Congestion Control Prediction Model for 5G Environment Based on Supervised and Unsupervised Machine Learning Approach

被引:1
作者
Kamel, Mohammed B. M. [1 ,2 ]
Najm, Ihab Ahmed [3 ]
Hamoud, Alaa Khalaf [4 ]
机构
[1] Univ Kufa, Dept Comp Sci, Najaf 54003, Iraq
[2] Eotvos Lorand Univ, Dept Comp Algebra, H-1053 Budapest, Hungary
[3] Univ Tikrit, Dept Math, Tikrit 43000, Iraq
[4] Univ Basrah, Dept Cybersecur, Basrah 61004, Iraq
来源
IEEE ACCESS | 2024年 / 12卷
关键词
5G mobile communication; Machine learning algorithms; Prediction algorithms; Classification algorithms; Clustering algorithms; Random forests; Predictive models; Unsupervised learning; Supervised learning; Machine learning; congestion control; 5G; supervised ML; unsupervised ML; WIRELESS SENSOR NETWORKS; FEATURE-SELECTION; INFORMATION GAIN; DATA MART; ALGORITHMS; OLAP;
D O I
10.1109/ACCESS.2024.3416863
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence of 5G technology, congestion control has become a vital challenge to be addressed in order to have efficient communication. There are several congestion control models that have been proposed to control and predict the possible congestion in 5G technology. However, finding the optimal congestion control model is an important yet challenging task. In this paper, we examine the supervised and unsupervised machine learning approaches to the task of predicting the possible node that causes congestion in the 5G environment. Due to the huge variance in the domains of the data set columns, measuring the prediction's consistency was not an easy task. During our study, we tested twenty-six supervised and seven clustering algorithms. Finally, and based on the performance criteria, we have identified the best five algorithms out of the studied algorithms.
引用
收藏
页码:91127 / 91139
页数:13
相关论文
共 94 条
[1]  
Abar T, 2017, INT WIREL COMMUN, P1395, DOI 10.1109/IWCMC.2017.7986488
[2]  
Abed M. H., 2021, P INT C INF TECHN AP, P161
[3]   Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services [J].
Adi, Erwin ;
Baig, Zubair ;
Hingston, Philip .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 91 :1-13
[4]   Toward a Secure 5G-Enabled Internet of Things: A Survey on Requirements, Privacy, Security, Challenges, and Opportunities [J].
Ahmed, Shams Forruque ;
Bin Alam, Md. Sakib ;
Afrin, Shaila ;
Rafa, Sabiha Jannat ;
Taher, Samanta Binte ;
Kabir, Maliha ;
Muyeen, S. M. ;
Gandomi, Amir H. .
IEEE ACCESS, 2024, 12 :13125-13145
[5]  
Al-Falahy N, 2017, IT PROF, V19, P12, DOI 10.1109/MITP.2017.9
[6]   A systematic review of automated pre-processing, feature extraction and classification of cardiotocography [J].
Al-yousif, Shahad ;
Jaenul, Ariep ;
Al-Dayyeni, Wisam ;
Alamoodi, Ah ;
Jabori, Ihab ;
Tahir, Nooritawati Md ;
Alrawi, Ali Amer Ahmed ;
Comert, Zafer ;
Al-shareefi, Nael A. ;
Saleh, Abbadullah H. .
PEERJ COMPUTER SCIENCE, 2021, 7 :1-37
[7]   5G Mobile Services and Scenarios: Challenges and Solutions [J].
Bin Zikria, Yousaf ;
Kim, Sung Won ;
Afzal, Muhammad Khalil ;
Wang, Haoxiang ;
Rehmani, Mubashir Husain .
SUSTAINABILITY, 2018, 10 (10)
[8]   Cronbach's alpha [J].
Bland, JM ;
Altman, DG .
BRITISH MEDICAL JOURNAL, 1997, 314 (7080) :572-572
[9]  
Brahma Swastik, 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), P413, DOI 10.1109/PERCOMW.2010.5470632
[10]  
Chen YY, 2016, 2016 IEEE 19TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), P132, DOI 10.1109/ITSC.2016.7795543