134,99 €
COGNITIVE COMPUTING MODELS IN COMMUNICATION SYSTEMS A concise book on the latest research focusing on problems and challenges in the areas of data transmission technology, computer algorithms, AI-based devices, computer technology, and their solutions. The book provides a comprehensive overview of state-of-the-art research work on cognitive models in communication systems and computing techniques. It also bridges the gap between various communication systems and solutions by providing the current models and computing techniques, their applications, the strengths and limitations of the existing methods, and the future directions in this area. The contributors showcase their latest research work focusing on the issues, challenges, and solutions in the field of data transmission techniques, computational algorithms, artificial intelligence (AI)-based devices, and computing techniques. Readers will find in this succinctly written and unique book: * Topics covering the applications of advanced cognitive devices, models, architecture, and techniques. * A range of case studies and applications that will provide readers with the tools to apply cutting-edge models and algorithms. * In-depth information about new cognitive computing models and conceptual frameworks and their implementation. Audience The book is designed for researchers and electronics engineers, computer science engineers, industrial engineers, and mechanical engineers (both in academia and industry) working in the fields of machine learning, cognitive computing, mobile communication, and wireless network system.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 292
Veröffentlichungsjahr: 2022
Cover
Title Page
Copyright
Preface
Acknowledgement
1 Design of a Low-Voltage LDO of CMOS Voltage Regulator for Wireless Communications
1.1 Introduction
1.2 LDO Controller Arrangement and Diagram Drawing
1.3 Conclusion
References
2 Performance Analysis of Machine Learning and Deep Learning Algorithms for Smart Cities: The Present State and Future Directions
2.1 Introduction
2.2 Smart City: The Concept
2.3 Application Layer
2.4 Issues and Challenges in Smart Cities: An Overview
2.5 Machine Learning: An Overview
2.6 Unsupervised Learning
2.7 Deep Learning: An Overview
2.8 Deep Learning vs Machine Learning
2.9 Smart Healthcare
2.10 Smart Transport System
2.11 Smart Grids
2.12 Challenges and Future Directions
2.13 Conclusion
References
3 Application of Machine Learning Algorithms and Models in 3D Printing
3.1 Introduction
3.2 Literature Review
3.3 Methods and Materials
3.4 Results and Discussion
3.5 Conclusion
References
4 A Novel Model for Optimal Reliable Routing Path Prediction in MANET
4.1 Introduction
4.2 Analytical Hierarchical Process Technique
4.3 Mathematical Models and Protocols
4.4 Routing Protocols
4.5 RTF-AHP Model
4.6 Models for Optimal Routing Performance
4.7 Results and Discussion
4.8 Conclusion
References
5 IoT-Based Smart Traffic Light Control
5.1 Introduction
5.2 Scope of the Proposed Work
5.3 Proposed System Implementation
5.4 Testing and Results
5.5 Test Results
5.6 Conclusions
References
6 Differential Query Execution on Privacy Preserving Data Distributed Over Hybrid Cloud
6.1 Introduction
6.2 Related Work
6.3 Proposed Solution
6.4 Novelty in the Proposed Solution
6.5 Results
6.6 Conclusion
References
7 Design of CMOS Base Band Analog
7.1 Introduction
7.2 Proposed Technique of the BBA Chain for Reducing Energy Consumption
7.3 Channel Preference Filter
7.4 Programmable Amplifier Gain
7.5 Executed Outcomes
7.6 Conclusion
References
8 Review on Detection of Neuromuscular Disorders Using Electromyography
8.1 Introduction
8.2 Materials
8.3 Methods
8.4 Conclusion
References
9 Design of Complementary Metal–Oxide Semiconductor Ring Modulator by Built-In Thermal Tuning
9.1 Introduction
9.2 Device Structure
9.3 DC Performance
9.4 Small-Signal Radiofrequency Assessments
9.5 Data Modulation Operation (High Speed)
9.6 Conclusions and Acknowledgments
References
10 Low-Power CMOS VCO Used in RF Transmitter
10.1 Introduction
10.2 Transmitter Architecture
10.3 Voltage-Controlled Ring Oscillator Design
10.4 CMOS Combiner
10.5 Conclusion
References
11 A Novel Low-Power Frequency-Modulated Continuous Wave Radar Based on Low-Noise Mixer
11.1 Introduction
11.2 FMCW Principle
11.3 Results
11.4 Conclusion
References
12 A Highly Integrated CMOS RF Tx Used for IEEE 802.15.4
12.1 Introduction
12.2 Related Work
12.3 Simulation Results and Discussion
12.4 Conclusion
References
13 A Novel Feedforward Offset Cancellation Limiting Amplifier in Radio Frequencies
13.1 Introduction
13.2 Hardware Design
13.3 Experimental Results
13.4 Conclusion
References
14 A Secured Node Authentication and Access Control Model for IoT Smart Home Using Double-Hashed Unique Labeled Key-Based Validation
14.1 Introduction
14.2 Challenges in IoT Security and Privacy
14.3 Background
14.4 Proposed Model
14.5 Results
14.6 Conclusion
14.7 Claims
References
Index
Wiley End User License Agreement
Chapter 1
Table 1.1 Requirements for the design of the two-phase operational amplifier [5–...
Table 1.2 Design requirements of maximum power transfer (MPT) [1–8].
Chapter 2
Table 2.1 Machine learning application evaluation in healthcare assessment.
Table 2.2 Machine learning application evaluation in a smart transportation syst...
Table 2.3 Machine learning application evaluation in the smart grid.
Chapter 3
Table 3.1 Using ML algorithms in design for 3D printing.
Table 3.2 Using ML algorithms security of attack detection.
Table 3.3 Use of ML algorithms in In Situ monitoring.
Table 3.4 Using ML in correlation between process parameters’ and parts’ final c...
Chapter 4
Table 4.1 Metric values from the performance metric equations.
Table 4.2 All possible routes from nodes 1 to 12.
Table 4.3 Simulation parameters.
Chapter 5
Table 5.1 Results from duo of ultrasonic devices.
Chapter 7
Table 7.1 Power layout elements at essential base band analog (BBA) requirements...
Table 7.2 Receiver baseband analog (BBA) execution report [13].
Chapter 11
Table 11.1 Values of the circuit elements of the proposed receiver.
Table 11.2 Performance comparison table.
Chapter 12
Table 12.1 Performance comparison.
Chapter 1
Figure 1.1 Schematic diagram of the low dropout control [2].
Figure 1.2 Representation of the planned low-dropout (LDO) control device [3–5].
Figure 1.3 Diagram of fault amplifier [5–8].
Figure 1.4 Intent of the two-stage operational amplifier.
Figure 1.5 Complete blueprint of the maximum power transfer (MPT) stage [9].
Figure 1.6 Dropout voltage.
Figure 1.7 Inactive current.
Figure 1.8 Line regulation.
Figure 1.9 Low dropout (LDO) in the N-channel metal–oxide semiconductor (NMOS) c...
Figure 1.10 Load guideline.
Figure 1.11 Complete load transitory response [10].
Figure 1.12 Power supply rejection ratio (PSRR) of the projected low dropout [10...
Figure 1.13 Gain and stage edge of low dropout [10].
Chapter 2
Figure 2.1 Five aspects of designing the architecture of smart cities [8].
Figure 2.2 Key challenges faced when deploying a smart city plan.
Figure 2.3 Support vector machine architecture.
Figure 2.4 Artificial neural network architecture.
Figure 2.5 Random forest architecture.
Figure 2.6 Naïve Bayes architecture.
Figure 2.7 Architecture of an autoencoder.
Figure 2.8 Architecture of CNN.
Figure 2.9 Architecture of RNN.
Figure 2.10 Healthcare framework.
Figure 2.11 Application of IoT/ML in healthcare.
Figure 2.12 Framework of a smart transport system.
Figure 2.13 Challenges in a smart transportation system.
Figure 2.14 The architecture of smart power generation and distribution.
Chapter 3
Figure 3.1 3D printing with machine learning [1].
Figure 3.2 Deploying of ML in 3D printing [2].
Figure 3.3 Use of ML in process structure properties (PSP) relationship with the...
Figure 3.4 3D model of weapon detection with ML [21].
Figure 3.5 Workflow of using AE and SCNN for in situ monitoring [22].
Figure 3.6 CNN based model for in situ monitoring [25].
Figure 3.7 Offline ML model for integrating AM and ML (Gobert et al. 2018) [6].
Chapter 4
Figure 4.1 Analytical hierarchical process (AHP) architecture flow.
Figure 4.2 Structure of the rough set TOPSIS fuzzy-based analytical hierarchy pr...
Figure 4.3 Comparison of the observed and computed CPU execution times with numb...
Figure 4.4 Comparison of the measured and simulated CPU execution time period vs...
Figure 4.5 Throughput vs Name of the paths.
Figure 4.6 Data transmission through path 2-18-22.
Chapter 5
Figure 5.1 Wamp server screen shot.
Figure 5.2 Existing system diagram.
Figure 5.3 Expected IoT-based traffic control system model.
Figure 5.4 Traffic network system animated diagram.
Figure 5.5 Flow chart diagram.
Figure 5.6 Output of single traffic light prototype.
Figure 5.7 Hardware prototype model of IoT traffic control system.
Figure 5.8 Status of traffic signals stored in database.
Figure 5.9 Status of traffic lights (Output 1).
Figure 5.10 Status of traffic lights when density is 0 (Output 2).
Figure 5.11 Status of traffic lights when density is not zero (Output 3).
Figure 5.12 Status of traffic lights when density is not zero (Output 4).
Chapter 6
Figure 6.1 Proposed architecture.
Figure 6.2 An example of generalization tree.
Figure 6.3 Access tree.
Figure 6.4 Encryption and decryption of keys using AHAC.
Chapter 7
Figure 7.1 Base band analog (BBA) circuit for direct conversion receiver (DCR) l...
Figure 7.2 Base band analog (BBA) strip that changes the filters and gain levels...
Figure 7.3 Two-level operational amplifier (op-amp).
Figure 7.4 Current utilization vs. A
v1
.
Figure 7.5 Simulation results for the transistor circuit-level spurious-free dyn...
Figure 7.6 Diagrammatic representation of the resistor–capacitor (RC) filter. (a...
Figure 7.7 Diagrammatic representation of the programmable gain amplifier (PGA)....
Figure 7.8 Microphotograph of the baseband design.
Figure 7.9 Graph between the frequency (in hertz) and gain (in decibels) of the ...
Figure 7.10 Gain programmable working of the receiver baseband analog (BBA).
Chapter 8
Figure 8.1 Process steps in the detection of neuromuscular disorders.
Chapter 9
Figure 9.1 (a) Photograph of the ring modulator. The upper-right 25% of the ring...
Figure 9.2 (a) P–N diode with diverse reverse biases practical to obtaining the ...
Figure 9.3 (a) Ring modulator with a small-signal circuit model and with circuit...
Figure 9.4 Optical eye of 25 Gb/s from the ring modulator with altered laser wav...
Chapter 10
Figure 10.1 Direct conversion wireless sensor transmitter architecture.
Figure 10.2 Proposed voltage-controlled ring oscillator (VCO) delay cell impleme...
Figure 10.3 Transient response of the voltage-controlled ring oscillator (VCO) a...
Figure 10.4 Proposed subtractor based on complementary metal–oxide–semiconductor...
Figure 10.5 Temporary subtractor reaction at node V
OUT2
for two in-segment compe...
Figure 10.6 (a) Die microphotograph of the voltage-controlled ring oscillator (V...
Chapter 11
Figure 11.1 Block diagram of direct conversion receiver (DCR).
Figure 11.2 Baseband signal degraded by FN.
Figure 11.3 FMCW principle of a sawtooth wave.
Figure 11.4 Schematic of proposed Rx.
Figure 11.5. (a) balanced mixer; (b) balanced mixer with current-bleeding techno...
Figure 11.6 Simulated FN of mixer with different LO power.
Figure 11.7 (a) S-parameters of LNA; (b) Noise figure of LNA; (c)P1 dB of LNA; (...
Figure 11.8 (a) Conversion gain and NF of receiver; (b) S-parameters of RF and L...
Figure 11.9 (a) FN results of mixer; (b) FN results of Rx.
Chapter 12
Figure 12.1 Sharing of power utilization using processing and transferring.
Figure 12.2 Schematic of the T
x
radio frequency amplifier.
Figure 12.3 Power amplifier.
Figure 12.4 S-parameters: (a) I/P return loss (S
11
) and (b) re verse isolation (...
Chapter 14
Figure 14.1 IoT applications.
Figure 14.2 IoT network linked devices.
Figure 14.3 Smart home controlling models.
Figure 14.4 Proposed model framework.
Figure 14.5 User authentication time levels.
Figure 14.6 Unauthorized user detection time levels.
Figure 14.7 Unique labeled key generation time levels.
Figure 14.8 Smart home security levels during instruction transmission.
Figure 14.9 Access control restriction level for unauthorized users.
Cover
Table of Contents
Title Page
Copyright
Preface
Acknowledgement
Begin Reading
Index
End User License Agreement
v
ii
iii
iv
xi
xii
xiii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
189
190
191
192
193
194
195
196
197
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
221
222
223
224
225
Scrivener Publishing
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106
Concise Introductions to AI and Data Science
Series Editor: Dr. Prasenjit Chatterjee, MCKV Institute of Engineering, West Bengal, India,
Dr. Loveleen Gaur, Amity International Business School (AIBS), India,
Dr. Morteza Yazdani, ESIC Business & Marketing School, Madrid, Spain
Scope: Reflecting the interdisciplinary and thematic nature of the series, Concise Introductions to (AI) and Data Science presents cutting-edge research and practical applications in the area of Artificial Intelligence and data science. The series aims to share new approaches and innovative perspectives in AI and data analysis from diverse engineering domains to find pragmatic and futuristic solutions for society at large. It publishes peer-reviewed and authoritative scholarly works on theoretical foundations, algorithms, models, applications and case studies on specific issues. The monographs and edited volumes will be no more than 75,000 words.
Submission to the series:
Please send proposals to one of the 3 editors:
Publishers at Scrivener
Martin Scrivener ([email protected])
Phillip Carmical ([email protected])
Budati Anil Kumar
ECE Department, Gokaraju Rangaraju Institute of Engineering & Technology, Hyderabad, India
S. B. Goyal
Faculty of Information Technology, City University, Malaysia
and
Sardar M.N. Islam
The American University of Ras Al Khaimah (AURAK), United Arab Emirates
This edition first published 2022 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA
© 2022 Scrivener Publishing LLC
For more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
Wiley Global Headquarters
111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Limit of Liability/Disclaimer of Warranty
While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Library of Congress Cataloging-in-Publication Data
ISBN 978-1-119-86507-0
Cover image: Pixabay.Com
Cover design by Russell Richardson
Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines
Domain-specific system architectures such as software and hardware are attracting attention for use in overcoming the stagnation of size scaling of memory and domain functions in wireless communication systems. The need for improvements in performance to lower latency, and for faster simulation and power efficiency requires dedicated software and hardware focused on accelerating key applications. This type of system is widespread, and artificial intelligence, hardware description languages, machine learning, neural networks, advanced computer algorithms, and deep learning are especially becoming mainstream in all areas. The rapid growth of applications and system software is also reflected in hardware system architectures, signal processing speeds, wired/wireless communication systems, computational algorithms, and data storage/transmission systems.
Ensuring the security and efficiency of communication system design and implementation is a top priority. Recent research has been aimed at a higher degree of autonomy of such systems in architecture/system design, implementation, and optimization, especially in areas such as advanced system architecture, digital signal processing, communication systems, and the internet. This poses new challenges for implementation and validation. Therefore, much research is being conducted in the area of embedded security and autonomous software systems of things and various aspects of communication systems and computing technologies. To this end, this book provides a comprehensive overview of current research on cognitive models in communication systems and computing. Furthermore, it aims to fill in the gap between various communication systems and solutions by providing current models and computing technologies, their applications, the strengths and limitations of existing methods, and future directions in this area.
The main purpose of this book is to publish the latest research papers focusing on problems and challenges in the areas of data transmission technology, computer algorithms, artificial intelligence (AI)-based devices, computer technology, and their solutions to motivate researchers. Therefore, it will serve as an instant ready reference for researchers and professionals working in the area of Cognitive Models.
The Editors
July 2022
We, the editors of Cognitive Models in Communication Systems and Computing Methods, wish to acknowledge the hard work, commitment and dedication of the authors who have contributed their wonderful chapters to this book within the stipulated time frame.
Furthermore, we would like to convey our special gratitude to Dr. Prasenjit Chatterjee, Dean (Research and Consultancy) of MCKV Institute of Engineering, West Bengal, India, for his consistent support and guidance at each stage of the book’s development.
We wish to bestow our best regards to all the reviewers for providing constructive comments to the authors to improve their chapters to meet the publisher’s standard, quality and coherence. A successful book publication is the integrated result of more people than the people granted credit as editor and author and we acknowledge these unsung heroes.
Finally, we, the editors, acknowledge everyone who helped us directly and indirectly.
Budati Anil Kumar
S. B. Goyal
Sardar M.N. Islam
August 2022
Pradeep Bedi1, S. B. Goyal2*, Sardar MN Islam3, Jia Liu4 and Anil Kumar Budati5
1Galgotias University, Greater Noida, Uttar Pradesh, India
2Faculty of Information Technology, City University, Petaling Jaya, Malaysia
3