Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks

S Rajasoundaran, AV Prabu, S Routray… - Computer …, 2022 - Elsevier
Fifth Generation (5G) security principles are widely expected with effective cryptography
models, information security models, Machine Learning (ML) based Intrusion Detection …

Optimization for computational offloading in multi-access edge computing: A deep reinforcement learning scheme

J Wang, H Ke, X Liu, H Wang - Computer Networks, 2022 - Elsevier
Owing to their limited computing power and battery level, wireless users (WUs) can hardly
handle compute-intensive workflows by the local processor. Multi-access edge computing …

Energy efficient resource allocation method for 5G access network based on reinforcement learning algorithm

S Zhao - Sustainable Energy Technologies and Assessments, 2023 - Elsevier
Abstract Edge computing and IIoT (Industrial Internet of Things) are two representative
application scenarios in 5G (5th Generation) mobile communication technology network …

[HTML][HTML] Node-based QoS-aware security framework for sinkhole attacks in mobile ad-hoc networks

BM Esiefarienrhe, T Phakathi, F Lugayizi - Telecom, 2022 - mdpi.com
Most networks strive to provide good security and an acceptable level of performance.
Quality of service (QoS) plays an important role in the performance of a network. Mobile ad …

Wireless network design optimization for computer teaching with deep reinforcement learning application

Y Luo, D Zhang - Applied Artificial Intelligence, 2023 - Taylor & Francis
Computer technology has had a significant impact on the field of education, and its use in
classrooms has facilitated the spread of knowledge and has helped students become well …

[HTML][HTML] Advancing 6G-IoT networks: Willow catkin packet transmission scheduling with AI and bayesian game-theoretic approach-based resource allocation.

AMA Ibrahim, Z Chen, HA Eljailany, G Yu, AA Ipaye… - Internet of Things, 2024 - Elsevier
The rapid expansion of mobile broadband networks and the proliferation of Internet of
Things (IoT) applications have substantially increased data transmission and processing …

Novel dynamic k-modes clustering of categorical and non categorical dataset with optimized genetic algorithm based feature selection

G Suryanarayana, LNC Prakash K… - Multimedia Tools and …, 2022 - Springer
Clustering is a technique that segregates a provided dataset into homogenous groups in
accordance with the provided features. It aims to determine a structure in a group of …

Sustainable and 5G enhanced power distribution network design considering renewable energy generation and dynamic electricity pricing

TD Beyene, YC Tsao - Energy, Ecology and Environment, 2024 - Springer
Power distribution network design optimization is the principal concern for power
companies. To address both environmental issues and increased energy demand, the need …

Predictability of Internet of Things traffic at the medium access control layer against information-theoretic bounds

M Nakip, BC Gül, V Rodoplu, C Güzeli̇ş - IEEE Access, 2022 - ieeexplore.ieee.org
Most of the existing Medium Access Control (MAC) layer protocols for the Internet of Things
(IoT) model the traffic generated by each IoT device via random arrivals such as those in a …

[PDF][PDF] Securing the iot-based wireless sensor networks in 5g and beyond

N Ambika - 5G and Beyond, 2023 - library.oapen.org
The previous contribution uses the k-means procedure to create clusters. It converts into a
chain route when the threshold content goes beyond the energy of the devices in the …