5g - Review 1
5g - Review 1
5g - Review 1
1
ABSTRACT
• With the spread and development of 5G technology, network configurations with MEC (Multi-Access
Edge Computing) servers in the vicinity of 5G base stations are becoming more common.
• In this project, we propose resource allocation methods to efficiently determine the server to which tasks
• A prioritized allocation by the average number of waiting tasks, by the communication delay, by the task
2
LITERATURE SURVEY
S.No Title Author Pros Cons Metrices
1 Performance Analysis of 5
Machine Learning Models with Abbas M, 2020 Used IOT Network Less Accuracy 75
Extensive Input Features
2 Detecting Anomalies in IoT
Devices for Enhanced Data Tie Luo, 2020 Extended Accuracy The training database 65
Security. consist less data
3
S.No Title Author Pros Cons Metrices
10 An Unsupervised Method
for Social Network Dataset belonging to
Spammer Detection Based Darshika Multiple category Accuracy Low 85
Koggalahewa1, 2022
on User Information
Interests
4
OBJECTIVE
In this framework, five machine learning models are evaluated using various metrics with a large
collection of inputs features sets.
Methods target the data anomalies present in general smart Internet of Things (IoT) devices, allowing for
easy detection of anomalous events based on stored data.
It can be sent in massive volume by botnets, networks of infected computers. This paper proposed deep
learning technique of spam detection for IOT devices application.
A quality of these data will fluctuate depending on the time and location, which is represented by their
speed. One can't depict IOT without Machine Learning
Spam detection and filtration are significant and enormous problems for email and IoT service providers
nowadays
5
To achieve this objective, resource Detection in IoT using Machine Learning framework is proposed. In
this framework, five machine learning models are evaluated using various metrics with a large collection
of inputs features sets.
Anomalous detection to improve the usability and security of IoT systems. On the other hand, attackers
often view learning algorithms to exploit the vulnerabilities in smart IoT-based systems.
It can be sent in massive volume by botnets, networks of infected computers. This paper proposed deep
learning technique of spam detection for IOT devices application
A quality of these data will fluctuate depending on the time and location, which is represented by their
speed. One can't depict IOT without Machine Learning
This paper presents a detailed survey on the latest developments in spam text detection and classification
in social media.
6
EXISTING SYSTEM
• There are situations where end devices offload computation to cloud servers.
• Resource Allocation has been proposed to assist the architecture consisting only of end devices and
cloud servers.
• Resource Allocation assumes that the performance of cloud servers, which are candidates for task
allocation, is homogeneous.
• Therefore, a new architecture is required to support network configurations that include MEC servers.
• In existing system to overcome the delay produced by the too much participant in internet access they
have applied the scheduling based schemes
7
EXISTING SYSTEM ARCHITECTURE
8
WORKPLAN
Phase I
Literature Survey
Implementation of Existing System
Journal Publication-I
Phase II
Implementation of Proposed System
Comparison of Existing & Proposed System
Journal Publication-II
9
REFERENCE
• 1. Ejaz, W.; Sharma, S.K.; Saadat, S.; Naeem, M.; Anpalagan, A.; Chughtai, N.A. A comprehensive survey on resource allocation for CRAN in 5G and
beyond networks. J. Netw. Comput. Appl. 2020, 160, 102638. [CrossRef]
• 2. Wei, X.; Kan, Z.; Sherman, X. 5G Mobile Communications; Springer: Cham, Switzerland, 2017; ISBN 9783319342061.
• 3. Yu, H.; Lee, H.; Jeon, H. What is 5G? Emerging 5G mobile services and network requirements. Sustainability 2017, 9, 1848. [CrossRef]
• 4. Fernández-Caramés, T.M.; Fraga-Lamas, P.; Suárez-Albela, M.; Vilar-Montesinos, M. A fog computing and cloudlet based augmented reality
system for the industry 4.0 shipyard. Sensors 2018, 18, 1798. [CrossRef] [PubMed]
• 5. Chin, W.H.; Fan, Z.; Haines, R. Emerging technologies and research challenges for 5G wireless networks. IEEE Wirel. Commun. 2014, 21, 106–
112. [CrossRef]
• 6. Abad-Segura, E.; González-Zamar, M.D.; Infante-Moro, J.C.; García, G.R. Sustainable management of digital transformation in higher education:
Global research trends. Sustainability 2020, 12, 2107. [CrossRef]
• 7. Institute of Business Management; Institute of Electrical and Electronics Engineers Karachi Section; Institute of Electrical and Electronics
Engineers. MACS-13. In Proceedings of the 13th International Conference Mathematics, Actuarial Science, Computer Science & Statistics, Karachi,
Pakistan, 14–15 December 2019.
• 8. Nalepa, G.J.; Kutt, K.; Zycka, B.G.; Jemioło, P.; Bobek, S. Analysis and use of the emotional context with wearable devices for games and
intelligent assistants. Sensors 2019, 19, 2509. [CrossRef]
• 9. Liu, G.; Jiang, D. 5G: Vision and Requirements for Mobile Communication System towards Year 2020. Chin. J. Eng. 2016, 2016, 8. [CrossRef]
• 10. Rappaport, T.S.; Gutierrez, F.; Ben-Dor, E.; Murdock, J.N.; Qiao, Y.; Tamir, J.I. Broadband millimeter-wave propagation measurements and
models using adaptive-beam antennas for outdoor Urban cellular communications. IEEE Trans. Antennas Propag. 2013, 61, 1850–1859. [CrossRef]
10