IMPROVED RESOURCE ALLOCATION IN 5G USING DEEP LEARNING
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ffbab52e000000ef64100001000400
All wireless equipment, including terminals, base stations, and phones, functions as a component of a single interconnected system, it is subject to attacks from a wide variety of different forms of cyber threats. This elucidates the relevance of considering the aforementioned attacks in order to prevent them from finally acquiring control of the complete system environment. The term cybersecurity refers to the set of preventative measures that are implemented to safeguard an information technology infrastructure against being corrupted or destroyed. The results of a performance evaluation that was carried out on the DRL at several different node densities. When there is a requirement to analyze a network in terms of its throughput, delivery ratio, and latency, NS2 is the tool that is utilized. In this article, a comparison and contrast between the Lagrange Duality Method technique is presented.

Authors
P. Sachidhanandam1, V. Amirtha Preeya2, B.H. Impa3, M. Ranjith Kumar4
Knowledge Institute of Technology, India1, Presidency University, India2,3, Knowledge Institute of Technology, India 4

Keywords
Wireless Equipment, Cybersecurity, Resource Allocation, Deep Learning
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
001002010000
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 13 , Issue: 4 , Pages: 2826 - 2829 )
Date of Publication :
December 2022
Page Views :
394
Full Text Views :
6

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.