Proceedings of International Conference on Communication and Artificial Intelligence
ICCAI 2021
- 2022
- Buch
- Herausgegeben von
- Vishal Goyal
- Manish Gupta
- Seyedali Mirjalili
- Aditya Trivedi
- Buchreihe
- Lecture Notes in Networks and Systems
- Verlag
- Springer Nature Singapore
Über dieses Buch
Über dieses Buch
This book is a collection of best selected research papers presented at the International Conference on Communication and Artificial Intelligence (ICCAI 2021), held in the Department of Electronics & Communication Engineering, GLA University, Mathura, India, during 19–20 November 2021. The primary focus of the book is on the research information related to artificial intelligence, networks, and smart systems applied in the areas of industries, government sectors, and educational institutions worldwide. Diverse themes with a central idea of sustainable networking solutions are discussed in the book. The book presents innovative work by leading academics, researchers, and experts from industry.
Inhaltsverzeichnis
-
Frontmatter
-
Communication System
-
Frontmatter
-
3 × 3 Split-Ring Resonators Array-Inspired Defected Ground Plane Antenna for 2.4/5.5 GHz Wireless LAN Applications
Upesh Patel, Trushit Upadhyaya, Arpan Desai, Rajat Pandey, Killol Pandya, Brijesh KundaliyaAbstractHomogeneous split-ring resonator array-inspired antenna for the Wireless LAN (WLAN) is presented in this article. The overall dimension for the designed antenna is 0.40λ mm2 ×0.32λ mm2 (at lower operating frequency). This antenna consists of the defected ground plane structure for the gain and bandwidth improvement. 3 × 3 split-ring resonator array is formed as defected ground plane. For the fabrication purpose, cost-effective and standard thickness of 1.6 mm, FR-4 substrate is used. The resonance frequencies are at 2.4 and 5.5 GHz with the values of gain are 1.06 and 2.14 dBi, respectively. The impedance bandwidths for both the frequencies are 7.5% (2.31–2.49 GHz) and 21.8% (4.9–6.1 GHz). The omnidirectional radiation patterns, overall gain, and efficiency of around 79% make the antenna most commercially suitable for the WLAN devices. -
A Review on Optimization LNA Topologies for Wideband Application
Manish Kumar, Manish Gupta, Gaurav Kumar Sharma, Aasheesh ShuklaAbstractThis paper exhibits review on different low-noise amplifier (LNA) topologies for wideband frequency applications. The LNA design metric includes gain, noise figure (NF), power dissipation, bandwidth, and linearity with broadband wideband input impedance matching. These all specified parameters required a tradeoff for optimization of LNA. This paper includes all-important LNA topologies and provides good insight to optimize LNA performance. In this paper, FOM is used to compare all the specifications on single platform. In addition, a performance summary of result has been given which will help the creation of new idea. Moreover, researchers also utilize the capabilities of soft computing like particle swarm optimization (PSO) and firefly algorithms (FA) in the area of LNA optimization and added at the end of Sect. 2. -
Speech Recognition Based Robotic Arm Writing
S. Yuvaraj, Abhishek Badholia, P. William, K. Vengatesan, Rahul BibaveAbstractThe goal of this research is to develop a low-cost, easily controlled robotic arm system based on the Arduino Uno that is lightweight, inexpensive, and simple to use for those who are physically challenged. The arm’s unique feature is that it may be completely voice-operated, which means that it will only react to commands given by a human operator to the arm. Despite the fact that there are several approaches to allow the robot to work without the need to order it manually, the voice-based strategy provides superior precision and efficiency for the robot to carry out sensitive tasks than other alternatives. The mechanical design of the robot, the selection of appropriate motors, and the use of electrical devices to direct the robotic joints are all included in the hardware element. The software component consists of algorithms that convert required words into right sequence with target places, as well as algorithms that govern the robot’s movement to ensure that it moves in accordance with the requirements. The writing process is guided by the use of speech recognition software in this case. Either by implementing a system or by utilizing Android apps, this speech recognition is made available to the user. -
A Comprehensive Investigation on Role of Machine Learning in 6G Technology
S. Bharathi, P. DurgadeviAbstractFifth generation network stands for broadband cellular network. 5G wireless networks face considerable problems due to the fast expansion of data-centric intelligent systems. It cannot completely fulfill the high compute, low latency, and other requirements of 6G applications. 6G is the next generation of wireless technology, and it is similar to 5G cellular technologies in that respect. In 6G networks, higher frequencies may be used, allowing for more capacity and decreased latency. The 6G sector is expected to make substantial advances in imaging, presence technologies, and location awareness. There will be numerous smart usage scenarios utilizing Machine Learning (ML) technology in the 6G perception that creates complicated reciprocities and a large data warehouse as well as comprehensive services. New opportunities will arise, along with a variety of privacy challenges, when ML and 6G come together. ML structures that are hidden, or the exact source of ML, can preserve privacy in 6G. On the other hand, ML can be taken by surprise or misapplied, leading to privacy violations. It is worth noting that 6G and ML collaboration might be a double-edged sword in some scenarios, rather than intrude or preserve privacy. Due to several ongoing initiatives, this study focuses to provide a comprehensive analysis of role of machine learning (ML) in 6G and its trends and technologies. -
Handoffs in Next-Generation Wireless Networks
Payal Mahajan, ZaheeruddinAbstractOver the years, a great advancement has been seen in the field of the wireless communication. Many new access technologies have been developed along with the existing wireless access technologies. For an efficient wireless communication system, a seamless handoff from one type of access technology to another type of access technology is needed. So that a user can enjoy all the wireless access technologies’ services at the same time without an interruption in the ongoing call or data session. In this paper, we have discussed about the various types of handoffs in wireless communication. A review of work done on the Handoffs is given and then a detailed LTE-Handoff procedure is explained along with the parameters of handoffs in LTE and the phases of handoffs in LTE are also explained. -
A Review: Recent Progress in Multiple Access Techniques (RSMA and IDMA) for 5G and Beyond Networks
Devendra KumarAbstractNowadays, wireless communication is played prominent role in modern scenarios. To make an effective communication, it is important to bring new changes in technology. In this paper different types of multiple access technologies have been studied and find that Performance-wise and easy to access are two parameters that have received much attention. In today’s era, NOMA (Non-orthogonal multiple access) technologies are giving better output as compared to other technologies for 5G and Beyond Communication network. Due to this, many types of multiple access technologies have been surveyed for the applications of NOMA. In which RSMA (Rate splitting multiple access) and IDMA (Interleave division multiple access) are the more suitable for NOMA applications. It has been noted IDMA that being a property like interleaving, IDMA distinguishes people very well. In every system there is always a trade-off exists, here the receiver-side complexity is increasing. To reduce this effect, RSMA is the better choice to minimize the receiver complexity. It has been found that RSMA increases the effective execution with easier architecture which assists with limiting execution delay. In this paper, it has been analyzed that RSMA gives better execution with low-complexity structure. -
A New Model for Real-Time Intrusion Prevention Systems for DDoS Attacks
Mohammed Nadir Bin Ali, Mohamed Emran Hossain, Touhid Bhuiyan, Mohammed Shamsul Hoque, J. KarthikeyanAbstractNowadays the internet has made a momentous impact on our daily life but we are not safe enough in the internet world. Last two decades, network security scholars have shown several innovative and practical solutions to save us from network and internet attacks. Among all the internet threats denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks are considered the most notorious and devastating ones. These attacks are one of the main threats that are a serious security problem for today’s internet. To exhaust the resources of target networks, these attacks are launched by generating a huge amount of network traffic. This study proposes a new model for real-time intrusion prevention systems for DDoS attacks. It is true that creative attackers are continuously developing effective attacking tools and techniques to impose maximum damage due to the rapid technological advancement. The proposed Efficient Detection System of Network Intrusion (EDSONI) model makes use of both the detection and prevention of this malicious activity properly. CICIDS2017 dataset has been applied to this proposed system to experiment with the detection and prevention performance. -
Implementation of Four-Pass Protocol Scheme Using Mathematical Series Cipher Encryption and Decryption in a Communication Network
V. Joseph Emmanuvel, E. J. Thomson FredikAbstractSecurity features come into play when it is compulsory or enviable to defend the information communication from an opponent who attempts to break the confidential information. Security of the information is the encryption of the message, which messes up the message so that the message is indecipherable by the opponent and the addition of the code based on the contents of the message which can be used to verify the uniqueness of the sender. Some information shared by two persons should be unidentified to the malicious intruders. An example is an encryption key used in concurrence with the transformation to mess up the message before transmission and unscramble it on reception. In this connect, a new algorithm has to be designed for performing and ensuring the security-related information transmission between two parties. The algorithm should be designed in such a way that an opponent cannot overcome its purpose. The secret message needs to be generated for implementing security in the algorithm. In designing the consent security service, the method has to be developed for the sharing and allocation of secret information. This research paper proposes a new technique for implementing four-pass protocol schemes which will use mathematical series perceptions for the encryption and decryption of information in a communication network. -
A Novel Spectrum Sensing Technique for Multiple Network Scenario
Sitadevi Bharatula, B. S. MurthyAbstractCognitive Radio Networks (CRN) use spectrum sensing techniques to provide connectivity to secondary users (SU) while ensuring nil or minimal interference is caused to the licensed user. Noisy conditions severely impact the finding of the spectrum white spaces as SUs generally operate at low signal power conditions and spectrum sensing may get affected by shadowing or fading. Estimating the channel state information estimation under cooperative method will provide a solution to tackle this issue wherein the primary channel state is estimated, for taking a decision on whether the primary channel is occupied or not. Multistage threshold techniques provide better accuracy in finding out the vacant primary channels, but it increases the complexity of the system. Review of the research works shows that the existing techniques are developed for a single RF signal scenario and hence not useful in a multiple network environment. Hence, in this scenario, there is a need to develop an efficient and accurate technique to detect spectrum white spaces to work effectively for multiple networks. In order to implement the spectrum sensing effectively in heterogeneous wireless networks, a novel energy detection scheme is proposed in this work for accurate spectrum sensing and efficient dynamic spectrum access to the secondary users. Probability of detection of vacant primary channel is improved in this method by combination of transmitter detection and channel state information. The combination of sensing decision and channel state estimation has been used for better spectrum sensing. Under this technique, secondary user information is processed with the help of a specially designed channel filter using universal bandpass sampling algorithm. Some important features of the spectrum sensing technique proposed in this research work are that it can sense the spectrum in heterogeneous network scenarios and under low Signal-to-Noise Ratio (SNR) conditions. The results obtained with this technique are compared with the other traditional methods which showed that it gives better performance and the same has been verified for various SNR values.
-
- Titel
- Proceedings of International Conference on Communication and Artificial Intelligence
- Herausgegeben von
-
Vishal Goyal
Manish Gupta
Seyedali Mirjalili
Aditya Trivedi
- Copyright-Jahr
- 2022
- Verlag
- Springer Nature Singapore
- Electronic ISBN
- 978-981-19-0976-4
- Print ISBN
- 978-981-19-0975-7
- DOI
- https://doi.org/10.1007/978-981-19-0976-4
Informationen zur Barrierefreiheit für dieses Buch folgen in Kürze. Wir arbeiten daran, sie so schnell wie möglich verfügbar zu machen. Vielen Dank für Ihre Geduld.