2019 27th Iranian Conference on Electrical Engineering (ICEE) 2019
DOI: 10.1109/iraniancee.2019.8786518
|View full text |Cite
|
Sign up to set email alerts
|

Admitting New Requests in Fog Networks According to Erlang B Distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Furthermore, the model finalized the results diverge from that of Optimal merely by at most 3.91%. Lastly on the list are the variations in the graph domino influence from the quantity of UAVs in the scheme, the collective acknowledged data escalations with the number of UAVs depicting the average data received thus proper admission [30]. The Impact of blockages was further investigated per the cumulative received data.…”
Section: The Impact Of Blockagesmentioning
confidence: 99%
“…Furthermore, the model finalized the results diverge from that of Optimal merely by at most 3.91%. Lastly on the list are the variations in the graph domino influence from the quantity of UAVs in the scheme, the collective acknowledged data escalations with the number of UAVs depicting the average data received thus proper admission [30]. The Impact of blockages was further investigated per the cumulative received data.…”
Section: The Impact Of Blockagesmentioning
confidence: 99%
“…Alternatively, considered the assumption that a WSN entailing of N nodes with sensing ability and one mobile sink, those sensor nodes collect files from the locality location and use multihops in forwarding to supply data to the closer mobile entities as shown in [20]. Also considered further assumed the transmission diameter a case in point a disk, of sensor nodes is positioned in this model demonstrated [21], this contributes to the efficiency of algorithm established on multiclassifiers [22], ensuring the two-stage fuzzy statistics envelopment exploration [23], and applicability and performance evaluation of models as detailed in [24].…”
Section:  mentioning
confidence: 99%
“…In comparison to pre-4G technology, 5G will incorporate a variety of emerging wireless technologies, for example, Non-Orthogonal Multiple Access (NOMA), broad Multiple Input Multiple Output (MIMO), millimeter-wave (mm-Wave), and many more technologies for IoT networking [16][17][18][19][20][21]. Within Figure 1, an illustration of the high-level 5G system architecture is demonstrated.…”
Section: Introductionmentioning
confidence: 99%
“…5G is one of the widely popular areas of research for telecommunications professionals as the next wave of broadband networks. As a result, several reports on 5G networks have already been completed, [14][15][16][17][18]. O These articles discussed many potential research opportunities, like infrastructure, flexibility organization, traffic organization, privacy, security, and technological economic features, which are extremely important to consider during the 5G implementation.…”
Section: Introductionmentioning
confidence: 99%