Improved resource allocation in 5g using deep learning (Record no. 19081)

MARC details
000 -LEADER
fixed length control field a
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230329101645.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230329b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency AIKTC-KRRC
Transcribing agency AIKTC-KRRC
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 20333
Author Sachidhanandam, P.
245 ## - TITLE STATEMENT
Title Improved resource allocation in 5g using deep learning
250 ## - EDITION STATEMENT
Volume, Issue number Vol.13(4), Dec
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Chennai
Name of publisher, distributor, etc. ICT Academy
Year 2022
300 ## - PHYSICAL DESCRIPTION
Pagination 2826-2829p.
520 ## - SUMMARY, ETC.
Summary, etc. All wireless equipment, including terminals, base stations, and phones,<br/>functions as a component of a single interconnected system, it is subject<br/>to attacks from a wide variety of different forms of cyber threats. This<br/>elucidates the relevance of considering the aforementioned attacks in<br/>order to prevent them from finally acquiring control of the complete<br/>system environment. The term cybersecurity refers to the set of<br/>preventative measures that are implemented to safeguard an<br/>information technology infrastructure against being corrupted or<br/>destroyed. The results of a performance evaluation that was carried out<br/>on the DRL at several different node densities. When there is a<br/>requirement to analyze a network in terms of its throughput, delivery<br/>ratio, and latency, NS2 is the tool that is utilized. In this article, a<br/>comparison and contrast between the Lagrange Duality Method<br/>technique is presented.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4619
Topical term or geographic name entry element EXTC Engineering
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 20334
Co-Author Amirtha Preeya, V.
773 0# - HOST ITEM ENTRY
Title ICTACT journal on communication technology
International Standard Serial Number 0976-0091
Place, publisher, and date of publication Chennai ICT Academy
856 ## - ELECTRONIC LOCATION AND ACCESS
URL https://ictactjournals.in/paper/IJCT_Vol_13_Iss_4_Paper_8_2826_2829.pdf
Link text Click here
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Articles Abstract Database
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     School of Engineering & Technology School of Engineering & Technology Archieval Section 29/03/2023   2023-0551 29/03/2023 29/03/2023 Articles Abstract Database
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.