[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3647444.3647851acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimmiConference Proceedingsconference-collections
research-article

Exploring InterferenceAware Spectrum Allocation in 6G Cellular Networks using dynamic resource Sharing Algorithm

Published: 13 May 2024 Publication History

Abstract

This paper looks at interference-conscious spectrum allocation in 6G cell networks. A novel dynamic resource sharing a set of rules is proposed, aiming to efficaciously use available stay spectral resources and minimize the interference not unusual to more than one technique or customer. The proposed set of rules consists of sub-algorithms: the first segment is a channel selection set of rules, which selects the most excellent channels for each licensee based totally on their signal-to-interference-plus-noise ratio (SINR) and interference degrees. The second segment is an optimization set of rules, which promotes the most valuable spectrum to get admission to and aid allocation in line with the interference necessities of the specific consumer or network. The proposed rules embrace the access strategy mentioned in 3GPP spec 5G-NR, wherein a fast spectrum allocation and aid-sharing principles throughout multiple licensees are used to maximize spectrum usage. Outcomes suggest that the algorithm can attain powerful spectrum utilization even by imparting high levels of interference mitigation. The proposed gadget gives a promising technique to enhance 6G spectrum allocation. It is predicted to offer an attractive answer for operators searching to deploy a dynamic, interference-resistant communications carrier.

References

[1]
Taneja, A., Alqahtani, N., & Alqahtani, A. (2023). Interference Aware Resource Control for 6G-Enabled Expanded IoT Networks. Sensors, 23(12), 5649.
[2]
Sanusi, I. O. (2023). Radio resource management techniques for industrial IoT in 5G-and beyond networks (Doctoral dissertation, University of Greenwich).
[3]
Ergun, S., Sammour, I., & Chalhoub, G. (2023). A survey on how network simulators serve reinforcement learning in wireless networks. Computer Networks, 109934.
[4]
Elmadina, N. N., Saeed, R., Saeid, E., Ali, E. S., Abdelhaq, M., Alsaqour, R., & Alharbe, N. (2023). Downlink Power Allocation for CR-NOMA-Based Femtocell D2D Using Greedy Asynchronous Distributed Interference Avoidance Algorithm. Computers, 12(8), 158.
[5]
Durgesh Srivastava, Rajeshwar Singh and Vikram Singh, “Performance Evaluation of Entropy Based Graph Network Intrusion Detection System (E-Ids)”, in Jour of Adv Research in Dynamical & Control Systems, Vol.- 11, 02-Special Issue, 2019
[6]
Durgesh Srivastava, Nachiket Sainis and Dr. Rajeshwar Singh, “Classification of various Dataset for Intrusion Detection System”, in International Journal of Emerging Technology and Advanced Engineering, Volume 8, Issue 1, January 2018.
[7]
Hasan, M. K., Islam, S., Gadekallu, T. R., Ismail, A. F., Amanlou, S., & Abdullah, S. N. H. S. (2023). Novel EBBDSA based Resource Allocation Technique for Interference Mitigation in 5G Heterogeneous Network. Computer Communications, 209, 320-330.
[8]
Mahamod, U., Mohamad, H., Shayea, I., Othman, M., & Asuhaimi, F. A. (2023). Handover parameter for self-optimisation in 6G mobile networks: A survey. Alexandria Engineering Journal, 78, 104-119.
[9]
Gargari, A. A., Ortiz, A., Pagin, M., Klein, A., Hollick, M., Zorzi, M., & Asadi, A. (2023). Safehaul: Risk-Averse Learning for Reliable mmWave Self-Backhauling in 6G Networks. arXiv preprint arXiv:2301.03201.
[10]
Rehman, B. U., Babar, M. I., Ahmad, A. W., Amir, M., Habib, W., Farooq, M., & Abdel Azim, G. (2022). Uplink non-orthogonal multiple access in heterogeneous networks: A review of recent advances and open research challenges. International Journal of Distributed Sensor Networks, 18(10), 15501329221132496.
[11]
Durgesh Srivastava, Rajeshwar Singh, Vikram Singh, “An Intelligent Gray Wolf Optimizer: A Nature Inspired Technique in Intrusion Detection System (IDS)”, in Journal of Advancements in Robotics. 2019; 6(1): 18–24p
[12]
Durgesh Srivastava, Rajeshwar Singh and Vikram Singh, “Analysis of different Hybrid methods for Intrusion Detection System,” International Journal Of Computer Sciences And Engineering 7(5):757-764, May 2019
[13]
Sarkar, N. I., & Gul, S. (2023). Artificial Intelligence-Based Autonomous UAV Networks: A Survey. Drones, 7(5), 322.
[14]
Wang, W., Qi, N., Jia, L., Li, C., Tsiftsis, T. A., & Wang, M. (2022). Energy-Efficient UAV-Relaying 5G/6G Spectrum Sharing Networks: Interference Coordination With Power Management and Trajectory Design. IEEE Open Journal of the Communications Society, 3, 1672-1687.
[15]
Roberts, M. K., & Ramasamy, P. (2022). Optimized hybrid routing protocol for energy-aware cluster head selection in wireless sensor networks. Digital Signal Processing, 130, 103737.
[16]
Alzaidi, M. S., Subbalakshmi, C., Roshini, T. V., Shukla, P. K., Shukla, S. K., Dutta, P., & Alhassan, M. (2022). Research Article 5G-Telecommunication Allocation Network Using IoT Enabled Improved Machine Learning Technique.
[17]
Logeshwaran, J., Shanmugasundaram, N., & Lloret, J. (2023). L‐RUBI: An efficient load‐based resource utilization algorithm for bi‐partite scatternet in wireless personal area networks. International Journal of Communication Systems, 36(6), e5439.
[18]
Vaigandla, K. K., Mounika, T., Urooj, U., Azmi, N., & Karne, R. (2022). Investigation on Cognitive Radio Networks: Introduction, Spectrum Sensing, IEEE Standards, Challenges, Applications. International Journal of Engineering Applied Sciences and Technology, 6(9), 91-103.
[19]
Logeshwaran, J. (2021). AICSA-an artificial intelligence cyber security algorithm for cooperative P2P file sharing in social networks. ICTACT Journal on Data Science and Machine Learning, 3(1), 251-253.
[20]
Wang, J. (2022). Analysis of wireless communication networks under edge computing scenarios. Wireless Networks, 28(8), 3665-3676.
[21]
Xue, X., Palanisamy, S., Manikandan, A., Selvaraj, D., Khalaf, O. I., & Abdulsahib, G. (2023). A novel partial sequence technique based chaotic biogeography optimization for PAPR reduction in Generalized frequency division multiplexing waveform. Heliyon.
[22]
Maakar, Sunil Kr, Manju Khurana, Chinmay Chakraborty, Deepak Sinwar, and Durgesh Srivastava. "Performance evaluation of AODV and DSR routing protocols for flying ad hoc network using highway mobility model." Journal of Circuits, Systems and Computers 31, no. 01 (2022): 2250008.
[23]
Sheenam, and Durgesh Srivastava. "Dwindling of interference by adopting MRMC technique in WMN." In AIP Conference Proceedings, vol. 2576, no. 1. AIP Publishing, 2022.
[24]
Yun, J., An, T., Jo, H., Ku, B. J., Oh, D., & Joo, C. (2023). Dynamic Downlink Interference Management in LEO Satellite Networks Without Direct Communications. IEEE Access, 11, 24137-24148.
[25]
Naous, T., Itani, M., Awad, M., & Sharafeddine, S. (2023). Reinforcement learning in the sky: A survey on enabling intelligence in ntn-based communications. IEEE Access.
[26]
Srivastava, D., Singh, R., Chakraborty, C., Kumar, S., Makkar, A. and Sinwar, D., 2023. A Framework for Detection of Cyber Attacks by the Classification of Intrusion Detection Datasets. Microprocessors and Microsystems, p.104964.
[27]
Sharma, Vaibhav, Lekha Rani, and Durgesh Srivastava. "Prediction of Coronavirus Using Various Machine Learning Algorithms." In 2023 International Conference on IoT, Communication and Automation Technology (ICICAT), pp. 1-6. IEEE, 2023.
[28]
Anand, Ayush, Durgesh Srivastava, and Lekha Rani. "Anomaly Detection and Time Series Analysis." In 2023 International Conference on IoT, Communication and Automation Technology (ICICAT), pp. 1-5. IEEE, 2023.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine Intelligence
November 2023
1215 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. AI-based Optimization
  2. Q-Learning Algorithms
  3. Resource Scheduling
  4. Spectrum Utilization

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIMMI 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 12
    Total Downloads
  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)3
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media