data using supervised and unsupervised testing technique by conducting simulation in Python.
The targeted and actual outcome is obtained which deduced through supervised and undersized
testing, the outcome remained 96.03%, and 94.53% respectively.
Keywords:
: Supervised testing, unsupervised testing, neural network, wireless networks.
INTRODUCTION
With the exponential increase in the number of wireless devices in recent years and due to the
rapid growth of wireless services, it has become increasingly important to allocate and manage
them accordingly. There is, however, generally a challenge to establish suitable strategies due to
the fact that the non-convex objective average rate maximization problem is NP-hard. It is no
secret that there has been a growing interest in numerical optimization as it relates to wireless
resource allocation in recent years.
There are still significant challenges in implementing numerical optimization-based algorithms on
practical systems, e.g., high computation costs, despite their ability to solve specific resource
management problems with tremendous results [1]
As neural networks (NNs) [2], memorize features of example data during training and
unintentionally reveal them during prediction, it is a major concern for machine learning
applications to prevent models from revealing sensitive input data details. There is, however, no
easy way to accomplish this. The literature is lacking studies that address deep learning-based
wireless resource allocation systems with privacy protection.
These radio resource management algorithms cannot always provide an adequate degree of
performance due to the dynamic nature of wireless networks. An algorithm that learns from
interactions with the environment may be able to better handle such dynamics.
Numerous resource management schemes have been proposed in order to address
heterogeneously [3], high service demands, fairness, and starvation, as well as transmission
errors due to channel congestion. In spite of this, there are many schemes out there that
prioritize voice services while allocating the remaining bandwidth to non-real-time applications
without any guarantee that the delay will not affect the voice service.
In wireless communication, when multiple resources exchanges between heterogeneous network
environment there is a great chance of distribution of data without the notice of the relevant
agencies. This lost of data sometimes create a big hassle and situation becomes aggravate [4].
In this situation, It is imperative to develop a system that should detect the leaked data
proactively. After detection of the leaked data the prevention measures can be taken for future.
After going through different studies, no specific study is found that can detect the wastage of