{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T08:23:08Z","timestamp":1743668588516,"version":"3.37.3"},"reference-count":184,"publisher":"Wiley","license":[{"start":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T00:00:00Z","timestamp":1711324800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100005417","name":"Universiti Teknologi Malaysia","doi-asserted-by":"publisher","award":["Q.K130000.21A2.07E08","R.J130000.7823.4J637","MoHERI\/BFP\/ASU\/2022","ASU\/IRG\/22\/23\/03"],"id":[{"id":"10.13039\/501100005417","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100020552","name":"Ministry of Higher Education, Research and Innovation","doi-asserted-by":"publisher","award":["Q.K130000.21A2.07E08","R.J130000.7823.4J637","MoHERI\/BFP\/ASU\/2022","ASU\/IRG\/22\/23\/03"],"id":[{"id":"10.13039\/100020552","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009165","name":"A'Sharqiyah University","doi-asserted-by":"publisher","award":["Q.K130000.21A2.07E08","R.J130000.7823.4J637","MoHERI\/BFP\/ASU\/2022","ASU\/IRG\/22\/23\/03"],"id":[{"id":"10.13039\/501100009165","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2024,3,25]]},"abstract":"Wireless technologies are growing unprecedentedly with the advent and increasing popularity of wireless services worldwide. With the advancement in technology, profound techniques can potentially improve the performance of wireless networks. Besides, the advancement of artificial intelligence (AI) enables systems to make intelligent decisions, automation, data analysis, insights, predictive capabilities, learning, and adaptation. A sophisticated AI will be required for next-generation wireless networks to automate information delivery between smart applications simultaneously. AI technologies, such as machines and deep learning techniques, have attained tremendous success in many applications in recent years. Hances, researchers in academia and industry have turned their attention to the advanced development of AI-enabled wireless networks. This paper comprehensively surveys AI technologies for different wireless networks with various applications. Moreover, we present various AI-enabled applications that exploit the power of AI to enable the desired evolution of wireless networks. Besides, the challenges of unsolved research in this area, which represent the future research trends of AI-enabled wireless networks, are discussed in detail. We provide several suggestions and solutions that help wireless networks be more intelligent and sophisticated to handle complicated problems. In summary, this paper can help researchers deeply understand the up-to-the-minute wireless network designs based on AI technologies and identify interesting unsolved issues to be pursued in their research in a fast way.<\/jats:p>","DOI":"10.1155\/2024\/8845070","type":"journal-article","created":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T02:50:23Z","timestamp":1711421423000},"page":"1-27","source":"Crossref","is-referenced-by-count":23,"title":["Artificial Intelligence in 6G Wireless Networks: Opportunities, Applications, and Challenges"],"prefix":"10.1155","volume":"2024","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0778-1869","authenticated-orcid":true,"given":"Abdulraqeb","family":"Alhammadi","sequence":"first","affiliation":[{"name":"Center for Artificial Intelligence and Robotics (CAIRO), Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, Kuala Lumpur 54100, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0957-4468","authenticated-orcid":true,"given":"Ibraheem","family":"Shayea","sequence":"additional","affiliation":[{"name":"Electronics and Communication Engineering Department, Faculty of Electrical and Electronics Engineering, Istanbul Technical University (ITU), Istanbul 34467, T\u00fcrkiye"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4754-9271","authenticated-orcid":true,"given":"Ayman A.","family":"El-Saleh","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, College of Engineering, A\u2019Sharqiyah University (ASU), Ibra 400, Oman"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5217-6049","authenticated-orcid":true,"given":"Marwan Hadri","family":"Azmi","sequence":"additional","affiliation":[{"name":"Wireless Communication Centre, Faculty of Electrical Engineering, Universiti Teknologi Malaysia, Johor Bahru 81310, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5918-636X","authenticated-orcid":true,"given":"Zool Hilmi","family":"Ismail","sequence":"additional","affiliation":[{"name":"Center for Artificial Intelligence and Robotics (CAIRO), Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, Kuala Lumpur 54100, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0693-4114","authenticated-orcid":true,"given":"Lida","family":"Kouhalvandi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Dogus University, Istanbul, T\u00fcrkiye"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0480-2380","authenticated-orcid":true,"given":"Sawan Ali","family":"Saad","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of Ha\u2019il, Ha\u2019il 55211, Saudi Arabia"}]}],"member":"311","reference":[{"volume-title":"Global mobile Data Traffic Forecast Update, 2015\u20132020","year":"2016","author":"C. V. N. Index","key":"1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2017.2692307"},{"article-title":"Minimum requirements related to technical performance for IMT-2020 radio interface (s)","year":"2017","author":"M. ITU-R","key":"3"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2021.3057679"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2022.3205505"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2021.3071496"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3199689"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.23919\/jcin.2022.9815195"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.001.1900292"},{"volume-title":"Employing AI Techniques to Enhance Returns on 5G Network Investments","year":"2019","author":"B. Ayvazian","key":"10"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2019.1900027"},{"first-page":"1","article-title":"Machine learning opportunities in cloud computing data center management for 5G services","author":"F. L\u00f3pez-Pires","key":"12"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006518"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/mce.2017.2685019"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2904897"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/jas.2020.1003021"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.3008362"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2891073"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2020.3009998"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.23919\/jcc.2020.03.006"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2984329"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.10.001"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2846401"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.3011561"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3018170"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCR56254.2022.10024692"},{"first-page":"616","article-title":"AI and 6G security: opportunities and challenges","author":"Y. Siriwardhana","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCDS53736.2022.9760857"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000218"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.021.1900629"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3126076"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2019.1900271"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.006.2100543"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.001.2100338"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2022.3213370"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3069707"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2022.3212586"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2017.1600304wc"},{"key":"39","first-page":"117","article-title":"Evolution towards 6G wireless networks: a resource allocation perspective with deep learning approach-A review","volume-title":"International Conference on Advancements in Smart Computing and Information Security","author":"P. Kamble","year":"2022"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1002\/9781119821809.ch8"},{"key":"41","doi-asserted-by":"crossref","first-page":"52","DOI":"10.4018\/978-1-6684-3921-0.ch003","article-title":"Machine learning algorithms for 6G wireless networks: a survey","volume-title":"Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks","author":"A. Patil","year":"2022"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100399"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2018.1800115"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2019.1800629"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2019.1800015"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.001.1900323"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.001.2000050"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2926625"},{"key":"49","first-page":"395","article-title":"{PCC}: Re-architecting congestion control for consistent high performance","volume-title":"12th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 15)","author":"M. Dong","year":"2015"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2837692"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4353525"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.3390\/a15060210"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108820"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2021.3063822"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60990-0_12"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.006.2200407"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.006.2200480"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1109\/tccn.2017.2758370"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3266355"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIKE58312.2023.10131868"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.11.001"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108565"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.23919\/JCN.2022.000037"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3262320"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0002.2100078"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3258692"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100398"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3183647"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2023.3279625"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2022.3196408"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN56518.2023.10049050"},{"first-page":"3","article-title":"Membership inference attacks against machine learning models","author":"R. Shokri","key":"72"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.01.1900525"},{"key":"74","doi-asserted-by":"crossref","DOI":"10.1109\/GLOBECOM42002.2020.9322479","article-title":"Secure federated learning in 5G mobile networks","author":"M. Isaksson","year":"2020"},{"key":"75","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-34292-8"},{"key":"76","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3213411"},{"key":"77","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3190330"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3196463"},{"key":"79","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3232440"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3168538"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100396"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.3390\/s20205796"},{"key":"83","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2022.08.017"},{"key":"84","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2023.3245669"},{"key":"85","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.118.2200057"},{"key":"86","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2022.3182539"},{"key":"87","doi-asserted-by":"publisher","DOI":"10.3390\/s23115034"},{"key":"88","doi-asserted-by":"publisher","DOI":"10.1109\/tthz.2023.3237697"},{"key":"89","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100540"},{"key":"90","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.001.220021"},{"first-page":"19","article-title":"An artificial intelligence framework for holographic beamforming: coexistence of holographic MIMO and intelligent omni-surface","author":"A. Adhikary","key":"91"},{"key":"92","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3288261"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.1109\/jstsp.2022.3176140"},{"key":"94","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2023.3278682"},{"key":"95","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3244395"},{"key":"96","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.006.00340"},{"key":"97","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.012.2200295"},{"key":"98","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.001.2200153"},{"key":"99","doi-asserted-by":"publisher","DOI":"10.26599\/tst.2023.9010001"},{"key":"100","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3288251"},{"key":"101","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2023.3244648"},{"key":"102","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3157651"},{"key":"103","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2023.3239621"},{"key":"104","doi-asserted-by":"publisher","DOI":"10.1109\/tgcn.2023.3237132"},{"key":"105","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.011.2100643"},{"key":"106","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.106.2100622"},{"key":"107","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2022.3208101"},{"key":"108","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3273707"},{"key":"109","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3236801"},{"key":"110","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.015.2200462"},{"key":"111","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109827"},{"key":"112","doi-asserted-by":"publisher","DOI":"10.3390\/s22093375"},{"first-page":"1","article-title":"Mobile edge computing, metaverse, 6G wireless communications, artificial intelligence, and blockchain: survey and their convergence","author":"Y. Wang","key":"113"},{"key":"114","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-3-030-83944-4_4","article-title":"Mobile edge computing for beyond 5G\/6G","author":"Y. Zhang","year":"2022","journal-title":"Mobile Edge Computing"},{"volume-title":"Serving Non-Scheduled Urllc Traffic: Challenges and Learning-Powered Strategies","year":"2018","author":"A. Azari","key":"115"},{"key":"116","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2019.1800635"},{"key":"117","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2019.1800581"},{"key":"118","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2019.1800584"},{"key":"119","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2019.1800565"},{"key":"120","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800608"},{"key":"121","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2019.1800644"},{"key":"122","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3056128"},{"first-page":"1","article-title":"6G enabled smart environments and sustainable cities: an intelligent big data architecture","author":"R. Saadane","key":"123"},{"first-page":"1","article-title":"Dependable mobile federated learning classifications focused for mobile intelligent source distribution system in big data analytics using artificial internet of things","author":"G. Anitha","key":"124"},{"key":"125","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3140719"},{"key":"126","doi-asserted-by":"publisher","DOI":"10.3390\/app12115692"},{"first-page":"80","article-title":"A cache-assisted computing offloading strategy based on deep Q network","author":"Q. Song","key":"127"},{"first-page":"2238","article-title":"Reinforcement learning for trajectory design in cache-enabled UAV-assisted cellular networks","author":"H. Xu","key":"128"},{"key":"129","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.024713"},{"key":"130","doi-asserted-by":"publisher","DOI":"10.3390\/s22166199"},{"key":"131","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3173255"},{"key":"132","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2022.04.013"},{"key":"133","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2023.101418"},{"key":"134","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3215684"},{"key":"135","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3273705"},{"key":"136","doi-asserted-by":"publisher","DOI":"10.1109\/tccn.2023.3262239"},{"first-page":"1","article-title":"AI-engine enabled intelligent management in B5G\/6G networks","author":"H. Zhang","key":"137"},{"key":"138","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2023.3233988"},{"key":"139","doi-asserted-by":"publisher","DOI":"10.3390\/s22083031"},{"key":"140","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-022-09693-1"},{"key":"141","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3034744"},{"key":"142","doi-asserted-by":"publisher","DOI":"10.1109\/lsp.2020.3028184"},{"key":"143","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2019.2898944"},{"first-page":"397","article-title":"Sparsely connected neural network for massive MIMO detection","author":"G. Gao","key":"144"},{"first-page":"1465","article-title":"Deep learning for TDD and FDD massive MIMO: mapping channels in space and frequency","author":"M. Alrabeiah","key":"145"},{"key":"146","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2020.3011978"},{"key":"147","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2020.3005027"},{"key":"148","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2020.3004842"},{"key":"149","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3006518"},{"key":"150","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2020.3000836"},{"key":"151","doi-asserted-by":"publisher","DOI":"10.1002\/9781119562306.ch14"},{"first-page":"1222","article-title":"Current trends on deep learning-aided channel coding","author":"T.-M. Dang","key":"152"},{"key":"153","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2019.2951403"},{"first-page":"1","article-title":"Joint channel coding and modulation via deep learning","author":"Y. Jiang","key":"154"},{"first-page":"1","article-title":"2D\/3D ResNet deep neural network for 4G and 5G NR wireless channel estimation","author":"V. S. Usatyuk","key":"155"},{"key":"156","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2022.3221963"},{"first-page":"1","article-title":"Deep joint source channel coding for wireless image transmission with OFDM","author":"M. Yang","key":"157"},{"key":"158","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2022.3222874"},{"key":"159","doi-asserted-by":"publisher","DOI":"10.1109\/tccn.2022.3151935"},{"key":"160","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2017.1700200"},{"article-title":"Autonomous network management in multi-domain 6G networks based on graph neural networks","author":"K. Aykurt","key":"161","doi-asserted-by":"crossref","DOI":"10.1109\/NetSoft57336.2023.10175480"},{"first-page":"760","article-title":"Intent-based network management in 6G core networks","author":"P. Lingga","key":"162"},{"key":"163","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1201\/9781003205494-8","article-title":"5G-AIoT artificial intelligence of things: opportunity and challenges","volume-title":"Driving 5G Mobile Communications with Artificial Intelligence towards 6G","author":"D. A. Milovanovic","year":"2023"},{"first-page":"36","article-title":"Data handling mechanisms and collection framework for 5G vRAN in edge networks","author":"A. Flizikowski","key":"164"},{"first-page":"1","article-title":"A machine learning-based xAPP for 5G O-RAN to mitigate Co-tier interference and improve QoE for various services in a HetNet environment","author":"D. Anand","key":"165"},{"key":"166","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030647"},{"key":"167","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3073543"},{"key":"168","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.100.2100313"},{"key":"169","doi-asserted-by":"publisher","DOI":"10.1109\/tgcn.2021.3099804"},{"key":"170","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.104.2100422"},{"key":"171","first-page":"347","article-title":"Artificial intelligence and machine learning-based security enforcement techniques for 6G communication","volume-title":"Handbook of Research on Design, Deployment, Automation, and Testing Strategies for 6G Mobile Core Network","author":"D. Kaleeswaran","year":"2022"},{"article-title":"Blockchain and AI-enabled framework for dynamic spectrum management in multi-operator 6G networks","year":"2023","author":"M. J. Yaremko","key":"172"},{"key":"173","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3220701"},{"key":"174","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.001.2200508"},{"key":"175","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.005.2100711"},{"key":"176","doi-asserted-by":"publisher","DOI":"10.1109\/tap.2023.3298134"},{"key":"177","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.003.2200382"},{"key":"178","doi-asserted-by":"publisher","DOI":"10.3390\/fi14040117"},{"first-page":"1","article-title":"Future 6G communication networks: typical IoT network topology and Terahertz frequency challenges and research issues","author":"M. Ndiaye","key":"179"},{"first-page":"175","article-title":"6G satellite communications","author":"B. Evans","key":"180"},{"first-page":"626","article-title":"Design for sustainability-an imperative for future mobile networks","author":"D. Remedios","key":"181"},{"key":"182","doi-asserted-by":"publisher","DOI":"10.3390\/app12136617"},{"key":"183","doi-asserted-by":"publisher","DOI":"10.1109\/mvt.2022.3228399"},{"key":"184","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2023.3265425"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2024\/8845070.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2024\/8845070.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2024\/8845070.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T02:50:33Z","timestamp":1711421433000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/ijis\/2024\/8845070\/"}},"subtitle":[],"editor":[{"given":"Said","family":"El Kafhali","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2024,3,25]]},"references-count":184,"alternative-id":["8845070","8845070"],"URL":"https:\/\/doi.org\/10.1155\/2024\/8845070","relation":{},"ISSN":["1098-111X","0884-8173"],"issn-type":[{"type":"electronic","value":"1098-111X"},{"type":"print","value":"0884-8173"}],"subject":[],"published":{"date-parts":[[2024,3,25]]}}}