2020
DOI: 10.1016/j.simpat.2019.102045
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning-Based traffic offloading in fog networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…An optimal machine learning algorithm that maximizes resource allocation and the arrival pattern of requests is an unanswered question [30]. Another unexplored paradigm is the handling of vast amount of data in a Wi-Fi environment both in delayed and non-delayed transmissions [31]. The optimization of Genetic algorithm to best suit varied architecture for differentiated data is still to be answered [31].…”
Section: Future Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…An optimal machine learning algorithm that maximizes resource allocation and the arrival pattern of requests is an unanswered question [30]. Another unexplored paradigm is the handling of vast amount of data in a Wi-Fi environment both in delayed and non-delayed transmissions [31]. The optimization of Genetic algorithm to best suit varied architecture for differentiated data is still to be answered [31].…”
Section: Future Researchmentioning
confidence: 99%
“…Another unexplored paradigm is the handling of vast amount of data in a Wi-Fi environment both in delayed and non-delayed transmissions [31]. The optimization of Genetic algorithm to best suit varied architecture for differentiated data is still to be answered [31]. The debate of optimal resource allocation and management for energy conservation is still open [32].…”
Section: Future Researchmentioning
confidence: 99%
“…In fact, training includes utilizing an algorithm to iteratively alter the power of the connections among the perceptrons, ensuring that the network absorbs to associate a specified input (the pixels of a picture) by the right label (cat or dog). When qualified, the deep net must preferably be capable of categorizing an input, which has not been obtained previously [23].…”
Section: 1mentioning
confidence: 99%
“…e neuron, then, transmits the data downstream to several other associated neurons in a system called "forward transfer." e last secret layer is connected to the output layer at the end of this phase, which has 1 neuron with each potential desired output [23]. e fundamental structure of NN is shown in Figure 3.…”
Section: Ml-driven Networkingmentioning
confidence: 99%
“…The evaluation metrics are traffic offloading rate and transmission time from the NBA‐videos provider to the user. The proposed mechanism, called IDTO is compared with two benchmarks, that is, 2,5 called CATO and MLTO respectively. In addition, the cache size is set as 128 MB, λ = 20 m , 50 m , 80 m , the hugepage size of DPDK is set as 1024 MB, and the caching time for each content is set as 3mins.…”
Section: Evaluation Performancementioning
confidence: 99%