Жанры
Авторы
Контакты
О сайте
Книжные новинки
Популярные книги
Найти
Главная
Авторы
Mohamed-Aymen Chalouf
Intelligent Security Management and Control in the IoT
Читать книгу Intelligent Security Management and Control in the IoT - Mohamed-Aymen Chalouf - Страница 1
Оглавление
Предыдущая
Следующая
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
52
Оглавление
Купить и скачать книгу
Вернуться на страницу книги Intelligent Security Management and Control in the IoT
Оглавление
Страница 1
Table of Contents
List of Tables
List of Illustrations
Guide
Pages
Страница 7
Страница 8
Страница 9
1
Multicriteria Selection of Transmission Parameters in the IoT
1.1. Introduction
1.2. Changing access network in the IoT
1.3. Spectrum handoff in the IoT
1.4. Multicriteria decision-making module for an effective spectrum handoff in the IoT
1.4.1.
General architecture
1.4.1.1.
Detection for an intelligent radio module
1.4.1.2.
Prediction module
1.4.1.2.1. Probability of channel availability at period t + 1
1.4.1.2.2. Average channel availability time
1.4.1.3.
Object characteristics
1.4.1.4.
Network monitoring module
1.4.1.5.
Database
1.4.1.6.
Multicriteria decision-making module
1.4.1.7.
Module for running vertical handover/spectrum handoff
1.4.2.
Decision-making flowchart
1.4.2.1.
Stage 1: selecting available access networks/CR channels
1.4.2.2.
Stage 2: classifying channels depending on the energy cost of the transmission models
1.4.2.3.
Stage 3: calculation of the QoS score of the transmission models
1.4.2.4.
Stage 4: attribution of weight and calculating the final score
1.4.3.
Performances evaluation
1.4.3.1.
Scenario 1: network selection – the case of V2I communications
1.4.3.2.
Scenario 2: selecting the radio channel – the case of CR-VANET
1.5. Conclusion
1.6. References
Страница 35
2
Using Reinforcement Learning to Manage Massive Access in NB-IoT Networks
2.1. Introduction
2.2. Fundamentals of the NB-IoT standard
2.2.1.
Deployment and instances of use
2.2.2.
Transmission principles
2.2.2.1.
Modes of deployment
2.2.2.2. Physical layer
2.2.3.
Radio resource random access procedure
2.3. State of the art
2.4. Model for accessing IoT terminals
2.5. Access controller for IoT terminals based on reinforcement learning
2.5.1.
Formulating the problem
2.5.2.
Regulation system for arrivals
2.6. Performance evaluation
2.7. Conclusion
2.8. References
{buyButton}
Подняться наверх