- Home
- A-Z Publications
- International Journal of Sensors Wireless Communications and Control
- Previous Issues
- Volume 14, Issue 3, 2024
International Journal of Sensors Wireless Communications and Control - Volume 14, Issue 3, 2024
Volume 14, Issue 3, 2024
-
-
Artificial Intelligence-based Fair Allocation in NOMA Technique: A Review
Authors: Seda Kirtay, Kazim Yildiz and Veysel Gökhan BocekciNon-Orthogonal Multiple Access (NOMA) is an innovation that has great potential in wireless communication. It permits multiple users to efficiently allot a frequency band by adjusting their power allocations. Nevertheless, attaining fair power allocation in NOMA structures presents complex challenges that require specific models, extensive training data, and addressing issues of generalization. This review aims to explore the applications of Artificial Intelligence (AI) and Deep Learning (DL) methods to tackle the challenges associated with fair power allocation in NOMA systems. The focus is on developing strong AI-DL models and creative optimization methods specifically designed for dynamic environments to improve transparency and interpretability. This study explores a wide range of techniques, including Reinforcement Learning, Convolutional Neural Networks (CNN) for power allocation, Generative Adversarial Networks, Deep Reinforcement Learning, and Transfer Learning. The goal is to enhance various aspects, such as power allocation, user coupling, scheduling strategies, interference cancellation, user mobility, security, and deeplearning- based NOMA. Despite the difficulties, impartial power allocation algorithms based on AI and DL show promise in improving user performance and promoting fair power distribution in NOMA systems. This study emphasizes the significance of continuous research efforts to overcome current obstacles, enhance efficiency, and strengthen the dependability of wireless communication systems. This highlights the significance of NOMA as an advanced innovation for upcoming wireless generations that go beyond 5G. Future areas of study involve investigating federated learning and novel techniques for gathering data and utilizing interpretable AI-DL models to address existing constraints. Overall, this review highlights the potential of AI and DL techniques in achieving fair power distribution in NOMA systems. However, further investigation is crucial to addressing obstacles and fully exploring the capabilities of NOMA technology.
-
-
-
A Deep Learning Framework for IoT Lightweight Traffic Multi-classification: Smart-cities
Aims and Background: Increased traffic volume is a major challenge for effective network management in the wake of the proliferation of mobile computing and the Internet of Things (IoT). Earlier models surrender efficiency to achieve high-precision classification outcomes, which are no longer fitting for limited assets in edge network circumstances, making traffic classification a difficult task for network administrators everywhere. Given the nature of the problem, the current state of the art in traffic classification is characterized by extremely high computational complexity and large parameters. Methodology: To strike a clever balance between performance and size, we present a deep learning (DL)-based traffic classification model. We begin by decreasing the amount of model parameters and calculations by modifying the model's scale, width, and resolution. To further improve the capability of feature extraction at the traffic flow level, we secondly incorporate accurate geographical information on the attention mechanism. Thirdly, we get multiscale flow-level features by employing lightweight multiscale feature fusion. Results: The results of our experiments demonstrate that our model has high classification accuracy and efficient operation. Our study presents a traffic categorization model with an accuracy of over 99.82%, a parameter reduction of 0.26M, and a computation reduction of 5.26M. Conclusions: Therefore, this work offers a practical design used in a genuine IoT situation, where IoT traffic and tools' profiles are anticipated and classified while easing the data dispensation in the higher levels of an end-to-end communication strategy.
-
-
-
Framework for Image Denoising Employing Different Thresholding Techniques
Authors: Monika Bharti, Shruti Jain and Himanshu JindalBackground: Noise represents a lack of data in the image which can be removed using Image denoising. Image denoising can be achieved by Gaussian filtering, anisotropic filtering, wavelet Thresholding, etc. Objective: In this paper, authors have used Wavelet-based denoising because it can effectively remove both additive and multiplicative noise from images, and preserve fine details and edges in the image. Methods: The different thresholding techniques like Visu Shrink and Bayes Shrink for Hard Thresholding (HT) and Soft Thresholding (ST) employing different standard deviations ranging from 0.05-0.3 with a difference of 0.05 is used. Results: The peak signal-to-noise ratio (PSNR) is evaluated as a performance parameter. For grayscale images, the maximum value of PSNR is obtained as 29.483 dB while for RGB images, 34.324dB using Bayes Shrink considering ST at 0.05 variance is achieved. 2.2% improvement is observed for grayscale images while 8.6% improvement is observed for RGB images considering Bayes Shrink ST over Bayes Shrink HT. Conclusion: While comparing PSNR values of other Thresholding techniques, ST results better over HT. The PSNR values for images produced by Bayes Shrink are high which therefore states that the quality of reconstructed images is better for Bayes Shrink than Visu Shrink.
-
-
-
Enhancing Indoor Navigation for Visually Impaired Individuals with an AI Chatbot Utilizing VEO Optimized Nodes and Natural Language Processing
Authors: Nagaraju Thandu and Murugeswari RathinamAims and Background: Visually impaired people face numerous challenges when it comes to indoor navigation. While outdoor navigation benefits from advancements in GPS and related technologies, indoor spaces present intricate, complex, and often less accessible environments for those with visual impairments. Objective and Methodology: In response to these challenges, we propose an innovative approach to enhance indoor navigation for individuals with visual impairments, leveraging the power of an AI chatbot. Our AI chatbot employs cutting-edge artificial intelligence techniques to provide realtime assistance and guidance, facilitating independent navigation within intricate indoor settings. By harnessing natural language processing technologies, the chatbot engages in intuitive interactions with users, comprehending their queries and offering detailed instructions for efficient indoor navigation. The main goal of this research is to enhance the independence of people with visual impairments by offering them a reliable and easily accessible tool. Results and conclusion: This tool, driven by our Volcano Eruption Optimization Network, promises to significantly enhance the independence and overall indoor navigation experience for visually impaired people, ultimately fostering a greater sense of autonomy in navigating complex indoor spaces.
-
-
-
Design and Implementation of Long Range Wide Area Networks for Future Industrial IoT Applications
More LessBackground: The evolution of Long Range Wide Area Networks (LoRaWAN) is a potential candidate for next generation networks for managing the massive number of devices in the Industrial Internet of Things (IIoT). LoRaWAN is more suitable for transmitting smaller intermittent data but using smaller bandwidth over a long distance. Objective: This research paper proposes to design a Low Power Wide Area Network (LPWAN) to provide long-range data transfer for Industrial IoT applications, especially for industrial sensor data. Methods: This research work deploys the experimental setup of LoRaWAN devices using LoRa gateways and Internet of Things network server to evaluate its performance for IIOT applications. Results: The deployment of this LoRaWAN has demonstrated its long range, low power, stability and low deployment cost through extensive performance evaluation carried out. LoRaWAN has been analyzed for its coverage and throughput performance. Conclusion: Through performance analysis, potential enhancements have been identified to overcome its shortcomings. This paper concludes the feasibility of deploying LoRaWAN technology for the future generation IIOT applications.
-
-
-
An Intelligent Cryptographic Approach for Preserving the Privacy and Security of Smart Home IoT Applications
Authors: TN Chitti and Maharajan KalianandiBackground: Today, computer networks are everywhere, and we utilize the Internet to access our home network. IoT networks connect home appliances and provide remote instructions. Access to any tool over an uncertain network attracts assaults. User authentication might be password- or biometric-based. Data security across a secure network like the Internet is difficult when authenticating a device. Hashing is used for validation and confidentiality in several encryption and decryption schemes. Classic cryptographic security methods require a lot of memory, processing power, and power. They cannot work with low-resource IoT devices. Methods: Automatic Device-to-Device communiqué opens up new applications, yet network machines and devices have limited resources. A remote-access home device authentication mechanism is proposed in this research. A new, lightweight encryption approach based on Deoxyribonucleic- Acid (DNA) sequences is developed to make IoT device connections easy and secure. Home network and appliance controller devices use authentication tools. DNA sequences are random therefore we utilized them to create a secure secret key. Results: Efficiency and strength are advantages of the proposed method. Our method prevents replay, server spoofing, and man-in-the-middle attacks. The suggested method protects network users and devices. Conclusion: Meanwhile, we model the system and find that the network's delay, throughput, and energy consumption don't degrade considerably.
-
-
-
Performance Analysis of Filtered OFDM using MLE for Wireless Communication Networks
Authors: Asia Hazareena, Kavitha Shekhara and Mohammed Z. BellaryIntroduction: OFDM has evolved as an effective modulation format for 4G mobile network technologies, Long-Term Evolution, and Worldwide Interoperability for Microwave Access. OFDM is the modulation technique adopted for communication standards such as DSL, wireless LAN, DVB, and DAB. However, because CP-OFDM has considerable out-of-band emission that may interfere with transmissions in adjacent bands and applies a single set of parameters to the whole band to fulfill a given service, it is unable to accommodate the diversity of services. The objective of the research is to develop a novel waveform with better adaptability than CP-OFDM that employs filters to increase spectrum containment. In this view, an FIR filter that uses the Blackman window function to lessen the OOBE is proposed in this manuscript. Filtered OFDM is sensitive to carrier frequency offset (CFO). CFO increases the Inter-Carrier Interference (ICI) in F-OFDM systems. However, research work that combines the CFO compensation technique with filtered OFDM has not been listed in the literature so far. Methods: In this paper, Maximum likelihood estimation is used to cancel the ICI caused by the CFO. The high PAPR of filtered OFDM is one of its drawbacks. The amplitude clipping method is used to reduce the PAPR. The distortion caused by amplitude clipping is prevented by filters used in the FOFDM system. Highlights: • A novel waveform addressing OOBE issues in OFDM is developed for 4G wireless communication networks. • An innovative solution using MLE is proposed to address the challenges faced by the filtered OFDM system due to the CFO. • Article addresses the high PAPR problem of filtered OFDM. Results: The performance of filtered OFDM with amplitude clipping is analyzed in terms of BER, PSD, and PAPR over the AWGN channel. Conclusion: Simulation results show that, when compared to the traditional OFDM system, such a combined method effectively suppresses PAPR while maintaining good BER (Bit Error Rate) and OOBE performance.
-