2022
DOI: 10.1155/2022/5691203
|View full text |Cite
|
Sign up to set email alerts
|

Design of Resources Allocation in 6G Cybertwin Technology Using the Fuzzy Neuro Model in Healthcare Systems

Abstract: In 6G edge communication networks, the machine learning models play a major role in enabling intelligent decision-making in case of optimal resource allocation in case of the healthcare system. However, it causes a bottleneck, in the form of sophisticated memory calculations, between the hidden layers and the cost of communication between the edge devices/edge nodes and the cloud centres, while transmitting the data from the healthcare management system to the cloud centre via edge nodes. In order to reduce th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Software-Defined Network Architecture. At present, the definition of software grid technology has already had a certain basic research [31][32][33][34].…”
Section: Research On Wireless Transmissionmentioning
confidence: 99%
“…Software-Defined Network Architecture. At present, the definition of software grid technology has already had a certain basic research [31][32][33][34].…”
Section: Research On Wireless Transmissionmentioning
confidence: 99%
“…Quantum security procedures have the ability to be used in prospective 6G app scenarios. Well, with quantum gains for supervised and unsupervised learning for clustering and classification jobs, quantum machine learning algorithms may increase confidentiality and security in communications systems [83].…”
Section: Security Challenges Associated With 6g Networkmentioning
confidence: 99%
“…In the encryption process, the data are converted to an unrecognized format so as to protect them from unauthorized persons. In the watermarking process, the data are hidden behind an image without any distortion in its credibility or visibility [30][31][32][33][34]. (iii) In the proposed system, the patient's data are hidden under the patient's face image by watermarking while storing in the fog server or transmitting to the cloud server.…”
Section: Fog Layermentioning
confidence: 99%