Transactions on Emerging Telecommunications Technologies最新文献

筛选
英文 中文
Energy Efficient Dual Index Multicarrier M-Ary Cyclic Shifted Chaotic Vector Shift Keying System 高能效双指标多载波M-Ary循环移位混沌矢量移位键控系统
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-01 DOI: 10.1002/ett.70123
G. Bavatharani, T. Laxmikandan, T. Manimekalai
{"title":"Energy Efficient Dual Index Multicarrier M-Ary Cyclic Shifted Chaotic Vector Shift Keying System","authors":"G. Bavatharani,&nbsp;T. Laxmikandan,&nbsp;T. Manimekalai","doi":"10.1002/ett.70123","DOIUrl":"https://doi.org/10.1002/ett.70123","url":null,"abstract":"<div>\u0000 \u0000 <p>Chaotic signals are highly suitable for spread spectrum communication due to their inherent anti-jamming and anti-interference properties. Chaos-based multicarrier systems meet the increasing demands for high spectral efficiency, energy efficiency, secure, and reliable communication. However, the transmission of reference signals in these systems negatively impacts both spectral and energy efficiency. In this work, we enhance the energy efficiency of chaos-based multicarrier systems by employing index modulation with dual indexing on carriers, combined with cyclic-shifted chaotic signals. This approach not only improves energy efficiency but also reduces hardware complexity by utilizing a subset of subcarriers. Semi-analytical expressions for bit error rate (BER) over AWGN (additive white Gaussian noise) and multipath fading channels have been derived and validated through simulations. Comparative analysis reveals that the proposed system achieves significant improvement in BER performance and offers gain in energy efficiency up to a 2.5 dB over existing chaotic multicarrier systems and reduced hardware complexity in addition.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143741401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Multi-Model Biometrics Using Deep Learning Model Based-Optimal Hybrid Pattern by the Heuristic Approach 基于启发式方法的基于深度学习模型的最优混合模式安全多模型生物识别
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-01 DOI: 10.1002/ett.70106
Samatha J, Madhavi Gudavalli
{"title":"A Secure Multi-Model Biometrics Using Deep Learning Model Based-Optimal Hybrid Pattern by the Heuristic Approach","authors":"Samatha J,&nbsp;Madhavi Gudavalli","doi":"10.1002/ett.70106","DOIUrl":"https://doi.org/10.1002/ett.70106","url":null,"abstract":"<div>\u0000 \u0000 <p>A new Deep Learning (DL)-based privacy preservation method using multimodal biometrics is implemented in this work. Here, the fingerprint, iris, and face are aggregated in the initial phase and fed to the Optimal Hybrid Pattern, where the Local Gradient Pattern and Local Weber Pattern are used. Thus, two sets of patterns from two diverse techniques for fingerprint, face, and iris are attained. Here, the Fitness-aided Random Number in Cheetah Optimizer (FRNCO) is used for optimization and also used for selecting the optimal Pixels to attain the optimal pattern. Further, these three pattern images are used to attain the histogram-based features, where the same FRNCO model is used for optimization. It is then forwarded to the final Deep Bayesian Network (DBN) with a Gated Recurrent Unit (GRU) termed the DB-GRU approach for acquiring the classified outcomes. The designed model is assimilated to recognize the efficacy of the developed model.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143741402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of Blockchain-Based Industrial Metaverse in SMMEs 基于区块链的中小企业工业元宇宙研究
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-01 DOI: 10.1002/ett.70109
Dianwei Wang, Junbiao Wang, Aijun Yan, Taotao Li, Yi Zhou, Qinqrui Tu, Jingfeng Zhu, Yejun Yang
{"title":"Survey of Blockchain-Based Industrial Metaverse in SMMEs","authors":"Dianwei Wang,&nbsp;Junbiao Wang,&nbsp;Aijun Yan,&nbsp;Taotao Li,&nbsp;Yi Zhou,&nbsp;Qinqrui Tu,&nbsp;Jingfeng Zhu,&nbsp;Yejun Yang","doi":"10.1002/ett.70109","DOIUrl":"https://doi.org/10.1002/ett.70109","url":null,"abstract":"<div>\u0000 \u0000 <p>The convergence of blockchain technology and the industrial metaverse is poised to revolutionize digital transformation in small- and medium-sized manufacturing enterprises (SMMEs), addressing their unique challenges and unlocking new opportunities for innovation and competitiveness. This survey explores the fundamental concepts, state-of-the-art advancements, and practical applications of blockchain and industrial metaverse technologies, focusing on their synergistic potential to reshape supply chain management, enhance production efficiency, and drive intelligent manufacturing. Key blockchain features such as decentralization, distributed ledgers, and smart contracts are analyzed alongside metaverse technologies like digital twins, virtual reality, and augmented reality, showcasing their transformative impact on data security, product traceability, and operational efficiency. Case studies and industry insights highlight the practical integration of these technologies in SMMEs, demonstrating their ability to overcome resource constraints and align with strategic goals. The survey also addresses the major challenges—technological, financial, and infrastructural—faced by SMMEs in digital transformation, providing actionable strategies and policy recommendations. By examining the interplay between blockchain and the industrial metaverse, this paper underscores the emerging trends and future trajectories of these technologies, offering a comprehensive roadmap for leveraging their potential to achieve sustainable growth and innovation in the manufacturing sector.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143749684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IoMT-Enabled Surgical Monitoring System Utilizing Robotics and AI With E2ARiA-RESNET-50 and MI-KMEANS 利用E2ARiA-RESNET-50和MI-KMEANS的机器人和人工智能的iomt手术监测系统
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-03-31 DOI: 10.1002/ett.70082
Dinesh Kumar Reddy Basani, Basava Ramanjaneyulu Gudivaka, Rajya Lakshmi Gudivaka, Raj Kumar Gudivaka, Sri Harsha Grandhi, Faheem khan
{"title":"An IoMT-Enabled Surgical Monitoring System Utilizing Robotics and AI With E2ARiA-RESNET-50 and MI-KMEANS","authors":"Dinesh Kumar Reddy Basani,&nbsp;Basava Ramanjaneyulu Gudivaka,&nbsp;Rajya Lakshmi Gudivaka,&nbsp;Raj Kumar Gudivaka,&nbsp;Sri Harsha Grandhi,&nbsp;Faheem khan","doi":"10.1002/ett.70082","DOIUrl":"https://doi.org/10.1002/ett.70082","url":null,"abstract":"<div>\u0000 \u0000 <p>Robotic automated Surgery uses robots to assist with surgeries, making procedures more precise and recovery faster. It is popular in healthcare because it enables surgeries with smaller incisions, leading to quicker healing and shorter hospital stays. However, existing research often neglects the implementation of strong safety measures and fail-safes in robotic surgical systems. Therefore, this paper presents a robotic-based AI framework for monitoring the surgical phase, utilizing E2ARiA-RESNET-50 AND MI-KMEANS. Initially, the input video is preprocessed, including frame conversion, key frame extraction, blur and distortion removal using AKRDF with sharpening. Next, data are balanced using SMOTE. Super-resolution is then performed using PWLC-SRGAN, followed by variability analysis in tissue appearance using MI-KMEANS and patch extraction. In the meantime, from super-resolution, segmentation is done by ROI-WA, followed by masking. Then, features are extracted from both patch-extracted and masked images. Finally, these extracted features are classified using E2ARiA-RESNET-50 for monitoring. The experimental results revealed that the proposed model reached a high accuracy of 98.625%, outperforming traditional methods.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143741690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simultaneous Vortex- and Non-Vortex-Based Transmission 同时涡旋和非涡旋传动
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-03-29 DOI: 10.1002/ett.70122
Man Hee Lee, Hye Yeong Lee, Soo Young Shin
{"title":"Simultaneous Vortex- and Non-Vortex-Based Transmission","authors":"Man Hee Lee,&nbsp;Hye Yeong Lee,&nbsp;Soo Young Shin","doi":"10.1002/ett.70122","DOIUrl":"https://doi.org/10.1002/ett.70122","url":null,"abstract":"<div>\u0000 \u0000 <p>This paper proposes simultaneous vortex and nonvortex-based transmission (SVNT) aimed at increasing capacity by serving multiple users (UEs) (new and legacy). The system model describes a cell with a base station (BS) that supports new UEs (NUEs) and legacy UEs (LUEs) to maintain backward compatibility. Geometrical transceivers for uniform circular array (UCA) and uniform rectangular array (URA) are utilized to derive channel models. Moreover, the modified Bessel function is applied to ensure an equitable divergence effect in vortex-based transmission (VT). Furthermore, we present three scenarios featuring three different antenna types. The numerical results are demonstrated and validated in terms of average capacity (AC), outage probability (OP), and throughput.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143726866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Electric Vehicle Battery Performance and Safety Through IoT and Machine Learning: A Fire Prevention Approach 通过物联网和机器学习提高电动汽车电池性能和安全性:一种防火方法
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-03-29 DOI: 10.1002/ett.70112
Uma S, R. Eswari
{"title":"Enhancing Electric Vehicle Battery Performance and Safety Through IoT and Machine Learning: A Fire Prevention Approach","authors":"Uma S,&nbsp;R. Eswari","doi":"10.1002/ett.70112","DOIUrl":"https://doi.org/10.1002/ett.70112","url":null,"abstract":"<div>\u0000 \u0000 <p>This research presents a comprehensive assessment and comparison of various battery technologies employed in EVs, including lithium-ion, nickel-metal hydride, solid-state, lithium iron phosphate, and sodium-ion batteries. A novel approach integrating IoT sensors and machine learning is proposed to monitor and analyze battery performance under real-world driving conditions, with a strong emphasis on fire prevention and safety. Through an extensive literature review, the inherent characteristics, advantages, and limitations of each battery type are explored. IoT sensors deployed in EVs can collect real-time data on important factors, such as voltage, current, temperature, and state of charge (SoC). Machine learning algorithms process this data to realize degradation patterns, optimize battery management strategies, and enhance charging protocols. By leveraging data-driven insights, this research aims to improve battery efficiency, extend lifespan, and mitigate fire hazards. The proposed approach achieves a battery performance prediction accuracy of 99.4%, reduces fire risk by 72%, and improves overall battery efficiency by 18.6% compared to conventional methods. Ultimately, the findings will contribute to the development of safer and more sustainable EV battery technologies, shaping the future of eco-friendly mobility.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143726867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secrecy Rate Optimization for Multi-User Secure Communication Assisted by Intelligent Reflecting Surfaces (IRS) Under Imperfect CSI Conditions 非完美CSI条件下智能反射面辅助下多用户安全通信保密率优化
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-03-29 DOI: 10.1002/ett.70117
Shengtao Huang, Ying Zhang
{"title":"Secrecy Rate Optimization for Multi-User Secure Communication Assisted by Intelligent Reflecting Surfaces (IRS) Under Imperfect CSI Conditions","authors":"Shengtao Huang,&nbsp;Ying Zhang","doi":"10.1002/ett.70117","DOIUrl":"https://doi.org/10.1002/ett.70117","url":null,"abstract":"<div>\u0000 \u0000 <p>This paper investigates the application of intelligent reflecting surfaces (IRS) in secure wireless communication under multi-user and multi-eavesdropper scenarios, focusing on addressing the challenges posed by imperfect channel state information (CSI). In this context, multiple users receive confidential information via a multi-antenna access point (AP), while the eavesdroppers' channels may be stronger than the legitimate communication channels and exhibit spatial correlation. To improve secure communication efficiency, a unified optimization method is introduced, combining AP signal direction adjustments and IRS reflection control to boost the confidentiality rate of authorized communication pathways. Considering the challenges of imperfect CSI and the presence of multiple users and eavesdroppers, the paper employs alternating optimization and semidefinite relaxation (SDR) methods, combined with an iterative hybrid optimization (IHO) algorithm, to solve the optimization problem and obtain high-quality suboptimal solutions. Simulation outcomes reveal that the suggested approach markedly enhances confidentiality rates in multi-user and multi-eavesdropper scenarios compared to traditional benchmark models, effectively mitigating the impact of imperfect CSI.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143726868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Self-Guided Quantum Generative Adversarial Network Based Scheduling Framework for Efficient Resource Utilization in Cloud Computing to Enhance Performance and Reliability 基于优化自导向量子生成对抗网络的云计算资源高效利用调度框架,提高性能和可靠性
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-03-25 DOI: 10.1002/ett.70120
P. M. Sithar Selvam, S. Shabana Begum, Yogesh Pingle, Santhosh Srinivasan
{"title":"Optimized Self-Guided Quantum Generative Adversarial Network Based Scheduling Framework for Efficient Resource Utilization in Cloud Computing to Enhance Performance and Reliability","authors":"P. M. Sithar Selvam,&nbsp;S. Shabana Begum,&nbsp;Yogesh Pingle,&nbsp;Santhosh Srinivasan","doi":"10.1002/ett.70120","DOIUrl":"https://doi.org/10.1002/ett.70120","url":null,"abstract":"<div>\u0000 \u0000 <p>Cloud computing enables dynamic resource access, but efficient resource allocation remains challenging due to interference and performance limitations in virtual machine (VM) management. Efficient resource allocation in cloud computing is crucial for minimizing interference and optimizing virtual machine (VM) performance. This study proposes a Self-Guided Quantum Generative Adversarial Network with Prairie Dog Optimization Algorithm (SGQGAN-PDOA) to reallocate tasks across VMs dynamically. The framework integrates Inception Transformer (IT) for feature extraction and Spatial Distribution–Principal Component Analysis (SD-PCA) for feature reduction, enhancing processing efficiency. Implemented in Java with CloudSim, the proposed model improves resource utilization, achieving 80% reliability for 150 VMs with a 200 ms processing time. Experimental results demonstrate significant reductions in waiting time, response time, and load imbalance, outperforming existing methods. By leveraging quantum generative modeling and optimization, this approach enhances scalability, energy efficiency, and system responsiveness in dynamic cloud environments. The findings suggest that quantum-inspired scheduling frameworks offer a promising solution for adaptive and high-performance resource management in cloud computing.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143689892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Dynamic Resource Assignment Technique for 6G Wireless Networks 6G无线网络动态资源分配技术性能分析
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-03-24 DOI: 10.1002/ett.70121
Sridhar Iyer
{"title":"Performance Analysis of Dynamic Resource Assignment Technique for 6G Wireless Networks","authors":"Sridhar Iyer","doi":"10.1002/ett.70121","DOIUrl":"https://doi.org/10.1002/ett.70121","url":null,"abstract":"<div>\u0000 \u0000 <p>The sixth generation (6G) wireless networks will implement dynamic spectrum access methods to ensure efficient spectrum sensing, which will in turn reduce the probability of false alarms and maximize the detection probability. Hence, time for sensing (TfS) will be a key parameter as it controls both probabilities. However, there exists a trade-off in setting the TfS value, which has an effect on network performance. Also, the implementation of an efficient spectrum sensing technique will mandate the use of efficient resource assignment (RA) to achieve high throughput. Therefore, there exists motivation to formulate an efficient spectrum sensing technique that jointly optimizes TfS and RA. In the current article, a dynamic RA (DRA) technique is proposed for assigning key resources, that is, sub-carriers, power, remote radio heads, and baseband units, dynamically within the network. The DRA technique implements an opportunistic spectrum sharing (SS) method which uses cooperative SS to enable secondary users (SUs) to detect any vacant spectrum slots not being currently utilized by primary users (PUs). The aim of the DRA technique is to maximize overall throughput of the SUs while simultaneously ensuring the desired quality of service for the PUs. To achieve this aim, DRA adjusts the time for spectrum sensing in accordance with the detection probabilities of targets and the false alarms. To find solutions to the formulated problem in reasonable times, an iterative heuristic method is proposed. The results reveal that (i) the DRA technique is effective in obtaining the solutions, and (ii) it is mandatory to adjust the time for sensing.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143689982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Nash Bargaining Cooperative Game Policy in Mobile Edge Computing 移动边缘计算中的纳什议价合作博弈策略
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-03-20 DOI: 10.1002/ett.70105
Ruixia Li, Chia Sien Lim, Muhammad Ehsan Rana, Xiancun Zhou, Jinhong Zhang
{"title":"A Nash Bargaining Cooperative Game Policy in Mobile Edge Computing","authors":"Ruixia Li,&nbsp;Chia Sien Lim,&nbsp;Muhammad Ehsan Rana,&nbsp;Xiancun Zhou,&nbsp;Jinhong Zhang","doi":"10.1002/ett.70105","DOIUrl":"https://doi.org/10.1002/ett.70105","url":null,"abstract":"<div>\u0000 \u0000 <p>While mobile edge computing (MEC) holds promise to enhance users' mobile experience, how to make appropriate offloading decisions under consideration of quality of service (QoS) and energy consumption requirements is challenging. In this research, we focus on obtaining an equilibrium solution that ensures not only the fairness of terminal users and utility maximization for the edge service providers but also QoS and energy consumption requirements. We formulate the cooperative game resource allocation optimization problem (CGRA) under the complete/incomplete information environment and propose the Nash Bargaining Cooperative Game (NBCG) policy to solve it. We perform experiments and compare it with six schemes. Experimental results show that the proposed NBCG can gain better offloading profits than the benchmarks and improve the percent of guaranteed tasks by as much as 23% under different input data sizes, as much as 18% under different time delay tolerances, and as much as 25% under different execution weights.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信