SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
Top10 Cited Articles in
Computer Networks&
Communications
2021-2022
International Journal of Computer
Networks& Communications (IJCNC)
http://airccse.org/journal/ijcnc.html
(Scopus, ERA Listed, WJCI Indexed)Scopus Cite Score 2022—1.7
ISSN 0974 - 9322 (Online); 0975 - 2293 (Print)
Citations, h-index, i10-index
Citations 6814 h-index 35 i10-index 194
DEVELOPING AN ADAPTIVE CHANNEL MODELLING USING A
GENETIC ALGORITHM TECHNIQUE TO ENHANCE AERIAL
VEHICLE-TO-EVERYTHING WIRELESS COMMUNICATIONS
Faris. A. Almalki
Department of Computer Engineering, College of Computers and Information Technology, Taif
University, Kingdom of Saudi Arabia
March 2021 | Cited by 12
ABSTRACT
In this digital era, Internet of Everything (IoE) has a potential to bring out drastic changes to how we live
today, where billions of people and devices require wireless connectivity. Where Unmanned Aerial
Vehicles contribute positively in paving the way for IoE and Fifth Generation technologies, and tackle
some of their comms challenges. Thus, this paper aims to provide an adaptive approach using a Genetic
Algorithm (GA) technique by combining indoor and outdoor propagation models to enhance aerial
vehicle-to-everything wireless connectivity. The proposed adaptive approach uses a GA multi-objective
function that yield optimum values of UAV altitude, elevation angles, and type of building for indoor
environment. The proposed GA optimization technique has met the demand of a typical dense-populated
urban environment, as well as empowering the IoE with greater coverage footprint, high Quality of
Service benchmark, and line-of-sight adaptability. The output results emphasized that the proposed
adaptive approach using the GA technique can help in smart decision-making and selecting a proper
setup and find the optimum parameters to provide seamless wireless connections from aerial vehicle-to-
everything.
KEYWORDS
Unmanned Aerial Vehicles, Internet of Everything, Channel Modelling, Propagation Model,
Fifth Generation
For More Details : https://aircconline.com/ijcnc/V13N2/13221cnc03.pdf
Volume Link : https://airccse.org/journal/ijc2021.html
Google scholar citations
https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20
&pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:nWoA1JPTheMC
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED
MODEL FOR COMPUTER NETWORK ANOMALY DETECTION WITH
SHAPLEY ADDITIVE EXPLANATION (SHAP)
Khushnaseeb Roshan and Aasim Zafar
Department of Computer Science, Aligarh Muslim University, Aligarh-202002, India
November 2021 | Cited by 6
ABSTRACT
Machine learning (ML) and Deep Learning (DL) methods are being adopted rapidly, especially in
computer network security, such as fraud detection, network anomaly detection, intrusion detection, and
much more. However, the lack of transparency of ML and DL based models is a major obstacle to their
implementation and criticized due to its black-box nature, even with such tremendous results.
Explainable Artificial Intelligence (XAI) is a promising area that can improve the trustworthiness of
these models by giving explanations and interpreting its output. If the internal working of the ML and
DL based models is understandable, then it can further help to improve its performance. The objective of
this paper is to show that how XAI can be used to interpret the results of the DL model, the autoencoder
in this case. And, based on the interpretation, we improved its performance for computer network
anomaly detection. The kernel SHAP method, which is based on the shapley values, is used as a novel
feature selection technique. This method is used to identify only those features that are actually causing
the anomalous behaviour of the set of attack/anomaly instances. Later, these feature sets are used to train
and validate the autoencoderbut on benign data only. Finally, the built SHAP_Model outperformed the
other two models proposed based on the feature selection method. This whole experiment is conducted
on the subset of the latest CICIDS2017 network dataset. The overall accuracy and AUC of
SHAP_Model is 94% and 0.969, respectively.
KEYWORDS
Network Anomaly Detection, Network Security, Autoencoder, Shapley Additive Explanation,
Explainable AI (XAI), Machine Learning
For More Details : https://aircconline.com/ijcnc/V13N6/13621cnc07.pdf
Volume Link : https://airccse.org/journal/ijc2021.html
Google scholar citations
https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20
&pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:NtGNdKbuCngC
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY
AGREEMENT FOR INTERNET OF THINGS
Beaton Kapito1,3, Mwawi Nyirenda1 and Hyunsung Kim1,2
1Department of Mathematical Sciences, University of Malawi, Zomba, Malawi
2 School of Computer Science, Kyungil University, Kyungbuk, Korea 3Malawi Adventist
University, Ntcheu, Malawi
March 2021 | Cited by 5
ABSTRACT
Internet of things (IoT) is the integration of computer-based systems and the physical world in which
things interact with each other. Due to heterogeneity and resource-constrained feature of IoT devices,
there are many privacy and security challenges resulting in many threat vulnerabilities in IoT
environments. After reviewing and analyzing the recent IoT security, privacy, and authentication
protocols, we will withdraw research gaps focused on the elimination of human factors in IoT
authentication. In order to fill these research gaps, this paper proposes a privacy-preserving machine
authenticated key agreement based on IoT, denoted as IoTMAKA. IoTMAKA uses dynamic identity and
machine fingerprint to provide security and privacy. Security analysis shows that IoTMAKA provides
anonymity and untraceability, provides freshness, and is secure against passive and active attacks.
IoTMAKA reduces communication overheads by 20% and computational overheads by 25% on average
as compared to the previous related works.
KEYWORDS
Internet of Things, Authenticated Key Agreement, Privacy, Machine Authentication,
Cryptography
For More Details : https://aircconline.com/ijcnc/V13N2/13221cnc06.pdf
Volume Link : https://airccse.org/journal/ijc2021.html
Google scholar citations
https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20
&pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:Tfl4UtY-dJUC
A NOVEL ROUTING STRATEGY TOWARDS ACHIEVING ULTRA-
LOW END-TO-END LATENCY IN 6G NETWORKS
Satya R. Das1, Sayan Sen Sarma2, Mitrabinda Khuntia1, Indranil Roy3,Koushik Sinha3, and
Bhabani P. Sinha1
1 Dept. of Computer Science & Engg., SOA University, Bhubaneswar, India.
2 Dept. of Computer Science & Engg., University of Calcutta, West Bengal, India.
3 School of Computing, Southern Illinois University, Carbondale, USA.
January 2022 | Cited by 5
ABSTRACT
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for
packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have
focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based
backbone network architecture coupled with high-speed wireless networks to connect end-devices to the
backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical
fiber grid network as its backbone. After messages from a source node enter the backbone network
through a local wireless network, these are delivered very fast to an access point in the backbone
network closest to the destination node, followed by its transfer to the local wireless network for delivery
to the destination node. We propose a novel routing strategy which is based on distributing the messages
in the network in such a way that the average queuing delay of the messages through the backbone
network is minimized, and also the route discovery time at each router in the backbone network is
drastically reduced. Also, multiple messages destined towards a particular destination router in the
backbone network are packed together to form a mailbag, allowing further reductions in processing
overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in
each router. The performance of the proposed approach green based on these ideas has been theoretically
analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end
latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic
conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid
over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1
Gbps downlink channel from the backbone network to the destination. The significant reduction in end-
to-end latency as compared to existing routing solutions clearly demonstrates the potential of our
proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G
networks, particularly for mobile edge computing (MEC) application scenarios.
KEYWORDS
6G, Beyond 5G, 5G, Routing, Ultra-low latency, Network architecture, Queuing delay
For More Details : https://aircconline.com/ijcnc/V14N1/14122cnc01.pdf
Volume Link : https://airccse.org/journal/ijc2022.html
Google scholar citations
https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20
&pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:pUxgyZctzPYC
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION
METHOD TO PROLONG THE NETWORK LIFETIME IN WSNS
Jungsub Ahn1 and Sanghyeok Lim2 and Taeho Cho3*
1Department of Electrical and Computer Engineering, Sungkyunkwan University, Republic of
Korea
2Amorepacific Republic of Korea
3*Department of Computer Science and Engineering, Sungkyunkwan University, Republic of
Korea
November 2021 | Cited by 4
ABSTRACT
Recently, sensor networks have been used in a wide range of applications, and interest in sensor node
performance has increased. A sensor network is composed of tiny nodes with limited resources. The
sensor network communicates between nodes in a configured network through self-organization. An
energyefficient security protocol with a hierarchy structure with various advantages has been proposed to
prolong the network lifetime of sensor networks. But due to structural problems in traditional protocols,
nodes located upstream tend to consume relatively high energy compared to other nodes. A network
protocol should be considered to provide minimal security and efficient allocation of energy
consumption by nodes to increase the network lifetime. In this paper, we introduce a solution to solve the
bottleneck problem through an efficient message route selection method. The proposed method selects
an efficient messaging path using GA and fuzzy logic composed of multiple rules. Message route
selection plays an important role in controlling the load balancing of nodes. A principal benefit of the
proposed scheme is the potential portability of the clustering-based protocol. In addition, the proposed
method is updated to find the optimal path through the genetic algorithm to respond to various
environments. We demonstrated the effectiveness of the proposed method through an experiment in
which the proposed method is applied to a probabilistic voting-based filtering scheme that is one of the
cluster-based security schemes.
KEYWORDS
Wireless sensor network, Fuzzy logic, Load balancing, Genetic algorithm.
For More Details : https://aircconline.com/ijcnc/V13N6/13621cnc05.pdf
Volume Link : https://airccse.org/journal/ijc2021.html
Google scholar citations
https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20
&pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:1EqfMoDn7-AC
SELF-PRUNING BASED PROBABILISTIC APPROACH TO MINIMIZE
REDUNDANCY OVERHEAD FOR PERFORMANCE IMPROVEMENT
IN MANET
Gyanendra Kumar Pallai1, Meenakshi Sankaran2 and Amiya Kumar Rath3
1Department of Computer Science & Engineering,SOA Deemed-to-be University,
Bhubaneswar, India,
2VIT Business School, VIT Bhopal University, Bhopal, India
3Department of Computer Science & Engineering, Veer Surendra Sai University of
Technology, Burla. Deputed as adviser to National Assessment & Accreditation Council,
Bengaluru, India
March 2021 | Cited by 4
ABSTRACT
The Broadcast storm problem causes severe interference, intense collision and channel contention, which
greatly degrades the QoS performance metrics of the routing protocols. So, we suggest a neighbourhood
coverage knowledge probabilistic broadcasting model (NCKPB) integrating with AODV protocol with
knowledge on 2-hop neighbourhood coverage; a connectivity function to control a node’s forwarding
probability of retransmission to alleviate significant overhead redundancy. Our objective is to minimize
the broadcast RREQ overhead while ensuring fair retransmission bandwidth. We considered two more
important measures called Saved Rebroadcast and Reachability. The outcomes of NCKPB, Fixed
probability (FP) and Flooding (FL) routing schemes are examined under three major operating
conditions, such as node density, mobility and traffic load. The NS-2 results demonstrate the efficacy of
the proposed NCKPB model by illustrating its performance superiority over all key metrics such as
redundancy overhead, end to end latency, throughput, reachability, saved rebroadcast and collision
contrast to FP and FL.
KEYWORDS
Broadcasting, Flooding, Self-pruning, Neighbour Coverage, Forwarding Probability,
Connectivity Metric.
For More Details : https://aircconline.com/ijcnc/V13N2/13221cnc02.pdf
Volume Link : https://airccse.org/journal/ijc2021.html
Google scholar citations
https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20
&pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:Oo1CbQkBAzEC
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD
HOC NETWORK
Priyanka Pandey and Raghuraj Singh
Department of Computer Science and Engineering, Harcourt Butler Technical University,
Kanpur, India
July 2021 | Cited by 3
ABSTRACT
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in
infrastructure-less wireless communication network. Routing in this kind of communication network is
highly affected by its restricted characteristics such as frequent topological changes and limited battery
power. Several research works have been carried out to improve routing performance in MANET.
However, the overall performance enhancement in terms of packet delivery, delay and control message
overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient
and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over
AODV to establish a better quality route between source and destination. In this method, we have
modified the route request and route reply phase. During the route request phase, cost metric of a route is
calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase,
average residual energy and average delay of overall path is calculated and the data forwarding decision
is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives
better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control
message overhead as compared to AODV.
KEYWORDS
Mobile Ad hoc Network, Energy, AODV, Routing, Random Waypoint Model.
For More Details : https://aircconline.com/ijcnc/V13N4/13421cnc02.pdf
Volume Link : https://airccse.org/journal/ijc2021.html
Google scholar citations
https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20
&pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:rFyVMFCKTwsC
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON
BLOOM FILTERS (CIA-BF) FOR HIGH PERFORMANCE
MONITORING APPLICATIONS OF INTERNET OF THINGS
Fawaz Alassery and Maha M. Althobaiti
College of Computers and Information Technology, Taif University, Taif, Saudi Arabia
January 2021 | Cited by 3
ABSTRACT
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications
such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators,
edge routers, and Base Stations (BS) which communicate with each other and send millions of data
packets that need to be delivered to their destination nodes successfully to ensure the High-performance
communication networks. IoT devices connect to the Internet using wired or wireless communication
channels where most of the devices are wearable, which means people slowly move from one point to
another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an
important research challenge while considering the limitation of some IoT devices that may have limited
power resources or limited coverage areas. Many Kinds of research focus on how to customize routing
protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP
addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on
any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or
high). While IoT devices have different characteristics, a multicasting mechanism to send one message
to various groups of devices will not be efficient in IoT communication networks since the aggregation
of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that
need to be sent to a specific group of devices. In this paper, we propose efficient context-aware
addressing mechanism, which is based on bloom filters to increase the performance of IoT
communication networks. A routing architecture is built based on bloom filters which store routing
information. In our works, we reduce the size of routing information using a proposed aggregation
mechanism which is based on connecting each group of IoT devices with an edge router which is
hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a
significant improvement in the IoT performance metrics such as packets transmission delay, jitter the
throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing
protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc
On-demand Distance Vector routing protocol (AODV).
KEYWORDS
Internet of Things, context-aware addressing, bloom filters, High-performance IoT, routing in
IoT. Packets aggregation mechanism.
For More Details : https://aircconline.com/ijcnc/V13N1/13121cnc07.pdf
Volume Link : https://airccse.org/journal/ijc2021.html
Google scholar citations
https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20
&pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:d4tt_xEv1X8C
EVOLUTIONARY COMPUTING BASED NEURON-COMPUTATIONAL
MODEL FOR MICROSTRIP PATCH ANTENNA DESIGN
OPTIMIZATION
Rohini Saxena, Mukesh Kumar and Shadman Aslam
Department of Electronics and communication, University of Allahabad, U.P., India
May 2021 | Cited by 2
ABSTRACT
In this paper, a novel Evolutionary Computing named Adaptive Genetic Algorithm (AGA) based ANN
model is developed for rectangular MPA (Microstrip patch antenna). Considering at-hand and
Nextgeneration Ultra wideband application demands, the emphasis has been made on retaining optimal
lowcost design with desired cut-off frequency. The proposed method employs multiple sets of
theoreticallydriven training instances or patch antenna design parameters which have been processed for
normalization and sub-sampling to achieve a justifiable and reliable sample size for further design
parameter prediction. Procedurally, the input design parameters were processed for normalization
followed by sub-sampling to give rise to a sufficient set of inputs to perform knowledge-driven
(designparameter) prediction. Considering limitations of the major at-hand machine learning methods
which often undergo local minima and convergence while training, we designed a state-of-art new
Adaptive Genetic Algorithm based neuro-computing model (AGA-ANN), which helped to predict the
set of optimal design parameters for rectangular microstrip patch antenna. The predicted patch antenna
length and width values were later used for verification which achieved the expected frequency. The
depth analysis revealed that a rectangular patch antenna with width 14.78 mm, length 11.08mm, feed-
line 50 Ω can achieve the cut-off frequency of 8.273 GHz, which can be of great significance for
numerous UWB applications.
KEYWORDS
Microstrip Patch Antenna, Design Optimization, Evolutionary Computing, Neural Network,
UltraWideband.
For More Details : https://aircconline.com/ijcnc/V13N3/13321cnc02.pdf
Volume Link : https://airccse.org/journal/ijc2021.html
Google scholar citations
https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20
&pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:qPeb-qHga9sC
ABOUT DIGITAL COMMUNICATION METHODS FOR VISIBLE
LIGHT COMMUNICATION
Wataru Uemura, Yasuhiro Fukumori and Takato Hayama
Department of Electronics and Informatics, Ryukoku University, Shiga, Japan
May 2021 | Cited by 2
ABSTRACT
The visible light communication (VLC) by LED is one of the important communication methods
because LED can work as high speed and VLC sends the information by high flushing LED. We use the
pulse wave modulation for the VLC with LED because LED can be controlled easily by the
microcontroller, which has the digital output pins. At the pulse wave modulation, deciding the high and
low voltage by the middle voltage when the receiving signal level is amplified is equal to deciding it by
the threshold voltage without amplification. In this paper, we proposed two methods that adjust the
threshold value using counting the slot number and measuring the signal level. The number of signal
slots is constant per one symbol when we use Pulse Position Modulation (PPM). If the number of
received signal slots per one symbol time is less than the theoretical value, that means the threshold
value is higher than the optimal value. If it is more than the theoretical value, that means the threshold
value is lower. So, we can adjust the threshold value using the number of received signal slots. At the
second proposed method, the average received signal level is not equal to the signal level because there
is a ratio between the number of high slots and low slots. So, we can calculate the threshold value from
the average received signal level and the slot ratio. Unfortunately, the first proposed method adjusts the
threshold value after receiving the data, once the distance between the sender and the receiver is
changed, then the performance becomes worse. And after adjusting the threshold, the performance
becomes better. Therefore, this method should be used in stable environments. The second proposed
method can change the threshold value during the signal is received. That means this method can work
very quickly. So, this method can show good performance for the wide range. We show these
performances as real experiments.
KEYWORDS
Visible Light Communication, Digital Communication, Pulse Position Modulation.
For More Details : https://aircconline.com/ijcnc/V13N3/13321cnc01.pdf
Volume Link : https://airccse.org/journal/ijc2021.html
Google scholar citations
https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20
&pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:G36d5HCDkJYC

Mais conteúdo relacionado

Semelhante a 2021 - 2022 : Top 10 Read articles in Computer Networks and Communication

Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsVijay Karan
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsVijay Karan
 
Smart offload chain: a proposed architecture for blockchain assisted fog off...
Smart offload chain: a proposed architecture for blockchain  assisted fog off...Smart offload chain: a proposed architecture for blockchain  assisted fog off...
Smart offload chain: a proposed architecture for blockchain assisted fog off...IJECEIAES
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
 
WEB ATTACK PREDICTION USING STEPWISE CONDITIONAL PARAMETER TUNING IN MACHINE ...
WEB ATTACK PREDICTION USING STEPWISE CONDITIONAL PARAMETER TUNING IN MACHINE ...WEB ATTACK PREDICTION USING STEPWISE CONDITIONAL PARAMETER TUNING IN MACHINE ...
WEB ATTACK PREDICTION USING STEPWISE CONDITIONAL PARAMETER TUNING IN MACHINE ...IJCNCJournal
 
Web Attack Prediction using Stepwise Conditional Parameter Tuning in Machine ...
Web Attack Prediction using Stepwise Conditional Parameter Tuning in Machine ...Web Attack Prediction using Stepwise Conditional Parameter Tuning in Machine ...
Web Attack Prediction using Stepwise Conditional Parameter Tuning in Machine ...IJCNCJournal
 
Residual balanced attention network for real-time traffic scene semantic segm...
Residual balanced attention network for real-time traffic scene semantic segm...Residual balanced attention network for real-time traffic scene semantic segm...
Residual balanced attention network for real-time traffic scene semantic segm...IJECEIAES
 
Medium access in cloud-based for the internet of things based on mobile vehic...
Medium access in cloud-based for the internet of things based on mobile vehic...Medium access in cloud-based for the internet of things based on mobile vehic...
Medium access in cloud-based for the internet of things based on mobile vehic...TELKOMNIKA JOURNAL
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsIJECEIAES
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
 
IRJET-E-Waste Management using Robotics
IRJET-E-Waste Management using RoboticsIRJET-E-Waste Management using Robotics
IRJET-E-Waste Management using RoboticsIRJET Journal
 
Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...Chowdhury Mohammad Masum Refat
 
A predictive model for network intrusion detection using stacking approach
A predictive model for network intrusion detection using stacking approach A predictive model for network intrusion detection using stacking approach
A predictive model for network intrusion detection using stacking approach IJECEIAES
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET Journal
 

Semelhante a 2021 - 2022 : Top 10 Read articles in Computer Networks and Communication (20)

Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
 
Smart offload chain: a proposed architecture for blockchain assisted fog off...
Smart offload chain: a proposed architecture for blockchain  assisted fog off...Smart offload chain: a proposed architecture for blockchain  assisted fog off...
Smart offload chain: a proposed architecture for blockchain assisted fog off...
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
 
WEB ATTACK PREDICTION USING STEPWISE CONDITIONAL PARAMETER TUNING IN MACHINE ...
WEB ATTACK PREDICTION USING STEPWISE CONDITIONAL PARAMETER TUNING IN MACHINE ...WEB ATTACK PREDICTION USING STEPWISE CONDITIONAL PARAMETER TUNING IN MACHINE ...
WEB ATTACK PREDICTION USING STEPWISE CONDITIONAL PARAMETER TUNING IN MACHINE ...
 
Web Attack Prediction using Stepwise Conditional Parameter Tuning in Machine ...
Web Attack Prediction using Stepwise Conditional Parameter Tuning in Machine ...Web Attack Prediction using Stepwise Conditional Parameter Tuning in Machine ...
Web Attack Prediction using Stepwise Conditional Parameter Tuning in Machine ...
 
Residual balanced attention network for real-time traffic scene semantic segm...
Residual balanced attention network for real-time traffic scene semantic segm...Residual balanced attention network for real-time traffic scene semantic segm...
Residual balanced attention network for real-time traffic scene semantic segm...
 
Medium access in cloud-based for the internet of things based on mobile vehic...
Medium access in cloud-based for the internet of things based on mobile vehic...Medium access in cloud-based for the internet of things based on mobile vehic...
Medium access in cloud-based for the internet of things based on mobile vehic...
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
 
IRJET-E-Waste Management using Robotics
IRJET-E-Waste Management using RoboticsIRJET-E-Waste Management using Robotics
IRJET-E-Waste Management using Robotics
 
Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...
 
A predictive model for network intrusion detection using stacking approach
A predictive model for network intrusion detection using stacking approach A predictive model for network intrusion detection using stacking approach
A predictive model for network intrusion detection using stacking approach
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
 

Mais de IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksIJCNCJournal
 

Mais de IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
 

Último

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Último (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

2021 - 2022 : Top 10 Read articles in Computer Networks and Communication

  • 1. Top10 Cited Articles in Computer Networks& Communications 2021-2022 International Journal of Computer Networks& Communications (IJCNC) http://airccse.org/journal/ijcnc.html (Scopus, ERA Listed, WJCI Indexed)Scopus Cite Score 2022—1.7 ISSN 0974 - 9322 (Online); 0975 - 2293 (Print) Citations, h-index, i10-index Citations 6814 h-index 35 i10-index 194
  • 2. DEVELOPING AN ADAPTIVE CHANNEL MODELLING USING A GENETIC ALGORITHM TECHNIQUE TO ENHANCE AERIAL VEHICLE-TO-EVERYTHING WIRELESS COMMUNICATIONS Faris. A. Almalki Department of Computer Engineering, College of Computers and Information Technology, Taif University, Kingdom of Saudi Arabia March 2021 | Cited by 12 ABSTRACT In this digital era, Internet of Everything (IoE) has a potential to bring out drastic changes to how we live today, where billions of people and devices require wireless connectivity. Where Unmanned Aerial Vehicles contribute positively in paving the way for IoE and Fifth Generation technologies, and tackle some of their comms challenges. Thus, this paper aims to provide an adaptive approach using a Genetic Algorithm (GA) technique by combining indoor and outdoor propagation models to enhance aerial vehicle-to-everything wireless connectivity. The proposed adaptive approach uses a GA multi-objective function that yield optimum values of UAV altitude, elevation angles, and type of building for indoor environment. The proposed GA optimization technique has met the demand of a typical dense-populated urban environment, as well as empowering the IoE with greater coverage footprint, high Quality of Service benchmark, and line-of-sight adaptability. The output results emphasized that the proposed adaptive approach using the GA technique can help in smart decision-making and selecting a proper setup and find the optimum parameters to provide seamless wireless connections from aerial vehicle-to- everything. KEYWORDS Unmanned Aerial Vehicles, Internet of Everything, Channel Modelling, Propagation Model, Fifth Generation For More Details : https://aircconline.com/ijcnc/V13N2/13221cnc03.pdf Volume Link : https://airccse.org/journal/ijc2021.html Google scholar citations https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20 &pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:nWoA1JPTheMC
  • 3. UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWORK ANOMALY DETECTION WITH SHAPLEY ADDITIVE EXPLANATION (SHAP) Khushnaseeb Roshan and Aasim Zafar Department of Computer Science, Aligarh Muslim University, Aligarh-202002, India November 2021 | Cited by 6 ABSTRACT Machine learning (ML) and Deep Learning (DL) methods are being adopted rapidly, especially in computer network security, such as fraud detection, network anomaly detection, intrusion detection, and much more. However, the lack of transparency of ML and DL based models is a major obstacle to their implementation and criticized due to its black-box nature, even with such tremendous results. Explainable Artificial Intelligence (XAI) is a promising area that can improve the trustworthiness of these models by giving explanations and interpreting its output. If the internal working of the ML and DL based models is understandable, then it can further help to improve its performance. The objective of this paper is to show that how XAI can be used to interpret the results of the DL model, the autoencoder in this case. And, based on the interpretation, we improved its performance for computer network anomaly detection. The kernel SHAP method, which is based on the shapley values, is used as a novel feature selection technique. This method is used to identify only those features that are actually causing the anomalous behaviour of the set of attack/anomaly instances. Later, these feature sets are used to train and validate the autoencoderbut on benign data only. Finally, the built SHAP_Model outperformed the other two models proposed based on the feature selection method. This whole experiment is conducted on the subset of the latest CICIDS2017 network dataset. The overall accuracy and AUC of SHAP_Model is 94% and 0.969, respectively. KEYWORDS Network Anomaly Detection, Network Security, Autoencoder, Shapley Additive Explanation, Explainable AI (XAI), Machine Learning For More Details : https://aircconline.com/ijcnc/V13N6/13621cnc07.pdf Volume Link : https://airccse.org/journal/ijc2021.html Google scholar citations https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20 &pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:NtGNdKbuCngC
  • 4. PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS Beaton Kapito1,3, Mwawi Nyirenda1 and Hyunsung Kim1,2 1Department of Mathematical Sciences, University of Malawi, Zomba, Malawi 2 School of Computer Science, Kyungil University, Kyungbuk, Korea 3Malawi Adventist University, Ntcheu, Malawi March 2021 | Cited by 5 ABSTRACT Internet of things (IoT) is the integration of computer-based systems and the physical world in which things interact with each other. Due to heterogeneity and resource-constrained feature of IoT devices, there are many privacy and security challenges resulting in many threat vulnerabilities in IoT environments. After reviewing and analyzing the recent IoT security, privacy, and authentication protocols, we will withdraw research gaps focused on the elimination of human factors in IoT authentication. In order to fill these research gaps, this paper proposes a privacy-preserving machine authenticated key agreement based on IoT, denoted as IoTMAKA. IoTMAKA uses dynamic identity and machine fingerprint to provide security and privacy. Security analysis shows that IoTMAKA provides anonymity and untraceability, provides freshness, and is secure against passive and active attacks. IoTMAKA reduces communication overheads by 20% and computational overheads by 25% on average as compared to the previous related works. KEYWORDS Internet of Things, Authenticated Key Agreement, Privacy, Machine Authentication, Cryptography For More Details : https://aircconline.com/ijcnc/V13N2/13221cnc06.pdf Volume Link : https://airccse.org/journal/ijc2021.html Google scholar citations https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20 &pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:Tfl4UtY-dJUC
  • 5. A NOVEL ROUTING STRATEGY TOWARDS ACHIEVING ULTRA- LOW END-TO-END LATENCY IN 6G NETWORKS Satya R. Das1, Sayan Sen Sarma2, Mitrabinda Khuntia1, Indranil Roy3,Koushik Sinha3, and Bhabani P. Sinha1 1 Dept. of Computer Science & Engg., SOA University, Bhubaneswar, India. 2 Dept. of Computer Science & Engg., University of Calcutta, West Bengal, India. 3 School of Computing, Southern Illinois University, Carbondale, USA. January 2022 | Cited by 5 ABSTRACT Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end- to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios. KEYWORDS 6G, Beyond 5G, 5G, Routing, Ultra-low latency, Network architecture, Queuing delay For More Details : https://aircconline.com/ijcnc/V14N1/14122cnc01.pdf Volume Link : https://airccse.org/journal/ijc2022.html Google scholar citations https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20 &pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:pUxgyZctzPYC
  • 6. FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NETWORK LIFETIME IN WSNS Jungsub Ahn1 and Sanghyeok Lim2 and Taeho Cho3* 1Department of Electrical and Computer Engineering, Sungkyunkwan University, Republic of Korea 2Amorepacific Republic of Korea 3*Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea November 2021 | Cited by 4 ABSTRACT Recently, sensor networks have been used in a wide range of applications, and interest in sensor node performance has increased. A sensor network is composed of tiny nodes with limited resources. The sensor network communicates between nodes in a configured network through self-organization. An energyefficient security protocol with a hierarchy structure with various advantages has been proposed to prolong the network lifetime of sensor networks. But due to structural problems in traditional protocols, nodes located upstream tend to consume relatively high energy compared to other nodes. A network protocol should be considered to provide minimal security and efficient allocation of energy consumption by nodes to increase the network lifetime. In this paper, we introduce a solution to solve the bottleneck problem through an efficient message route selection method. The proposed method selects an efficient messaging path using GA and fuzzy logic composed of multiple rules. Message route selection plays an important role in controlling the load balancing of nodes. A principal benefit of the proposed scheme is the potential portability of the clustering-based protocol. In addition, the proposed method is updated to find the optimal path through the genetic algorithm to respond to various environments. We demonstrated the effectiveness of the proposed method through an experiment in which the proposed method is applied to a probabilistic voting-based filtering scheme that is one of the cluster-based security schemes. KEYWORDS Wireless sensor network, Fuzzy logic, Load balancing, Genetic algorithm. For More Details : https://aircconline.com/ijcnc/V13N6/13621cnc05.pdf Volume Link : https://airccse.org/journal/ijc2021.html Google scholar citations https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20 &pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:1EqfMoDn7-AC
  • 7. SELF-PRUNING BASED PROBABILISTIC APPROACH TO MINIMIZE REDUNDANCY OVERHEAD FOR PERFORMANCE IMPROVEMENT IN MANET Gyanendra Kumar Pallai1, Meenakshi Sankaran2 and Amiya Kumar Rath3 1Department of Computer Science & Engineering,SOA Deemed-to-be University, Bhubaneswar, India, 2VIT Business School, VIT Bhopal University, Bhopal, India 3Department of Computer Science & Engineering, Veer Surendra Sai University of Technology, Burla. Deputed as adviser to National Assessment & Accreditation Council, Bengaluru, India March 2021 | Cited by 4 ABSTRACT The Broadcast storm problem causes severe interference, intense collision and channel contention, which greatly degrades the QoS performance metrics of the routing protocols. So, we suggest a neighbourhood coverage knowledge probabilistic broadcasting model (NCKPB) integrating with AODV protocol with knowledge on 2-hop neighbourhood coverage; a connectivity function to control a node’s forwarding probability of retransmission to alleviate significant overhead redundancy. Our objective is to minimize the broadcast RREQ overhead while ensuring fair retransmission bandwidth. We considered two more important measures called Saved Rebroadcast and Reachability. The outcomes of NCKPB, Fixed probability (FP) and Flooding (FL) routing schemes are examined under three major operating conditions, such as node density, mobility and traffic load. The NS-2 results demonstrate the efficacy of the proposed NCKPB model by illustrating its performance superiority over all key metrics such as redundancy overhead, end to end latency, throughput, reachability, saved rebroadcast and collision contrast to FP and FL. KEYWORDS Broadcasting, Flooding, Self-pruning, Neighbour Coverage, Forwarding Probability, Connectivity Metric. For More Details : https://aircconline.com/ijcnc/V13N2/13221cnc02.pdf Volume Link : https://airccse.org/journal/ijc2021.html Google scholar citations https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20 &pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:Oo1CbQkBAzEC
  • 8. AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK Priyanka Pandey and Raghuraj Singh Department of Computer Science and Engineering, Harcourt Butler Technical University, Kanpur, India July 2021 | Cited by 3 ABSTRACT Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV. KEYWORDS Mobile Ad hoc Network, Energy, AODV, Routing, Random Waypoint Model. For More Details : https://aircconline.com/ijcnc/V13N4/13421cnc02.pdf Volume Link : https://airccse.org/journal/ijc2021.html Google scholar citations https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20 &pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:rFyVMFCKTwsC
  • 9. CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR HIGH PERFORMANCE MONITORING APPLICATIONS OF INTERNET OF THINGS Fawaz Alassery and Maha M. Althobaiti College of Computers and Information Technology, Taif University, Taif, Saudi Arabia January 2021 | Cited by 3 ABSTRACT Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV). KEYWORDS Internet of Things, context-aware addressing, bloom filters, High-performance IoT, routing in IoT. Packets aggregation mechanism. For More Details : https://aircconline.com/ijcnc/V13N1/13121cnc07.pdf Volume Link : https://airccse.org/journal/ijc2021.html Google scholar citations https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20 &pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:d4tt_xEv1X8C
  • 10. EVOLUTIONARY COMPUTING BASED NEURON-COMPUTATIONAL MODEL FOR MICROSTRIP PATCH ANTENNA DESIGN OPTIMIZATION Rohini Saxena, Mukesh Kumar and Shadman Aslam Department of Electronics and communication, University of Allahabad, U.P., India May 2021 | Cited by 2 ABSTRACT In this paper, a novel Evolutionary Computing named Adaptive Genetic Algorithm (AGA) based ANN model is developed for rectangular MPA (Microstrip patch antenna). Considering at-hand and Nextgeneration Ultra wideband application demands, the emphasis has been made on retaining optimal lowcost design with desired cut-off frequency. The proposed method employs multiple sets of theoreticallydriven training instances or patch antenna design parameters which have been processed for normalization and sub-sampling to achieve a justifiable and reliable sample size for further design parameter prediction. Procedurally, the input design parameters were processed for normalization followed by sub-sampling to give rise to a sufficient set of inputs to perform knowledge-driven (designparameter) prediction. Considering limitations of the major at-hand machine learning methods which often undergo local minima and convergence while training, we designed a state-of-art new Adaptive Genetic Algorithm based neuro-computing model (AGA-ANN), which helped to predict the set of optimal design parameters for rectangular microstrip patch antenna. The predicted patch antenna length and width values were later used for verification which achieved the expected frequency. The depth analysis revealed that a rectangular patch antenna with width 14.78 mm, length 11.08mm, feed- line 50 Ω can achieve the cut-off frequency of 8.273 GHz, which can be of great significance for numerous UWB applications. KEYWORDS Microstrip Patch Antenna, Design Optimization, Evolutionary Computing, Neural Network, UltraWideband. For More Details : https://aircconline.com/ijcnc/V13N3/13321cnc02.pdf Volume Link : https://airccse.org/journal/ijc2021.html Google scholar citations https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20 &pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:qPeb-qHga9sC
  • 11. ABOUT DIGITAL COMMUNICATION METHODS FOR VISIBLE LIGHT COMMUNICATION Wataru Uemura, Yasuhiro Fukumori and Takato Hayama Department of Electronics and Informatics, Ryukoku University, Shiga, Japan May 2021 | Cited by 2 ABSTRACT The visible light communication (VLC) by LED is one of the important communication methods because LED can work as high speed and VLC sends the information by high flushing LED. We use the pulse wave modulation for the VLC with LED because LED can be controlled easily by the microcontroller, which has the digital output pins. At the pulse wave modulation, deciding the high and low voltage by the middle voltage when the receiving signal level is amplified is equal to deciding it by the threshold voltage without amplification. In this paper, we proposed two methods that adjust the threshold value using counting the slot number and measuring the signal level. The number of signal slots is constant per one symbol when we use Pulse Position Modulation (PPM). If the number of received signal slots per one symbol time is less than the theoretical value, that means the threshold value is higher than the optimal value. If it is more than the theoretical value, that means the threshold value is lower. So, we can adjust the threshold value using the number of received signal slots. At the second proposed method, the average received signal level is not equal to the signal level because there is a ratio between the number of high slots and low slots. So, we can calculate the threshold value from the average received signal level and the slot ratio. Unfortunately, the first proposed method adjusts the threshold value after receiving the data, once the distance between the sender and the receiver is changed, then the performance becomes worse. And after adjusting the threshold, the performance becomes better. Therefore, this method should be used in stable environments. The second proposed method can change the threshold value during the signal is received. That means this method can work very quickly. So, this method can show good performance for the wide range. We show these performances as real experiments. KEYWORDS Visible Light Communication, Digital Communication, Pulse Position Modulation. For More Details : https://aircconline.com/ijcnc/V13N3/13321cnc01.pdf Volume Link : https://airccse.org/journal/ijc2021.html Google scholar citations https://scholar.google.co.in/citations?view_op=view_citation&hl=en&user=YnJ2pwkAAAAJ&cstart=20 &pagesize=80&sortby=pubdate&citation_for_view=YnJ2pwkAAAAJ:G36d5HCDkJYC