ICC 2021 - IEEE International Conference on Communications 2021
DOI: 10.1109/icc42927.2021.9500265
|View full text |Cite
|
Sign up to set email alerts
|

Actor-Critic-Based Learning for Zero-touch Joint Resource and Energy Control in Network Slicing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(21 citation statements)
references
References 12 publications
0
21
0
Order By: Relevance
“…Table I presents the network parameters. We set hyperparameters of DNNs through extensive experiments [25]- [26] and adopt a similar architecture for both Actor-Critic and target DNN models. We use 5 hidden layers and 128 units per layer with batch size 128.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…Table I presents the network parameters. We set hyperparameters of DNNs through extensive experiments [25]- [26] and adopt a similar architecture for both Actor-Critic and target DNN models. We use 5 hidden layers and 128 units per layer with batch size 128.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…The simulation results show that this method converges faster than the double DQN and AC methods and outperforms in terms of the mentioned parameters. Also, in [130], a method called twin-delayed double-Q soft Actor-Critic (TDSAC) is provided for allocating CPU resources and controlling power consumption in DU-CU based on the C-RAN architecture. To increase the stability and improve the decision quality in TDSAC, double DQN is used to tune the AC parameters.…”
Section: ) Resource Virtualizationmentioning
confidence: 99%
“…It can be learned from [130] that by tuning the AC parameters at specified times, the decision fluctuation in [35], [129] can be reduced. In the Q-learning-based method ( [109]), if the state and action spaces are very large, then the size of the Q-Table will be very large.…”
Section: ) Lessons Learnedmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, Reference [10] proposes a security enhancement to the ZSM architecture, addressing its various identified security threats. The work in [11] introduces the concept of Knowledge Plane (KP) in ZSM. As a pervasive system, the KP provides high-level models of the network's overall functioning.…”
Section: Related Workmentioning
confidence: 99%