Normal view MARC view ISBD view

Improved resource allocation in 5g using deep learning

By: Sachidhanandam, P.
Contributor(s): Amirtha Preeya, V.
Publisher: Chennai ICT Academy 2022Edition: Vol.13(4), Dec.Description: 2826-2829p.Subject(s): EXTC EngineeringOnline resources: Click here In: ICTACT journal on communication technologySummary: All wireless equipment, including terminals, base stations, and phones, functions as a component of a single interconnected system, it is subject to attacks from a wide variety of different forms of cyber threats. This elucidates the relevance of considering the aforementioned attacks in order to prevent them from finally acquiring control of the complete system environment. The term cybersecurity refers to the set of preventative measures that are implemented to safeguard an information technology infrastructure against being corrupted or destroyed. The results of a performance evaluation that was carried out on the DRL at several different node densities. When there is a requirement to analyze a network in terms of its throughput, delivery ratio, and latency, NS2 is the tool that is utilized. In this article, a comparison and contrast between the Lagrange Duality Method technique is presented.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode Item holds
Articles Abstract Database Articles Abstract Database School of Engineering & Technology
Archieval Section
Not for loan 2023-0551
Total holds: 0

All wireless equipment, including terminals, base stations, and phones,
functions as a component of a single interconnected system, it is subject
to attacks from a wide variety of different forms of cyber threats. This
elucidates the relevance of considering the aforementioned attacks in
order to prevent them from finally acquiring control of the complete
system environment. The term cybersecurity refers to the set of
preventative measures that are implemented to safeguard an
information technology infrastructure against being corrupted or
destroyed. The results of a performance evaluation that was carried out
on the DRL at several different node densities. When there is a
requirement to analyze a network in terms of its throughput, delivery
ratio, and latency, NS2 is the tool that is utilized. In this article, a
comparison and contrast between the Lagrange Duality Method
technique is presented.

There are no comments for this item.

Log in to your account to post a comment.

Click on an image to view it in the image viewer

Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha