You are on page 1of 10

RAJIV GANDHI COLLEGE OF

ENGINEERING AND TECHNOLOGY


DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

DATA EFFICIENT RESOURCE OPTIMIZATION &


CONGESTION CONTROL IN 5G NETWORKS

UNDER THE GUIDENCE OF PRESENTED BY,


Dr. B. SHOBA EBINESAR. V (20TC0054)
HOD OF ECE JAGAN. V (20TC0056)
Kailash. B (20TC0057)

1
ABSTRACT

• With the spread and development of 5G technology, network configurations with MEC (Multi-Access

Edge Computing) servers in the vicinity of 5G base stations are becoming more common.

• In this project, we propose resource allocation methods to efficiently determine the server to which tasks

are allocated in a network configuration that includes MEC servers.

• A prioritized allocation by the average number of waiting tasks, by the communication delay, by the task

response time, and by the cost of using computing resources.

2
LITERATURE SURVEY
S.No Title Author Pros Cons Metrices

1 Performance Analysis of 5
Machine Learning Models with Abbas M, 2020 Used IOT Network Less Accuracy 75
Extensive Input Features
2 Detecting Anomalies in IoT
Devices for Enhanced Data Tie Luo, 2020 Extended Accuracy The training database 65
Security. consist less data

3 Securing IoT Devices from Mass


Spam Attack(Botnets) with HANWEI ZHU, Faster Algorithm The system was trained 84
Machine Learning 2020 with Less type of data

4 A Survey on Mobile Crowd-


Sensing & Its Applications in the KHALID High Accuracy Very Complex 90
IoT Era ABUALSAUD, 2020 Algorithm

5 Machine Learning Techniques


for Spam Detection in Email & Naeem Ahmed, Dataset belonging to Accuracy Low 65
IoT Platforms 2021 Multiple category

3
S.No Title Author Pros Cons Metrices

6 Improving IoT Resources


Detection with Machine Sidharth S, 2022 Used IOT Network Less Accuracy 85
Learning

7 Enhancing IoT Security:


Anomaly Detection Vs Extended Accuracy The training database 90
M.Praveena, 2021
Attack Exploitation consist less data

8 Improving IoT Data Quality


and Predictive Power with Naman Nema, 2021 Faster Algorithm The system was trained 92
Machine Learning with Less type of data

9 Intelligent Detection of IoT


Botnets Using Machine Sanaa Kaddoura, 2021 High Accuracy Very Complex 90
Learning Algorithm

10 An Unsupervised Method
for Social Network Dataset belonging to
Spammer Detection Based Darshika Multiple category Accuracy Low 85
Koggalahewa1, 2022
on User Information
Interests
4
OBJECTIVE
 In this framework, five machine learning models are evaluated using various metrics with a large
collection of inputs features sets.
 Methods target the data anomalies present in general smart Internet of Things (IoT) devices, allowing for
easy detection of anomalous events based on stored data.
 It can be sent in massive volume by botnets, networks of infected computers. This paper proposed deep
learning technique of spam detection for IOT devices application.
 A quality of these data will fluctuate depending on the time and location, which is represented by their
speed. One can't depict IOT without Machine Learning
 Spam detection and filtration are significant and enormous problems for email and IoT service providers
nowadays

5
 To achieve this objective, resource Detection in IoT using Machine Learning framework is proposed. In
this framework, five machine learning models are evaluated using various metrics with a large collection
of inputs features sets.
 Anomalous detection to improve the usability and security of IoT systems. On the other hand, attackers
often view learning algorithms to exploit the vulnerabilities in smart IoT-based systems.
 It can be sent in massive volume by botnets, networks of infected computers. This paper proposed deep
learning technique of spam detection for IOT devices application
 A quality of these data will fluctuate depending on the time and location, which is represented by their
speed. One can't depict IOT without Machine Learning
 This paper presents a detailed survey on the latest developments in spam text detection and classification
in social media.

6
EXISTING SYSTEM

• There are situations where end devices offload computation to cloud servers.
• Resource Allocation has been proposed to assist the architecture consisting only of end devices and
cloud servers.
• Resource Allocation assumes that the performance of cloud servers, which are candidates for task
allocation, is homogeneous.
• Therefore, a new architecture is required to support network configurations that include MEC servers.
• In existing system to overcome the delay produced by the too much participant in internet access they
have applied the scheduling based schemes

7
EXISTING SYSTEM ARCHITECTURE

8
WORKPLAN

Phase I
 Literature Survey
 Implementation of Existing System
 Journal Publication-I
Phase II
 Implementation of Proposed System
 Comparison of Existing & Proposed System
 Journal Publication-II

9
REFERENCE
• 1. Ejaz, W.; Sharma, S.K.; Saadat, S.; Naeem, M.; Anpalagan, A.; Chughtai, N.A. A comprehensive survey on resource allocation for CRAN in 5G and
beyond networks. J. Netw. Comput. Appl. 2020, 160, 102638. [CrossRef]
• 2. Wei, X.; Kan, Z.; Sherman, X. 5G Mobile Communications; Springer: Cham, Switzerland, 2017; ISBN 9783319342061.
• 3. Yu, H.; Lee, H.; Jeon, H. What is 5G? Emerging 5G mobile services and network requirements. Sustainability 2017, 9, 1848. [CrossRef]
• 4. Fernández-Caramés, T.M.; Fraga-Lamas, P.; Suárez-Albela, M.; Vilar-Montesinos, M. A fog computing and cloudlet based augmented reality
system for the industry 4.0 shipyard. Sensors 2018, 18, 1798. [CrossRef] [PubMed]
• 5. Chin, W.H.; Fan, Z.; Haines, R. Emerging technologies and research challenges for 5G wireless networks. IEEE Wirel. Commun. 2014, 21, 106–
112. [CrossRef]
• 6. Abad-Segura, E.; González-Zamar, M.D.; Infante-Moro, J.C.; García, G.R. Sustainable management of digital transformation in higher education:
Global research trends. Sustainability 2020, 12, 2107. [CrossRef]
• 7. Institute of Business Management; Institute of Electrical and Electronics Engineers Karachi Section; Institute of Electrical and Electronics
Engineers. MACS-13. In Proceedings of the 13th International Conference Mathematics, Actuarial Science, Computer Science & Statistics, Karachi,
Pakistan, 14–15 December 2019.
• 8. Nalepa, G.J.; Kutt, K.; Zycka, B.G.; Jemioło, P.; Bobek, S. Analysis and use of the emotional context with wearable devices for games and
intelligent assistants. Sensors 2019, 19, 2509. [CrossRef]
• 9. Liu, G.; Jiang, D. 5G: Vision and Requirements for Mobile Communication System towards Year 2020. Chin. J. Eng. 2016, 2016, 8. [CrossRef]
• 10. Rappaport, T.S.; Gutierrez, F.; Ben-Dor, E.; Murdock, J.N.; Qiao, Y.; Tamir, J.I. Broadband millimeter-wave propagation measurements and
models using adaptive-beam antennas for outdoor Urban cellular communications. IEEE Trans. Antennas Propag. 2013, 61, 1850–1859. [CrossRef]
10

You might also like