Эротические рассказы

Intelligent Security Management and Control in the IoT. Mohamed-Aymen ChaloufЧитать онлайн книгу.

Intelligent Security Management and Control in the IoT - Mohamed-Aymen Chalouf


Скачать книгу
in terms of latency, we can see in Figure 2.12 that after an exploration stage, the revenue improves very significantly. This recompense is clearly higher than for the adaptive controller, which shows a reduced and very variable recompense (Figure 2.11). In fact, the average of the recompense in TD3 is in the order of 13.91%, while the adaptive controller shows a recompense in the order of 3.6%. This recompense reflects the fact that under TD3, the average number of terminals attempting access gets closer to the optimum. This result, perhaps also shown in Figure 2.14, shows that the number of attempts with TD3 is closer still to the optimum which is equal to 15.49. In fact, the average number of attempts using the adaptive controller is equal to 30.12 (Figure 2.13), while it is equal to 19.6 for our approach.

Graph depicts the average recompense with the adaptive controller.

      Figure 2.11. The average recompense with the adaptive controller

Graph depicts the average recompense with the controller using TD3.

      Figure 2.12. The average recompense with the controller using TD3

Graph depicts the access attempts and abandonments with the adaptive controller.

      Figure 2.13. Access attempts (blue) and abandonments (red) with the adaptive controller. For a color version of this figure, see www.iste.co.uk/chalouf/intelligent.zip

Graph depicts the access attempts and abandonments with the controller using TD3.

      Figure 2.14. Access attempts (blue) and abandonments (red) with the controller using TD3. For a color version of this figure, see www.iste.co.uk/chalouf/intelligent.zip

      In this chapter, we proposed a mechanism to control congestion of the access network, which is considered one of the most critical problems for IoT objects. We have proposed tackling congestion at its root by effectively managing random accesses from these devices thanks to use of the ACB mechanism.

      The proposed access control mechanism is different from conventional methods, which generally rely on simple heuristics. Indeed, the proposed technique relies on recent advances in deep reinforcement learning, through use of the TD3 algorithm. The proposed approach has, in addition, the advantage of learning from its environment and could therefore enable it to adapt to variation of the access schema.

      The simulation results make it possible to show the superiority of the proposed approach, which succeeds in maintaining a number of access attempts close to the optimum, despite the absence of exact information on the number of access attempts. This work also makes it possible to show the potential of using learning techniques in environments where the state cannot be known with precision.

      In the context of our future work, we envisage improving estimation of the number of attempts using learning techniques.

      3GPP (2011). RAN improvements for machine-type communications. TR 37.868, version 11.0.0 [Online]. Available at: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2630 [Accessed 14 October 2020].

      3GPP (2015). Cellular system support for ultra-low complexity and low throughput Internet of Things (CIoT). TR 45.820 [Online]. Available at: https://portal.3gpp.org/ChangeRequests.aspx?q=1&versionId=46751&release=187 [Accessed 14 October 2020].

      3GPP (2016). E-UTRA and E-UTRAN; LTE physical layer, general description (Release 13). TR TS 36.201 [Online]. Available at: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2424 [Accessed 14 October 2020].

      3GPP (2017b). User equipment (UE) radio transmission and reception (Release 13). TS 36.101, version 13.9.0 [Online]. Available at: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2411 [Accessed 14 October 2020].

      3GPP (2018a). Consideration on self-evaluation of IMT-2020 for mMTC connection density. R1-1801796 [Online]. Available at: http://www.3gpp.org/ftp/TSG_RAN/WG1_RL1/TSGR1_92/Docs/R1-1801796.zip [Accessed 14 October 2020].

      3GPP (2018b). Radio Resource Control (RRC); protocol specification. TS 36.331 [Online]. Available at: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2440 [Accessed 14 October 2020].

      3GPP (2019a). Study on cellular Internet of Things (IoT) support and evolution for the 5G System. TR 23.724, version 16.1.0 [Online]. Available at: http://www.3gpp.org/DynaReport/23724.htm [Accessed 14 October 2020].

      3GPP (2019b). Medium Access Control (MAC) protocol specification. TS 36.321, V14.12.0 [Online]. Available at: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2437 [Accessed 14 October 2020].

      3GPP (2020). Evolved Universal Terrestrial Radio Access (E-UTRA); physical channels and modulation (Release 16). TS 36.211, version 16.2.0, June 2020 [Online]. Available at: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2425 [Accessed 14 October 2020].

      Adhikary, A., Lin, X., Wang, Y.-P.-E. (2016). Performance evaluation of NB-IoT coverage. In The IEEE 84th Vehicular Technology Conference (VTC-Fall). IEEE, Montreal.

      Ali, M.S., Hossain, E., Kim, D.I. (2017). LTE/LTE-A random access for massive machine-type communications in smart cities. IEEE Communications Magazine, 55(1), 76–83.

      Baracat, G. and Brito,


Скачать книгу
Яндекс.Метрика