2021
DOI: 10.1016/j.array.2021.100093
|View full text |Cite|
|
Sign up to set email alerts
|

Hybrid optimization algorithm based optimal resource allocation for cooperative cognitive radio network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…With the help of experimental hardware, a certain amount of data has been periodically collected and those data can be used as datasets for future prediction of water requirements. ose pressure datasets and flow datasets are going to play a vital role in future predictions and forecasting [11,12].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…With the help of experimental hardware, a certain amount of data has been periodically collected and those data can be used as datasets for future prediction of water requirements. ose pressure datasets and flow datasets are going to play a vital role in future predictions and forecasting [11,12].…”
Section: Resultsmentioning
confidence: 99%
“…[5,6] Monica et al brief that the breaks and holes were fundamentally brought about by enormous varieties in pipe pressure inside a water conveyance framework [7,8]. is proposed research is related to [9][10][11][12] oil pipeline transportation monitoring using a machine learning algorithm, which is the base work to carry out the present research. What's more, subsequently, in this task, research has been led to recognize the issues that might be happening in the water circulation frameworks ahead of time utilizing time arrangement estimation calculation.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the third question given by the researcher concerns various types of verification that can be implemented inside the application [12]. e verification given by the researcher consists of six types, which are account password verification; e-mail OTP verification; phone OTP verification; captcha verification; fingerprint verification; and face-recognition verification [13]. As the result shown in Figure 5, the highest vote has been given to fingerprint verification, which has 45 votes with 90% of the respondents.…”
Section: Resultsmentioning
confidence: 99%
“…of input LUTs. The important details like minimum period value, minimum input arrival time before clock, information of delay, maximum frequency value, and maximum output required time after clock were resulted at timing details [19]. But the design is still incomplete, and by means total memory utilization value, it will attain complete state.…”
Section: Device Utilization and Timingmentioning
confidence: 99%