A comprehensive survey on IRS-assisted NOMA-based 6G wireless network: Design perspectives, challenges and future directions
The propagation environment was uncontrollable in first-generation to fifth-generation (5G)
wireless technologies. This behavior of the wireless propagation environment is one of the …
wireless technologies. This behavior of the wireless propagation environment is one of the …
A systematic analysis of enhancing cyber security using deep learning for cyber physical systems
In this current era, cyber-physical systems (CPSs) have gained concentrated consideration
in various fields because of their emergent applications. Though the robust dependence on …
in various fields because of their emergent applications. Though the robust dependence on …
[HTML][HTML] Federated reinforcement learning based task offloading approach for MEC-assisted WBAN-enabled IoMT
The exponential proliferation of wearable medical apparatus and healthcare information
within the framework of the Internet of Medical Things (IoMT) introduces supplementary …
within the framework of the Internet of Medical Things (IoMT) introduces supplementary …
Computation Rate Maximization for SCMA-Aided Edge Computing in IoT Networks: A Multi-Agent Reinforcement Learning Approach
Integrating sparse code multiple access (SCMA) and mobile edge computing (MEC) into the
Internet of Things (IoT) networks can enable efficient connectivity and timely computation for …
Internet of Things (IoT) networks can enable efficient connectivity and timely computation for …
Sum-Rate Maximization for D2D-Enabled UAV Networks With Seamless Coverage Constraint
X Liu, B Yang, J Liu, L **an, X Jiang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
This article investigates sum-rate maximization while achieving seamless coverage with the
minimum number of unmanned aerial vehicles (UAVs) in a device-to-device (D2D)-enabled …
minimum number of unmanned aerial vehicles (UAVs) in a device-to-device (D2D)-enabled …
A hybrid secure resource allocation and trajectory optimization approach for mobile edge computing using federated learning based on WEB 3.0
The use of unmanned aerial vehicles (UAVs) in Internet-of-Things (IoT) has grown, but
security for UAV communications still a challenge due to the distributed nature of line-of …
security for UAV communications still a challenge due to the distributed nature of line-of …
Deep reinforcement learning based rate enhancement scheme for RIS assisted mobile users underlaying UAV
The fifth generation (5G) network enabled communication between devices has emerged as
a state-of-the-art technology. In the era of proliferating smart devices and intelligent wireless …
a state-of-the-art technology. In the era of proliferating smart devices and intelligent wireless …
Joint traffic admission, resource allocation and mode selection protocol for NOMA-based D2D users underlaying cellular network for 5G and beyond networks
Device-to-device (D2D) communications offload the data traffic from the cellular network and
improve spectral and energy efficiency. Non-orthogonal multiple access (NOMA) is an …
improve spectral and energy efficiency. Non-orthogonal multiple access (NOMA) is an …
[HTML][HTML] Multiagent deep reinforcement learning based Energy efficient resource management scheme for RIS assisted D2D users in 6G-aided smart cities …
Device-to-device communication (D2D-C) is one of the promising technologies for the sixth-
generation (6G) environment. This is because it enhances end-user throughput, energy …
generation (6G) environment. This is because it enhances end-user throughput, energy …
Incremental RBF-based cross-tier interference mitigation for resource-constrained dense IoT networks in 5G communication system
The deployment of resource-constrained and densely distributed Internet of Things (IoT)
devices poses significant challenges for 5G communication systems due to the increased …
devices poses significant challenges for 5G communication systems due to the increased …