Metaheuristic Deep Learning-Driven Wireless Communication Security Adaptation Using Multivariate Analysis of Variance (MANOVA)

Pallavi Deshpande,N. Suganthi,G. Nirmala,Anand Pandey,Patteti Krishna,Meenakshi Anurag Thalor,Evans Asenso
DOI: https://doi.org/10.1155/2022/8426997
IF: 1.968
2022-05-07
Security and Communication Networks
Abstract:The implementation of accurate models to improve access technologies, communication transmission, and network slicing is anticipated to play a big part in the edge computing approach, as the demands and needs of individuals are quickly evolving. Deep learning models have tended to deliver more benefits in a wide range of applications; it also assists data providers in demonstrating considerable improvements in tackling complex real-world challenges. While the integration of connected wireless networks and deep learning is still in its infancy, wireless communication networks are increasingly focused on sophisticated technologies to meet the current and future needs of end users. Based on the theoretical and practical aspect that ranges from the basic aspect to future applications of wireless communication, this study is intended in addressing the opportunities of adopting metaheuristic deep learning-driven wireless communication. The researchers intend to apply descriptive design to the study as this enables in understanding the critical aspects of the study in an elaborate manner. The authors use both a primary data sources and a secondary data sources for performing the analysis. The secondary data source is sourced to understand the application of deep learning in the wireless communication area, and primary research is used to gather the data from the respondents to test the hypothesis and provide conclusions based on the analyses. The scope of this work is to utilize a quantitative model to undertake an analysis on evaluating the key parameters in the application of deep learning in wireless communication, which will allow for critical analysis and interpretation based on the findings.
computer science, information systems,telecommunications
What problem does this paper attempt to address?