2021
DOI: 10.1155/2021/8899094
|View full text |Cite
|
Sign up to set email alerts
|

Effective Capacity Maximization in beyond 5G Vehicular Networks: A Hybrid Deep Transfer Learning Method

Abstract: How to improve delay-sensitive traffic throughput is an open issue in vehicular communication networks, where a great number of vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) links coexist. To address this issue, this paper proposes to employ a hybrid deep transfer learning scheme to allocate radio resources. Specifically, the traffic throughput maximization problem is first formulated by considering interchannel interference and statistical delay guarantee. The effective capacity theory is then … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…But this method does not pay attention to the fact that the content between the source domain and the target domain is not exactly the same. Therefore, in order to make up for the shortcomings of traditional methods, this paper improves ResNet and proposes a new deep transfer learning method [ 16 , 17 ]. After improving ResNet, a deep transfer learning model is reframed, as shown in Figure 6 .…”
Section: Methodsmentioning
confidence: 99%
“…But this method does not pay attention to the fact that the content between the source domain and the target domain is not exactly the same. Therefore, in order to make up for the shortcomings of traditional methods, this paper improves ResNet and proposes a new deep transfer learning method [ 16 , 17 ]. After improving ResNet, a deep transfer learning model is reframed, as shown in Figure 6 .…”
Section: Methodsmentioning
confidence: 99%
“…Where: 𝑀 π‘˜ is the membership authentication code for participants on the network, 𝐢 π‘˜ is the control authentication key for the NCU, 𝐼𝐷 𝑇𝐴 is the identity of the TA, 𝑅𝐼𝐷 𝑣 is the real identity of the vehicle, 𝐼𝐷 π‘πΆπ‘ˆ is the identity of NCU, '𝑠' is the master secret key, 𝛾 𝑖 is a set of integer randomly generated in 𝛾 𝑖 ∈ 𝑍 π‘ž * , 𝐻 is the hash function, || is the concatenation operation and βŠ• is the exclusive-OR operation. The NCU checks for the validity of the request using (7), and further checks the revocation list which contains the real identities of revoked vehicles received securely from the TA to ascertain the authenticity of the vehicles' membership.…”
Section: Development Of Vehicle Authentication Systemmentioning
confidence: 99%
“…Given the tremendous benefits expected from vehicular communications, just like any other wireless communication network, security has been a major challenge. Intruders can easily intercept, modify, and replay messages transmitted on the network or even impersonate other vehicles to broadcast incorrect information [6], [7]. Besides, the privacy of users on the network is also a challenge.…”
Section: Introductionmentioning
confidence: 99%
“…where β„Ž m is the channel between eNB and 𝑀𝑆π‘₯(𝑑) is the transmitted signal at any slot, β„Ž a is access link between MS, and user equipment (UE) is user equipment [6], [21]. MS is the mobile small station placed on the top of vehicle to increase the coverage and the capacity for the passengers especially when the vehicle or bus is pass at cell boundaries, ψ is amplification factor of amplify and forward mobile relay station was selected in this work, therefore the re-transmitted signal form MS at the 𝑑 1 can be write as:…”
Section: Proposed Modelmentioning
confidence: 99%
“…In order to evaluate the signal to noise ratio (SNR) for this system, there are very influencing factors such as, channel coefficient, quality of service (QoS), interference and noise [22], [21]. For simplicity, channel coefficient can be defined as |β„Ž| 2 = 𝛫(β„“) βˆ’π‘Ž where π‘Ž is the path-loss exponent which is dependent on the environment , β„“ is the length of distance between the sender and receiver , 𝛫 is the transceivers' coefficients [22], [23] whereas, 𝛫 = 𝐺 𝑑 𝐺 π‘Ÿ β„Ž 𝑑 2 β„Ž π‘Ÿ 2 , (𝐺 𝑑 β„Ž 𝑑 2 ) and (𝐺 π‘Ÿ β„Ž π‘Ÿ 2 ) are the gains and heights of the sender and receiver antennas, respectively, whereas β„“ is the distance between the source and destination.…”
Section: Proposed Modelmentioning
confidence: 99%