 U. Raj and R. Shankar Fig. 6 Fluctuation profile for tie-line power flow Table 1 Comparison of performance between presented controller and PIDN Proposed controller PIDN controller f 1max −0.02172 −0.03215 f 2max −0.02769 −0.03054 Ptie,max −0.00397 −0.00819 Table 2 Optimized parameters of proposed controller Parameter Optimized value Kp1, Kp2 0.2706, 0.3162 Ki1, Ki2 0.2771, 0.3362 Kd1, Kd2 0.4378, 0.6671 N1, N2 18.9447, 10.8676 Table 3 Optimized parameters of PIDN controller Parameter Optimized Value Kp1, Kp2 0.0814, 0.7165 Ki1, Ki2 0.9414, 0.1790 Kd1, Kd2 0.8205, 0.9651 N1, N2 22.8673, 45.9474 4.2 Effectiveness of Proposed Control Scheme Under Variable Load Disturbance Effectiveness of control schemes are generally tested for constant step load per- turbation in the literature. But in practical situations, load disturbances are rarely constant. Hence the proposed control scheme has also been tested under variable load disturbance condition. The graph of load disturbance versus time is shown in
  • 38. Effectiveness of Whale Optimization Based I+PD Controller … 17 Fig. 7 Graph of load disturbance versus time Fig. 8 Frequency fluctuation profile in first area Fig. 7. The WOA-optimized proposed controller is considered for the secondary LFC of the proposed system. The dynamics of the presented system under the variable load condition are shown from Figs. 8, 9 and 10. The WOA-optimized controller parameter values are given in Table 4. 5 Conclusion In the current research work, a binary-area multi-source system has been consid- ered for LFC study. WOA-optimized I+PD controller has been used for frequency stabilization study. The supremacy of proposed controller has been shown by con- trasting it with WOA-based PIDN controller for the same proposed system. Further, the efficacy of the presented control scheme has been shown under variable load conditions.
  • 39. 18 U. Raj and R. Shankar Fig. 9 Frequency fluctuation profile in second area Fig. 10 Fluctuation profile for tie-line power flow Table 4 Optimized parameters of proposed controller Parameter Optimized value Kp1, Kp2 0.2847, 0.5972 Ki1, Ki2 0.2343, 0.5598 Kd1, Kd2 0.2459, 0.5312 N1, N2 27.2613, 23.2915 Appendix Thermal generating unit: Kr = 0.3, Tt = 0.3 s, Rth = 2.4 Hz/pu, Tr = 10 s, Tg = 0.08 s, GRC = 0.0017pu/MW/s; Gas generating unit: X = 0.6 s, Y = 1.0 s, TF = 0.23 s, b = 0.05 s, c = 1, TCR = 0.01 s, TCD = 0.2 s, RG = 2.4 Hz/pu MW, Rth = 2.4 Hz/pu; Power system: Kps = 120 Hz/pu, Tps = 20 s; EV: KEV = 1 and TEV = 1.
  • 40. Effectiveness of Whale Optimization Based I+PD Controller … 19 References 1. Shiva, C.K., Mukherjee, V.: A novel quasi-oppositional harmony search algorithm for AGC optimization of three-area multi-unit power system after deregulation. Eng. Sci. Technol. Int. J. 19(1), 395–420 (2016) 2. Parmar, K.P.S., Majhi, S., Kothari, D.P.: Load frequency control of a realistic power system with multi-source power generation. Int. J. Electr. Power Energy Syst. 42(1), 426–433 (2012) 3. Shankar, R., Pradhan, S.R., Chatterjee, K., Mandal, R.: A comprehensive state of the art lit- erature survey on LFC mechanism for power system. Renew. Sustain. Energy Rev. 76(2015), 1185–1207 (2017) 4. Upalanchiwar, T., Sakhare, P.A.V.: Design and implementation of the fuzzy PID controller using MATLAB/SIMULINK model. 3(3), 369–372 (2014) 5. Pal, A.K., Bera, P., Chakraborty, K.: AGC in Two-area deregulated power system using reinforced learning neural network controller (2014) 6. Bhasin, H., Gupta, N.: Critical path problem for scheduling using genetic algorithm. Soft Comput.: Theor. Appl. Adv. Intell. Syst. Comput. 15–24 (2018) 7. Shankar, R., Chatterjee, K., Bhushan, R.: Impact of energy storage system on load frequency control for diverse sources of interconnected power system in deregulated power environment. Int. J. Electr. Power Energy Syst. 79, 11–26 (2016) 8. Shankar, R., Kumar, A., Raj, U., Chatterjee, K.: Fruit fly algorithm-based automatic generation control of multiarea interconnected power system with FACTS and AC/DC links in deregulated power environment. Int. Trans. Electr. Energy Syst. e2690 (2018) 9. Mohanty, B., Panda, S., Hota, P.K.: Differential evolution algorithm based automatic generation control for interconnected power systems with non-linearity. Alexandria Eng. J. 53(3), 537–552 (2014) 10. Mohanty, B., Hota, P.K.: A hybrid chemical reaction-particle swarm optimisation technique for automatic generation control. J. Electr. Syst. Inf. Technol. 1–16 (2017) 11. Sharma, T.K., Pant, M.: Opposition-based learning embedded shuffled frog-leaping algorithm. Soft Comput.: Theor. Appl. Adv. Intell. Syst. Comput. 853–861 (2018) 12. Mukherjee, V., Shiva, C.K.: Automatic generation control of multi-unit multi-area deregulated power system using a novel quasi-oppositional harmony search algorithm. IET Gener. Transm. Distrib. 9(15), 2398–2408 (2015) 13. Saha, A., Saikia, L.C.: Performance analysis of combination of ultra-capacitor and super- conducting magnetic energy storage in a thermal-gas AGC system with utilization of whale optimization algorithm optimized cascade controller. J. Renew. Sustain. Energy. 10(1) (2018) 14. Mirjalili, S., Lewis, A.: Advances in engineering software the whale optimization algorithm. 95, 51–67 (2016) 15. Guha, D., Kumar, P., Subrata, R.: Whale optimization algorithm applied to load frequency control of a mixed power system considering nonlinearities and PLL dynamics. Energy Syst. (0123456789) (2019)
  • 41. Dual Band Printed Rectangular Ring-Shaped Monopole Antenna for Wireless Communication Chandrakant Jatav and Sudhanshu Verma Abstract In the present work, printed rectangular ring-shaped antenna with inverted L-shaped strip for dual band wireless communication. Structure of antenna is simple and the size is 34 × 18 mm2 . This modified inverted L-shape will give the required bandwidth with good return loss. The simulated results show the dual band from (2.5– 3.2 GHz) and (5.09–5.83 GHz) with the center operating frequency at around 2.9 and 5.48 GHz having reflection coefficient less than −10 dB for wireless applications. Keywords Trident shaped antenna · Rectangular ring · Slot antenna 1 Introduction In the present year, improvement of communication system with wireless services calls for much more frequency band which boosts wideband antenna design. More- over, the antenna should only have to provide wideband but also it is necessary to have small dimensions. The monopole antenna has the characteristics of low, lightweight, low profile, and easy fabrication. Many structures of dual band or multiband antenna [1–8] proposed to the application of WIMAX and WLAN. Number of structures such as H-shaped, E-shaped, G-shaped, S-shaped, cover only WLAN band [1–3]. Antenna in [4–8] is designed and it satisfies the WLAN and WIMAX application, these designs have drawbacks and these antennas have a relatively larger size. In this letter, a newly rectangular ring-shaped patch antenna introduced for WLAN applica- tion. And the proposed antenna size is smallest compared to mentioned above. With introducing rectangular shaped and adding trident shaped inverted L-shaped and defected ground obtained dual band for WLAN applications. The simulated results of the proposed model are discussed in the present work. C. Jatav (B) · S. Verma Department of Electronics and Communication Engineering, Madan Mohan Malaviya University of Technology, Gorakhpur, India e-mail: chandrakantjatav@gmail.com S. Verma e-mail: svermaeced@gmail.com © Springer Nature Singapore Pte Ltd. 2020 M. Pant et al. (eds.), Soft Computing: Theories and Applications, Advances in Intelligent Systems and Computing 1154, https://doi.org/10.1007/978-981-15-4032-5_3 21
  • 42. 22 C. Jatav and S. Verma 2 Antenna Design The plan development system for making the proposed antenna is represented in Fig. 2. This simulated on the 1.6 mm thickness of FR4 substrate has permittivity 4.4 and loss tangent is 0.02. The compact radiator is connected with 50 microstrip which composed of a modified rectangular ring and signal stripe has width 3 mm. This proposed model consists of defected ground and dielectric substrate of FR4 length L1 = 34 mm, width W1 = 18 mm. The antenna is designed on the simulation tool ANSYS HFSS 16.2. All dimensions introduce in Table 1. On the basis of dimensions antenna design fabricated and measured. The design of the proposed antenna step by step is shown in Fig. 1. Simple antenna structures antenna1, antenna2 and antenna3 are not given the good result shown in comparing graph. By introducing an inverted L-shape on the above trident shape gives better results at 5.48 resonating frequency Optimized Table 1 Design parameters of proposed antenna Parameters Optimized value (mm) L1 34 L2 13.4 L3 3 L4 17 L5 9 L6 4.4 L7 2 L8 1.2 L9 11.2 Ls 8.7 Ld 6.3 W1 18 W2 3 W3 4 W4 15.5 W5 1.4 W6 1.8 W7 1 W8 8.2 W9 1.15 H 1.6 a 1
  • 43. Dual Band Printed Rectangular Ring-Shaped Monopole … 23 Fig. 1 Structure of design antenna proposed antenna produce dual band (2.57–3.21 GHz) and (5.09–5.83 GHz) appli- cable for WIMAX and WLAN applications. Optimized dimensions for our proposed model shown below in Table 1 and Fig. 2. 3 Result Discussion Due to the given dimensions shown in Table 1, a rule for our proposed model antenna was designed and tested. The antenna with the variation in its design is shown in Fig. 1 and the comparison in the outcomes of these designs in terms of refection coefficient are presented in Fig. 3. Simulated results show the required bandwidth with good |S11| of the proposed antenna. Notching at the trident shape and fit two inverted L-shape on the trident shape with the proper selection of the dimensions resonant peak of the proposed antenna4 achieved at 5.48 GHz lower cutoff frequency (f L) is 5.07 GHz and upper cutoff frequency (f H) is 5.80 GHz, so calculated bandwidth by a formula with the center operating frequency (f C). The counterfeit and measured return losses against frequency seen in Figs. 4 and 5. The surface current density of the proposed model is shown in Fig. 6a, b at 2.9 GHz frequency and 5.80 GHz frequency. The current density is high on the middle radiating element so it observed that the middle radiating element is the most active part of the proposed antenna4. The current density is shown in Fig. 3
  • 44. 24 C. Jatav and S. Verma (a) Antenna1 (b) Antenna2 (c) Antenna3 (d) Antenna4 Fig. 2 The proposed antenna design with different shape at the lower and higher band on the rectangular ring and strip under it that means rectangular ring and strip is very important role generation of two resonant modes lower and higher band. In dual band operation mechanism, the trident with L-inverted shape monopole antenna is a counterfeit surface at resonant frequency of 2.9 and 5.48 GHz, shown in Fig. 6. Figure 5 shows the gain of dual band modified inverted L-shape antenna is about 4.8 dB. Proposed antenna4 provided omnidirectional characteristics in Fig. 7, which is shown that simulated radiation patterns at resonant frequencies 2.9 and 5.48 GHz. 4 Conclusion A dual band rectangular ring-shaped monopole antenna with an inverted L-shape and truncate rectangular slot on the ground plane, have been design successfully to
  • 45. Dual Band Printed Rectangular Ring-Shaped Monopole … 25 Fig. 3 a Current density of proposed antenna at 2.9 GHz. b Current density of proposed antenna at 5.4 GHz Fig. 4 Comparison results |S11| of different antennas obtained WLAN and WIMAX applications. Simulated results show that enhance- ment of bandwidth and gains with introducing inverted L-shapes with trident shape on the patch. The percentage bandwidth of dual band is achieved 24.56 and 13.55% with peak gain 4.8 dB. With the suitable radiation pattern and good gain of the simulated dual band antenna are used for WLAN and WIMAX application.
  • 46. 26 C. Jatav and S. Verma Fig. 5 |S11| result of proposed antenna Fig. 6 Gain of proposed antenna
  • 47. Dual Band Printed Rectangular Ring-Shaped Monopole … 27 Fig. 7 Radiation pattern at 2.9 GHz (a) E-field (b) H-field and Radiation pattern at 5.48 GHz (a) E-field (b) H-field References 1. Keno, Y.L., Wang, K.L.: Printed double-T monopole antenna for 2.4/5.2 GHz dual-band WLAN operations. IEEE Trans. Antennas Propagate 51(9), 2187–2192 (2013) 2. Yon, J.H.: Fabrication and measurement of rectangular ring with open-ended CPW-fed monopole antenna for 2.4/5.2 GHz WLAN operations. Microw. Opt. Technol. Lett. 48(8), 1480–1483 (2016) 3. Guy, J.-H., Zhen, S.-S., Xue, L.-L., Sun, Z.: Dual-band monopole antenna with L-shaped strips for 2.4/5 GHz WLAN applications. Microw. Opt. Technol. Lett. 50(11), 2830–2833 (2008) 4. Koon, T.W., Kim, D., Rye, J.I., Kim, G.C., Yolk, J.-G.: A coupled dual-U-shaped monopole antenna for WiMAX dual-band operation. Microw. Opt. Technol. Lett. 53(4), 745–748 (2011) 5. Lau, H.W., Kou, C.H., Yang, C.F.: Novel CPW-fed planar monopole antenna for W IMAX/WLAN application. IEEE Antenna Wirel. Propagate. Lett. 9, 240–243 (2010) 6. Chu, Q.X., Yom, LuH: Design of compact dual-wideband antenna with assembled monopoles. IEEE Trans. Antennas Propagate 58(12), 4063–4066 (2010)
  • 48. 28 C. Jatav and S. Verma 7. Chon, H.D., Chen, H.T.: A CPW-fed dual-frequency monopole antenna. IEEE Trans. Antennas Propagate 52(4), 978–982 (2014) 8. Fun, S.T., Yin, Y.Z., Hue, W., Song, K., Li, B.: CPW-fed printed monopole antenna with an n-shaped slot for dual-band operations. Microw. Opt. Technol. Lett. 54(1), 240–242 (2012)
  • 49. Printed U-Shaped Monopole Dual Band Antenna for Wireless Application Vikash Chandra Sharma and Sudhanshu Verma Abstract In this paper, coplanar wave guide (CPW) fed printed U-shaped monopole dual band antenna is introduced. U-shaped monopole antenna presented CPW fed with symmetrical circular and triangular slot on ground plane which is applicable for wide band and wireless application. The simulated result shows that the design of U-shaped symmetrical circular and triangular slot antenna covers with wide band application from 3.76–4.56 to 6.16–9.15 GHz with resonating frequency 4.42 and 8.04 GHz. The second band of the antenna offers the 39.05% bandwidth with less than −10 dB reflection coefficient which is applicable for UWB and wireless application. The overall dimension of the ground plane is 80 × 101 × 1.5 mm3 with substrate material having dielectric constant 2.2 along with loss tangent 0.002 is used. The results of the proposed antenna with inverted L-strip along with radiation patterns, reflection coefficient |S11| in dB and surface current density of antenna is presented and discussed. The distinctive of the proposed antenna has been investigated using software HFSS. Keywords Slot antenna · Printed antenna · Wide band antenna 1 Introduction Due to the need for wireless applications, high gain antenna is required on large scale. Here this antenna introduces U-shaped slot comprise with broad main slot. In the last decade mobile and wireless communication system has increased dra- matically [1]. This cellular network has required a high data rate. The criteria for (ITMA) international mobile telecommunication, 4G wireless communication sys- tems are designed [2]. In the wireless communication system, the data rate is up V. C. Sharma (B) · S. Verma Department of Electronics and Communication Engineering, Madan Mohan Malaviya University of Technology, Gorakhpur, India e-mail: vikashchandrasharma94@gmail.com S. Verma e-mail: svermaeced@gmail.com © Springer Nature Singapore Pte Ltd. 2020 M. Pant et al. (eds.), Soft Computing: Theories and Applications, Advances in Intelligent Systems and Computing 1154, https://doi.org/10.1007/978-981-15-4032-5_4 29
  • 50. 30 V. C. Sharma and S. Verma to (1 GB/S) for less mobility and even up to (100 Mb/S) for high mobility for mobile access. In the sequence of solving the problem and satisfaction, high data rate requirement wireless system 5G will develop immediately [3]. In the field of engineering Manufacturing, 5G offers a high quality of services such as electronic transactions, transportation industry, etc. In 5G wireless communication network has been future used by millimeter-wave frequencies. The frequency range of millimeter- wave ranges from 30 to 300 GHz in the electromagnetic spectrum [4]. Ultra-wide bandwidth (UWB) systems have got a large number of engrossment repayable to less power feeding and high data rate ability. In the view, this phenomenon the UWB antennas is the main part and important part of these systems, which promotes and indicated the frequency band by ‘Federal Communication Commission’ (FCC), i.e. 3.1–10.6 GHz have received attention by researchers. Present time the role of copla- nar waveguide (CPW) is very important for wireless communication. These days CPW transmission line is used at high level as a feeding network and slot antenna [4]. Coplanar wave guide CPW has a lot of useful design advantages which is like a less dispersion, low radiation leakage, small characteristic impedance on substrate height and uni-planar configuration [4, 5]. Now in Advanced ‘modern wireless sys- tems’ it offers many types of radiofrequency technology such as WiFi, WiMAX and basically Zigbee, 3G, and LTE comes in this category. Last few years ago, in the research field, it has been performed to make many types of design and goals. Many types of ‘wideband low-profile antennas’ have been constructed by utilizing a slot antenna [6, 7] a ‘loop antenna’ [10] and a ‘spiral antenna’ [11, 12]. In the literature, a lot of ‘slot antenna’ element is capable of CPW coplanar wave guide configuration. In the field of research, the main motive of researchers has been to work on the enhancement of bandwidth of microstrip antenna [6–9]. In this paper, the parasitic [11, 12] technique is used for bandwidth enhancement. According to the view, thickness of substrate is increased. When the thickness is increased about 0.05λ0, the inductance of fed is decreased by 50 impedance matching. 2 Antenna Design For achieving the wide band, here, U-shaped is introduced with two symmetrical triangular and circular slots of radius R1 and R2 which is shown in Fig. 2. According to base paper, along with circular slot, an inverted L-strip is introduced which is shown in Fig. 2. U-shaped and symmetric circular and triangular slots are removed from the overall ground plane dimension. For comparison of antenna design, first of all, symmetrical triangular slot is introduced which is shown in Fig. 1a. After that, in the design of antenna2 symmetrical circular slot is introduced which is lower side of U-shaped which is shown in Fig. 1b. In the design of antenna3, both slot triangular and circular slot are introduced together which is shown in Fig. 1c and finally the fourth design of the antenna is introduced, U-shaped inverted L-strip triangular and circular slot which is shown in Fig. 1d because of poor |S11| result of antenna1, antenna2, antenna3 which is present in Fig. 3.
  • 51. Printed U-Shaped Monopole Dual Band Antenna … 31 (a) Antenna1 (b) Antenna2 (c) Antenna3 (d) Antenna4 Fig. 1 The proposed antenna design with different shapes Among these antennas, the good |S11| in dB result and effective bandwidth is achieved by symmetric triangular and circular slot with an inverted L-strip which is applicable for ultra wideband and wireless application. The design model of the antenna is present in Fig. 2 with all dimensions. Design parameters of the proposed antenna and their values are shown in Table 1. The area of the ground plane is L × W × H mm3 with substrate material having a dielectric constant which is 2.2 and loss tangent is 0.002 is used which is corre- sponding to the ground plane. The fed line is connected with coplanar wave guide CPW which is excites to the ground plan. 3 Result Discussion The variation in different shapes of proposed antennas is shown in Fig. 1 and the comparison of these designs in the term of reflection coefficient are shown in Fig. 3. Triangular and Circular slot loaded U-shaped inverted L-strip Printed Microstrip ‘patch antenna’ are present in Fig. 2 and the simulated result of these designs in the term of reflection coefficient |S11| are present in Fig. 5. The radius comparison of
  • 52. 32 V. C. Sharma and S. Verma Fig. 2 Structure of design antenna Table 1 Design parameters of proposed antenna Parameters Optimized value (mm) L 80 L1 32 W 101 W1 8 a 28 b 14 c 2 d 11.75 E 34.5 R1 14 R2 14 f 2.4 f 1 0.5 h 15 H 1.5
  • 53. Printed U-Shaped Monopole Dual Band Antenna … 33 Fig. 3 Comparison results |S11| of different antennas symmetrical circle of this design in the term of reflection coefficient is presented in Fig. 4. Among these comparisons, the good |S11| result achieved by symmetrical circle radius at 14 mm is applicable for wireless applications. The proposed antenna gives dual band. The first band range of this antenna 3.76– 4.56 GHz with resonating frequency 4.42 GHz which is applicable for WiMAX application and second band range covers from 6.16–9.15 GHz with resonating frequency 8.04 GHz. The total bandwidth is achieved 39.05% which is less than −10 dB reflection coefficient with good return loss −31.51 GHz at centre frequency 6.14 GHz. The current distribution of proposed antenna is achieved at 4.42 GHz frequency and 8.04 GHz frequency which is shown below in Fig. 6. Fig. 4 Comparison results |S11| of different radius
  • 54. 34 V. C. Sharma and S. Verma Fig. 5 |S11| result of proposed antenna Fig. 6 a Current density of proposed antenna at 4.42 GHz. b Current density of proposed antenna at 8.04 GHz
  • 55. Other documents randomly have different content
  • 56. Bewußtseinskraft so wenig durch alle Wege und Wandlungen verfolgen, als die lebendige Körperkraft. Sorgst du aber, das menschliche Bewußtsein werde, weil aus dem Allgemeinbewußtsein herausgeboren, auch wieder in ihm verfließen, so sieh den Baum an. Es hat lange Jahre gedauert, ehe die Zweige aus dem Stamme kamen; einmal gekommen, gehen sie nicht wieder in ihm unter. Wie wollte der Baum wachsen und sich entwickeln, wenn es geschähe; auch der Lebensbaum der Welt aber will wachsen und sich entwickeln. Nach allem ist das die große Kunst des Schlusses vom Diesseits auf das Jenseits, nicht von Gründen, die wir nicht kennen, noch von Voraussetzungen, die wir machen, sondern von Tatsachen, die wir kennen, auf die größern und höhern Tatsachen des Jenseits zu schließen, und dadurch den praktisch geforderten, an höheren Gesichtspunkten hängenden Glauben von untenher zu festigen, zu stützen und mit dem Leben in lebendigen Bezug zu setzen. Ja, brauchten wir den Glauben nicht, wozu ihn stützen; doch wie ihn brauchen, hätte er keine Stütze.
  • 57. Zehntes Kapitel Des Menschen Seele ist durch seinen ganzen Leib ergossen, alsbald zerfällt er, wenn sie von ihm weicht; doch ihr Bewußtseinslicht ist bald hier bald da.[9] Nur eben sahen wirs im engen Leibe hin und wider wandern, wechselnd dem Aug, dem Ohr, dem innern und dem äußern Sinn zu leuchten, um endlich im Tode ganz darüber hinaus zu wandern, wie der, dessen kleines Haus zerstört wird, worin er lange hin und her gegangen, auf immer in die Weite zieht und eine neue Wanderung beginnt. Der Tod setzt keine andere Scheide zwischen beiden Leben, als daß er den engen Schauplatz der Wanderung mit dem weiteren vertauschen läßt. Und so wenig in dem jetzigen Leben das Bewußtseinslicht immer und überall zugleich ist, wo es nacheinander sein und wohin es sich zerstreuen kann, wird es im künftigen Leben sein. Der Schauplatz der Wanderung ist nur unsäglich größer, die mögliche Verbreitung weiter, die Wege freier und die Aussichtspunkte höher, alle niederen des Diesseits unter sich begreifend. Selbst schon im jetzigen Leben aber sehen wir ausnahmsweise, in seltenen Fällen, das Bewußtseinslicht aus dem engeren Leibe in den weiteren wandern und wieder heimkehren, Nachricht bringend von dem, was in fernem Raume oder, in dessen weiten Zusammenhängen wurzelnd, in ferner Zeit geschieht; denn die Länge der Zukunft fußt auf der Breite der Gegenwart. Plötzlich öffnet sich eine Spalte in der sonst immer verschlossenen Tür zwischen Diesseits und Jenseits, um schnell sich wieder zu schließen, der Tür, die im Tode sich ganz öffnen wird, und erst da sich öffnen soll, um nie mehr sich zu schließen. Auch frommts nicht, vorher durch die Spalte nur zu schauen. Doch die Ausnahme von der diesseitigen Lebensregel ist nur ein Fall der größeren Lebensregel, welche Diesseits und Jenseits zugleich umfaßt.
  • 58. Es kommt vor, daß der engere Leib nach einer Seite tief genug einschläft, um nach anderer über seine Grenzen hinaus in ungewohnter Weise zu erwachen, und doch nicht so ganz und tief, um nie mehr zu erwachen. Oder im weiteren Leibe wird ein Punkt so ungewöhnlich stark erregt, um in den engeren hinein eine die Schwelle übersteigende Wirkung aus einer sonst unzugänglichen Ferne zu erstrecken. Damit beginnen die Wunder des Hellgesichts, der Ahnungen, der vorbedeutenden Träume; lauter Fabeln, wenn der jenseitige Leib und das jenseitige Leben Fabeln sind; sonst Zeichen des einen und Vorzeichen des andern; was aber Zeichen hat, ist da, und was Vorzeichen hat, wird kommen. Doch sind es keine Zeichen diesseitigen gesunden Lebens. Das Diesseits hat den Leib des Jenseits nur für das Jenseits zu bauen, nicht schon mit dessen Auge und Ohr zu sehen und zu hören. Die Blüte gedeiht nicht, die man vor der Zeit aufbricht. Und ob man den Glauben an das Jenseits durch den Glauben an diese Spuren seines Hineinleuchtens in das Diesseits u n t e r s t ü t z e n kann, so soll man ihn doch nicht darauf b a u e n Der gesunde Glaube baut sich auf Gründen und schließt sich ab in höchsten Gesichtspunkten des gesunden Lebens, indem er selbst zu seiner Gesundheit und zum Abschluß seiner höchsten Gesichtspunkte gehört. Du hattest seither gemeint, die leichte Gestalt, in der ein Verstorbener dir in der Erinnerung erscheint, sei bloß dein innerer Schein. Du irrst; er selbst leibhaftig ists, der in bewußtem Gange damit nicht bloß zu dir, sondern in dich eintritt. Die frühere Gestalt ist noch sein Seelenkleid; nur nicht mehr beschwert mit seinem frühern festen Leibe und träge mit ihm wandelnd, sondern durchsichtig, leicht, der irdischen Last entkleidet, im Momente jetzt hier jetzt da, dem Rufe jedes folgend, der den Toten ruft oder von selber sich dir stellend, dann mußt du des Toten denken. Auch hat man sich ja immer die jenseitige Erscheinung der Seelen so leicht, so körperlos, so unabhängig von des Raumes Schranken gedacht, und damit, das Rechte zwar nicht meinend, das Rechte doch getroffen.
  • 59. Auch hörtest du wohl von Geistererscheinungen sprechen. Den Ärzten heißen sie Phantasmen, Halluzinationen. Sie sind es auch für die Lebenden, doch zugleich wirkliche Erscheinungen der Toten, die wir so nennen. Denn wenn schon die schwächern Erinnerungsgestalten in uns es sind, wie sollten es die soviel stärkeren entsprechenden Erscheinungen nicht sein. Warum also noch streiten, ob sie das eine oder andere sind, wenn sie zugleich das eine und das andere sind. Und warum dich künftig noch vor Geistererscheinungen fürchten, wenn du dich vor den Erinnerungsgestalten in dir, die es schon sind, nicht fürchtest. Doch ganz fehlt nicht der Grund dazu. Ungleich den von dir selbst gerufenen, oder in den Zusammenhang deines innern Lebens von selbst leise und friedlich eintretenden, hilfreich daran mit fortspinnenden Gestalten kommen sie ungerufen, überkommen dich mit nicht abwehrbarer Stärke, scheinbar vor dich, wirklich in dich tretend, am Gewebe deines innern Lebens vielmehr zausend als fortspinnend. Ein krankhaft Wesen zugleich des Diesseits und des Jenseits. So sollen Tote mit Lebenden nicht verkehren. Es ist schon halber Tod des Lebenden, die Toten annähernd so deutlich, so objektiv zu schauen, wie sie sich untereinander schauen mögen; darum das Grausen der Lebendigen vor solcher Erscheinung der Toten; es ist zugleich ein halbes Zurückversinken der Toten aus dem Reiche über dem Tode in das Reich unter dem Tode; daher die Sage —und ob nicht mehr als Sage? —daß nur Geister umgehen, die nicht ganz erlöst sind, die noch mit einer schweren Kette an dem Diesseits hängen. Den Unseligen zu scheuchen, ruf' einen besseren und stärkeren Geist zu Hilfe; der beste und stärkste aber ist der Geist ob allen Geistern. Wer hat in seinem Schutz dir etwas an! Auch dazu stimmt die Sage, daß vor dem Anruf Gottes jeder böse Geist weicht. Inzwischen droht in diesem Gebiete geistiger Krankheit, der Glaube selbst zum Aberglauben zu erkranken. Am einfachsten, sich vor dem Kommen von Gespenstern zu bewahren, bleibts immer, an ihr Kommen nicht zu glauben; denn glauben, daß sie kommen, heißt schon, ihnen auf halbem Wege entgegenkommen.
  • 60. Wie sie einander selbst erscheinen mögen, sagt ich. Denn dieselbe Erscheinung, die wider die Ordnung des Diesseits ist, ist nur vorweggenommen aus der Ordnung des Jenseits. Licht, voll, klar und objektiv werden die Bewohner des Jenseits einander in der Gestalt erscheinen, wovon wir nur einen schwachen Abklang, eine dämmernde Umrißzeichnung in der Erinnerung an sie haben, weil sie einander mit dem ganzen vollen Wesen durchdringen, wovon nur ein kleiner Teil in jeden von uns bei der Erinnerung an sie eindringt. Nur daß es jenseits wie diesseits der auf die Erscheinung gerichteten Aufmerksamkeit bedürfen wird, um sie zu haben. Nun mag man immer fragen: wie ist es möglich, daß, die sich so durchdringen, sich doch so gegenständlich und begrenzt erscheinen. Aber frage erst, wie ist es möglich, daß, was als Erscheinung eines Lebenden in dich eingeht und in der Erinnerung an einen Toten dein Gehirn durchdringt — und anders nichts liegt deiner Seele vor, darauf zu fußen —, dir als Anschauung doch objektiv, als Erinnerung noch begrenzt erscheint. Die selbst nicht mehr begrenzte Wirkung, die der Erinnerung unterliegt, spiegelt dir doch noch die Begrenzung der Gestalt, wovon sie anfangs ausgegangen, vor. Du weißt vom Diesseits nicht, warum; wie kannst du es vom Jenseits wissen wollen. Und so sage ich wieder: schließe nicht von Gründen des Diesseits, die du nicht kennst, noch von Voraussetzungen, die du machst, sondern von Tatsachen des Diesseits, die du kennst, auf die größeren und höheren Tatsachen des Jenseits. Der einzelne Schluß kann irren; auch der, den wir nur eben machten; also hefte dich an keine Einzelheit der Zusammenschluß der Schlüsse in Richtung dessen, was wir vor allem Schluß und über allem Schluß zu fordern haben, wird unsers Glaubens beste Stütze von unten und Führung nach oben sein. Faßtest du aber den Glauben gleich recht von oben, leicht fiele dir der ganze Glaubensweg herunter, den wir herauf genommen.
  • 61. Elftes Kapitel Ja wie leicht wäre alles für den Glauben, könnte der Mensch sich nur gewöhnen, in dem Wort, womit er seit mehr als tausend Jahren spielt, daß er in Gott lebt und webt und ist, mehr als ein Wort zu sehen. Dann ist der Glaube an Gottes und sein eigenes ewiges Leben nur e i n e r er sieht sein eigenes ewiges Leben zum ewigen Leben Gottes selbst gehörig, und in der Höhe seines künftigen über seinen jetzigen Leben nur einen höhern Aufbau über einem niedern in Gott, wie er selbst schon solchen in sich hat; er faßt am kleinen Beispiel das Höhere und im Zusammenhange beider das Ganze, wovon er nur der Teil. Die Anschauung in dir zerrinnt, und die Erinnerung steigt daraus in dir auf; dein ganzes diesseitiges Anschauungsleben in Gott zerrinnt, und ein höheres Erinnerungsleben steigt daraus in Gott auf; und wie die Erinnerungen in deinem Haupte, verkehren die Geister des Jenseits im göttlichen Haupte. Nur eine Stufe über der Stufe derselben Treppe, die nicht zu Gott, sondern in Gott aufwärts führt, der in sich zugleich den Grund und Gipfel hat. Wie leer war Gott mit jenem leer gedachten Worte, wie reich ist Gott mit seinem vollen Sinne. Weißt du denn, wie das Jenseits der Anschauungen in deinem Geiste möglich ist? Du weißt nur, daß es wirklich ist; doch nur in einem Geiste ist es möglich. Also kannst du auch leicht, unwissend wie es möglich ist, an die Wirklichkeit eines Jenseits deines ganzen Geistes in einem höhern Geiste glauben; du mußt nur glauben, daß ein höherer Geist ist und daß du in ihm bist. Und wieder: wie leicht wäre alles für den Glauben, wenn der Mensch sich gewöhnen könnte, eine Wahrheit in dem zweiten Worte zu sehen, daß Gott in allem lebt und webt und ist. Dann ist es nicht
  • 62. eine tote, sondern eine durch Gott lebendige Welt, aus welcher der Mensch sich seinen künftigen Leib erbaut und damit ein neues Haus in Gottes Haus hineinbaut. Wenn aber wird dieser lebendig machende Glaube lebendig werden? Daß er lebendig macht, wird ihn lebendig machen.
  • 63. Zwölftes Kapitel Du fragest nach dem Ob; ich antwortete mit dem Wie. Der Glaube erspart die Frage des Ob; doch wird sie getan, so gibt es nur die eine Antwort darauf durch das Wie; und solange das Wie nicht fest steht, wird das Ob nicht aufhören zu gehen und zu kommen. Hier steht der Baum; manch einzeln Blatt davon mag fallen; doch sein Grund und sein Zusammenhang ist fest und gut. Er wird immer neue Zweige treiben, und immer neue Blätter werden fallen; er selbst wird nicht mehr fallen; wird Blüten der Schönheit treiben, und statt im Glauben zu wurzeln, Früchte des Glaubens tragen.
  • 64. Nachschrift Die erste Anregung zu der in dieser Schrift ausgeführten Idee, daß die Geister der Gestorbenen als Individuen in den Lebenden fortexistieren, ward mir durch eine Unterredung mit meinem, damals in Leipzig, jetzt in Halle lebenden Freunde, Professor Billroth. Indem diese Idee in eine Reihe verwandter Vorstellungen bei mir teils eingriff, teils solche erweckte, hat sich dieselbe auf vorstehende Weise gestaltet und durch eine Art notwendigen Fortschritts zur Idee eines höhern Lebens der Geister in Gott erweitert. Inzwischen hat der Urheber derselben, wie in der Religionsphilosophie überhaupt, so namentlich in der Unsterblichkeitslehre, eine von der hier verfolgten ganz verschiedene und sich direkter an das kirchliche Dogma anschließende Richtung genommen, welche ihn sogar von jener Grundidee großenteils oder ganz wieder abgeführt hat, daher ich, indem ich ihn als Schöpfer derselben glaubte bezeichnen zu müssen, doch nicht mehr als ihren Vertreter zu nennen wage. Die eigenen Ansichten dieses Philosophen über den betreffenden Gegenstand wird man in einem, demnächst von demselben zu erwartenden, Werke entwickelt finden. Druck der Spamerschen Buchdruckerei in Leipzig
  • 65. FUSSNOTEN [1] Dem Physiologen läßt sich bezeichnender sagen: das schaffende Prinzip des Kindes liegt vor der Geburt nicht in dem, was nach der Geburt von ihm fortleben wird, was ja jetzt erst das Abhängige ist, das Geschaffene, sondern in dem, was vom Kinde bei der Geburt in Rückstand bleiben und verderben wird, wie der Leib des Menschen im Tode (placenta cum funiculo umbilicali, velamentis ovi eorumque liquoribus); aus seiner Tätigkeit, als seine Fortsetzung wächst der junge Mensch hervor. [2] Viele biblische Parallelstellen hierzu sind zusammengestellt in „Zendavesta“ III, S. 363 ff. und den „Drei Motiven und Gründen des Glaubens“, S. 178. [3] Mag man das Nervenspiel auf chemische oder elektrische Prozesse zurückführen, immer wird man, wenn nicht selbst ein Spiel von Schwingungen letzter Teilchen darin zu sehen, doch solches wesentlich dadurch erweckt oder davon mitgeführt zu halten haben, wobei das Unwägbare eine wichtigere Rolle als das Wägbare spielen mag. Schwingungen aber können nur scheinbar erlöschen, indem sie sich in die Umgebung ausbreiten, oder, wenn ja durch Übergang ihrer lebendigen Kraft in sogenannte Spannkraft zeitweise erlöschend, doch nach dem Gesetze der Erhaltung der Kraft einer Wiederbelebung in irgendwelcher Form harren. [4] Schon bei Annäherungen an den Tod im Diesseits (durch Narkose, oder im Moment des eben drohenden Ertrinkens, oder im Schlafwachen) kommen Annäherungen an diese den geistigen Inhalt auf einmal durchleuchtende Klarheit vor, wovon Beispiel in „Zendavesta“ III, S. 27 und (Fälle bei drohendem Ertrinken) in Fechners Zentralbl. für Naturwiss. u. Anthropologie 1853, S. 43 u. 623 verzeichnet sind. [5] Dies erfahrungsmäßige Gesetz der Beziehung zwischen Leib und Seele besteht darin, daß das Bewußtsein überall erlischt, wenn die leibliche Tätigkeit, woran es hängt, unter einen gewissen Grad der Stärke, den man die Schwelle nennt, sinkt. Nach Maßgabe nun, als sie sich mehr ausbreitet, kann sie auch leichter durch die damit eintretende Schwächung darunter sinken.
  • 66. Wie das ganze Bewußtsein seine Schwelle hat, welche die Scheide zwischen Schlaf und Wachen des ganzen Menschen bildet, so auch alles Besondere im Bewußtsein, worauf es beruht, daß während des Wachens bald dies bald das im Bewußtsein auftaucht oder erlischt, je nachdem die besondere Tätigkeit, woran es hängt, die Sonderschwelle übersteigt oder darunter sinkt. Vergl. Elemente der Psychophysik Kap. 10. 38. 39 und 42. [6] Vergl. hierüber Elemente der Psychophysik, Kap. 37, und Atomenlehre Kap. 26. [7] Um nicht einen scheinbaren Widerspruch der obigen Betrachtung mit der psychophysischen Lehre von der Mischungsschwelle (worüber das Erläuterndste in Wundts Philos. Stud. IV, S. 204 und 211) bestehen zu lassen, folgende Bemerkung: wenn die aus Komponenten mannigfachster Art zusammengesetzte psychophysische Lebenswelle des Menschen, um diesen kurzen Ausdruck fortzubrauchen, sich in eine Welt hineinverbreitete, die nur andersartige Komponenten enthielte, so würde freilich anzunehmen sein, daß sie durch ihre Ausbreitung unter die, hier in Betracht kommende, Mischungsschwelle fiele. Da aber das psychophysische Wellenmeer der Welt unter seinen übrigen Komponenten auch solche enthält, welche mit denen der Lebenswelle des Menschen gleichartig sind, und zwar von verschiedenster Höhe oder Intensität, also auch solche, welche die Mischungsschwelle schon übersteigen oder derselben nahe sind, und durch die zutretenden gleichartigen nur um so mehr gesteigert werden, so stellt sich das Resultat der obigen Betrachtung nur auf etwas gründlicherem Wege wieder her. [8] Unstreitig hängt dies, dem sog. Gesetz der Erhaltung der Kraft im Körpergebiete analoge, Gesetz auch mit demselben durch die Grundbeziehung des Geistigen zum Körperlichen irgendwie zusammen, ohne daß dieser Zusammenhang schon klargestellt ist, oder das Gesetz der Erhaltung der Bewußtseinskraft schon psychophysisch aus dem Gesetz der Erhaltung der Körperkraft ableitbar wäre, solange das Grundwesen der psychophysischen Tätigkeit selbst nicht klargestellt ist. Das Gesetz muß also für sich aus Tatsachen, wie sie oben folgen, gefolgert werden; und gewinnt, ohne e x a k t in voller Allgemeinheit bewiesen zu sein, doch eine Wahrscheinlichkeit dadurch, die es geeignet macht, Aperçus, wie die, um die es sich hier handelt, zugrunde gelegt zu werden.
  • 67. [9] Mit wissenschaftlichem Ausdrucke wird man sagen können: das Bewußtsein ist überall da und wach, wenn und wo die der geistigen unterliegende leibliche, sogenannte psychophysische Tätigkeit jenen Grad der Stärke, den man die Schwelle nennt, übersteigt. (Vgl. S. 44 Anmerk.) Hiernach kann das Bewußtsein in Zeit und Raum lokalisiert werden. Der Gipfel der Welle unserer psychophysischen Tätigkeit schwankt gleichsam von einem Orte zum anderen, womit das Bewußtseinslicht seine Stelle wechselt, nur daß er während des diesseitigen Lebens immer bloß innerhalb unseres Leibes, ja eines beschränkten Teils dieses Leibes, hin und wider schwankt und im Schlafe ganz unter die Schwelle sinkt, über die er im Wachen wieder aufsteigt. Hierüber vgl. Elemente der Psychophysik II, Kap. 40 und 41.
  • 68. *** END OF THE PROJECT GUTENBERG EBOOK DAS BÜCHLEIN VOM LEBEN NACH DEM TODE *** Updated editions will replace the previous one—the old editions will be renamed. Creating the works from print editions not protected by U.S. copyright law means that no one owns a United States copyright in these works, so the Foundation (and you!) can copy and distribute it in the United States without permission and without paying copyright royalties. Special rules, set forth in the General Terms of Use part of this license, apply to copying and distributing Project Gutenberg™ electronic works to protect the PROJECT GUTENBERG™ concept and trademark. Project Gutenberg is a registered trademark, and may not be used if you charge for an eBook, except by following the terms of the trademark license, including paying royalties for use of the Project Gutenberg trademark. If you do not charge anything for copies of this eBook, complying with the trademark license is very easy. You may use this eBook for nearly any purpose such as creation of derivative works, reports, performances and research. Project Gutenberg eBooks may be modified and printed and given away—you may do practically ANYTHING in the United States with eBooks not protected by U.S. copyright law. Redistribution is subject to the trademark license, especially commercial redistribution. START: FULL LICENSE
  • 69. THE FULL PROJECT GUTENBERG LICENSE
  • 70. PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK To protect the Project Gutenberg™ mission of promoting the free distribution of electronic works, by using or distributing this work (or any other work associated in any way with the phrase “Project Gutenberg”), you agree to comply with all the terms of the Full Project Gutenberg™ License available with this file or online at www.gutenberg.org/license. Section 1. General Terms of Use and Redistributing Project Gutenberg™ electronic works 1.A. By reading or using any part of this Project Gutenberg™ electronic work, you indicate that you have read, understand, agree to and accept all the terms of this license and intellectual property (trademark/copyright) agreement. If you do not agree to abide by all the terms of this agreement, you must cease using and return or destroy all copies of Project Gutenberg™ electronic works in your possession. If you paid a fee for obtaining a copy of or access to a Project Gutenberg™ electronic work and you do not agree to be bound by the terms of this agreement, you may obtain a refund from the person or entity to whom you paid the fee as set forth in paragraph 1.E.8. 1.B. “Project Gutenberg” is a registered trademark. It may only be used on or associated in any way with an electronic work by people who agree to be bound by the terms of this agreement. There are a few things that you can do with most Project Gutenberg™ electronic works even without complying with the full terms of this agreement. See paragraph 1.C below. There are a lot of things you can do with Project Gutenberg™ electronic works if you follow the terms of this agreement and help preserve free future access to Project Gutenberg™ electronic works. See paragraph 1.E below.
  • 71. 1.C. The Project Gutenberg Literary Archive Foundation (“the Foundation” or PGLAF), owns a compilation copyright in the collection of Project Gutenberg™ electronic works. Nearly all the individual works in the collection are in the public domain in the United States. If an individual work is unprotected by copyright law in the United States and you are located in the United States, we do not claim a right to prevent you from copying, distributing, performing, displaying or creating derivative works based on the work as long as all references to Project Gutenberg are removed. Of course, we hope that you will support the Project Gutenberg™ mission of promoting free access to electronic works by freely sharing Project Gutenberg™ works in compliance with the terms of this agreement for keeping the Project Gutenberg™ name associated with the work. You can easily comply with the terms of this agreement by keeping this work in the same format with its attached full Project Gutenberg™ License when you share it without charge with others. 1.D. The copyright laws of the place where you are located also govern what you can do with this work. Copyright laws in most countries are in a constant state of change. If you are outside the United States, check the laws of your country in addition to the terms of this agreement before downloading, copying, displaying, performing, distributing or creating derivative works based on this work or any other Project Gutenberg™ work. The Foundation makes no representations concerning the copyright status of any work in any country other than the United States. 1.E. Unless you have removed all references to Project Gutenberg: 1.E.1. The following sentence, with active links to, or other immediate access to, the full Project Gutenberg™ License must appear prominently whenever any copy of a Project Gutenberg™ work (any work on which the phrase “Project Gutenberg” appears, or with which the phrase “Project Gutenberg” is associated) is accessed, displayed, performed, viewed, copied or distributed:
  • 72. This eBook is for the use of anyone anywhere in the United States and most other parts of the world at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.org. If you are not located in the United States, you will have to check the laws of the country where you are located before using this eBook. 1.E.2. If an individual Project Gutenberg™ electronic work is derived from texts not protected by U.S. copyright law (does not contain a notice indicating that it is posted with permission of the copyright holder), the work can be copied and distributed to anyone in the United States without paying any fees or charges. If you are redistributing or providing access to a work with the phrase “Project Gutenberg” associated with or appearing on the work, you must comply either with the requirements of paragraphs 1.E.1 through 1.E.7 or obtain permission for the use of the work and the Project Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9. 1.E.3. If an individual Project Gutenberg™ electronic work is posted with the permission of the copyright holder, your use and distribution must comply with both paragraphs 1.E.1 through 1.E.7 and any additional terms imposed by the copyright holder. Additional terms will be linked to the Project Gutenberg™ License for all works posted with the permission of the copyright holder found at the beginning of this work. 1.E.4. Do not unlink or detach or remove the full Project Gutenberg™ License terms from this work, or any files containing a part of this work or any other work associated with Project Gutenberg™. 1.E.5. Do not copy, display, perform, distribute or redistribute this electronic work, or any part of this electronic work, without prominently displaying the sentence set forth in paragraph 1.E.1
  • 73. with active links or immediate access to the full terms of the Project Gutenberg™ License. 1.E.6. You may convert to and distribute this work in any binary, compressed, marked up, nonproprietary or proprietary form, including any word processing or hypertext form. However, if you provide access to or distribute copies of a Project Gutenberg™ work in a format other than “Plain Vanilla ASCII” or other format used in the official version posted on the official Project Gutenberg™ website (www.gutenberg.org), you must, at no additional cost, fee or expense to the user, provide a copy, a means of exporting a copy, or a means of obtaining a copy upon request, of the work in its original “Plain Vanilla ASCII” or other form. Any alternate format must include the full Project Gutenberg™ License as specified in paragraph 1.E.1. 1.E.7. Do not charge a fee for access to, viewing, displaying, performing, copying or distributing any Project Gutenberg™ works unless you comply with paragraph 1.E.8 or 1.E.9. 1.E.8. You may charge a reasonable fee for copies of or providing access to or distributing Project Gutenberg™ electronic works provided that: • You pay a royalty fee of 20% of the gross profits you derive from the use of Project Gutenberg™ works calculated using the method you already use to calculate your applicable taxes. The fee is owed to the owner of the Project Gutenberg™ trademark, but he has agreed to donate royalties under this paragraph to the Project Gutenberg Literary Archive Foundation. Royalty payments must be paid within 60 days following each date on which you prepare (or are legally required to prepare) your periodic tax returns. Royalty payments should be clearly marked as such and sent to the Project Gutenberg Literary Archive Foundation at the address specified in Section 4, “Information
  • 74. about donations to the Project Gutenberg Literary Archive Foundation.” • You provide a full refund of any money paid by a user who notifies you in writing (or by e-mail) within 30 days of receipt that s/he does not agree to the terms of the full Project Gutenberg™ License. You must require such a user to return or destroy all copies of the works possessed in a physical medium and discontinue all use of and all access to other copies of Project Gutenberg™ works. • You provide, in accordance with paragraph 1.F.3, a full refund of any money paid for a work or a replacement copy, if a defect in the electronic work is discovered and reported to you within 90 days of receipt of the work. • You comply with all other terms of this agreement for free distribution of Project Gutenberg™ works. 1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™ electronic work or group of works on different terms than are set forth in this agreement, you must obtain permission in writing from the Project Gutenberg Literary Archive Foundation, the manager of the Project Gutenberg™ trademark. Contact the Foundation as set forth in Section 3 below. 1.F. 1.F.1. Project Gutenberg volunteers and employees expend considerable effort to identify, do copyright research on, transcribe and proofread works not protected by U.S. copyright law in creating the Project Gutenberg™ collection. Despite these efforts, Project Gutenberg™ electronic works, and the medium on which they may be stored, may contain “Defects,” such as, but not limited to, incomplete, inaccurate or corrupt data, transcription errors, a copyright or other intellectual property infringement, a defective or
  • 75. damaged disk or other medium, a computer virus, or computer codes that damage or cannot be read by your equipment. 1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for the “Right of Replacement or Refund” described in paragraph 1.F.3, the Project Gutenberg Literary Archive Foundation, the owner of the Project Gutenberg™ trademark, and any other party distributing a Project Gutenberg™ electronic work under this agreement, disclaim all liability to you for damages, costs and expenses, including legal fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE. 1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you discover a defect in this electronic work within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending a written explanation to the person you received the work from. If you received the work on a physical medium, you must return the medium with your written explanation. The person or entity that provided you with the defective work may elect to provide a replacement copy in lieu of a refund. If you received the work electronically, the person or entity providing it to you may choose to give you a second opportunity to receive the work electronically in lieu of a refund. If the second copy is also defective, you may demand a refund in writing without further opportunities to fix the problem. 1.F.4. Except for the limited right of replacement or refund set forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
  • 76. INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE. 1.F.5. Some states do not allow disclaimers of certain implied warranties or the exclusion or limitation of certain types of damages. If any disclaimer or limitation set forth in this agreement violates the law of the state applicable to this agreement, the agreement shall be interpreted to make the maximum disclaimer or limitation permitted by the applicable state law. The invalidity or unenforceability of any provision of this agreement shall not void the remaining provisions. 1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation, the trademark owner, any agent or employee of the Foundation, anyone providing copies of Project Gutenberg™ electronic works in accordance with this agreement, and any volunteers associated with the production, promotion and distribution of Project Gutenberg™ electronic works, harmless from all liability, costs and expenses, including legal fees, that arise directly or indirectly from any of the following which you do or cause to occur: (a) distribution of this or any Project Gutenberg™ work, (b) alteration, modification, or additions or deletions to any Project Gutenberg™ work, and (c) any Defect you cause. Section 2. Information about the Mission of Project Gutenberg™ Project Gutenberg™ is synonymous with the free distribution of electronic works in formats readable by the widest variety of computers including obsolete, old, middle-aged and new computers. It exists because of the efforts of hundreds of volunteers and donations from people in all walks of life. Volunteers and financial support to provide volunteers with the assistance they need are critical to reaching Project Gutenberg™’s goals and ensuring that the Project Gutenberg™ collection will
  • 77. remain freely available for generations to come. In 2001, the Project Gutenberg Literary Archive Foundation was created to provide a secure and permanent future for Project Gutenberg™ and future generations. To learn more about the Project Gutenberg Literary Archive Foundation and how your efforts and donations can help, see Sections 3 and 4 and the Foundation information page at www.gutenberg.org. Section 3. Information about the Project Gutenberg Literary Archive Foundation The Project Gutenberg Literary Archive Foundation is a non-profit 501(c)(3) educational corporation organized under the laws of the state of Mississippi and granted tax exempt status by the Internal Revenue Service. The Foundation’s EIN or federal tax identification number is 64-6221541. Contributions to the Project Gutenberg Literary Archive Foundation are tax deductible to the full extent permitted by U.S. federal laws and your state’s laws. The Foundation’s business office is located at 809 North 1500 West, Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up to date contact information can be found at the Foundation’s website and official page at www.gutenberg.org/contact Section 4. Information about Donations to the Project Gutenberg Literary Archive Foundation Project Gutenberg™ depends upon and cannot survive without widespread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine-readable form accessible by the widest array of equipment including outdated equipment. Many
  • 78. small donations ($1 to $5,000) are particularly important to maintaining tax exempt status with the IRS. The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States. Compliance requirements are not uniform and it takes a considerable effort, much paperwork and many fees to meet and keep up with these requirements. We do not solicit donations in locations where we have not received written confirmation of compliance. To SEND DONATIONS or determine the status of compliance for any particular state visit www.gutenberg.org/donate. While we cannot and do not solicit contributions from states where we have not met the solicitation requirements, we know of no prohibition against accepting unsolicited donations from donors in such states who approach us with offers to donate. International donations are gratefully accepted, but we cannot make any statements concerning tax treatment of donations received from outside the United States. U.S. laws alone swamp our small staff. Please check the Project Gutenberg web pages for current donation methods and addresses. Donations are accepted in a number of other ways including checks, online payments and credit card donations. To donate, please visit: www.gutenberg.org/donate. Section 5. General Information About Project Gutenberg™ electronic works Professor Michael S. Hart was the originator of the Project Gutenberg™ concept of a library of electronic works that could be freely shared with anyone. For forty years, he produced and distributed Project Gutenberg™ eBooks with only a loose network of volunteer support.
  • 79. Project Gutenberg™ eBooks are often created from several printed editions, all of which are confirmed as not protected by copyright in the U.S. unless a copyright notice is included. Thus, we do not necessarily keep eBooks in compliance with any particular paper edition. Most people start at our website which has the main PG search facility: www.gutenberg.org. This website includes information about Project Gutenberg™, including how to make donations to the Project Gutenberg Literary Archive Foundation, how to help produce our new eBooks, and how to subscribe to our email newsletter to hear about new eBooks.
  • 80. Welcome to our website – the perfect destination for book lovers and knowledge seekers. We believe that every book holds a new world, offering opportunities for learning, discovery, and personal growth. That’s why we are dedicated to bringing you a diverse collection of books, ranging from classic literature and specialized publications to self-development guides and children's books. More than just a book-buying platform, we strive to be a bridge connecting you with timeless cultural and intellectual values. With an elegant, user-friendly interface and a smart search system, you can quickly find the books that best suit your interests. Additionally, our special promotions and home delivery services help you save time and fully enjoy the joy of reading. Join us on a journey of knowledge exploration, passion nurturing, and personal growth every day! ebookbell.com