Читать книгу Artificial Intelligent Techniques for Wireless Communication and Networking - Группа авторов - Страница 10
Оглавление
Preface
In the current digital era, artificial intelligence (AI) resembling human intelligence is enabling superior inventions for the advancement of the world. Broadening the scientific scope of AI has made it possible to change fundamentals and modulate everlasting facts in the wireless communication and networking domains. This breakthrough in AI miraculously preserves the inspired vision of communication technology.
Wireless communication and networking based on AI concepts and techniques are explored in this book, specifically focusing on the current research in the field by highlighting empirical results along with theoretical concepts. The possibility of applying AI mechanisms towards security aspects in the communication domain is also elaborated. Moreover, the application side of integrated technologies are also explored to enhance AI Revolution innovations, insights, intelligent predictions, cost optimization, inventory management, identification processes, classification mechanisms, cooperative spectrum sensing techniques, ad-hoc network architecture, and protocol and simulation-based environments.
This book allows both practitioners and researchers to share their opinions and recent research on the convergence of these technologies with those in academia and industry. The contributors have presented their technical evaluation and comparative analysis of existing technologies; and theoretical explanations and experimental case studies related to real-time scenarios are also included. Furthermore, this book will connect IT professionals, researchers, and academicians working on 5G communication and networking technologies.
The book is organized into 20 chapters that address AI principles and techniques used in wireless communication and networking. It outlines the benefits, functions, and future role of AI in wireless communication and networking. In addition, AI applications are addressed from a variety of aspects, including basic principles and prominent methodologies that offer researchers relevant instructions to follow in their research. The editing team and expert reviewers in various disciplines have thoroughly reviewed the information included.
– In Chapter 1, “Comprehensive and Self-Contained Introduction to Deep Reinforcement Learning,” P. Anbalagan, S. Saravanan and R. Saminathan present a brief guide to the deep reinforcement learning process and its detailed applications and research directions in order to enhance the basics of reinforcement mechanisms.
– In Chapter 2, “Impact of AI in 5G Wireless Technologies and Communication Systems,” A. Sivasundari and K. Ananthajothi present an in-depth overview of the implementation of AI to improve 5G wireless communication systems, discuss the role and difficulties faced, and highlight suggestions for future studies on integrating advanced AI into 5G wireless communications.
– In Chapter 3, “Artificial Intelligence Revolution in Logistics and Supply Chain Management,” P.J. Satish Kumar, Ratna Kamala Petla, Elangovan K and P.G. Kuppusamy give a brief description of recent developments and some relevant impacts concerning logistics and supply chain related to AI.
– In Chapter 4, “An Empirical Study of Crop Yield Prediction Using Reinforcement Learning,” M. P. Vaishnnave and R. Manivannan use reinforcement learning (RL) data technologies and high-performance computing to create new possibilities to activate, calculate, and recognize the agricultural crop forecast.
– In Chapter 5, “Cost Optimization for Inventory Management in Blockchain Under Cloud,” C. Govindasamy, A. Antonidoss and A. Pandiaraj investigate some of the most prominent bases of blockchain for inventory management of blockchain and cost optimization methods for inventory management in cloud.
– In Chapter 6, “Review of Deep Learning Architectures Used for Identification and Classification of Plant Leaf Diseases,” G. Gangadevi and C. Jayakumar describe the deep learning architectures for plant disease prediction and classification using standard techniques like artificial neural network (ANN), k-means classifier (K-means), recurrent neural network (RNN), k-nearest neighbor (K-NN) classifier, and support vector machine (SVM).
– In Chapter 7, “Generating Art and Music Using Deep Neural Networks,” A. Pandiaraj, Lakshmana Prakash, R. Gopal and P. Rajesh Kanna develop a model using deep neural nets that can imagine like humans and generate art and music of their own. This model can also be used to increase cognitive efficiency in AGI (artificial general intelligence), thereby improving the agent’s image classification and object localization.
– In Chapter 8, “Deep Learning Era for Future 6G Wireless Communications – Theory, Applications, and Challenges,” S. K. B. Sangeetha, R. Dhaya, S. Gayathri, K. Kamala and S. Divya Keerthi encapsulate the background of 6G wireless communication with details on how deep learning has made a contribution to 6G wireless technology and also highlight future research directions for deep learning-driven wireless technology.
– In Chapter 9, “Robust Cooperative Spectrum Sensing Techniques for a Practical Framework Employing Cognitive Radios in 5G Networks,” J. Banumathi, S.K B. Sangeetha and R. Dhaya discuss the use of cooperative spectrum sensing in cognitive radio systems to improve the efficiency of detecting primary users.
– In Chapter 10, “Natural Language Processing,” S. Meera and B. Persis Urban Ivy elucidate natural language processing (NLP), which is a branch of computer science and artificial intelligence that studies how computers and humans communicate in natural language, with the aim of computers understanding language as well as humans do.
– In Chapter 11, “Class-Level Multi-Feature Semantic Similarity-Based Efficient Multimedia Big Data Retrieval,” Sujatha D, Subramaniam M and A. Kathirvel present an efficient class-level multi-feature semantic similarity measure-based approach. The proposed method receives the input query and estimates class-level information similarity, class-level texture similarity, and class-level semantic similarity measures for different classes.
– In Chapter 12, “Supervised Learning Approaches for Underwater Scalar Sensory Data Modeling with Diurnal Changes,” J. V. Anand, T. R. Ganesh Babu, R. Praveena and K. Vidhya describe an inter-depth variation profile in line with latitude and longitude in a particular area, calculate attenuations by the temperature coefficient of real data sets, and attribute attenuation to a frequency-dependent loss.
– In Chapter 13, “Multi-Layer UAV Ad-Hoc Network Architecture, Protocol and Simulation,” Kamlesh Lakhwani, Tejpreet Singh Orchu and Aruna discuss the use of flying ad hoc networks (FANETs) to provide communication among the UAVs. In FANET, the selection of a suitable mobility model is a critical task for researchers.
– In Chapter 14, “Artificial Intelligence in Logistics and Supply Chain,” Jeyaraju Jayaprakash explains the source of activities in any white product manufacturing and service industry. This logistics and supply chain network will become more complex over the next few decades as a result of pandemic situations, natural disasters, increasing population, and other side entities developing smart strategies.
– In Chapter 15, “Hereditary Factor-Based Multi-Feature Algorithm for Early Diabetes Detection Using Machine Learning,” S. Deepajothi, R. Juliana, Aruna S K and R. Thiagarajan indicate that the predominance of diabetes mellitus among the global population ultimately leads to blindness and death in some cases. The proposed model attempts to design and deliver an intelligent solution for predicting diabetes in the early stages and address the problem of late detection and diagnosis.
– In Chapter 16, “Adaptive and Intelligent Opportunistic Routing Using Enhanced Feedback Mechanism,” V. Sharmila, Mandal K, Shankar Shalani and P. Ezhumalai discuss opportunistic routing of an intercepted packet to provide an effective wireless mesh network. Traditional opportunistic routing algorithms are being used to provide high-speed use batching of packets, which is a complex task. Therefore, an enhanced opportunistic feedback-based algorithm is proposed in this chapter in which individual packet forwarding uses a new route calculation in the proposed work that takes into consideration the cost of transmitting feedback and the capacity of the nodes to choose appropriate rates for monitoring operating conditions.
– In Chapter 17, “Enabling Artificial Intelligence and Cyber Security in Smart Manufacturing,” R. Satheesh Kumar, G. Keerthana, L. Murali, S. Chidambaranathan, C.D. Premkumar and R. Mahaveerakannan propose an efficient green manufacturing approach in SM systems with the aid of AI and cyber security frameworks. The proposed work employs a dual-stage artificial neural network (ANN) to find the design configuration of SM systems in industries. Then, for maintaining data confidentiality while communicating, the data are encrypted using the 3DES approach.
– In Chapter 18, “Deep Learning in 5G Networks,” G. Kavitha, P. Rupa Ezhil Arasi and G. Kalaimani discuss a 3D-CNN model combined with RNN model for analyzing and classifying the network traffic into three various classes, such as maximum, average and minimum traffic, which proves that the combined 3D-CNN and RNN model provides better classification of network traffic.
– In Chapter 19, “EIDR Umpiring Security Models for Wireless Sensor Networks,” A. Kathirvel, S. Navaneethan and M. Subramaniam provide an overview of WSNs with their classification, as well as comparisons between different routing algorithms and the proposed EIDR (enhanced intrusion detection and response). Soundness of proposed EIDR is tested using QualNet 5.0.
– In Chapter 20, “Artificial Intelligence in Wireless Communication,” Prashant Hemrajani, Vijaypal Singh Dhaka, Manoj Kumar Bohra and Amisha Kirti Gupta describe the applications of AI techniques in wireless communication technologies and networking, which can bring these changes through new research. Also, AI/ML techniques can improve the current state of network management, operations and automation. They can further support software-defined networking (SDN) and network function virtualization (NFV), which are considered important wireless communication technology components for the deployment of 5G and higher generation communication systems.
All of the contributors to this book deserve our heartfelt gratitude. With the fervent cooperation of the editorial director and production editor at Scrivener Publishing, we aspire to cross many more milestones to glory in the future academic year.
Prof. Dr. R. Kanthavel
Department of Computer Engineering, King Khalid UniversityAbha, Saudi Arabia
Dr. K. Ananthajothi
Department of Computer Science and Engineering Misrimal Navajee Munoth Jain Engineering CollegeChennai, India
Dr. S. Balamurugan
Founder and Chairman, Albert Einstein Engineering and Research Labs (AEER Labs)Vice-Chairman, Renewable Energy Society of India, India
Dr. R. Karthik Ganesh
Department of Computer Science and EngineeringSCAD College of Engineering and Technology Cheranmahadevi, India January 2022