Towards artificial general intelligence (agi) in the internet of things (iot): Opportunities and challenges

F Dou, J Ye, G Yuan, Q Lu, W Niu, H Sun… - arXiv preprint arXiv …, 2023 - arxiv.org
Artificial General Intelligence (AGI), possessing the capacity to comprehend, learn, and
execute tasks with human cognitive abilities, engenders significant anticipation and intrigue …

[PDF][PDF] Resource allocation optimization using artificial intelligence methods in various computing paradigms: A Review

JH Joloudari, R Alizadehsani, I Nodehi… - arXiv preprint arXiv …, 2022 - easychair.org
With the increasing growth of information through smart devices, increasing the quality level
of human life requires various computational paradigms presentation including the Internet …

Fog computing systems: State of the art, research issues and future trends, with a focus on resilience

J Moura, D Hutchison - Journal of Network and Computer Applications, 2020 - Elsevier
Many future innovative computing services will use Fog Computing Systems (FCS),
integrated with Internet of Things (IoT) resources. These new services, built on the …

Deep reinforcement learning for radio resource allocation and management in next generation heterogeneous wireless networks: A survey

A Alwarafy, M Abdallah, BS Ciftler, A Al-Fuqaha… - arXiv preprint arXiv …, 2021 - arxiv.org
Next generation wireless networks are expected to be extremely complex due to their
massive heterogeneity in terms of the types of network architectures they incorporate, the …

[PDF][PDF] Using ML and Data-Mining Techniques in Automatic Vulnerability Software Discovery

IA Shah, S Rajper, N ZamanJhanjhi - International Journal of …, 2021 - academia.edu
Today's age is Machine Learning (ML) and Data-Mining (DM) Techniques, as both
techniques play a significant role in measuring vulnerability prediction accuracy. In the field …

Toward smart traffic management with 3D placement optimization in UAV-assisted NOMA IIoT networks

ABM Adam, MSA Muthanna… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Next generation networks will involve huge number of industrial internet of things (IIoT)
sensors which require reliable connectivity with low latency to manage the data transmission …

Detection techniques for massive machine-type communications: Challenges and solutions

RB Di Renna, C Bockelmann, RC de Lamare… - IEEE …, 2020 - ieeexplore.ieee.org
Massive machine-type communications (mMTC) is one of the key application scenarios of
fifth generation (5G) and beyond cellular networks. Bringing the unique technical challenge …

[HTML][HTML] 信息物理系统技术现状分析与趋势综述

杨挺, 刘亚闯, 刘宇哲, 王成山 - 电子与信息学报, 2021 - jeit.ac.cn
随着国民经济中各个产业信息化程度的提升和产业间深度交叉融合, 信息物理系统(Cyber-
Physical System, CPS) 正成为支撑这一发展的关键技术, 也被誉为是引领全球新一轮产业技术 …

Research of machine learning algorithms for the development of intrusion detection systems in 5G mobile networks and beyond

A Imanbayev, S Tynymbayev, R Odarchenko… - Sensors, 2022 - mdpi.com
The introduction of fifth generation mobile networks is underway all over the world which
makes many people think about the security of the network from any hacking. Over the past …

A reinforcement learning-based cluster routing scheme with dynamic path planning for mutli-uav network

S Swain, PM Khilar, BR Senapati - Vehicular Communications, 2023 - Elsevier
Abstract Unmanned Aerial Vehicles (UAVs) with visual sensors are widely used for area
mapping, management of crops and traffic, rescuing lives, and many other applications that …