Advanced searches left 3/3

5G Network - Springer Nature

Summarized by Plex Scholar
Last Updated: 10 May 2022

* If you want to update the article please login/register

A constrained optimization model for the provision of services in a 5G network with multi-level cybersecurity investments

The three layers of the network consist of the infrastructure layer, which contains services or applications that are required by end users or devices, and the slices layer, which provides services or applications that are not required by users or devices, and the services layer, which includes services or applications that are required by users or devices.

Source link: https://doi.org/10.1007/s00500-022-07117-5


Edge artificial intelligence-based affinity task offloading under resource adjustment in a 5G network

Edge computing can be used to achieve low-latency service in 5th-generation networks, as well as local computation. Offloading is one of the primary methods in the 5th-generation network mobile edge cloud computing environment. Both large data and computationally complex applications may suffer from inevitable delays posed by resource allocation and resource swapping within various user environments. Deep reinforcement training has been embedded to explore the offloading technique for offloading offline affinity tasks in a dynamic environment due to terminals' mobility and erratic service demands. Resource demand fluctuations and stable resource provisioning yields dissatisfaction with the edge resource utilization constraint. According to loosen the edge resource constraint and save electricity, the distributed unit device in the 5th-generation network is opened/called back as needed. To provide cognitive services for affinity task offloading and dynamic resource allocation, we use deep learning and deep reinforcement learning.

Source link: https://doi.org/10.1007/s10489-021-02786-5

* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions

* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions