Skip to main content
Computational Intelligence and Neuroscience logoLink to Computational Intelligence and Neuroscience
. 2022 Mar 24;2022:1164273. doi: 10.1155/2022/1164273

5G Network Slicing: Methods to Support Blockchain and Reinforcement Learning

Juan Hu 1,, Jianwei Wu 2
PMCID: PMC8970895  PMID: 35371233

Abstract

With the advent of the 5G era, due to the limited network resources and methods before, it cannot be guaranteed that all services can be carried out. In the 5G era, network services are not limited to mobile phones and computers but support the normal operation of equipment in all walks of life. There are more and more scenarios and more and more complex scenarios, and more convenient and fast methods are needed to assist network services. In order to better perform network offloading of the business, make the business more refined, and assist the better development of 5G network technology, this article proposes 5G network slicing: methods to support blockchain and reinforcement learning, aiming to improve the efficiency of network services. The research results of the article show the following: (1) In the model testing stage, the research results on the variation of the delay with the number of slices show that the delay increases with the increase of the number of slices, but the blockchain + reinforcement learning method has the lowest delay. The minimum delay can be maintained. When the number of slices is 3, the delay is 155 ms. (2) The comparison of the latency of different types of slices shows that the latency of 5G network slicing is lower than that of 4G, 3G, and 2G network slicing, and the minimum latency of 5G network slicing using blockchain and reinforcement learning is only 15 ms. (3) In the detection of system reliability, reliability decreases as the number of users increases because reliability is related to time delay. The greater the transmission delay, the lower the reliability. The reliability of supporting blockchain + reinforcement learning method is the highest, with a reliability of 0.95. (4) Through the resource utilization experiment of different slices, it can be known that the method of blockchain + reinforcement learning has the highest resource utilization. The resource utilization rate of the four slices under the blockchain + reinforcement learning method is all above 0.8 and the highest is 1. (5) Through the simulation test of the experiment, the results show that the average receiving throughput of video stream 1 is higher than that of video stream 2, IOT devices and mobile devices, and the average cumulative receiving throughput under the blockchain + reinforcement learning method. The highest is 1450 kbps. The average QOE of video stream 1 is higher than that of video stream 2, IOT devices and mobile devices, and the average QOE is the highest under the blockchain + reinforcement learning method, reaching 0.83.

1. Introduction

Relieving users' network congestion, reducing network latency, and offloading the network are the top priorities for 5G networks. As a core technology, the 5G network slicing technology can effectively solve the challenges of business creation and exclusive network access for different users, as well as the coexistence of multiple application scenarios. The 5G network is expected to meet the different needs of users [1]. 5G network slicing may be a natural solution [2]. A wide range of services required for vertical specific use cases can be accommodated simultaneously on the public network infrastructure. 5G mobile networks are expected to meet flexible demands [3]. Therefore, network resources can be dynamically allocated according to demand. Network slicing technology is the core part of 5G network [4]. The definition of 5G network slicing creates a broad field for communication service innovation [5]. The vertical market targeted by 5G networks supports multiple network slices on general and programmable infrastructure [6]. The meaning of network slicing is to divide the physical network into two virtual networks so that they can be flexibly applied to different network scenarios. The future 5G network will also change the mobile network ecosystem [7]. The 5G mobile network is expected to meet the diversified needs of a variety of commercial services [8]. 5G mobile networks must support a large number of different service types [9]. Network slicing allows programmable network instances to be provided to meet the different needs of users. Blockchain can establish a secure and decentralized resource sharing environment [10]. Blockchain is a distributed open ledger [11] and is used to record transactions between multiple computers. Reinforcement learning algorithms can effectively solve large state spaces [12]. Reinforcement learning is mainly used to solve simple learning tasks [13]. 5G networks are designed to support many vertical industries with different performance requirements [14]. Network slicing is considered an important factor in enhancing the network and has the necessary flexibility to achieve this goal. Network slicing is considered one of the key technologies of 5G network [15]. You can create virtual networks and provide customized services on demand.

2. Overview of Related Theories

2.1. 5G Network Slicing

2.1.1. Network Slicing

Network slicing refers to the implementation of offload management of the network when the network is congested and complicated [16]. When facing the different needs of different users, the network is divided into many pieces to meet customer needs. Moreover, it provides targeted services and assistance.

2.1.2. Network Slice Classification

The ultimate goal of 5G network slicing is to organically combine multiple network resource systems to form a complete network that can serve different types of users. Network slices can be divided into independent slices and shared slices as shown in Table 1:

Table 1.

Network slice classification.

Independent slice A slice with a logically independent and complete network function. The slice includes a user data plane, a network control plane, and various user business function films, which can provide a logically independent end-to-end private network service for a specific user group. If necessary, only part of the services of specific functions can be provided.
Shared slice A shared slice is a specific network slice whose network resources can be used by different independent slices. The slice can provide end-to-end services, and when necessary, it can also only provide partial sharing functions.

2.1.3. 5G Network Application Scenarios

The application scenarios of 5G networks are divided into three categories: mobile broadband, massive Internet of Things, and mission-critical Internet of Things [17]. The details are shown in Table 2:

Table 2.

5G network application scenarios.

5G application scenarios Application examples Need
Mobile broadband 4K/8K Ultra HD video, holographic technology, augmented reality/virtual reality High capacity, video storage
Mass Internet of Things Massive sensors (deployed in measurement, construction, agriculture, logistics, smart cities, homes, etc.) Large-scale connection (200,000/km2), mostly stationary
Mission Critical Internet of Things Autonomous driving, automated factories, smart grids, etc. Low latency, high reliability

2.2. Blockchain

2.2.1. Definition of Blockchain

The blockchain consists of a shared, fault-tolerant distributed database, and a multi-node network [18].

2.2.2. Blockchain Structure

The block chain is composed of a block header and a block body, which forms into a chain structure through the hash of the parent block [19]. The structure is shown in Figure 1:

Figure 1.

Figure 1

Blockchain structure.

The structure contains the parent block hash, timestamp, random number, difficulty, and the Merkle root [20]. Its functions are shown in Table 3:

Table 3.

Blockchain structure function.

Parent block hash Has the hash value of the previous block
Timestamp Used to record the time when the current block was generated
Random number and difficulty Used to calculate proof of work
Version number Record the version of the current block, so that you can view and update the version at any time
Merkle root value of the entire block It is the root value of the Merkle tree, which stores the hash value of all transactions in the entire block

2.2.3. Blockchain Properties

Blockchain technology has three attributes of distribution, security, and robustness [21], as shown in Table 4:

Table 4.

Blockchain attributes.

Distributed The blockchain connects the participating nodes through a peer-to-peer network to realize resource sharing and task allocation between peer nodes. Each network node does not need to rely on the central node and can directly share and exchange information. Each peer node can not only be an acquirer of services, resources, and information but can also be a provider thereof, which reduces the complexity of networking while improving the fault tolerance of the network.
Safety Blockchain can use encryption technology to asymmetrically encrypt the transmitted data information. The task request for writing data in the blockchain needs to be accompanied by the private key signature of the task initiator. The changed signature is broadcasted together with the task request among participating nodes in the network. Each node can verify its identity, so the task request is not allowed for forgery and tampering. At the same time, the blockchain data structure in the blockchain further ensures that the content in the block cannot be tampered with at will. Even if some nodes in the chain are maliciously forged, tampered with, or destroyed. It will not affect the normal operation of the entire blockchain.
Robustness The consensus mechanism determines the degree of agreement between the voting weight and computing power between subjects. The entire blockchain system uses a special incentive mechanism to attract more miners to participate in the process of generating and verifying data blocks, perform mathematical calculations in a distributed system structure, use consensus algorithms to select a node, and then create a new one. The effective block of is added to the entire blockchain, and the entire process does not rely on a third-party trusted institution.

2.3. Reinforcement Learning

2.3.1. Definition of Reinforcement Learning

Reinforcement learning is one of the methods of machine learning. It is mainly to solve the method of how the agent takes different actions in the environment in order to maximize the accumulated rewards obtained.

2.3.2. Reinforcement Learning Process

In the process of reinforcement learning, the agent needs to make decisions on the information in the environment [22]. At the same time, the environment will also reward the agent for the corresponding behavior, and the agent will enter a new state after the behavior. The process is shown in Figure 2:

Figure 2.

Figure 2

Reinforcement learning process.

2.4. Model Design

The 5G network slicing architecture is composed of network slicing demander, slice management (business design, instance orchestration, operation management), slice selection function, and virtualization management orchestration.

The process of the 5G network slicing model is as follows: network services enter the slice manager through the network slice demander, and the slice manager includes business design, instance arrangement, and operation management. After the slice manager enters the slice selection function, it is divided into shared slice function and independent slice special function, and it can also enter the virtualization management orchestration as shown in Figure 3:

Figure 3.

Figure 3

Model design.

3. Formula

3.1. Blockchain

3.1.1. Scalability within Shards

In the process of verifying the block consensus, the scalability within the shard [23]is as follows:

ΦBF,TF=BFBH/bFTF. (1)

Among them, bI is the average transaction size, BIh is the block header size, and K is the number of shards.

3.1.2. Scalability of Directory Fragmentation

Assuming that the average transaction size is bF, the block header size is BH, and the scalability of the directory fragmentation is as follows:

ΦBI,TII=i=1KBIBIh/bITIIi. (2)

3.1.3. Scalability of Sharded Blockchain

The scalability of the entire sharded blockchain is composed of the internal scalability of the shards and the scalability of the catalog shards [24]. Assuming that the block packing time within the fragment and the directory fragment is the same as TI′ and the block header size is the same as BH′, the formula is as follows:

ΦB,T=ΦBI,TII+ΦBF,TFΦB,T=i=1KBIBIh/bITIIi+BFBh/bFTFΦB,T=kBIBH/bI+BFBh/bFTI. (3)

3.2. Reinforcement Learning Methods

3.2.1. Value Function Method

The value function method is to give an estimate of the value for different states. 0 is the given value, and Vπ(s) starts from state Vπ(s). The formula is as follows:

Vπs=EπR|s,π,Vπs=EπR0+γR1+γ2R2++γtRt+|s=St. (4)

The optimal strategy π has a corresponding state-value function V(s), which is expressed as follows:

Vs=maxπVπssS. (5)

In the RL setting, it is difficult to obtain the state transition function P. So, a state-action value function is constructed.

Qπs,a=ER|s,a,π,Qπs,a=ER0+γR1+γ2R2++γtRt+|s=St,a=At. (6)

Given Qπ(s, a), in each state, the optimal strategy argmaxaQπ(s, a) can be adopted. Under this strategy, Vπ(s) can be defined by maximizing Qπ(s, a)as follows:

Vπs=maxaQπs,a. (7)

At present, mature deep learning methods such as SARSA and offline Q learning can all be used to solve the value function.

SARSA:

QSt,AtQSt,At+αRt+1+γmaxaQSt+1,aQSt,At. (8)

Offline Q learning:

QSt,AtQSt,At+αRt+1+γQSt+1,At+1QSt,At. (9)

3.2.2. Strategy Method

The strategy method is to directly output the action by searching for the optimal strategy π. The objective function J(θ) is defined as the cumulative expected reward.

Jθ=Et0γtrt|π=sdπSAπa|s,θRs,adsda. (10)

The policy parameter ∇θJ(θ) is estimated in the discounted cumulative expected reward gradient θ and obtained based on a certain learning rate (αl). The formula of the strategy gradient method is as follows:

θl+1=θl+αtθJθ|θθl. (11)

3.2.3. MDP

MDP mainly solves the problem of learning-related experiences in the interaction between the agent and the environment to achieve the goal [25]. Assuming that the state space is S, it is defined as follows:

S=h,x,d,φ|hH,xX,dD,φψ. (12)

Among them, h represents the state of all wireless channels in the 5G network slice, H represents the channel state space, and H is represented as follows:

H=h1,h2,,hm|mM,hmHm. (13)

Among them, hm represents the channel state and Hm represents the channel state space.

x means connection status, X means connection status space. X is defined as follows:

X=x1,x2,,xM|mM,xmXm. (14)

d represents the state of all data transmission rates in the slice, and D represents the data transmission rate state space. D is defined as follows:

D=d1,d2,,dU|uU,ddmin,dmax. (15)

φ represents the topological state of the physical network, and ψ represents the topological state space in the physical network. ψ is defined as follows:

ψ=φ1,φ2,,φN|φψ,φ0,1. (16)

A r means that the action space is allocated for unlimited resources, which is defined as follows:

Ar=ar,1,ar,2,,ar,U|uU,ar,uAr,u. (17)

Among them, ar,u is the 5G network radio resource allocation action, and Ar,u is its corresponding network action space, expressed as follows:

Ar,u=vu,m|mM,vu,m0,vm. (18)

Among them, vu,m′ represents occupied wireless resources.

3.3. Model Building

Suppose the weighted undirected graph of the physical network is C=(Ai, Si), where the set of network nodes is denoted as Ai={a1, a2,…, an}, the calculation level of Ai is denoted as Si={s1, s2,…, sn}, and the link set composed of nodes is denoted as Ln={l1, l2,…, ln}.

The first dynamic dispatch queue state transition function is as follows:

ZX=γi+AiSiLndi. (19)

The second dynamic scheduling queue state transition function is as follows:

ZY=γi+AiLndiZX. (20)

Combining the above analysis, the 5G network slicing model, the formula is expressed as below:

Fx=ZX+ZYdiγi. (21)

4. Experiment

4.1. Model Test

4.1.1. Variation of Time Delay with the Number of Slices

This article mainly studies 5G network slicing methods to support blockchain and reinforcement learning. First, we will test the model and compare the blockchain + reinforcement learning method with the blockchain, reinforcement learning, and unused methods. The results are shown in Figure 4.

Figure 4.

Figure 4

Time delay changes with the number of slices.

The comparison results show that the delay increases with the increase of the number of slices, but the blockchain + reinforcement learning method has the lowest delay and can maintain the minimum delay. When the number of slices is 3, the delay is 155 ms. The overall delay of the blockchain is lower than the delay of reinforcement learning because the blockchain will give priority to nodes with rich resources and strong data processing capabilities when selecting nodes and link mappings, so the delay is lower.

4.1.2. Delay Comparison of Different Slice Types

Under different slice types, set the number of users to 30 and compare the delays generated by several methods. We compare 5G network slicing, 4G network slicing, 3G network slicing, and 2G network slicing in blockchain + reinforcement learning, blockchain, reinforcement learning, and unused methods. The results are shown in Figure 5.

Figure 5.

Figure 5

Delay comparison of different slice types.

Through the comparison results, it can be seen that the latency of 5G network slicing is lower than that of 4G, 3G, and 2G. 5G network slicing has the lowest latency of only 15 ms in the method of blockchain and reinforcement learning. This is because the greater the number of VNFs, the more nodes that the slice will pass through to process the same data packet, the longer the link that passes, and the greater the delay.

4.1.3. System Reliability

System reliability is an indispensable step before the experiment. We will compare the system reliability of different methods (blockchain + reinforcement learning, blockchain, reinforcement learning) under different numbers of users. The comparison result is shown in Figure 6:

Figure 6.

Figure 6

System reliability.

It can be seen from the graph that the reliability decreases with the increase of the number of users because reliability is related to delay. The greater the transmission delay, the lower the reliability. The reliability of the supporting blockchain + reinforcement learning method is the highest, with a reliability of 0.95. This means that 5G network slicing that supports blockchain + reinforcement learning methods can provide services for more businesses.

4.2. Resource Utilization of Different Slices

This article studies the methods that support blockchain and reinforcement learning. We will study the resource utilization of blockchain and reinforcement learning for different slices. Set up 4 slices and perform three tests on each slice, namely, blockchain + reinforcement learning, blockchain and reinforcement learning, and finally compare their resource utilization experiment results as shown in Figure 7:

Figure 7.

Figure 7

Resource utilization of different slices.

According to the experimental results, it can be concluded that the method of blockchain + reinforcement learning has the highest resource utilization rate. The resource utilization rate of the four slices under the blockchain + reinforcement learning method is all above 0.8, and the highest is 1. It shows that the block chain + reinforcement learning method has the best resource utilization for the block.

4.3. Simulation Test

According to the 5G network proposed in this article: Support blockchain and reinforcement learning methods to design a simulation test. Excluding other factors, the experimental subjects are video stream 1, video stream 2, IOT devices, and mobile devices.

4.3.1. Average Cumulative Receiving Throughput

The experiment will compare 4 types of equipment using three methods: blockchain + reinforcement learning, blockchain, and reinforcement learning. By comparing the average cumulative received throughput (kpbs), which method is better is decided. Throughput refers to the number of requests processed by the system in a unit of time. The results are shown in Table 5.

Table 5.

Average cumulative receiving throughput.

Equipment Blockchain + reinforcement learning Blockchain Reinforcement learning
Video stream 1 1450 1400 1150
Video stream 2 1350 1320 1160
IOT equipment 700 650 480
Mobile devices 270 260 100

The result is plotted as a histogram, and the result is shown in Figure 8.

Figure 8.

Figure 8

Average cumulative receiving throughput.

According to the experimental results, the average receiving throughput of video stream 1 is higher than that of video stream 2, IOT devices, and mobile devices, and the average cumulative receiving throughput is the highest under the blockchain + reinforcement learning method, reaching 1450 kbps.

4.3.2. Average QOE

Under three different methods, compare the average QOE of different devices to prove which method is more suitable for 5G network slicing. QOE refers to the user's comprehensive experience of the quality and performance of the network system. The results are shown in Table 6:

Table 6.

Average QOE.

Equipment Blockchain + reinforcement learning Blockchain Reinforcement learning
Video stream 1 0.83 0.75 0.68
Video stream 2 0.79 0.73 0.62
IOT equipment 0.7 0.64 0.47
Mobile devices 0.64 0.56 0.4

The result is plotted as a histogram, and the result is shown in Figure 9.

Figure 9.

Figure 9

Average QOE.

According to the experimental results, the average QOE of video stream 1 is higher than that of video stream 2, IOT devices, and mobile devices, and the average QOE is the highest under the blockchain + reinforcement learning method, reaching 0.83.

5. Conclusion

With the advent of the 5G era, current technologies can no longer meet the needs of users. Network congestion and slow network speeds are major problems currently facing. In order for users to use network services more smoothly, network services are more convenient. This article designs 5G network slicing: a method model supporting blockchain and reinforcement learning. This model will perform better distribution management of the network, increase the transmission rate of users in the business, and reduce the transmission delay.

The research results of the article are given below:

  1. In the model testing stage, the results of the study on the variation of the delay with the number of slices show that the delay increases with the increase of the number of slices, but the blockchain + reinforcement learning method has the lowest delay and can maintain the minimum delay When the number of slices is 3, the delay is 155 ms.

  2. The comparison of the delay of different slice types shows that the delay of 5G network slicing is lower than that of 4G, 3G, and 2G. 5G network slicing has the lowest delay in the method of blockchain and reinforcement learning, only 15 ms.

  3. In the detection of system reliability, reliability decreases as the number of users increases. This is because reliability is related to delay. The greater the transmission delay, the lower the reliability. Supporting blockchain + reinforcement learning method has the highest reliability.

  4. In the resource utilization experiment of different slices, it can be known that the method of blockchain + reinforcement learning has the highest resource utilization. The resource utilization rate of the four slices under the blockchain + reinforcement learning method is all above 0.8 and the highest is 1.

  5. Through the simulation test of the experiment, the results show that the average receiving throughput of video stream 1 is higher than that of video stream 2, IOT devices, and mobile devices, and the average cumulative receiving throughput under the blockchain + reinforcement learning method The volume is the highest, reaching 1450 kbps. The average QOE of video stream 1 is higher than that of video stream 2, IOT devices, and mobile devices, and the average QOE is the highest under the blockchain + reinforcement learning method, reaching 0.83.

Although the results of this experiment are obvious, it has certain limitations and is limited to the use of 5G network slicing. A lot of research is needed in the future to enhance its universality and apply it to more scenarios. In future research, the methods for supporting blockchain and reinforcement learning proposed in this article can be improved, so that blockchain and reinforcement learning methods can be realized in the network service requirements with more goals.

Data Availability

The experimental data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest regarding this work.

References

  • 1.Zhang H., Liu N., Chu X., Long K., Aghvami A.-H., Leung V. C. M. Network slicing based 5G and future mobile networks: Mobility, resource management, and challenges. IEEE Communications Magazine . 2017;55(8):138–145. doi: 10.1109/mcom.2017.1600940. [DOI] [Google Scholar]
  • 2.Ordonez-Lucena J., Ameigeiras P., Lopez D., Ramos-Munoz J. J., Lorca J., Folgueira J. Network slicing for 5G with SDN/NFV: Concepts, architectures, and challenges. IEEE Communications Magazine . 2017;55(5):80–87. doi: 10.1109/mcom.2017.1600935. [DOI] [Google Scholar]
  • 3.Jiang M., Condoluci M., Mahmoodi T. Network slicing management & prioritization in 5G mobile systems. Proceedings of the European Wireless 2016; 22th European Wireless Conference; May 2016; Oulu, Finland. VDE; [Google Scholar]
  • 4.Luo M., Wu J., Li X. Cross-domain certificateless authenticated group key agreement protocol for 5G network slicings. Telecommunication Systems: Modelling, Analysis, Design and Management . 2020;74 doi: 10.1007/s11235-020-00673-x. [DOI] [Google Scholar]
  • 5.Kourtis M. A., Sarlas T., Xilouris G. Conceptual evaluation of a 5G network slicing technique for emergency communications and preliminary estimate of energy trade-off. Energies . 2021;14 [Google Scholar]
  • 6.Campolo C., Molinaro A., Iera A. 5G network slicing for vehicle-to-everything services. IEEE Wireless Communications . 2018;24(6):38–45. [Google Scholar]
  • 7.Bega D., Gramaglia M., Banchs A., Sciancalepore V., Samdanis K., Costa-Perez X. Optimising 5G infrastructure markets: the business of network slicing. Proceedings of the IEEE Infocom-IEEE Conference on Computer Communications; May 2017; Atlanta, GA, USA. IEEE; pp. 1–9. [Google Scholar]
  • 8.Jiang M., Condoluci M., Mahmoodi T. Network slicing in 5G: An auction-based model. Proceedings of the 2017 IEEE International Conference on Communications (ICC); May 2017; Paris, France. IEEE; [Google Scholar]
  • 9.Pries R., Morper H. J., Galambosi N., Jarschel M. Network as a service-a demo on 5G network slicing. Proceedings of the Teletraffic Congress; September 2017; Germany. IEEE; [Google Scholar]
  • 10.Dai Y., Xu D., Maharjan S., Chen Z., He Q., Zhang Y. Blockchain and deep reinforcement learning empowered intelligent 5G beyond. IEEE Network . 2019;33(3):10–17. doi: 10.1109/mnet.2019.1800376. [DOI] [Google Scholar]
  • 11.Ahamed N. N., Karthikeyan P. A reinforcement learning integrated in heuristic search method for self-driving vehicle using blockchain in supply chain management. International Journal of Intelligent Networks . 2020;1 [Google Scholar]
  • 12.Nguyen D. C., Pathirana P. N., Ding M., Seneviratne A. Privacy-preserved task offloading in mobile blockchain with deep reinforcement learning. IEEE Transactions on Network and Service Management . 2020;99:p. 1. [Google Scholar]
  • 13.Long-Ji L. Self-improving reactive agents based on reinforcement learning, planning and teaching. Machine Learning . 1992;8 [Google Scholar]
  • 14.Kaloxylos A. A survey and an analysis of network slicing in 5G networks. IEEE Communications Standards Magazine . 2018;2(1):60–65. doi: 10.1109/mcomstd.2018.1700072. [DOI] [Google Scholar]
  • 15.Jia Q., Xie R., Huang T., Liu J., Liu Y. Efficient caching resource allocation for network slicing in 5G core network. IET Communications . 2017;11(18):2792–2799. doi: 10.1049/iet-com.2017.0539. [DOI] [Google Scholar]
  • 16.Stone P., Sutton R. S., Kuhlmann G. Reinforcement learning for RoboCup soccer keepaway. Adaptive Behavior . 2005;13(3):165–188. doi: 10.1177/105971230501300301. [DOI] [Google Scholar]
  • 17.Chen G., Qi J., Tang C., Wang Y., Wu Y., Shi X. Analysis and research of key genes in gene expression network based on complex network. Complexity . 2020;2020:12. doi: 10.1155/2020/8816633.8816633 [DOI] [Google Scholar]
  • 18.Ning X., Gong K., Li W., Zhang L. JWSAA: Joint weak saliency and attention aware for person re-identification. Neurocomputing . 2021;453:801–811. doi: 10.1016/j.neucom.2020.05.106. [DOI] [Google Scholar]
  • 19.Theodorou A., Buchli J., Sch A. L. S. A generalized path integral control approach to reinforcement learning. Journal of Machine Learning Research . 2010;11(11):3137–3181. [Google Scholar]
  • 20.Yuan Y., Wang F. Y. Blockchain: The state of the art and future trends. Acta Automatica Sinica . 2016;42 [Google Scholar]
  • 21.Sun L., Yu Q., Peng D., Subramani S., Wang X. FogMed: a fog-based framework for disease prognosis based medical sensor data streams. Computers, Materials & Continua . 2021;66(1):603–619. [Google Scholar]
  • 22.Verbert K., Sharples M., Klobuar T. The blockchain and kudos: A distributed system for educational record, reputation and reward. Proceedings of the European Conference on Technology Enhanced Learning; 2016; Lyon, France. Springer International Publishing; [Google Scholar]
  • 23.Abidi M. H., Alkhalefah H., Moiduddin K. Optimal 5G network slicing using machine learning and deep learning concepts. Computer Standards & Interfaces . 2021;76(1) doi: 10.1016/j.csi.2021.103518.103518 [DOI] [Google Scholar]
  • 24.Tobar C. H., Ordonez A., Rendon O. Scalability and performance analysis in 5G core network slicing. IEEE Access . 2020;8:142086–142100. [Google Scholar]
  • 25.Tang L., Zhou Y., Yang Y. Virtual network function dynamic deployment algorithm based on prediction for 5G network slicing. Journal of Electronics and Information Technology . 2019;41(9):2071–2078. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The experimental data used to support the findings of this study are available from the corresponding author upon request.


Articles from Computational Intelligence and Neuroscience are provided here courtesy of Wiley

RESOURCES