Chapter 1: Deep Convolutional Encoder-Decoder Models for Road Extraction from Aerial Imagery .- Chapter 2 :Methods, Approaches, and Techniques for Privacy-Preserving Data Mining .- Chapter 3 :Penetration Testing for the Cloud-Based Web Application .- Chapter 4 :Recurrent Neural Network based Energy Management system in Electric vehicle application with Hybrid energy sources .- Chapter 5 :Pre-Eclampsia Risk Prediction Using Machine Learning Algorithms .- Chapter 6 :Path Planning of Autonomous Vehicle For Real World Scenario using CARLA .- Chapter 7 : Analyzing the Impact of Carbon Emission in Training Neural Machine Translation Models: A Case Study .- Chapter 8 :WOMEN'S SAFETY WEARABLES DESIGN USING AN IOT-BASED FRAMEWORK TECHNOLOGY .- Chapter 9 : Improving Traffic Surveillance with Deep Learning Powered Vehicle Detection, Identification, and Recognition .- Chapter 10 : A Case Study in Requirements Analysis – Sakhee, Software Portfolio Manager .- Chapter 11 :Panorama: A Multi-Language Software Information Prospecting Facility .- Chapter 12 :UNVEILING DRIVER BEHAVIOR THROUGH CNNLSTM- BILSTM ANALYSIS OF OPERATIONAL TIME SERIES DATA .- Chapter 13 : A Systematic Review of Pomegranate Fruit Disease Detection and Classification Using Machine Learning and Deep Learning Techniques .- Chapter 14 :SURVEILLANCE WITH SMART SPHERICAL ROBOT .- Chapter 15 :Face recognition for attendance system in online classes .- Chapter 16 : An Electricity Theft Cyber-Attacks Detection System for Future IoT-based Smart Electric Meters in Renewable Distributed Generation .- Chapter 17: Exploring Research Trends through Topic Modeling of Scopus Data .- Chapter 18 : Microarray Data Classification and Gene selection using Convolutional Neural Network .- Chapter 19 :Physical Activity Detection and Tracking - Review .- Chapter 20 : Brain Inspired Traffic Incident Detection for Effective Communication .- Chapter 21 :Diminishing Unclear Consequences of Missing Values in Data Mining .- Chapter 22 :Social Media Networking Analytics and Growth Perspectives .- Chapter 23 : An Efficient Method for Evaluating the Two-terminal Reliability with A Parallel Algorithm on the Multicore Processor Architecture .- Chapter 24 :4-Port MIMO Dual Band Antenna System for 5G Sub-6 GHz and WLAN Communications .- Chapter 25 :A Secure Health Monitoring Model for Prediction of Heart Disease Detection using Machine Learning .- Chapter 26 :IoT Enabled Solar Powered Water Trash Collector with Conveyor Belt .- Chapter 27 :ECC-Based Hybrid Approach for Data Security for MANET .- Chapter 28 :5G RAN Anomaly Prediction using AI and ML .- Chapter 29 : An Intelligent Traffic Control System Incorporating Deep Learning and Computer Vision with Prioritized and Dynamic Timing .- Chapter 30 :Industrial Worker Safety Device with Proactive Gas Leak and Fire Protection System .- Chapter 31 : Exploring VANETs and their applications with Blockchain .- Chapter 32 :Exploring ICT as a Catalyst for Technological Adoption: Insights from Action Research .- Chapter 33 : "TRICHOASSIST" Trichogram Hair and Scalp Feature Extraction and Analysis using Image Processing .- Chapter 34 :Performance Analysis for Trichoscopy and Trichogram using Deep Learning and Image Processing- A Survey .- Chapter 35 :Conversation Graph Construction Approach of Cyberbully Detection using Bully Scores .- Chapter 36 :Artificial Intelligence based L&E-Refiner for Blind Learners .- Chapter 37 :Security and Journalism: A Systematic Review .- Chapter 38 :Perspective Transform Based Lane Detection for Lane Keep Assistance .- Chapter 39 :Classification of Pneumonia from chest X-Ray Image Using Convolutional Neural Network .- Chapter 40 :Enhancing Network Security with Machine Learning-Based IDSs and IPSs: An Evaluation Using UNSW-NB15 Dataset<div><br></div>