2022
DOI: 10.1155/2022/4937588
|View full text |Cite|
|
Sign up to set email alerts
|

Secure and Energy-Efficient Computational Offloading Using LSTM in Mobile Edge Computing

Abstract: The use of application media, gamming, entertainment, and healthcare engineering has expanded as a result of the rapid growth of mobile technologies. This technology overcomes the traditional computing methods in terms of communication delay and energy consumption, thereby providing high reliability and bandwidth for devices. In today’s world, mobile edge computing is improving in various forms so as to provide better output and there is no room for simple computing architecture for MEC. So, this paper propose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 36 publications
(36 reference statements)
0
2
0
Order By: Relevance
“…On the basis of these methods, a security mechanism was introduced in IoT networks for the healthcare applications in different works. These studies implemented closely related existing schemes in the simulation, for instance, delay optimal long short-term memory (LSTM) [ 21 ], workflow metaheuristic system (WFMS), [ 22 ] and workflow metaheuristic cloud (WMC) [ 23 ]. These studies are closely related to our work to execute workflow applications on heterogeneous nodes in cloud computing.…”
Section: Related Workmentioning
confidence: 99%
“…On the basis of these methods, a security mechanism was introduced in IoT networks for the healthcare applications in different works. These studies implemented closely related existing schemes in the simulation, for instance, delay optimal long short-term memory (LSTM) [ 21 ], workflow metaheuristic system (WFMS), [ 22 ] and workflow metaheuristic cloud (WMC) [ 23 ]. These studies are closely related to our work to execute workflow applications on heterogeneous nodes in cloud computing.…”
Section: Related Workmentioning
confidence: 99%
“…Few research studies which have used the asynchronous learning method, have done so by using it as a regularization method [19], and they lack in detailed methodical research. Furthermore, few research studies [6,[20][21][22] has addressed this issue and explained different methodologies in an effective way.…”
Section: Related Workmentioning
confidence: 99%
“…Tis article has been retracted by Hindawi following an investigation undertaken by the publisher [1]. Tis investigation has uncovered evidence of one or more of the following indicators of systematic manipulation of the publication process:…”
mentioning
confidence: 99%