Improved resource allocation in 5g using deep learning (Record no. 19081)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | a |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20230329101645.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 230329b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | AIKTC-KRRC |
| Transcribing agency | AIKTC-KRRC |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 20333 |
| Author | Sachidhanandam, P. |
| 245 ## - TITLE STATEMENT | |
| Title | Improved resource allocation in 5g using deep learning |
| 250 ## - EDITION STATEMENT | |
| Volume, Issue number | Vol.13(4), Dec |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Chennai |
| Name of publisher, distributor, etc. | ICT Academy |
| Year | 2022 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Pagination | 2826-2829p. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | All wireless equipment, including terminals, base stations, and phones,<br/>functions as a component of a single interconnected system, it is subject<br/>to attacks from a wide variety of different forms of cyber threats. This<br/>elucidates the relevance of considering the aforementioned attacks in<br/>order to prevent them from finally acquiring control of the complete<br/>system environment. The term cybersecurity refers to the set of<br/>preventative measures that are implemented to safeguard an<br/>information technology infrastructure against being corrupted or<br/>destroyed. The results of a performance evaluation that was carried out<br/>on the DRL at several different node densities. When there is a<br/>requirement to analyze a network in terms of its throughput, delivery<br/>ratio, and latency, NS2 is the tool that is utilized. In this article, a<br/>comparison and contrast between the Lagrange Duality Method<br/>technique is presented. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 4619 |
| Topical term or geographic name entry element | EXTC Engineering |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 20334 |
| Co-Author | Amirtha Preeya, V. |
| 773 0# - HOST ITEM ENTRY | |
| Title | ICTACT journal on communication technology |
| International Standard Serial Number | 0976-0091 |
| Place, publisher, and date of publication | Chennai ICT Academy |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| URL | https://ictactjournals.in/paper/IJCT_Vol_13_Iss_4_Paper_8_2826_2829.pdf |
| Link text | Click here |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Articles Abstract Database |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | School of Engineering & Technology | School of Engineering & Technology | Archieval Section | 29/03/2023 | 2023-0551 | 29/03/2023 | 29/03/2023 | Articles Abstract Database |