2017 International Joint Conference on Neural Networks (IJCNN) 2017
DOI: 10.1109/ijcnn.2017.7965930
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning through evolution: A hybrid approach to scheduling in a dynamic environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…This entity keeps track of the user device, and there can only be one MME connected to a device at a time. The S-GW takes care of the data packet routing, forwarding, and manages mobility between LTE and other networks [83]- [85]. This component also allows for the replication of user data for lawful interception.…”
Section: A Lte Network Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…This entity keeps track of the user device, and there can only be one MME connected to a device at a time. The S-GW takes care of the data packet routing, forwarding, and manages mobility between LTE and other networks [83]- [85]. This component also allows for the replication of user data for lawful interception.…”
Section: A Lte Network Architecturementioning
confidence: 99%
“…Fagan et al [85] applied deep learning approach for downlink scheduling. The data-set is derived using a genetic algorithm over many simulated random UE data reports and used to train the deep learning network.…”
Section: Hybrid / Multi-objective Techniquesmentioning
confidence: 99%
“…Conventional methods for static scheduling include genetic algorithm, [7][8][9] particle swarm, 10,11 heuristic search, 12,13 and so on. Dynamic scheduling algorithms include load balancing, [14][15][16] fuzzy stochastic optimization, 10,17 deep reinforcement learning, 18,19 and so on. A heuristic search algorithm is adopted to find the optimal reconfiguration scheme for the target security protocol in given solution space.…”
Section: Related Workmentioning
confidence: 99%