{"title":"Using Blockchain to Reduce Multi-Server Edge Computing Latencies for Supervised Learning","authors":"Anubhav Bhalla","doi":"10.1109/AISC56616.2023.10085285","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085285","url":null,"abstract":"This research investigates a novel issue as the block chain federated learning (BFL). In this system paradigm, block mining and machine learning (ML) model training are handled concurrently by in communication through a group named as a edges servers (ESs). We create the offloading techniques that enable the MD to send the required data to the linked ESs in order to aid in the ML training for the resource and constrained MDs. Then, based on a consensus method to create peer-to-peer (P2P)-based blockchain communications, we suggest a new decentralized approach at the edge layer. In order to reduce system latency, we propose that takes into account, MD transmits the required amount of power, channel bandwidth allocation for MD data offloading, MD computational allocation, and hash power allocation. With a parameterized advantage actor critic method, we offer a unique deep reinforcement learning scheme given the mixed action space of discrete offloading and continuous allocation variables. We theoretically define the aggregation latency, mini-batch size, and number of P2P communication rounds as the convergence properties of BFL. In terms of model training effectiveness, convergence rate, system latency, and robustness against model poisoning attempts, our numerical evaluation shows that our suggested approach outperforms baselines.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"6 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124583039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Latest Developments in Smart Grid and Wireless Security Technologies Serve to Protect the Environment for Better Upcoming Generations","authors":"Laxmi Goswami, Neeraj Anand Sharma","doi":"10.1109/AISC56616.2023.10085582","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085582","url":null,"abstract":"In addition to decrease emissions of greenhouse gases and safeguard the environment for future generations, smart grid technology is helping to transform government and industry. The next generation electricity system, known as smart lines, is primarily described as one that helps consumers and suppliers increase output and production overall. The goal of the smart grids is to increase efficiency, demonstrate two-way communication, and allow the application of dependability for future power systems. These networks may facilitate improved cooperation between alternative energy sources and renewable energy sources. The networked nature of these devices means that in addition to the previously mentioned qualities, Security issues may have an impact on the devices and disrupt the power supply. Therefore, it is crucial to adopt stronger wireless security that allows for the protection of data sent across communication networks, supports continuous power supply, and boosts dependability on widely used technology and infrastructure.That research is concentrated on outlining the key benefits of using power cities and Wi-Fi technologies to safeguard ecological issues for future generations. In order to better understand the factors that will affect the implementation of network connections and power generation, the research aims to gather information from respondents. The model for structural equations (SEM) is used to conduct the study.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121596735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Gunturu, V. Bansal, Manoj Sathe, Ajay Mahaputra Kumar, A. Gehlot, Bhasker Pant
{"title":"Wireless Communications Implementation Using Blockchain as Well as Distributed Type of IOT","authors":"V. Gunturu, V. Bansal, Manoj Sathe, Ajay Mahaputra Kumar, A. Gehlot, Bhasker Pant","doi":"10.1109/AISC56616.2023.10085249","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085249","url":null,"abstract":"Electronic gadgets now work closely together as a result of the growth of the Internet of Things (IoT) and Mobile Edge Computing (MEC). Strong dependability and integrity of the technologies are required. But the present trust procedures have the big drawback: (1) they significantly depend on a trustworthy third party, which might have serious security problems if it were compromised; and (2) they subject the associated devices to malicious assessments that may skew their trustrank. In this research, we propose a blockchain-based done to assure for global IoT devices that incorporates the ideas of financial planning and cryptography. The link prediction mechanism uses norms trust but also risk metrics to quantify trustrank, and a novel storage structure is created to make it easier for the domain secretariat to spot and remove fraudulent assessments of the objects. Evidence suggests that the suggested trust system can protect IoT devices from malicious assaults while also guaranteeing data exchange and consistency.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122143850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Categorization of Emotet IoT Botnet Malware","authors":"Umang Garg, Santosh Kumar, Mridul Ghanshala","doi":"10.1109/AISC56616.2023.10085302","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085302","url":null,"abstract":"To provide the ease control and remote monitoring, Internet of Things (IoT) plays an important role in smart devices. The IoT system ranges from smart city to healthcare sector, and supply chain management. This extent of advancement generated a huge amount of data which may be the reason of malware threats of the IoT system. IoT Malware is a threat which may affects all sectors such as business, network, telecoms, media, military, etc. The recent report claimed the proliferation of global cost of malware estimated that till 2023 it would be around 8 trillion dollars annually which may double due to coronavirus outbreak. The analysis of IoT malware needs serious concern as now warfare and digital retaliation can cause serious damage than the war lead on ground. The major aim of this paper is performing the critical analysis of an IoT malware named Emotet. The IoT malware analysis can be categorized in two types such as static and dynamic malware analysis. Static analysis is the process of analyzing malware or binary without executing it. It is considered a more effective method when it comes to the diversity of processor architecture. While dynamic analysis is based on the detection of malware and its behavior with real-time execution. This paper focused on the testbed and Analysis of Emotet malware statically and dynamically using distinguished malware analysis tools.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"86 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120825291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yogesh Solunke, Deven G. Patanvariya, A. Kothari, Kanhaiya Sharma, D. Singh
{"title":"Design of Dual-Band Pass Polarization Insensitive and Transparent Frequency Selective Surface for Wireless Applications","authors":"Yogesh Solunke, Deven G. Patanvariya, A. Kothari, Kanhaiya Sharma, D. Singh","doi":"10.1109/AISC56616.2023.10085319","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085319","url":null,"abstract":"This article proposes a novel, compact, transparent Frequency Selective Surface (FSS) geometry with dual-band pass characteristics for wireless applications. The proposed design consists of multiple concentric rings. The lower S-band dual-band response has been generated with the help of top and bottom mirror geometry. The proposed structure has a size of 14 × 14 mm2 and provides dual-band responses at 3.0 GHz and 3.87 GHz. The first band response is from 2.85 − 3.18 GHz, the second band response is from 3.84−3.99 GHz, and the stop-band, appears from 3.8−3.96 GHz. The proposed geometry is designed in such a way that the responses can be shifted by controlling a single parameter. Further, the proposed geometry is polarization insensitive. The proposed transparent compact FSS is applicable for various S-band dual-band pass wireless applications.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122310677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anubhav Kumar, Divya Saxena, N. Sharma, Anil Gankotiya
{"title":"Shorting pin and SRR loaded multi-band Antenna for 4G/5G/Wi-Fi/WiMAX and IOT Applications","authors":"Anubhav Kumar, Divya Saxena, N. Sharma, Anil Gankotiya","doi":"10.1109/AISC56616.2023.10085352","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085352","url":null,"abstract":"In this paper, shorting pin and SRR-loaded multi-band antenna is presented for wireless communication application. The multiple radiation strips are used with the partial ground to design a multiband operating frequency antenna. The hook and L-shaped radiating strips are used to design a two-band antenna where SRR is loaded on the antenna to implement a triple band antenna which shifted the bandwidth of the antenna. The shorting-pin is used to ground the lower arm of the antenna and enhances the impedance bandwidth with four operating bands. The obtained antenna bandwidth is 2.2-2.4/3.1-3.6/4.9-5.05/5.35-5.6 GHz and covers multiple applications in the wireless communications.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125288500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeidy Panduro-Ramirez, M. Lourens, A. Gehlot, D. P. Singh, Yashpal Singh, Deepak J. Salunke
{"title":"Blockchain Approach for Implementing Access Control In IOT","authors":"Jeidy Panduro-Ramirez, M. Lourens, A. Gehlot, D. P. Singh, Yashpal Singh, Deepak J. Salunke","doi":"10.1109/AISC56616.2023.10085452","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085452","url":null,"abstract":"Block chain is now attracting a lot of interest from scientists and experts for a variety of reasons, including wireless communication decentralization, remote access, digital security, and confidentiality. Although peer-to-peer networking, confidentiality, improved storage, and extra security are all advantages of crypto currencies, its irreversible nature is the primary factor in its top ranking. Block chain may be utilized as a crucial technique to do away with the need for a trustworthy third person in networks that are linked to one another because of how it is dispersed. The most well-known block chains that may be used for installation are Public block chain Fiber, IBM Bit coin, Eth, Eris, R3 Corda, and multichain. The abovementioned review study presents and evaluates the current proof - of - stake security methods for distribution chain, medicine, and IoT access controls. The thorough analysis of applications of block chain will function as the most recent state-of-the-art for academics to conduct cutting-edge research in the pursuit of block chain - based across diverse disciplines.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126707684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Scene Text Detection Systems: An Imminent Progress","authors":"Simarjit Singh, Sukhpreet Kaur, Sachin Bhardwaj","doi":"10.1109/AISC56616.2023.10084958","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10084958","url":null,"abstract":"In this techno-savvy world, digitalization has become a part of our daily lives and has various applications in every field of work. For example, an automatic scene text detection system utilizes a video camera to capture the frames and then detect and recognize the text on the frames to help in different applications like navigation for blind people, sign detection, text retrieval, etc. So, it is essential to understand the current state of the work done in this field. Therefore, in this paper, with the same objective, the theoretical analysis includes the details of the present benchmark datasets, existing systems, and approaches. Moreover, the current methods' shortcomings are also discussed in this paper, along with the future requirement which will help the researchers to target their objectives.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124369188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arshi Naim, Sahar Mohammed Alshawaf, Praveen Kumar Malik, Rajesh Singh
{"title":"Effective E-Learning Practices by Machine Learning and Artificial Intelligence","authors":"Arshi Naim, Sahar Mohammed Alshawaf, Praveen Kumar Malik, Rajesh Singh","doi":"10.1109/AISC56616.2023.10085391","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085391","url":null,"abstract":"The world is moving at a fast pace having the application of Machine Learning (ML) and Artificial Intelligence (AI) in all the major disciplines and the educational sector is also not untouched by its impact especially in an online learning environment. E-Learning (EL) is always under the monitoring of its effectiveness and suitability for learning and teaching (L&T) due to its nature. This paper attempts to elaborate on the benefits of ML and AI in E-Learning (EL) in general and explain how King Khalid University (KKU) EL Deanship is making the best of ML and AI in its practices to make EL effective and an appropriate platform of L&T. This research is descriptive in nature; results are based on qualitative analysis done through studying the applications of ML and AI in KKU’s EL but the same modus operandi can be implemented by any institution in its EL platform to learn the effectiveness of their EL. KKU is using Learning Management Services (LMS) for providing online learning practices and Blackboard (BB) for sharing online learning resources. This research applies the ML and AI in LMS and BB services in KKU and measured the effectiveness of EL. The results show constructive impact of ML and AI in EL in KKU and effective working of EL in imparting the L&T.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127390764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing of wideband patch antenna array for 5-6 GHz application","authors":"A. Dubey, V. Gupta","doi":"10.1109/AISC56616.2023.10085560","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085560","url":null,"abstract":"This paper proposed wide-band microstrip patch antenna of rectangular topology with array of 2×2 E shaped element. RT duroid of dielectric constant 2.2 is selected for the designing of proposed microstrip patch antenna. To get faster speed at lower range proposed patch antenna operate at the resonating frequency of 5.8 GHz, patch antenna is modified to array structure with the aim to achieve a wider bandwidth and is designed and simulated on electromagnetic simulator IE3D. Parameters like return loss, directivity, VSWR and gain are computed and analyzed, which shows that the designed antenna array have good performance and wideband operation.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132773427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}