Effective data optimization and evaluation based on social communication with AI‐assisted in opportunistic social networks

L Li, F Gou, H Long, K He, J Wu - … Communications and Mobile …, 2022 - Wiley Online Library
L Li, F Gou, H Long, K He, J Wu
Wireless Communications and Mobile Computing, 2022Wiley Online Library
Billions of people around the world send and receive data over online networks daily.
Sufficient and redundant data are transmitted over social platforms with AI‐assisted in 5G
networks. In opportunistic social networks, the main challenge faced by traditional methods
is that numerous user nodes participate in data transmission, causing a lot of message copy
redundancy and node cache consumption. As a result, the transmission delay of the
algorithm is high, the node energy consumption is too large, and even information is lost. To …
Billions of people around the world send and receive data over online networks daily. Sufficient and redundant data are transmitted over social platforms with AI‐assisted in 5G networks. In opportunistic social networks, the main challenge faced by traditional methods is that numerous user nodes participate in data transmission, causing a lot of message copy redundancy and node cache consumption. As a result, the transmission delay of the algorithm is high, the node energy consumption is too large, and even information is lost. To solve these problems, this study establishes an artificial intelligence‐based optimization multiple evaluation method. The main purpose of this method is to avoid information loss caused by data loss when reducing data noise, reasonably select communication nodes in opportunistic social network scenarios, optimize data transmission performance, and avoid network congestion. Moreover, our method can effectively identify and exclude potential malicious nodes, reducing the situation that packets are intercepted and discarded. The experiment confirms that the optimized transmission evaluation scheme can effectively reduce routing overheads and energy consumption of a user node, improve the delivery ratio of node data transmission, and ensure the reliability and security of data transmission.
Wiley Online Library
以上显示的是最相近的搜索结果。 查看全部搜索结果